用户名: 密码: 验证码:
数字水印抗几何攻击理论及应用研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
计算机与网络多媒体技术的飞速发展极大地改变了人们的生活方式。借助于Internet人们可以很容易地实现文件的实时传输,而Bitcomet、eMule等下载软件的出现更加速了多媒体资源的共享与传播。在没有规范的网络监管的情况下,数字图像、音频与视频等多媒体产品在网络上被肆意地分发与下载,严重侵犯了作者的合法权益。数字水印技术在这种情况下应运而生,并且被认为是对数字产品进行版权保护的有效手段。但是目前已有的多数水印算法仅能够抵抗常规的噪声、压缩、滤波等信号处理攻击;当发生旋转、缩放、平移等几何变换的时候,很难成功地进行水印检测。因此,几何攻击也被认为是水印技术通向应用的瓶颈,研究能够抵抗几何攻击的数字水印技术具有重要的理论和现实意义。
     本文主要围绕能够抵抗几何攻击的数字图像水印技术展开研究。对抗几何攻击水印算法涉及的图像不变矩、图像归一化和特征点检测等相关技术进行了深入研究,并研究了基于以上技术的水印同步,提出了一系列的水印算法。本文的主要研究工作及贡献包括:
     1.深入研究了针对数字水印系统的几何攻击,包括几何攻击的类型,几何攻击对水印系统的作用,抵抗几何攻击的方法。首先,根据几何攻击对图像内容的作用将几何攻击分为全局几何攻击和局部几何攻击;其次,以图像的旋转和缩放攻击为例分别分析了几何攻击对空域水印算法和变换域水印算法的不同影响;再次,将目前抗几何攻击的数字水印算法分为三种,即基于几何校正的方法、基于几何不变域的方法和基于图像特征的方法,并对各种类型的方法进行了总结和分析,指出了各自的优缺点。
     2.提出了一种基于图像伪Zernike矩的抗几何攻击图像自适应零水印算法。该算法利用伪Zernike矩幅度对图像旋转的不变性,通过对原始图像伪Zernike矩的幅度进行奇偶量化生成原始的水印序列。在水印检测时,用相同的参数对受攻击图像的伪Zernike矩幅度进行奇偶量化得到提取的水印序列,并计算其与原始水印信号的相似度,进而判断水印存在与否。该算法为盲检测的零水印算法,不会造成图像质量的下降,并且该算法可以抵抗旋转、缩放等几何攻击以及JPEG压缩、噪声、滤波等常规攻击。
     3.提出了两种基于Harris特征点的水印同步方案。其基本思想是结合Harris特征点和图像归一化确定水印嵌入和提取的区域,保证嵌入和提取过程的同步性。针对所提出的两种水印同步方案,分别提出了两种鲁棒图像水印算法,分别在离散小波变换(DWT)域和空域嵌入水印,且水印提取不需要原始图像。实验结果表明了水印同步方案的有效性,所提出两种水印算法能够获得很高的图像质量,并能同时抵抗常规的各种信号处理攻击与几何攻击。
     4.提出了一个基于尺度空间特征点的图像水印系统框架。详细分析了该框架下水印算法设计所应遵循的原则,包括特征点的选择、局部区域的确定、嵌入域的选择、水印嵌入和提取策略的设计等具体问题。紧接着提出了两种能够同时抵抗传统信号处理攻击和几何攻击的图像水印算法。第一种算法对局部区域进行具有旋转不变性的分割,然后在非下采样Contourlet变换(NSCT)域嵌入二进制水印序列;第二种算法将二值水印图像在DWT域以一种自适应的方式嵌入到局部区域中。大量的实验结果表明这两种算法均能够很好地抵抗常规的信号处理攻击和几何攻击,与已有算法的性能比较也进一步验证了算法的优越性。
     5.提出了一种结合图像特征点与不变矩的水印嵌入和提取新思路。其基本思想是利用基于特征点的水印同步,将从图像局部区域中计算出的伪Zernike矩矢量作为水印信号,并通过修改特定阶数的矩来嵌入水印。在水印提取时通过所提出的最小距离检测器(Minimum Distance Decoder)判断水印存在与否。由于在图像的局部区域中嵌入水印,相对于已有的基于伪Zernike矩的方法可以获得更高的图像质量,且对几何攻击的鲁棒性也大大提高。Stirmark 4.0平台下的实验结果表明了算法的有效性。
     6.提出了一种新的基于空-时兴趣点(Space-Time Interest Point)的鲁棒视频水印算法。空-时兴趣点往往代表视频序列中感兴趣的事件或内在结构,而这些结构在视频序列受到干扰的时候很难被破坏。基于此,提出利用这些兴趣点进行视频水印嵌入和提取的同步,即确定水印嵌入的视频帧序号及在帧中的嵌入和提取位置。该算法能有效地解决视频水印中的时间维水印同步问题,不仅可以抵抗常规的图像处理攻击,还可以抵抗帧删除,帧平均,帧交换等针对视频水印的攻击。实验结果证明了算法的有效性。
The rapid development of computer and multimedia network has changed ourlives significantly. Real-time transmission of the files can be easily realized with thehelp of Internet. Meantime, the prevalence of online downloading softwares, such asBitcomet and eMule, has further accelerated the share and distribution of themultimedia contents. Without canonical monitoring, the multimedia products, suchas image, audio and video, have been distributed and downloaded randomly, whichhas greatly infringed the legal rights of the authors. The digital watermarkingtechnique appears accordingly and has been regarded as a promising way to protectthe copyright of digital products. However, most of the existing watermarkingschemes can only resist traditional signal processing attacks, such as added noise,image compression and filtering. When the watermarked image is subject togeometric transformations, such as rotation, scaling and translation (RST), it is hardto detect the watermark successfully. As a result, geometric attack is regarded as thebottleneck of the practical application of digital watermarking. It is of greattheoretical and practical importance to design digital watermarking schemes with theability to resist geometric attacks.
     In this dissertation, we mainly do researches on image watermarking schemeswith the ability to resist geometric attacks. The related techniques are first studiedincluding the invariant moment theory, image normalization and feature pointdetection. Then watermark synchronization schemes are presented as well as severalwatermarking algorithms. The main research work and contributions are as follows.
     1. In-depth researches are conducted on geometric attacks, including theclassification, their effects on the watermarking systems and the esistingcountermeasures. First, geometric attacks can be grouped into global attacks andlocal attacks according to their different principles. Second, the different effectsof geometric attacks on spatial domain watermarking shcmes and transformdomain schemes are analyzed respectively, with image rotation and scaling as anexample. Finally, we classify the current countermeasures into three kinds,namely inverse transformation based methods, invariant domain embedding andfeature based synchronization. The author also analyzes these methods and pointout the advantages and disadvantages respectively.
     2. An image adaptive zero watermarking scheme with the ability to resistgeometric attacks is presented based on the pseudo Zernike moment. Theproposed method employs the rotation invariant property of the magnitudes ofpseudo Zernike moments, and generates the original watermark sequence byapplying odd-even quantization on the pseudo Zernike magnitudes that arecomputed over the original image. During watermark detection, the sameparameters are used to apply odd-even quantization on the pseudo Zernikemagnitudes of the distorted image, producing the extracted watermark sequence.Then the similarity between the original watermark and the extracted one iscomputed and used to judge the presence of the watermark. This scheme is azero watermarking scheme so that it causes no degradation on image quality.Besides, it can resist both geometric attacks and traditional attacks, such asrotation, scaling, JPEG compression, added noise and filtering.
     3. Two watermark synchronization schemes are proposed based on the Harriscorner detector. The key idea is to determine the regions for both watermarkembedding and extraction by combining Harris feature points and imagenormalization. Based on the proposed synchronization schemes, two robustimage watermarking schemes are presented, which embed the watermark indiscrete wavelet transform (DWT) domain and spatial domain respectively.Besides, the original image is not needed in watermark detection. Experimentalresults show the effectiveness of the synchronization schemes. Besides, theproposed schemes can obtain good invisibility and they can resist traditionalsignal processing attacks and geometric attacks, simultaneously.
     4. A new framework for image watermarking system is presented based on thescale space feature points. The principles that watermarking schemes shouldfollow under this framework is analyzed in detail, for example how to choose thefeature points, how to determine the local regions, selection of embeddingdomain, watermark embedding and extraction strategy design, etc. Then tworobust image watermarking schemes are proposed, which can resist bothtraditional signal processing attacks and geometric attacks. The first scheme firstpartitions the local region in a rotation invariant pattern and embeds a binarywatermark sequence in the Nonsubsampled Contourlet Transform (NSCT)domain. The second scheme embeds a binary watermark image into the localregions adaptively in DWT domain. Extensive simulation results show that thesetwo schemes can resist both signal processing attacks and geometric attacks. Comparisons with the existing schemes also demonstrate the superiorities of theproposed scheme.
     5. A new watermark embedding and detection strategy is proposed, whichcombines image feature points and invariant moments. The basic idea is to usefeature point based watermark synchronization, and employs the pseudo Zernikemoment vectors computed from the local image regions as the watermark signal.Then the watermark is embedded by modifying the moment with predeterminedorder. Watermark detection can be achieved using the proposed minimumdistance decoder. As the watermark is embedded into local image regions, moresatisfactory image quality can be obtained compared to the existing pseudoZernike moment based watermarking methods. Besides, the robustness togeometric attacks is improved significantly. Simulation results using Stirmark4.0 have demonstrated the effectiveness of the proposed schemes.
     6. A new robust video watermarking scheme is presented using the space-timeinterest points. Space-time interest points represent interest events or inherentstructures of the video so that they cannot be easily destroyed when the video isdistorted. Based on this observation, we propose to use the space-time interestpoint for watermark synchronization. Namely the embedding and extractionframe index and positions are determined by these features. The proposedscheme can solve the probem of time-dimensional watermark synchronization invideo watermarking, and it can not only resist traditional image processingattacks but also video oriented attacks, such as frame removal, frame averagingand frame swapping. Simulation results demonstrate the effectiveness of theproposed scheme.
引文
[1] D.G. Feng and X.Y. Wang.“Progress and Prospect of Some FundamentalResearch on Information Security in China,”Journal of Computer Science andTechnology, 2006, 21(5), pp: 740-755.
    [2] C.X. Shen, H.G. Zhang, D.G. Feng et al.“Survey of Information Security,”Science in China Series F: Information Sciences, 2007, 50(3), pp: 273-298.
    [3] Digital Watermarking, from Wikipedia, the free encyclopedia, available online:http://en.wikipedia.org/wiki/Digital_watermarking
    [4] I.J. Cox, M.L. Miller, J.A. Bloom.“Digital Watermarking,”Morgan KaufmannPublishers, 2002.
    [5] I.J. Cox, M.L. Miller, J.A. Bloom et al. "Digital Watermarking andSteganography," (Second Edition), Morgan Kaufmann Publishers, 2008.
    [6]王炳锡,陈琦,邓峰森.“数字水印技术”,西安:西安电子科技大学出版社,2003.
    [7]孙圣和,陆哲明,牛夏牧.“数字水印技术及应用”,北京:科学出版社,2004.
    [8] J.S Pan, H.C Huang and L. C. Jain.“Intelligent Watermarking Techniques”,Singapore: World Scientific Publishing Company, 2004.
    [9] J.S Pan, H.C Huang and L. C. Jain et al.“Intelligent Multimedia Data Hiding:New Directions”, Germany: Springer, 2007.
    [10] M.D. Swanson, M. Kobayashi and A.H. Tewfik.“Multimedia Data Embeddingand Watermarking Techniques,”Proceedings of the IEEE, 1998, 86(6), pp:1064-1087.
    [11] F. Hartung and M. Kutter.“Multimedia Watermarking Techniques,”Proceedings of the IEEE, 1999, 87(7), pp:1079-1107.
    [12] C.I. Podilchuk and E.J. Delp.“Digital watermarking: algorithms andapplications,”IEEE Signal Processing Magazine, 2001, 18(4), pp: 33-46.
    [13] I.J. Cox, M.L. Miller.“The First 50 Years of Electronic Watermarking,”EURASIP Journal ofApplied signal processing, 2002, 2002(2), pp: 126-132.
    [14] Information Hiding, from Wikipedia, the free encyclopedia, available online:http://en.wikipedia.org/wiki/Information_hiding
    [15] F.A.P. Petitcolas, R.J. Anderson and M.G. Kuhn.“Information Hiding-ASurvey,”Proceedings of the IEEE, 1999, 87(7), pp: 1062-1078.
    [16] R. J. Anderson and F.A.P. Petitcolas.“On the Limits of Steganography,”IEEEJournal of SelectedAreas in Communications, 1998, 16(4), pp:474-481.
    [17] N. F. Johnson and S. Jajodia.“Exploring Steganography: Seeing the Unseen,”IEEE Computer, 1998, 31(2), pp: 26-34.
    [18]郭磊,数字图像的稳健水印技术研究.西安电子科技大学博士学位论文,2004.
    [19] M. Wu and B. Liu,‘‘Watermarking for Image Authentication,’’in Proceedingsof IEEE InternationalConferenceon Image Processing, 1998, pp: 437-441.
    [20] D. Kundur and D. Hatzinakos.“Digital Watermarking for Telltale TamperProofing and Authentication,”Proceedings of the IEEE, 1999, 87(7), pp:1167~1180.
    [21] G.J Yu, C.S Lu and H.Y.M. Liao.“Mean-quantization-based FragileWatermarking for Image Authentication,”Optical Engineering, 2001, 40(7), pp:1396-1408.
    [22] C.T. Li.“Digital Fragile Watermarking Scheme for Authentication of JPEGImages,”IEE Proceedings on Vision, Image and Signal Processing, 2004,151(6), pp: 460-466.
    [23] J.Q Hu, J.W. Huang, D.R. Huang et al.“Image Fragile Watermarking Based onFusion of Multi-Resolution Tamper Detection,”IEE Electronics Letters, 2002,38(24), pp: 1512-1513.
    [24] H. Yuan and X.P. Zhang.“Multiscale Fragile Watermarking Based on theGaussian Mixture Model,”IEEE Transactions on Image Processing, 2006,15(10), pp: 3189-3200.
    [25] N. Nikolaidis and I. Pitas.,“Robust Image Watermarking in the SpatialDomain,”Signal Processing, 1998, 66(3), pp: 385-403.
    [26] W.W. Zhu, Z.X. Xiong and Y.Q. Zhang.“Multiresolution Watermarking forImages and Video,”IEEE Transactions on Circuits and Systems for VideoTechnology, 1999, 9(4), pp: 545-550.
    [27] X.M. Niu, Z.M. Lu and S.H. Sun.“Digital Watermarking of Still Images withGray-level Digital Watermarks,”IEEE Transactions on Consumer Electronics,2000, 46(1), pp: 137-145.
    [28] I.J. Cox, M.L. Miller and A.L. McKellips.“Watermarking as Communicationswith Side Information”Proceedings of the IEEE, 1999, 87(7), pp: 1127– 1141.
    [29] M. Barni, F. Bartolini and A. Piva.“Improved Wavelet-based WatermarkingThrough Pixel-wise Masking,”IEEE Transactions onImage Processing, 2001,10(5), pp: 783-791.
    [30] T.K Tsui, X.P. Zhang and D. Androutsos.“Color Image Watermarking UsingMultidimensional Fourier Transforms,”IEEE Transactions on InformationForensics and Security, 2008, 3(1), pp:16-28.
    [31] R.G. van Schyndel, A.Z. Tirkel and C.F. Osborne.“A Digital Watermark,”inProceedings of IEEE International Conference on Image Processing, 1994,Austin, Texas, USA, vol.2, pp: 86-90.
    [32] I.J. Cox, J. Kilian, T. Leighton et al.“Secure Spread Spectrum Watermarkingfor Images, Audio and Video,”in Proceedings of IEEE InternationalConference on Image Processing, 1996, vol.3, pp: 243-246.
    [33] I.J. Cox, J. Kilian, T. Leighton et al.“Secure Spread Spectrum Watermarkingfor Multimedia,”IEEE Transactions on Image Processing, 1997, 6(12), pp:1673-1687.
    [34] Y.W. Kim, K.A. Moon and I.S. Oh.“A Text Watermarking Algorithm Based onWord Classification and Inter-word Space Statistics,”in Proceedings ofSeventh International Conference on Document Analysis and Recognition,2003, pp: 775-779.
    [35] M.A. Qadir and I. Ahmad.“Digital Text Watermarking: Secure ContentDelivery and Data Hiding in Digital Documents,”IEEE Aerospace andElectronic Systems Magazine, 2006, 21(11), pp: 18-21.
    [36] J.L. Yang, J.M. Wang and C.K. Wang et al.“A Novel Scheme forWatermarking Natural Language Text,”in Proceedings of InternationalConference on Intelligent Information Hiding and Multimedia SignalProcessing, 2007, vol.2, pp: 481-484.
    [37] W. Li, X.Y. Xue and P.Z. Lu.“Localized audio watermarking technique robustagainst time-scale modification,”IEEE Transactions on Multimedia, 2006,8(1), pp: 60-69.
    [38] S.J. Xiang, J.W. Huang.“Histogram-Based Audio Watermarking AgainstTime-Scale Modifications and Cropping Attacks,”IEEE Transactions onMultimedia, 2007, 9 (7), pp:1357-1372.
    [39] E.T. Lin and E.J. Delp.“Temporal Synchronization in Video Watermarking,”IEEETransactions on Signal Processing, 2004, 52(10), pp: 3007-3022.
    [40] Y.L. Wang and A. Pearmain.“Blind MPEG-2 Video Watermarking RobustAgainst Geometric Attacks: A Set of Approaches in DCT Domain,”IEEETransactions on Image Processing, 2006, 15(6), pp: 1536-1543.
    [41] B.L. Yeo and M.M. Yeung.“Watermarking 3D objects for Verification,”IEEEComputer Graphics andApplications, 1999, 19(1), pp: 36-45.
    [42] S. Zafeiriou, A. Tefas and I. Pitas.“Blind Robust Watermarking Schemes forCopyright Protection of 3D Mesh Objects,”IEEE Transactions onVisualization and Computer Graphics, 2005, 11(5), pp:596-607.
    [43]刘九芬,黄达人,黄继武.“图像水印抗几何攻击研究综述”,电子与信息学报, 2004, 26(9), pp: 1495-1503.
    [44] D. Delannay. Digital Watermarking Algorithms Robust Against Loss ofSynchronization, Ph.D Thesis,Universitécatholique de Louvain,2004.
    [45] V. Licks and R. Jordan.“Geometric attacks on image watermarking systems,”IEEE Multimedia, 2005, 12(3), pp:68-78.
    [46] D. Zheng, Y. Liu and J. Zhao.“A Survey of RST Invariant ImageWatermarking Algorithms,”in Proceedings of Canadian Conference onElectrical and Computer Engineering (CCECE), 2006, pp: 2086-2089.
    [47] D. Zheng, Y. Liu, J. Zhao et al.“A Survey of RST Invariant ImageWatermarking Algorithms,”ACM ComputingSurveys, 2007, 39(2), pp: 1-91.
    [48] J. Lichtenauer, I. Setyawan, T. Kalker et al.“Exhaustive Geometrical Searchand The False Positive Watermark Detection Probability,”in Proceedings ofSPIE Conference on Security and Watermarking of Multimedia Content, 2003,pp: pp. 203-214.
    [49] J. L. T. Kalker and G. Depovere.“Modelling the False-alarm and MissedDetection Rate for Electronic Watermarks,”in Proceedings of InternationalWorkshop on Information Hiding, 1998, pp:329.343.
    [50] M. L. Miller and J. A. Bloom.“Computing the Probability of False WatermarkDetection,”in Proceedings of International Workshop on Information Hiding,1999, pp. 146-158.
    [51] B. Zitováand J. Flusser.“Image Registration Methods: A survey,”Image andVision Computing, 2003,21(11), pp: 977-1000.
    [52] H.Z. Liu, B.L. Guo and Z.Z. Feng.“Pseudo-Log-Polar Fourier Transform forImage Registration,”IEEE Signal Processing Letters, 2006, 13(1), pp: 17-20.
    [53] P. Loo and N. G. Kingsbury.“Watermarking Using Complex Wavelets withResistance to Geometric Distortion,”in Proceedings of the 10th EuropeanSignal Processing Conference, 2000, pp:1677-1680.
    [54] I. Ozer, M. Ramkumar, and A. Akansu.“A New Method for Detection ofWatermarks in Geometrically Distorted Images,”in Proceedings of IEEEInternational Conference on Accoustic, Speech, and Signal Processing(ICASSP), 2000, pp:1963-1966.
    [55] W. Bender, D. Gruhl, N. Morimoto et al.“Techniques for Data Hiding,”IBMSystems Journal, 1996, 35(3-4), pp:313-336.
    [56] M. Kutter.“Watermarking Resisting to Translation, Rotation, and Scaling,”inProceedings of SPIE Conference on Security and Watermarking of MultimediaContents, 1998, vol.3528, pp: 423–431.
    [57] A. Herrigel, J.J.K. O’Ruanaidh, H. Petersen et al.“Secure Copyright ProtectionTechniques for Digital Images,”in Proceedings of the Second InternationalWorkshop on Information Hiding, 1998, vol.1525, pp: 169-190.
    [58] F. Deguillaume, G. Csurka, J.J.K. O’Ruanaidh et al.“Robust 3D DFT VideoWatermarking,”in Proceedings of SPIE Conference on Security andWatermarking of Multimedia Contents,, 1999, vol. 3657, pp: 113-124.
    [59] G. Csurka, F. Deguillaume, J.J.K. O’Ruanaidh et al.“A Bayesian Approach toAffine Transformation Resistant Image and Video Watermarking,”inProceedings of International Workshop on Information Hiding, 1999, pp:270-285.
    [60] R. Caldelli, M. Barni,F. Bartolini et al.“Geometric-invariant RobustWatermarking Through Constellation Matching in the Frequency Domain,”inProceedings of IEEE International Conference on Image Processing, 2000, pp:65-68.
    [61] S. Pereira and T. Pun.“Robust Template Matching for Affine Resistant ImageWatermarks,”IEEE Transactions on Image Processing, 2000, 9(6), pp:1123-1129.
    [62] W. Lu, H.T Lu, and F.L. Chung.“Feature Based Watermarking UsingWatermark Template Match,”Applied Mathematics and Computation, 2006,177(1), pp: 377-386.
    [63] S. Pereira, J.J.K. O’Ruanaidh, F. Deguillaume et al.“Template BasedRecovery of Fourier-Based Watermarks Using Log-polar and Log-log Maps,”in Proceedings of IEEE International Conference on Multimedia Computingand Systems (ICMCS), 1999, vol.1, pp: 870-874.
    [64] T. Tokar and D. Levicky.“Robust Watermarking of Gray Scale Images byUsing Synchronization Templates,”in Proceedings of 17th InternationalRadioelektronika Conference, 2007, pp: 1-4.
    [65] S. Pereira and T. Pun.“An Iterative Template Matching Algorithm Using theChirp-Z Transform for Digital Image Watermarking,”Pattern Recognition,2000, 33(1), pp: 173-175.
    [66] M.A. Rodríguez, F.P. González.“Analysis of Pilot-based SynchronizationAlgorithms for Watermarking of Still Images,”Signal Processing: ImageCommunication, 2002, 17(8), pp:611-633.
    [67] F. Hartung, J.K. Su, and B. Girod,“Spread Spectrum Watermarking:Malicious Attacks and Counterattacks,”in Proceedings of SPIE Conference onSecurity and Watermarking of Multimedia Contents, 1999, pp: 147-158.
    [68] F. Deguillaume, S. Voloshynovskiy, and T. Pun.“Method for the Estimationand Recovering from General Affine Transforms in Digital WatermarkingApplications,”in Proceedings of SPIE Conference on Security andWatermarking of Multimedia Contents, 2002, vol.4675, pp: 313-322.
    [69] D. Delannay and B. Macq.“Generalized 2D Cyclic Patterns for SecretWatermark Generation,”in Proceedings of IEEE International Conference onImage Processing, 2000, vol.2, pp:77-79.
    [70] D. Zheng and J.Y. Zhao.“LPM-based RST Invariant Digital ImageWatermarking,”in Proceedings of Canadian Conference on Electrical andComputer Engineering, 2003, vol.3, pp:1951-1954.
    [71] J.J.K. O’Ruanaidh and T. Pun.“Rotation, Scale and Translation InvariantDigital Image Watermarking,”in Proceedings of IEEE InternationalConference on Image Processing, 1997, vol.1, pp: 636-539.
    [72] J.J.K. O’Ruanaidh and T. Pun.“Rotation, Scale and Translation InvariantSpread Spectrum Digital Image Watermarking,”Signal Processing, 1998,66(3), pp: 303-317.
    [73] C.Y. Lin, M. Wu, J.A. Bloom et al.“Rotation, Scale, and Translation ResilientWatermarking for Images,”IEEE Transactions on Image Processing, 2001,10(5), pp: 767-782.
    [74] D. Zhang, Y. Liu and J.Y. Zhao.“RST Invariant Digital Image WatermarkingBased on a New Phase-only Filtering Method,”Signal Processing, 2005,85(12), pp: 2354-2370.
    [75] Y. Liu, D. Zheng and J.Y. Zhao.“A Rectification Scheme for RST InvariantImage Watermarking,”IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences, 2005, E88-A(1), pp: 314-318.
    [76] D. Zheng, J.Y. Zhao and A. El Saddik.“RST-invariant Digital ImageWatermarking Based on Log-Polar Mapping and Phase Correlation,”IEEETransactions on Image Processing, 2003, 13(8), pp: 753-765.
    [77] Y. Liu, D. Zheng and J.Y. Zhao.“An Image Rectification Scheme and ItsApplications in RST Invariant Digital Image Watermarking,”Multimedia ToolsandApplications, 2007, 34(1), pp: 57-84.
    [78] M. Farzam and S. Shirani.“A Robust Multimedia Watermarking TechniqueUsing Zernike Transform,”in Proceedings of the Fourth IEEE Workshop onMultimedia Signal Processing, 2001, pp: 529-534.
    [79] P. Amin and K.P. Subbalakshmi.“Rotation and Cropping Resilient DataHiding with Zernike Moments,”in Proceedings of IEEE InternationalConference on Image Processing, 2004, vol.4, pp: 2175-2178.
    [80] J. Chen, H.X Yao, W. Gao et al.“A Robust Watermarking Method Based onWarelet and Zernike Transform,”in Proceedings of IEEE InternationalSymposium on Circuits and Systems, 2004, pp: 173-176.
    [81] H.F. Li, S.X. Wang, W.W. Song et al.“A Novel Watermarking AlgorithmBased on SVD and Zernike Moments,”in Proceedings of IEEE InternationalConference on Intelligent and Security Informatics, 2005, pp: 448-453.
    [82] Q. Chen, X.L. Yang, J.Y. Zhao,“Robust Image Watermarking with ZernikeMoments,”in Proceedings of Canadian Conference on Electrical andComputer Engineering, 2005, pp: 1282-1285.
    [83] H.S. Kim and H.Y. Lee.“Invariant Image Watermark Using ZernikeMoments,”IEEE Transactions on Circuits and Systems for Video Technology,2003, 13(8), pp: 766-775.
    [84] Y.Q. Xin, S. Liao and M. Pawlak.“A Multibit Geometrically Robust ImageWatermark Based on Zernike Moments,”in Proceedings of InternationalConference on Pattern Recognition, 2004, vol.4, pp: 861-864.
    [85] Y.Q. Xin, S. Liao and M. Pawlak.“Geometrically Robust Image Watermarkingvia Pseudo-Zernike Moments,”in Proceedings of Canadian Conference onElectrical and Computer Engineering, 2004, vol.2, pp: 939-942.
    [86] Y.Q. Xin, S. Liao and M. Pawlak.“Robust Data Hiding With ImageInvariants,”in Proceedings of Canadian Conference on Electrical andComputer Engineering, 2005, pp:963-966.
    [87] P. Tzouveli, K. Ntalianis, and S. Kollias.“Human Face Watermarking Basedon Zernike Moments,”in Proceedings of IEEE International Symposium onSignal Processing and InformationTechnology, 2005, pp:399-404.
    [88] X.Y. Wu, H.M. Liu, and J.W. Huang.“Semi-fragile Watermarking Based onZernike Moments and Integer Wavelet Transform,”in Proceedings of 9thInternational Conference on Knowledge-Based Intelligent Information andEngineering Systems, 2005, vol.3682, pp: 1108-1114.
    [89] J.Z. Wu and J.Y. Xie.“Rotation, Scaling and Translation Invariant Blind ImageWatermarking Scheme Utilizing Zernike Moments,”Journal of DonghuaUniversity(English Edition), 2005, 22(5), PP: 53-58.
    [90] N. Singhal, Y.Y. Lee, C.S. Kim et al.“Robust Image Watermarking Based onLocal Zernike Moments,”in Proceedings of the 9th IEEE Workshop onMultimedia Signal Processing, 2007, pp: 401-404.
    [91] Y.Q. Xin, S. Liao and M. Pawlak.“Circularly Orthogonal Moments forGeometrically Robust Image Watermarking,”Pattern Recognition, 2007,40(12), pp: 3740-3752.
    [92] M. Alghoniemy and A.H. Tewfik.“Image Watermarking by MomentInvariants,”in Proceedings of IEEE International Conference on ImageProcessing, 2000, pp: 73-76.
    [93] M. Barni, F. Bartolini, V. Cappellini et al.“Text Based GeometricNormalization for Robust Watermarking of Digital Maps,”in Proceedings ofInternational Conference on Image Processing, 2001, vol.1, pp: 1082-1085.
    [94] M. Alghoniemy and A.H. Tewfik.“Geometric Distortion Correction throughImage Normalization,”in Proceedings of International Conference onMultimedia and Expo, 2000, vol.3, pp: 1291-1294.
    [95] M. Alghoniemy and A.H. Tewfik.“Geometric Distortions Correction in ImageWatermarking,”in Proceedings of SPIE Conference on Security andWatermarking of Multimedia Contents, 2000, vol.3971,pp: 82-89.
    [96] Q. Song, G.X. Zhu, and H.J. Luo.“Image Watermarking Based on ImageNormalization,”in Proceedings of IEEE International Symposium onCommunications and InformationTechnology, 2005, vol.2, pp: 1501-1504.
    [97] Q. Song, G.X. Zhu, and H.J. Luo.“Geometrically Robust Image WatermarkingBased on Image Normalization,”in Proceedings of International Symposiumon Intelligent Signal Processing and Communication Systems, 2005, pp:333-336.
    [98] P. Dong P and N.P. Galatsanos.“Affine Transformation ResistantWatermarking Based on Images Normalization,”in Proceedings ofInternational Conference on Image Processing, 2002, pp: 489-492.
    [99] P. Dong, J.G. Brankov, N.P. Galatsanos et al.“Digital watermarking robust togeometric distortions”, IEEE Transactions on Image Processing, 2005, 14(2),pp: 2140-2150.
    [100] H.I. Kang and E.J. Delp.“An Image Normalization Based WatermarkingScheme Robust to General Affine Transformation,”in Proceedings ofInternational Conference on Image Processing, 2004, pp: 1553-1556.
    [101] M. Alghoniemy and A.H. Tewfik.“Geometric Invariance in ImageWatermarking,”IEEE Transactions on Image Processing, 2004, 13(2), pp:145-153.
    [102] D. Zheng and J.Y. Zhao.“A Rotation Invariant Feature and ImageNormalization Based Image Watermarking Algorithm,”in Proceedings ofInternational Conference on Multimedia and Expo, 2007, pp:2098-2101.
    [103] A. Venkataramana and P.AnanthRaj.“Image Watermarking Using KrawtchoukMoments,”in Proceedings of International Conference on Computing: Theoryand Applications, 2007, pp: 676-680.
    [104] L. Zhang, W.W. Xiao and Z. Ji.“Local Affine Transform Invariant ImageWatermarking by Krawtchouk Moment Invariants,”IET Information Security,2007, 1(3), pp: 97-105.
    [105] L. Zhang, G.B. Qian, and W.W. Xiao.“Geometric Distortions Invariant BlindSecond Generation Watermarking Technique Based on Tchebichef Moment ofOriginal Image,”Journal of Software, 2007, 18(9), pp: .2283?2294.
    [106] L. Zhang, G.B. Qian, and W.W. Xiao et al.“Geometric Invariant Blind ImageWatermarking by Invariant Tchebichef Moments,”Optics Express, 2007, 15(5),pp: 2251-2261.
    [107] H.S Kim, Y. Baek, H.Y Lee et al.“Robust Image Watermark Using RadonTransform and Bispectrum Invariants,”in Proceedings of the 5th InternationalWorkshop on Information Hiding, 2002, pp:145-159.
    [108] M. Kutter, S. K. Bhattacharjee, and T. Ebrahimi.“Towards Second GenerationWatermarking Schemes,”in Proceedings of International Conference onImage Processing, 1999, vol.1, pp: 320-323.
    [109] A. Nikolaidis and I. Pitas.“A Robust Feature-Based Technique forWatermarking Frontal Face Images,”in Proceedings of IEEE-EURASIPWorkshop on Nonlinear Signal and Image Processing, 1999, vol. 1, pp:341-345.
    [110] A. Nikolaidis and I. Pitas,“Robust Watermarking of Facial Images Based onSalient Geometric Pattern Matching,”IEEE Transactions on Multimedia, 2000,2(3), pp: 172-184.
    [111] M.U. Celik, E. Saber, G. Sharma et al.“Analysis of Feature-Based GeometryInvariant Watermarking,”in Proceedings of SPIE Conference on Security andWatermarking of Multimedia Content, 2001, vol.4314, pp: 261-268.
    [112] Z. Ji, W.W. Xiao, and J.H Wang.“A Rotation and Scaling Invariant SecondGeneration Watermarking Scheme,”in Proceedings of IEEE Region 10Conference on Computers, Communications, Control and Power Engineering,2002, vol.2, pp: 921-924.
    [113] P. Bas, J.M. Chassery, and B. Macq.“Image Watermarking: An Evolution toContent Based Approaches,”Pattern Recognition, 2002, 35(3), pp: 545-561.
    [114] P. Bas, J.M. Chassery, and B. Macq.“Geometrically Invariant WatermarkingUsing Feature Points,”IEEE Transactions on Image Processing, 2002, 11(9),pp: 1014-1028.
    [115] K. She, J.C. Huang, and M.T. Zhou.“Using Key Points to Improve RobustReference Watermarking Algorithm,”in Proceedings of InternationalConference on Information Reuse and Integration, 2003, pp: 311-316.
    [116] C.W. Tang and H.M. Hang.“A Feature-based Robust Digital ImageWatermarking Scheme,”IEEE Transactions on Signal Processing, 2003, 51(4),pp: 950-959.
    [117] H.Y. Lee, J.T. Kim, H.Y. Lee et al.“Content-Based Synchronization Using theLocal Invariant Feature for Robust Watermarking,”Lecture Notes in ComputerScience, 2004, vol. 3325, pp: 122-134.
    [118] J.S. Seo and C.D. Yoo.“Localized Image Watermarking Based on FeaturePoints of Scale-Space Representation,”Pattern Recognition, 2004, 37(7), pp:1365-1375.
    [119]邓峰森,王炳锡.“基于特征点的抗几何失真数字图像水印”,信号处理,2005,21(1), pp: 12-16.
    [120] Y. Liu and J.Y. Zhao.“A Robust RST Invariant Image Watermarking MethodBased on Locally Detected Features,”in Proceedings of IEEE InternationalWorkshop on Haptic Audio Visual Environments and their Applications, 2005,pp: 133-138.
    [121] M. Tone and N. Hamada.“Affine Invariant Digital Image WatermarkingUsing Feature Points,”in Proceedings of RISP International Workshop onNonlinear Circuit and Signal Processing, 2005, pp: 117-120.
    [122] N. Chotikakamthorn and N. Pantuwong.“Attacks on Feature-basedAffine-invariant Watermarking Methods,”in Proceedings of InternationalConference on Computer and InformationTechnology, 2005, pp:706- 710.
    [123] H.Y. Lee, H.K. Lee, and J. Lee.“Comparison of Feature ExtractionTechniques for Watermark Synchronization,”Lecture Notes in ArtificialIntelligence, 2005, vol. 3684,pp: 309-316.
    [124] H.Y. Lee, I.K. Kang, H.K. Lee et al.“Evaluation of Feature ExtractionTechniques for Robust Watermarking,”in Proceedings of InternationalWorkshop on Digital Watermarking, 2005, vol.3710,pp: 418-431.
    [125] H.Y. Lee, C.H. Lee, H.K. Lee et al.“Feature-Based Image WatermarkingMethod Using Scale-Invariant Keypoints,”in Proceedings of Pacific RimConference on Multimedia, 2005, vol.3768, pp:313-325.
    [126] X.J. Qi and J. Qi.“Image Content-based Geometric Transformation ResistantWatermarking Approach,”in Proceedings of International Conference onAudio, Speech, and Signal Processing, 2005, vol.2, pp: 829-832.
    [127]王向阳,邬俊,侯丽敏.“基于图像特征的数字水印算法研究”,中国图象图形学报,2006,11(11), 1562-1565.
    [128] J. Weinheimer, X.J. Qi, and J. Qi.“Towards a Robust Feature-BasedWatermarking Scheme,”in Proceedings of International Conference on ImageProcessing, 2006, pp: 1401-1404.
    [129] N. Terzija and W. Geisselhardt.“A Novel Synchronisation Approach forDigital Image Watermarking Based on Scale Invariant Feature Point Detector,”Proceedings of International Conference on Image Processing, 2006, pp:2585-2588.
    [130] Y.W. Yu, Z.D. Lu, H.F. Ling et al.“A Robust Blind Image WatermarkingScheme Based on Feature Points and RS-invariant Domain,”in Proceedings ofInternational Conference on Signal Processing, 2006, vol.2.
    [131] Y. Liu and J.Y. Zhao.“A Robust Image Watermarking Method Based onAdaptive Feature Points Detection,”in Proceedings of InternationalConference on Communications, Circuits and Systems, 2006, vol.1, pp: 49-53.
    [132] C. Jin.“Affine Invariant Watermarking Algorithm Using Feature Matching,”Digital Signal Processing, 2006, 16(3), pp: 247-254.
    [133] H.Y. Lee and H.K. Lee.“Copyright Protection through Feature-basedWatermarking using Scale-invariant Keypoints,”in Proceedings ofInternational Conference on Consumer Electronics, 2006, pp: 225- 226.
    [134] J.S. Seo and C.D. Yoo.“Image Watermarking Based on Invariant Regions ofScale-Space Representation,”IEEE Transactions on Signal Processing, 2006,54(4), pp: 1537-1549.
    [135] H.Y. Lee, H.S. Kim and H.K. Lee.“Robust Image Watermarking Using LocalInvariant Features,”Optical Engineering, 2006, 45(3), pp: 037002(1-11).
    [136]王向阳,邬俊,侯丽敏.“一种基于图像特征点的数字水印嵌入方法”,电子学报,2007,35(7), pp: 1318-1322.
    [137] V.Q. Pham, T. Miyaki, T. Yamasaki et al.“Geometrically InvariantObject-Based Watermarking using SIFT Feature,”in Proceedings ofInternational Conference on Image Processing, 2007, vol.3, pp:V-473-V476.
    [138] C. Deng, X. Gao, D. Tao et al.“Digital Watermarking in Image AffineCo-Variant Regions,”in Proceedings of International Conference on MachineLearning and Cybernetics, 2007, vol.4, pp:2125-2130.
    [139] X.J. Qi and J. Qi.“A Robust Content-based Digital Image WatermarkingScheme,”Signal Processing, 2007, 87(6), pp: 1264-1280.
    [140] X.Y. Wang and J. Wu.“A Feature-based Robust Digital Image WatermarkingAgainst Desynchronization Attacks,”International Journal of Automation andComputing, 2007, 4(4), pp: 428-432.
    [141] X.Y. Wang, J. Wu and P.P. Niu.“A New Digital Image WatermarkingAlgorithm Resilient to Desynchronization Attacks,”IEEE Transactions onInformation Forensics and Security, 2007, 2(4), pp:655-663.
    [142] M. Tone and N. Hamada.“Scale Change and Rotation Invariant Digital ImageWatermarking Method,”Systems and Computers in Japan, 2007, 38(10), pp:1-11.
    [143]王向阳,侯丽敏,邬俊.“基于图像特征点的强鲁棒数字水印嵌入方案”,自动化学报,2008,34(1), pp: 1-6.
    [144] X.Y. Wang, L.M. Hou, and J. Wu.“A Feature-based Image WatermarkingScheme Robust to Geometric Attacks,”Image and Vision Computing, 2008,26(7), pp: 980-989.
    [145] M. Vatsa, R. Singh, and A. Noore.“Feature Based RDWT Watermarking forMultimodal Biometric System,”Image and Vision Computing, 2009, 27(3),pp: 293-304.
    [146] D. Coltuc and P. Bolon.“Robust Watermarking by Histogram Specification,”in Proceedings of International Conference on Image Processing, 1999, vol.2,pp: 236-239.
    [147] C.H. Lin, D.Y. Chan, H. Su et al.“Histogram-oriented WatermarkingAlgorithm: Colour Image Watermarking Scheme Robust Against GeometricAttacks and Signal Processing,”IEE Proceedings on Vision, Image and SignalProcessing, 2006, 153(4), pp: 483-492.
    [148] S.J. Xiang, H.Y. Kim, J.W. Huang.“Invariant Image Watermarking Based onStatistical Features in the Low-Frequency Domain,”IEEE Transactions onCircuits and Systems forVideoTechnology, to appear.
    [149] S. Roy, E.C. Chang.“Watermarking Color Histograms,”Proceedings ofInternational Conference on Image Processing, 2004, vol.4, pp:2191- 2194.
    [150] P.T. Yu, H.H. Tsai, and J.S. Lin.“Digital Watermarking Based on NeuralNetworks for Color Images,”Signal Processing, 2001, 81(3), pp: 663-671.
    [151] R.M. Shen, Y.G. Fu, and H.T. Lu.“A Novel Image Watermarking SchemeBased on Support Vector Regression,”Journal of Systems and Software, 2005,78(1), pp: 1-8.
    [152]吴健珍,谢剑英.“基于支持向量机同步的自适应水印检测方法,”上海交通大学学报,2006,40(3), pp: 480-484.
    [153] J.Z. Wu, J.X. Xie, and Y.P. Yang.“Image-Moment Based Affine InvariantWatermarking Scheme Utilizing Neural Networks,”Journal of BeijingInstituteof Technology, 2006, 15(1), pp: 71-75.
    [154] H.H. Tsai and D.W. Sun.“Color Image Watermark Extraction Based onSupport Vector Machines,”Information Sciences, 2007, 177(2), pp: 550-569.
    [155] X.Y. Wang and C.Y. Cui.“A Novel Image Watermarking Scheme AgainstDesynchronization Attacks by SVR Revision,”Journal of VisualCommunication andImage Representation, 2008, 19(5), pp: 334-342.
    [156] X.Y. Wang, H.Y. Yang, C.Y. Cui.“A SVM-based Robust Digital ImageWatermarking Against Desynchronization Attacks,”Signal Processing, 2008,88(9), pp: 2193-2205.
    [157] J.L. Dugelay, S. Roche, C. Rey et al.“Still-Image Watermarking Robust toLocal Geometric Distortions,”IEEE Transactions on Image Processing, 2006,15(9), pp: 2831-2842.
    [158] M. K. Hu,“Visual Pattern Recognition by Moment Invariants,”IRETransactions onInformationTheory, 1962, vol.IT-8, pp: 179-187.
    [159] C.H. Teh and R.T. Chin.“On Image Analysis by the Methods of Moments,”IEEE Transactions on Pattern Analysis and Machine Intelligence, 1988, 10(4),pp: 496-513.
    [160] Y.H Pang, A.T B. Jin and D.N.C. Ling.“A Robust Face Recognition System,”in Proceedings of 18th Australian Joint Conference on Artificial Intelligence,2005, vol.3809, pp: 1217-1220.
    [161] S. Alirezaee, H. Aghaeinia, M. Ahmadi et al.“A Weighted Pseudo-ZernikeFeature Extractor for Face Recognition," in Proceedings of 11th IEEEInternational Conference on Systems, Man and Cybernetics, 2005, pp:2128-2132.
    [162] A. Broumandnia and J. Shanbehzadeh.“Fast Zernike Wavelet Moments forFarsi Character Recognition,”Image and Vision Computing, 2007, 25(5), pp:717-726.
    [163] S. Liao and M. Pawlak.“On the Accuracy of Zernike Moments for ImageAnalysis,”IEEE Transactions on Pattern Analysis and Machine Intelligence,1998, 20(12): 1358-1364.
    [164] S.M. Smith and J.M. Brady.“SUSAN-A New Approach to Low Level ImageProcessing,”International Journal of ComputerVision, 1997, 23(1), pp: 45-78.
    [165] C. Harris and M. Stephens.“A Combined Corner and Edge Detector,”inProceedings of the 4thAlveyVision Conference, 1988, pp: 147-151.
    [166] K. Mikolajczyk and C. Schmid.“Indexing Based on Scale Invariant InterestPoints,”in Proceeding of the 8th International Conference on Computer Vision,2001, pp: 525-531.
    [167] K. Mikolajczyk and C. Schmid.“Scale and Affine Invariant Interest PointDetectors,”International Journal of ComputerVision, 2004, 60(1), pp: 63-86.
    [168] D.G. Lowe.“Distinctive Image Features from Scale-invariant Keypoints,”International Journal of ComputerVision, 2004, 60(2), pp: 91-110.
    [169] T. Lindeberg.“Scale-Space Theory: A Basic Tool for Analysing Structures atDifferent Scales," Journal of Applied Statistics, 1994, 21(2), pp: 224-270.
    [170] S.C. Pei and C.N. Lin.“Image Normalization for Pattern Pecognition,”Imageand Vision Computing, 1995, 13(10), pp: 711?723.
    [171] A.B. Watson, G. Y. Yang, J.A. Solomon et al.“Visibility of WaveletQuantization Noise,”IEEE Transactions on Image Processing, 1997, 6(8), pp:1164-1175.
    [172] A. Cunha, J. Zhou, and M. Do.“The Nonsubsampled Contourlet Transform:Theory, Design, and Applications,”IEEE Transactions on Image Processing,2006, 15(10), pp: 3089-3101.
    [173] F.A.P. Petitcolas, R.J. Anderson,and M. G. Kuhn.“Attacks on CopyrightMarking Systems,”in Proceedings of International Workshop on InformationHiding, 1998, pp:219-239.
    [174] F.A.P. Petitcolas.“Watermarking Schemes Evaluation,”IEEE SignalProcessing, 2000, 17(5), pp: 58–64.
    [175] D. Gwenael, and J.L. Dugelay,“A Guide Tour of Video Watermarking,”Signal Processing:Image Communication, 2003, 18(4), pp:263-282.
    [176] G.C. Langelaar, and L.L. Reginald,“Optimal Differential EnergyWatermarking of DCT Encoded Images and video,”IEEE Transactions onImage Processing, 2001, 10(1), pp: 148-158.
    [177] A.M. Alattar, E.T. Lin, and M.U. Celik,“Digital Watermarking of LowBit-Rate Advanced Simple Profile MPEG-4 Compressed Video,”IEEETransactions on Circuits and Systems for Video Technology, 2003, 13(8), pp:787-800.
    [178] M. Noorkami, and R.M. Mersereau,“A Framework for Robust Watermarkingof H.264 Encoded Video with Controllable Detection Performance,”IEEETransactions onInformationForensics and Security, 2007, 2(1), pp:14-23.
    [179] J. Zhang, T.S.H. Anthony, G. Qiu, et al.“Robust Video Watermarking ofH.264/AVC", IEEE Transactions on Circuits and Systems II, 2007, 54(2), pp:205-209.
    [180] F. Deguillaume, G. Csurka, J. O'Ruanaidh, et al.“Robust 3D DFT VideoWatermarking,”in Proceedings of SPIE Internatioal Worpshop on Securityand Watermarking of Multimedia Contents, 1999,vol. 3657, pp: 113-124.
    [181] J. Yang, J.P. Hu, and P. Liu.“Video Watermarking by 3D DCT,”inProceedings of IEEE International Conference on Signal Processing, 2004,vol. 1, pp: 861-864.
    [182] P. Campisi, A. Neri.“Video Watermarking in the 3D-DWT Domain UsingPerceptual Masking,”in Proceedings of IEEE International Conference onImage Processing, 2005, vol. 1, pp:997-1000.
    [183] I. Laptev.“On Space-Time Interest Points,”International Journal of ComputerVision, 2005, 64(2/3), pp: 107-123.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700