用户名: 密码: 验证码:
矢量地理数据数字水印模型与算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
矢量地理数据是国家基础设施建设和地球科学研究的支撑性成果之一,在国家经济、国防建设中占有十分重要的地位。在目前的网络化、数字化时代,矢量地理数据在数据获取、访问、传播、复制等方面更为便捷,矢量地理数据的安全问题特别是数据版权安全问题显得更加突出,如何利用可靠的技术手段来保护矢量地理数据的版权是目前急需解决的重大社会需求。
     数字水印技术是近年来发展起来的信息安全前沿技术,是保护矢量地理数据安全的有效手段。本文从矢量地理数据水印技术的特征分析出发,运用小波变换、集合映射、常函数、数理统计等数学理论,对矢量地理数据数字水印模型和算法进行了深入的研究,主要研究成果如下:
     (1)基于矢量地理数据自身的特征,阐述了矢量地理数据水印技术的特点。分析了水印攻击对矢量地理数据的影响,对矢量地理数据水印攻击进行了分类,探讨了抵抗不同攻击方式的水印算法设计的基本策略。
     (2)基于矢量地理数据特点分析,提出三种不同的矢量地理数据非盲水印算法。通过把水印信息嵌入到数据的特征点中提出了一种抗数据压缩的矢量地理数据水印算法;在线状数据中插入冗余点,通过冗余点在线状数据上的移动来嵌入水印信息,提出了一种保持几何形状的矢量地理数据水印算法;基于小波变换,利用分段嵌入思想,提出了一种基于小波变换的矢量地理数据水印算法。
     (3)通过矢量地理数据水印嵌入和提取过程中关键技术分析,基于集合映射思想,提出了一种矢量地理数据水印嵌入和提取模型,可用于指导矢量地理数据水印算法的设计与实现;在水印嵌入和提取模型的基础之上,利用无意义水印信息生成技术,提出了一种适合于小数据量数据且能有效抵抗数据增删攻击的矢量地理数据水印算法。
     (4)利用量化规则的对称性特点,采用匹配检测方法,提出了一种抵抗数据平移攻击的矢量地理数据空域水印算法,算法能抵抗数据增删和数据平移组成的复合攻击;基于常函数对于某些几何变换具有的不变特性,推证了一个平移、旋转、放缩变换下的常函数,提出了一种能抵抗几何变换矢量地理数据水印算法,算法能有效抵抗数据增删、平移、旋转、放缩以及以上攻击组成的复合攻击。
     (5)分析了矢量地理数据水印攻击中拼接攻击的特点,探讨了抗数据拼接攻击的基本对策。通过单点检测结果的可视化显示,提出了一种基于单点检测可视化的交互式水印提取和检测算法;为了实现批量的自动化水印检测,通过网格划分的检测方法,提出了基于网格划分-检测-合并的抗拼接攻击矢量地理数据水印算法。提出的抗拼接攻击水印算法能从各种不同方式的拼接攻击中有效检测到水印信息。
     (6)提出了一种矢量地理数据鲁棒水印检测算法,解决了矢量地理数据盲水印检测过程中检测阈值的设定问题,并通过实验验证了检测算法的合理性;提出了一种矢量地理数据自检测水印算法,解决了在没有原始水印信息的情况下,如何有效判断载体数据是否含有水印信息的问题。
     (7)分析了水印嵌入对矢量地理数据水印可用性的影响,顾及水印数据的可用性,构建了四种基本的空间约束规则,进而建立了顾及空间约束的矢量地理数据水印嵌入策略。
     (8)基于水印模型和算法的研究,设计了三层次水印系统整体框架,实现了矢量地理数据数字水印原型系统,并阐述了系统的主要功能。
Vector geographic data is one of the supportive achievements in the field of national infrastructure and geosciences research, and plays a significant role in national economy and defenses. With the development of internetwork and computer technology, the acquisition, access, dissemination and copying of vector geographic data are more and more convenient, thus an important issue that arises in the security and copyright issues of vector geographic data is becoming increasingly salient. How to use feasible technology to secure the copyright protection of vector geographic data is a major social need which is urgently needed to resolve.
     Digital watermarking technology is a new information security technology, and can provide a feasible and practical solution for the copyright protection for the vector geographic data. The characteristics of vector geographic data watermark technology are analyzed, and the digital watermarking models and algorithms for vector geographic data are studied based on wavelet transform, collection mappings, constant function, and mathematical statistics and so on. The main results are as follows:
     (1) Based on the own characteristics of the vector geographic data, the characteristics of the digital watermarking technology for vector geographic data is analyzed; this paper classify the watermarking attack of vector geographic data through the analysis of the impacts of different watermarking attack; the design strategies of watermarking algorithm against different attacks are discussed.
     (2) Based on the characteristics of vector geographic data, three different watermarking algorithms for vector geographic data are proposed. A vector geographic data watermarking algorithm resisted data compression is proposed by embedding watermark into feature points; a high-fidelity vector geographic data watermarking algorithm is proposed through embedding watermark in the moving redundant points that inserting into line segment; a watermarking algorithm for vector geographic data is proposed based on the wavelet transform and the segment-embedding thinking.
     (3) Through the analysis of the key technology of watermark embedding and extracting, a watermarking model for vector geographic data is proposed based on set mappings thought, the model can be used to guide the design and implementation of vector geographical data watermarking algorithm. Based on the proposed model and non-mean watermark generation, a watermarking algorithm adapted small data for vector geographic data is proposed, the proposed algorithm can resist data adding and deleting attacks.
     (4) A watermarking algorithm for vector geographical data resisted data translation is proposed based on the symmetry characteristics of quantitative rules and the match detection method, the proposed algorithm can resist data adding and deleting attacks and also can resist compound attacks composed of data translation ,data adding and data deleting attacks. Based on invariant function has non-denatured for some of the transform, a invariant function under translation, rotation, scale transformation is derived, then a watermarking algorithm resist geometrical transform is proposed, which can resist data adding, data deleting, data translation, data rotation, data scaling and complex attacks composited of above attacks.
     (5) The characteristics of splicing attack is analyzed, basic strategies resist splicing attack are discussed. By visualizing the single point detecting result, a interactive watermark detection algorithm resists splicing attack is proposed; in order to achieve automation and batch watermark detection, a watermark detection based on method of meshing-detection-merging which also resist splicing attack is proposed. The proposed algorithms can detect watermark exactly from the watermark data which suffer different types of data splicing attacks.
     (6) A robust watermark detection algorithm is proposed, which solves the problem of setting detection threshold, experimental results show that the proposed algorithm is adapted to vector geographical data. A self-detection watermarking algorithm for vector geographical data is proposed, which can be used to judge whether there is watermark in the vector geographical data.
     (7) The impact of watermarking to the usability of watermark vector geographical data is analyzed, considering the usability of watermark-data, four types of spatial constraint rules are established, and a watermark embedding strategy is constructed based on the space constraint rules.
     (8) Based on the research of watermarking models and algorithms, a three-level framework for watermarking system is designed, digital watermarking prototype system for vector geographical data is constructed, and the main function of the digital watermarking system for vector geographical data is introduced.
引文
[1]王家耀.空间信息系统原理[M].北京:科学出版社,2004.
    [2]邬伦,刘瑜等.地理信息系统―原理、方法和应用[M].北京:科学出版社,2005.
    [3]孙圣和,陆哲明,牛夏牧.数字水印技术与应用[M].北京:科学出版社,2004.
    [4] Chung,T.Y.,Hong,M.S.,Oh,Y,N.,Shin,D.H.,Park,S.H..Digital watermarking for copyright protection of MPEG2 compressed video[J].IEEE Transactions on Consumer Electronics,1998,24(3):895-901.
    [5]张春田,苏育挺.信息产品的版权保护技术―数字水印[J].电信科学,1998,14(12):15-17.
    [6] Chang-Tsun Li,Der-Chyuan Lou,Tsung-Hsu Chen.Image authentication and integrity verification via content-based watermarks and a public key cryptosystem[C] . Proceedings of 2000 International Conference on Image Processing,Vancouver,BC,Canada,2000:694-697.
    [7] M. Barni,F. Bartolini,V. Cappellini,E. Magli,G. Olmo.Near-lossless digital watermarking for copyright protection of remotely sensed images[A].In:Proc,ICARSS,Toronto,Canada,June 2002,3:1447-1449.
    [8]王善辉.应用于广播监控的视频水印技术研究[D].吉林:吉林大学,2006.
    [9]田乐,李宇.一种基于数字水印的媒体自动识别技术[J].计算机应用,2007,27(10):2461-2463.
    [10] Ro P,Dn V.A Robust Digital Watermarking Scheme for Video Copyright Protection in the Wavelet Domain[J].MEASUREMENT.,2010,43(10) :1720-1726.
    [11] Barni M,Bartolin F,Cappellini V.Watermarking-based protection of remote sensing images:Requirements and possible solutions[J].IEEE Transactions on Image Processing,2003,12(6):1-12.
    [12] Barni M,Bartolini F,Cappellini V,et al.Near-lossless Digital Watermarking for Copyright Protection of Remote Sensing Images[C].Proc.of IEEE International Conference on Image Processing.2003-10:64-76.
    [13]隋雪莲,王振国,耿则勋.一种用于版权通知和保护的遥感图像水印算法[J].遥感信息,2007(3):25-28
    [14]王向阳,杨红颖,邬俊.基于内容的离散余弦变换域自适应遥感图像数字水印算法[J].测绘学报,2005,34(4):324-330.
    [15]耿迅,龚志辉,张春美.基于HVS和整数小波变换的遥感图像水印算法[J].测绘通报,2007,8:20-22.
    [16]朱长青,符浩军,杨成松.基于整数小波变换的栅格数字地图数字水印算法[J].武汉大学学报·信息科学版,2009, 34(5):619-621.
    [17]闾国年,刘爱利.数字水印技术的DEM版权保护适用性研究[J].遥感学报,2008,12(5):810-818.
    [18]刘爱利,闾国年.基于DCT域数字水印技术的DEM版权保护研究[J].地球信息科学,2008,10(2):214-223
    [19]王志伟,朱长青,殷硕文.一种基于DFT的DEM自适应数字水印算法[J].中国图象图形学报,2010, 15(5):796-801.
    [20]张丽娟,李安波,闾国年等.GIS矢量数据的自适应水印研究[J].地球信息科学,2008,10(6): 724-728.
    [21] M. Samoa, Y. Matsuura and Y. Takashima.A Scheme of digital watermarking for geographical map data[C].Proceedings of the Symposium on Cryptography and Information Security,Okinama,Japan, 2000:26-28.
    [22] Kang H.A vector watermarking using the generalized square mask[C].Proceeding of the International Conference on Information Technology:Coding and Computing,Las Vegas,NV,USA,2001:234-236.
    [23]李媛媛,许录平.用于矢量地图版权保护的数字水印[J].西安电子科技大学学报·自然科学版, 2004,31(5):719-723.
    [24] Ohbuchi.Robust watermarking of vector digital maps[C].Proceeding of the IEEE International Conference on Multimedia and Expo,Lausanne,Switzerland 2002,1:577-580.
    [25]王勋,林海,鲍虎军.一种鲁棒的矢量地图数字水印算法[J].计算机辅助设计与图形学学报,2004,16(10):1377-1381.
    [26]马桃林,顾种,张良培.基于二维矢量数字地图的水印算法研究[J].武汉大学学报·信息科学版,2006,31(9):792-794.
    [27] Kyi Tae Park,Kab Il Kim,Hwan Il Kang,Seung Soo Han.Digital geographical map watermarking using polyline interpolation[C].Proceedings of the IEEE Pacific Rim Conference on Multimedia,Hsinchu,Taiwan,2002:58-65.
    [28]贾培宏,马劲松,史照良,徐志中.GIS空间数据水印信息隐藏与加密技术方法研究[J].武汉大学学报·信息科学版,2004,29(8):747-751.
    [29] Hongmei Gou,Min Wu.Data hiding in curves with application to fingerprinting maps[C].IEEE Transactions on Signal Processing,USA,2005:3988– 4005.
    [30]邵承永,汪海龙,牛夏牧,王孝通.基于统计特征的二维矢量地图鲁棒水印算法[J].电子学报, 2005, 33(B12):2312-2316.
    [31]王忠军,王玉海,王豪.一种鲁棒的矢量地图数字水印算法[J].测绘科学,2008,33(4): 148-150.
    [32]闵连权.一种鲁棒的矢量地图数据的数字水印[J].测绘学报,2008,37(2):262-267.
    [33] Solachidis V.,N. Nikolaidis,I. Pitas.Watermarking polygonal lines using Fourier descriptors[C].Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing,Istanbul,Turkey,2000,IV:1955-1958.
    [34] Kitamura,I., S. Kanai and T. Kishinami.Copyright protection of vector map using digital watermarking method based on discrete Fourier transform [C].Proceedings of the IEEE 2001 International Symposium on Geoscience and Remote Sensing,Sydney,Australia,2001,3:1191–1193.
    [35]许德合,王奇胜,朱长青.基于DFT幅度的矢量地理空间数据数字水印算法[J].测绘科学,2008,33(5): 129-131.
    [36]赵林,门朝光,曹刘娟.基于DFT的自适应矢量地图水印算法[J].应用科技,2009,36(7):47-50.
    [37]王奇胜.基于DFT的矢量地理空间数据数字水印技术研究[D].郑州:解放军信息工程大学,2008.
    [38] Kitamura,I., S. Kanai and T. Kishinami.Digital watermarking method for vector map based on wavelet transform[C].Proceedings of Annual Conference of the Geographic Information Systems Association, Tokyo,Japan,2000,9:417-421.
    [39] Yuanyuan Li,Luping Xu.A blind watermarking of vector graphics images[C].Fifth International Conference on Computational Intelligence and Multimedia Applications,Xi’an 2003,9:424-429.
    [40]李媛媛,许录平.矢量图形中基于小波变换的盲水印算法[J].光子学报,2004,33(1):97-100.
    [41]张琴,向辉,孟祥旭.基于复数小波域的图形水印方法[J].中国图象图形学报:A辑,2005,10(4): 494-498
    [42]杨成松,朱长青.基于小波变换的矢量地图数据数字水印算法[J].测绘科学技术学报,2007,24(1):37-39.
    [43] Voigt,M.,B. Yang and C. Busch.Reversible watermarking of 2D-vector data[C].Proceedings of the 2004 Multimedia and Security Workshop on Multimedia and Security,Magdeburg,Germany,2004, 160~165.
    [44]闵连权,喻其宏.基于离散余弦变换的数字地图水印算法[J].计算机应用与软件,2007,24(1): 146-148.
    [45]许德合,朱长青,王奇胜.矢量地图数字水印技术的研究现状和展望[J].地理信息世界,2007,5(6):42-48.
    [46]闵连权,李强,杨玉彬,喻其宏.矢量地图数据的水印技术综述[J].测绘科学技术学报,2009,26(2):96-102.
    [47]孙建国,门朝光,俞兰芳,曹刘娟.矢量地图数字水印研究综述[J].计算机科学,2009,36(9): 11-16.
    [48]彭雅莉.矢量地图数据数字水印技术[J].湘南学院学报,2010,31(2):73-76.
    [49]钟尚平,高庆狮.矢量地图水印归一化相关检测的可行性分析与改进[J].中国图象图形学报,2006, 11(3):401-409.
    [50]胡云,伍宏涛,张涵钰,钮心忻,杨义先.矢量数据中水印系统的设计与实现[J].计算机工程与应用,2004,40(21):28-30.
    [51]朱长青,杨成松,任娜.论数字水印技术在地理空间数据安全中的应用[J].测绘通报,2010,10:1-3.
    [52]周璐,胡永健,曾华飞.用于矢量数字地图的可逆数据隐藏算法[J].计算机应用,2009,29(4): 990-993.
    [53]郑良斌,贾玉禄,王群.用于矢量地图完整性验证的脆弱数字水印算法[J].计算机工程与应用,2010,46(26):99-101.
    [54]刘小勇.数字水印发展的历史与发展前景[J].计算机关盘软件与应用,2010,7:101-102.
    [55] A Z Tirkel,G A Rankin,R M van Schyndel et al.Electronic Watermark.DICTA-93 MacquarieUniversity,Sydney,1993-12:666-672.
    [56] Schyndel R G van,Tirkel A Z,Osborne C F.A digital watermark[C].First IEEE International Image Processing Conference,1994,2:86-90.
    [57]杨义先,钮心忻.数字水印理论与技术[M].北京:高等教育出版社,2006.
    [58]温泉,孙锬锋,王树勋.零水印的概念与应用[J].电子学报,2003,31(2):214-216.
    [59]徐涛,张艳宁.三维网格模型零水印技术[J].吉林大学学报:工学版,2007,37(4): 901-904.
    [60] Bender W,Gruhl D,Morimto N,et al.Techniques for data hiding[J].IBM System Journal,1996, 35(3/4):313~335.
    [61] D. Coltuc,P. Bolon. Robust watermarking by histogram specification[A]. Proc.IEEE Int.Conf.Images Processing:vol.2.[C],Kobe,Japan,Oct 1999:236-239.
    [62] Chen B,Wornell G W.Quantization index modulation:a class of provably good methods for digital watermarking and information embedding[J].IEEE Transactions on Information Theory,2001 ,47(4):1423~1443.
    [63]许君一,熊昌镇,齐东旭,黄继武.量化水印算法分析[J].通信学报,2006,27(3):15-27.
    [64] G. Depovere,T. Kalker and J.P. Linnartz.Improved Watermark Detection Reliability Using Filtering Before Correlation.Proceeding of the International Conference on Image Processing,1998,1: 430-434.
    [65] J.R. Boston.A Signal Detection System Based on Dumpster-Shafer Theory and Comparison to Fuzzy Detection.IEEE Transactions on System,Man,and Cybernetics,2000,30(1):45-51
    [66] A. Tefas and I. Pitas.Robust Spatial Image Watermarking Using Progressive Detection.In Processing of IEEE International Conference on Acoustics,Speech,and Signal Processing,May,2001,3:1973~1976
    [67] R. Chandramouli and N. D. memon. On Sequential Watermark Detection. IEEE Transactions on Signal Processing,Apr.2003,51(4):1034-1044
    [68] R. Chandramouli and N. D. memon.How many pixels to watermark? IEEE International Conference on Information Technology:Coding and Computing,March 2000, 11-15.
    [69]华一新,吴升,赵军喜.地理信息系统原理与技术[M].北京:解放军出版社,2001:165-166.
    [70]郭仁忠.空间分析[M].北京:高等教育出版社,2001:20-21.
    [71]邢轻,柏森,刘耀东.水印攻击方法综述[J].重庆通信学院学报,2005,24(2):102-103.
    [72]季智,戴旭初.数字水印攻击技术及其对策分析[J].测控技术,2005,24(5):14-17.
    [73] S Voloshynovskiy,S Pereira,T Pun,et al.Attacks on Digital Watermarks:Classification, Estimation Based Attacks , and Benchmarks[J] . IEEE Communications Magazine , 2001 , 39(8):118-126.
    [74] C. Voloshynovskiy,S. Pereira,A. Herrigel,et al.Generalized Watermarking Attack Based on Watermark Estimation and Perceptual Remodulation [J].Proc. SPIE-Security Watermarking Multimedia ContentsⅡ,2000,3971:358-370.
    [75]陈更力,张青等.数字水印技术及其攻击分析[J].江汉石油学院学报,2004,26(4):202-203.
    [76]伍凯宁,曹汉强等.数字水印攻击技术及对策研究[J].计算机应用研究,2004,9:153-154.
    [77]郭思远,朱长青,阚映红,杨成松.空域矢量地理数据水印算法及攻击方法分析[J].测绘科学,2009,34(3):37-38
    [78]朱长青,杨成松,李中原.一种抗数据压缩的矢量地图数据数字水印算法[J].测绘科学技术学报,2006,23(4):281-283.
    [79]王净,江刚武.无拓扑矢量数据快速压缩算法的研究与实现[J].测绘学报,2003,32(2):173-177.
    [80]阚映红,杨成松,崔翰川,王莹莹,刘嵘.一种保持矢量数据几何形状的数字水印算法[J].测绘科学技术学报, 2010, 27(2):135-138.
    [81]杨成松,朱长青.基于小波变换的矢量地理空间数据数字水印算法[J].测绘科学技术学报,2007,24(1):37-39.
    [82]成礼智,王红霞,罗永.小波的理论与应用[M].北京:科学出版社,2004.
    [83]魏明果.实用小波分析[M].北京:北京理工大学出版社,2005.
    [84]朱长青.小波分析理论与影像分析[M].北京:测绘出版社,1997.
    [85]朱长青王玉海李清泉柳林涛.基于小波分析的等高线数据压缩模型[J].中国图象图形学报:A辑,2004,9(7):841-845.
    [86] M.A.Dorairangaswamy. A Novel Invisible and Blind Watermarking Scheme for Copyright Protection of Digital Images[J]. International Journal of Compter Science and Network Security. 2009, 9(4): 71-78.
    [87] Aboofazeli,M.,Thomas,G., Moussavi, Z..A Wavelet Transform Based Digital Image Watermarking Scheme[C].Canadian Conference on Electrical and Computer Engineering. Saskatoon: 2004:823-826
    [88] Santhi, V.,Rekha,N.,Tharini,S..Dwt_Svd Combined Full Band Robust Watermarking Technique for Color Images in Yuv Color Space[J] . International Journal of Computer Theory and Engineering. 2009, 1(4): 424-429.
    [89] Yan Niu, Jiang Yi Du, La La Li.Digital Watermarking System Design and Implementation Based On Lsb Algorithm[J]. ADVANCED MEASUREMENT AND TEST, PARTS 1 AND 2. 2010, 439: 652-657.
    [90] Lee G, Yoon E, Yoo K. A New Lsb Based Digital Watermarking Scheme with Random Mapping Function[J]. 2008: 130-134.
    [91] Low C, Teoh A B, Tee C. Fusion of Lsb and Dwt Biometric Watermarking Using Offline Handwritten Signature for Copyright Protection[C].Lecture Notes in Computer Science. 2009:786-795
    [92] N J, J J, R S. Signal Compression Based On Model of Human Perception[J]. Processings of the IEEE. 1993, 81(10): 1385-1422.
    [93] Maity S P, Kundu M K. An Image Watermarking Scheme Using Hvs Characteristics and Spread Transform[C].17th International Conference on Pattern Recognition. 2004:869-872
    [94]郭思远,朱长青.基于灰度图像的矢量地理空间数据水印算法[J].测绘工程,2008,17(1):21-23
    [95]刘家胜,黄贤武,朱灿焰等.基于m序列变换和混沌映射的图像加密算法[J].电子与信息学报,2007,29(6):1476-1479.
    [96]王会华,李保平.m序列发生器的设计与实现[J].北京电子科技学院学报,2007,15(2):58-61.
    [97]王诚,吴蕾等.任意长度的M序列的生成[J].西安电子科技大学学报,2001,28(1):129-132.
    [98]孙家广.计算机图形学[M].北京:清华大学出版社,1998.
    [99]何援军.图形变换的几何化表示―论图形变换和投影的若干问题之一[J].计算机辅助设计与图形学学报,2005,17(4):723-728.
    [100]杨启和.地图投影变换原理与方法[M].北京:解放军出版社,1990.
    [101]李黎张明敏潘志庚.一种抗几何变换的图像盲水印算法[J].浙江大学学报:工学版,2004,38(2):141-144.
    [102]胡玉平,韩德志,羊四清.抗几何变换的小波域自适应图像水印算法[J].系统仿真学报,2005,17(10):2470-2475.
    [103]石磊,钟铭,洪帆.抵抗几何变换的基于量化的水印技术[J].计算机辅助设计与图形学学报,2004,16(6):850~855.
    [104] Joseph J K.O Ruanaidh,Thierry Pun.Rotation,scale and translation invariant spread spectrum digital image watermarking[J].Signal Processing,1998,66(3):303-317.
    [105] M Wu,ML Miller,J A Bloom,et al.A Rotation,Scale,and Translation Resilient Public Watermark[A] . IEEE Int'l Conf on Acoustics , Speech , and Signal Processing (ICASSP'99)[C].1999.2065-2068.
    [106] Kima B S,Choib J G,Parka C H.Robust digital image watermarking method against geometrical attacks[J].Real-Time Imaging,2003,9:139- 149.
    [107] Cai Lian , Du Sidan , Gao Duntang . Geometrically invariant watermarking based on Radon transformation[J].Journal of Electronics,2005,22(5) :300-306.
    [108]谢荣生,刘承香,杨树国,郝燕玲.基于模板匹配的抗几何攻击图像数字水印[J].哈尔滨工程大学学报,2002,22(3):54-58
    [109]汪西莉,赵树芗.矢量化地图中线的自动拼接[J].西安电子科技大学学报,1994,21(4):492-496.
    [110]郭黎.空间矢量数据融合问题的研究[D].郑州:解放军信息工程大学,2003.
    [111] T. Fujital, M. Yoshidal and T. Fujiwqrai.A New Scheme to Realize the Optimum Watermark Detection for the Additive Embedding Scheme with the Spatial Domain[J]. IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences, 2007 E90-A(1):216-225.
    [112] Q.Cheng and T.S. Huang.Optimum Detection of Robust Perceptual-Model-Based Image-Adaptive Watermarks[C].International Conference on Image Processing,Oct,7-10,2001,2:490-493.
    [113] B.Yan,S.H. Sun and Z.M. Lu. Robust Audio Watermarking Detection Based on Dempster-Shafer Theory[C].The 5th International Symposium on Test and Measurement(ISTM’2003), Shenzhen,China,June1-5, 2003: 253-256.
    [114] C. Karabat,M. Keskinoz.Watermark detection using channel estimation in the quantization based watermarking system[C].The 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing,IIH-MSP 2008,2008,973-976.
    [115] C.S. Yang,C.Q. Zhu,Q.S. Wang.Research on the autocorrelation detection in digital watermarking technology[C].Proceeding of the XXI International Congress for Photogrammetry and Remote Sensing,Beijinag,China,2008,7,Vol. XXXVII,Part. B4-1,Commission IV:127-130.
    [116]王学民.应用多元分析[M].上海:上海财经出版社,1999.134-148.
    [117]李志林.空间数据的关注问题,从质量到可用性[J].地理信息世界,2006,4(3):14-17.
    [118] Hunter G,Wachowicz M. and Bregt A..Understanding spatial data usability[J].Data Science Journal,2003,2:79-89.
    [119]李滨,王青山等.空间数据库引擎关键技术剖析[J].测绘学院学报,2003,20(1):35-38.
    [120]刘荣高,庄大方,刘纪远.分布式海量矢量地理数据共享研究[J].中国图象图形学报:A辑,2001,6(9):865-872.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700