用户名: 密码: 验证码:
数字图像的鲁棒性水印技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
计算机技术、数字多媒体技术以及Internet技术的飞速发展使得多媒体信息的安全问题成为目前一个相当重要而又富有挑战性的研究课题。数字水印技术在这样的背景下获得了广泛的重视,并成为当今发展最为迅速的学科之一,对数字水印领域中的关键技术研究有着重要的理论和现实意义。
     本论文首先介绍了数字水印技术的应用、分类及研究现状,并针对数字图像媒体,系统阐述了其基本原理,分析了数字水印技术在各种应用中的基本特征和设计要求,以及评估方法、水印攻击及对策等。论文的重点在于,紧紧围绕着数字图像的鲁棒性水印中的盲检测技术、鲁棒性、不可见性这一主线,对其进行了深入的研究和探讨,研究的内容属于目前数字水印技术领域的研究重点。
     本文的主要贡献概括如下:
     1.研究了基于图像区域的鲁棒性水印技术,提出了一种利用图像显著特征区域来嵌入水印的算法,称作WRSF算法。该算法利用了人眼视觉中更为关注区域的特点,有生理学基础,且具有很好的鲁棒性。在WRSF算法中,首先利用人眼的视觉注意机制作为指导,给出了一种简单有效的提取图像显著特征区域的算法;然后提取图像的显著特征区域在并在其中嵌入水印;水印的嵌入利用了原始图像的部分信息并使用人眼视觉模型来调整水印信号的嵌入强度;通过在水印嵌入时构造参考水印,以较小的存储代价,来实现水印的盲检测。该算法的特点在于:提出了一种水印嵌入的思路,即水印嵌入应该利用图像中人眼视觉更为关注的区域,这种思路有视觉注意机制这一生理学依据而且考虑了版权拥有者的主观要求。实验结果表明了这种思路的合理性以及算法的有效性。
     2.研究了基于图像特征的数字水印技术,提出了一种基于图像兴趣点的数字水印算法,称作WIP算法。WIP算法的一个突出特点在于:采用了较为“精确”的模式识别技术来寻找更鲁棒的图像特征,把水印信息的嵌入和图像中鲁棒的特征联系在一起,从而改善水印盲检测的可靠性。首先概括性地介绍了现有的基于特征的数字水印算法,分析了它们的优缺点,在已有工作的基础上,WIP算法先对图像进行自适应非线性滤波,然后提取显著的兴趣点,以减少噪声干扰;并对描述图像特征的显著兴趣点有所筛选,采用其中鲁棒的显著兴趣点作为水印嵌入和提取的参考点;水印重复地嵌入到每一个鲁棒的显著兴趣点的局部邻域内,并使用人眼视觉模型来调整水印信号的嵌入强度。算法中对检测性能做了详细分析用于指导水印的检测。实验结果表明了此算法的有效性。
    
    摘要
     3.研究了基于扩频技术的水印问皿,提出了一种小波域的标识符水印算法.
    该算法在保证图像较高视觉质t的情况下,增强了水印的鲁棒性,改善了水印的
    性能。在该算法中,首先采用纠错编码技术对二值有意义的标识符水印信号进行
    编码,然后应用直接序列扩频码调制编码后的水印信号;水印的嵌入在图像的小
    波变换域中进行,并利用图像正交小波变换的特点和人类视觉特性来充分考虑水
    印图像的视觉效果,在保证图像质量的条件下调整水印的能量。实验结果表明本
    算法的有效性。
     4.研究了基于边带通信模型的数字水印技术,提出了一种基于边信息的数字
    水印算法。此算法的特点在于:在水印信号的嵌入过程中,不是把原始图像完全
    看作噪声,而是利用了原始图像本身的部分信息,以减少图像内容和水印信号之
    间的干扰。在该算法中,水印的嵌入过程包括误码纠错、安全置乱、对原始图像
    中边信息的提取和基于人类视觉模型的小波域嵌入等技术,以保证盲水印恢复的
    鲁棒性和安全性。此外,该算法对水印盲检测的性能做了详细分析以指导水印的
    检测。实验结果表明了该算法的有效性。
    关键词:数字水印,人类视觉系统,视觉注意,感知模型,显著特征区域,显著
     兴趣点,扩频通信,边带通信,相关检测
    西安电子科技大学博士学位论文
With the rapid development of computer, multimedia and Internet techniques, the multimedia security becomes an important and challenging research topic. Digital watermarking technique is a new method for digital content protection such as copyright protection, transaction tracking, content authentication, broadcasting monitoring, copy control and secret communication, and becomes an important research area in the field of multimedia security.In this dissertation, a systematical introduction of the applications, classification and background of watermarking techniques is given first. Then the principle of digital watermarking is described with their characteristics and design requirements in different applications being analyzed, before the ways of performance evaluation, attacks and countermeasures are introduced. The work is focused on the key techniques of digital watermarking for images, which include blind detection, robustness, invisibility. The presented study is the current research focus of watermarking techniques. Thus, its research has both the theory and the application value.The main contributions of this dissertation can be summarized as follows:1. Region-based watermarking technique is studied and a watermarking scheme using the region with salient features of the image is proposed. A simple and effective algorithm for extracting the region with salient features is first realized by exploiting the human visual attention model. The watermark is embedded into this region using the part information of the original image, and its invisibility is derived by means of HVS. Watermark can be blindly detected by means of the reference watermark, which is designed during the watermark embedding process. The primary characteristic of the scheme is that, it presents a new idea for the watermarking techniques, by means of which the watermark embedding should exploiting the image region to which human eyes pays more attention. This idea has the evidence based on the human visual attention model and has considered the subjective requirement of the copyright owner. Experimental result shows effectiveness of the proposed methods.2. Salient feature-based watermarking technique is studied. A salient interest
    
    point-based watermarking scheme is proposed based on the analysis of the recent feature-based algorithms. The primary characteristic of the scheme is that, it exploits the refined pattern recognition techniques to find the robust image feature, by means of which the watermark can be bound with the image content to improve the reliability of the blind detection. The scheme firstly uses an adaptive filter to process the image. Then the popular way is adopted to detect the interest points. The extracted interest points are selected to obtain the robust salient interest points, which are used as a reference for both watermark embedding and detection. Watermark is iteratively embedded into each local region centered at the points. HVS is used for the invisibility of the watermark. The detection performance is analyzed to guide the watermark detection. Experimental result shows the effectiveness of the proposed scheme.3. Spread spectrum watermarking techniques are studied, and a identifier watermarking scheme is proposed. Watermark embedding includes the techniques of error-correct code, direct sequence spread spectrum and wavelet-based HVS model to gain the trade-off between robustness and invisibility of the watermark. The orthogonal wavelet is used in embedding process, and watermark energy can be adjusted by means of HVS with a specific PSNR. Experimental result shows that the scheme improves the robustness of the watermark with a high quality marked image.4. Side-informed watermarking techniques are studied. A side information-based watermarking algorithm is proposed. Watermark embedding includes the techniques of error-correct code, shuffling, extracting the side information from original image and wavelet-based HVS model to gain the robustness and security for the blind d
引文
[1] Petitcolas E A. E, Anderson R. J. and Kuhn M. G., "Information hiding-a survey," Proceedings of the IEEE, 1999, 87(7), pp: 1062-1078.
    [2] Hartung F. and Kutter M., "Multimedia watermarking techniques," Proceedings of the IEEE, 1999, 87(7), pp: 1079-1107.
    [3] Anderson R. J. and Petitcolas F. A. P., "On The Limits of Steganography," IEEE Journal of Selected Areas in Communications, 1998, 16(4), pp: 474-481.
    [4] Fridrich J. and Goljan M., "Practical Steganalysis-State of the Art," Proc. SPIE On Security and Watermarking of Multimedia Content, San Jose, California, 2002, pp: 1-13.
    [5] Johnson, N. F. and Jajodia, S. "Exploring Steganography: Seeing the Unseen," IEEE Computer, 1998, 31(2), pp: 26-34.
    [6] Swanson M. D., Kobayashi M. and Tewfik A. H., "Multimedia data embedding and watermarking techniques," Proceedings of the IEEE, 1998, 86(6), pp: 1064-1087.
    [7] Paskifi N., "Towards unique identifiers," Proceedings of the IEEE, 1999, 87(7), pp: 1208-1227.
    [8] Protecting Video in the Digital Age. DigiMarc Co.Ltd. http://www.digimarc.com/docs/analogHole/Protecting Video Brief Final.pdf
    [9] Digital Watermarking and the analog Hole. DigiMarc Co. Ltd. http://www.digimarc.com/docs/analogHole/DWM Facts FINAL.pdf
    [10] http://tech.sina.com.cn/it/2004-02-05/0800288223.shtml.
    [11] 周利军,周源华.基于直接序列扩频码的图像空间域水印技术[J].软件学报,2002,13(2):298-303.
    [12] Hill K., "A perspective: the role of identifiers in managing and protecing intellectual property in the digital age," Proceedings of the IEEE, 1999, 87(7), pp: 1228-1238.
    [13] Augot D., Boucqueau J.-M., Delaigle J.-F., Fontaine C. and Goray E., "Secure delivery of image over open networks," Proceedings of the IEEE, 1999, 87(7), pp: 1251-1266.
    [14] Macq B. M. and Quisquater J.-J., "Cryptology for digital TV broadcasting," Proceedings of the IEEE, 1995, 83(6), pp: 944-956.
    
    [15] Schneier B., Applied cryptography-protocols, algorithms, and source code in C, second edition, John Wiley & Sons, Inc., 1996.
    [16] Call for proposal, Data Hiding Subgroup of the Copy Protection Technical Working Group [EB/OL]. Version 1.0, http://www.dvec.com/dbsg, July 1, 1997.
    [17] Friedman G. L., "The trustworthy digital camera: Restoring credibility to the photographic image," IEEE trans, on Consumer Electronics, 1993, 39(4), pp: 404-408.
    [18] Wong P. W. and Memon N., "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE trans, on Image Processing, 2001, 10(10), pp: 1593-1601.
    [19] Kundur D. and Hatzinakos D., "Digital watermarking for telltale tamper proofing and authentication," Proc. IEEE, 1999, 87(7), pp: 1167-1180.
    [20] Wu M. and Liu B., "Watermarking for image authentication," IEEE International Conference on Image Processing, Chicago, Illinois, USA, October 1998, vol. 2, pp: 437-441.
    [21] I.J.Cox,, M.L.Miller. The first 50 years of electronic watermarking. Journal of Applied signal processing, Vol.2, 2002, pp: 126-132.
    [22] W. Trappe, M. Wu, Z.J. Wang, et.al. Anti-collusion Fingerprinting for Multimedia. IEEE Trans. On Signal Processing, Vol.51, No.4, April, 2003, pp: 1069-1087.
    [23] Memon N., "Authentication techniques for multimedia content," IS&T SPIE 3528, San Jose, CA, November 1998, pp: 412-422.
    [24] Eggers J.J. and Girod B., "Blind watermarking applied to image authentication," ICASSP 2001, Salt Lake City, Utah, USA, May 2001, pp: 7-11.
    [25] Lin C-Y and Chang S-F, "Semi-fragile watermarking for authenticating JPEG visual content," SPIE Security and Watermarking of Multimedia Contents II, San Jose, CA, Jan. 2000, pp: 140-151.
    [26] Magerlein K.A., Braudaway GW. and Mintzer F.C., "Protecting publicly-available images with a visible image watermark," IS&T/SPIE Symposium on Elect. Imaging Sci. and Tech., Proceedings of Symposium on Optical Security and Counterfeit Deterrence Techniques, San Jose, CA, Feb. 1996, pp: 126-132.
    [27] Gladney H.M., Mintzer F.C. and Schiattarella F., "Safeguarding digital library contents and users: digital images of treasured antiquities," D-Lib Magazine, http://www.dlib.org/dlib/july97/vatican/07gladney.html, July 1997.
    
    [28] Yeung M.M., Mintzer F.C., Braudaway GW and Rao A.R., "Digital Watermarking for High Quality Imaging," Proc. of IEEE First Workshop on Multimedia Signal Processing, Princeton, NJ, June 1997, pp. 357-362.
    [29] Meng J. and Chang S.F., "Embedding visible video watermarking in the compressed domain," Proc. IEEE ICIP, Chicago, IL, 1998, vol. 1, pp: 474-477.
    [30] Kankanhalli M.S. and Ramakrishnan K.R., "Adaptive visible watermarking of images," Proc. ICMCS'99, Florence, Italy, 1999, pp: 568-573.
    [31] Mohanty S.P., Ramakrishnan K.R and Kankanhalli M.S., "A DCT domain visible watermarking technique for images," Proc. Int. Conf. Multimedia and Expo, New York, USA, 2000.
    [32] Hu Yongjian and Kwong sam, "Wavelet domain adaptive visible watermark," IEE Electronics Letters, 2001, 37(20), pp: 1219-1220.
    [33] Cox I. J., Kilian J., Leighton F. T. and Shamoon T., "Secure spread spectrum watermarking for multimedia," IEEE Trans, on Image Processing, 1997, 6(12), pp: 1674-1687.
    [34] Moulin, P. and Ivanovic A., "Nonadditive gaussian watermarking and its application to wavelet-based image watermarking," Proc. IEEE International Conference on Image Processing, Thessaloniki, Greece, 2002, vol. 3, pp: 473-476.
    [35] Barni M., Bartolini F., Cappellini V. and Piva A., "A DCT-domain system for robust image watermarking," Signal Processing, 1998, 66(3), pp: 357-372.
    [36] Nikolaidis N. and Pitas I., "Robust image watermarking in the spatial domain," Signal Processing, 1998,66(3), pp: 385-403.
    [37] Zhu Wenwu, Xiong Zixiang and Zhang Ya-Qin, "Multiresolution watermarking for images and video," IEEE Trans, on Circuits and Systems for Video Technology, 1999, 9(4), pp: 545-550.
    [38] Xia X.G., Boncelet C.G. and Arce GR, "Wavelet transform based watermark for digital images," Optics Express, 1998, 3(12), pp: 497-511.
    [39] Kundur D. and Hatzinakos D., "A robust digital image watermarking method using wavelet based fusion," IEEE International Conference on Image Processing, Santa Barbara, CA, October 1997, vol 1, pp: 544-547.
    [40] Simmons G J., "The prisoners' problem and the subliminal channel," Workshop on Communications Security(CRYPT0'83), IEEE, 1983. pp. 51-67.
    [41] Kahn David, "The history of steganography," Lecture Notes in Computer Science, Vol..1174, Springer-Verlag, pp: 1-6.
    
    [42] Wilkins J., Mercury: or the secret and swift messenger: shewing, how a man may with privacy and speed communicate his thoughts to a friend at any distance, 2nd edition, London, U.K., Rich Baldwin, 1694.
    [43] Reeds J., "Solved: The ciphers in book III of Trithemius' steganographia," Cryptologia, 1998, vol. XXII, no. 4, pp: 291-317.
    [44] Kahn D., The codebreakers-the story of secret writing, New York, Scribner, 1996.
    [45] Bacon R, Of the advancement and proficiencie of learning or the partitions of sciences, Oxford, U.K, Leon Lichfield, 1640, vol. VI, pp: 257-271.
    [46] Seckel A., "Your mind's eye: illusions & paradoxes of the visual system," presented at National Science Week, Univ. Cambridge, Cambridge, U.K., Mar. 1998. [Online]. Available WWW: http://www.illusionworks.com/.
    [47] Newman B., Secrets of German espionage, London, U.K, Robert Hale, 1940.
    [48] Stevens G.W.W., Microphotography-photography and photofabrication at extreme resolutions, London, U.K, Chapman & Hall, 1968.
    [49] Anderson R. J., "Why cryptosystems fail," Commun. ACM, 1994, 37, pp. 32-40.
    [50] Petitcolas F. A. P., (Aug. 1998). MP3Stego. [Online]. Available WWW: http://www.cl.cam.ac.uk/~fapp2/steganography/mp3stego/.
    [51] Hartung F. and Girod B., "Watermarking of MPEG-2 encoded video without decoding and re-encoding," Proc. SPIE 3020: Multimedia Computing and Networking, San Jose, CA, 1997, pp: 264-273.
    [52] Gruhl D., Bender W. and Lu A., "Echo hiding," Information Hiding: 1st Int. Workshop (Lecture Notes in Computer Science, vol. 1174), R. J. Anderson, Ed. Berlin, Germany: Springer-Verlag, 1996, pp: 295-315.
    [53] Craver S., "On public-key steganography in the presence of an active warden," Tech. Rep. RC20931, IBM Research Division, T.J. Watson Research Center, Yorktown Heights, New York, USA, Jul. 1997.
    [54] Anderson R., "Stretching the limits of steganography," Lecture Notes in Computer Science, Vol.1174, Springer-Verlag, pp: 1-6.
    [55] Johnson N. F. and Jajodia S., "Steganalysis of images created using current steganography software," Lecture Notes in Computer Science, vol.1525, Springer-Verlag, Berlin, 1998, pp: 273.289.
    [56] Chandramouli R. and Memon N., "Analysis of LSB based image steganography techniques," IEEE Int. Conf. on Image Processing, Thessaloniki, Greece, 2001, vol. 3, pp: 1019-1022.
    
    [57] J F Delaigle, C De Vleeschouwer and B Macq. Watermarking algorithm based on a human visual model[J]. Signal procedding, 1998, 66: 319-335.
    [58] I. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia [J]. IEEE Trans on Image Processing, 1997, 6(12): 1673-1687.
    [59] 姚俊,郭雷.一种基于图像区域特征分类的数字水印算法.西北工业大学学报.2002,20(3):418-421.
    [60] 王卫卫,杨波.宋国乡.基于图像特征的小波域水印算法.光子学报.2001,30(7):857-860.
    [61] 钟桦,焦李成.基于特征子空间的数字水印技术,计算机学报,2003,26(3):1-6.
    [62] P. Bas, J-M. Chassery, B. Macq. Geometrically invariant watermarking using feature points[J]. IEEE Trans on Image Processing, 2002, 11 (9): 1014-1028.
    [63] Chih-Wei Tang and Hsueh-Ming Hang, A feature-based robust digital image watermarking scheme[J]. IEEE Trans on signal processing, 2003, 51(4): 950-959.
    [64] A. B. Watson, G. Y. Yang, J. A. Soloman, and J. Villasenor. Visibility of wavelet quantization noise[J]. IEEE Trans on Image Processing, 1997, 6(8): 1164-1175.
    [65] R. Deriche and G. Giraudon. A computational approach for comer and vertex detection. Int'l J. Computer Vision, 1993, 10(2): 101-124.
    [66] C. Harris and M. Stephens. A combined comer and edge detector. Alvey Vision Conf., 1988: 147-151.
    [67] 韩军伟,基于内容的图像检索技术研究.西北工业大学博士论文.2003.4
    [68] Lampson Butler, "A note on the confinement problem," CACM, 1973, 16(10), pp: 613-615.
    [69] Kemmerer R. A., "Shared resource matrix methodology: a practical approach to identifying covert channels," ACM Transactions on Computer Systems, 1983, 1(3), pp: 256-257.
    [70] Simmons G. J., "Subliminal communication is possible using the DSA," Proceedings of Eurocrypt'93, Springer-Verlag, 1993.
    [71] Moskowitz I. S. and Kang M. H., "Covert channels-here to say?" Proc.eedings of IEEE COMPASS 94, N J, 1994, 235-243.
    [72] Proctor N. E. and Neumann P. G., "Architectural implications of covert channels," Proceedings of The 15th National Computer Security Conference, NIST/NCSC, Baltimore, MD, 1992, pp: 236-243.
    [73] Yang Y. X., Zhou Z. and Niu X. X., "Systematic procedure for the implementation of Naini-Seberry's subliminal channels," Chinese journal of Electronics, 2000, 9(1), pp: 43-47.
    [7
    
    [74] Yang Y. X., Niu X. X. and Zhou Z., "Solution of of Naini-Seberry's open problem," IEE Electronics Letters, 1999, 35(8), pp: 634-635.
    [75] 夏光升,杨义先,“一种新的密钥分享方案—叠像术,”北京邮电大学,1999,22(1),PP:57-61.
    [76] 吴秋新,信息伪装与数字签名,博士论文,北京:北京邮电大学,2000.
    [77] Tirkel A., "Rankin G., Schyndel R. van, Ho W., Mee N. and Osbome C., "Electronic watermark," Proceedings. DICTA 1993, pp: 666-672.
    [78] 张春田,苏育挺,管晓康,“多媒体数字水印技术,”通信学报,2000,21(9),PP:46-52.
    [79] 黄继武,谭铁牛,“图像隐性水印综述,”自动化学报,2000,26(5),PP:645-655.
    [80] 刘瑞祯,谭铁牛,“数字图像水印研究综述,”通信学报,2000,21(8),PP:39-48.
    [81] 杨义先,钮心忻,“多媒体信息伪装综论,”通信学报,2002,23(5),PP:32-38.
    [82] 孙圣和,陆哲明,“数字水印处理技术,”电子学报,2000,28(8),PP:85-90.
    [83] Herrigel A., O'Ruanaidh J. J. K., Petersen H., Pereira S. and Pun T., "Secure copyright protection techniques for digital images," Information Hiding: 2nd Int. Workshop (Lec-ture Notes in Computer Science), vol. 1525, Berlin, Germany: Springer-Verlag, 1998, pp: 169-190.
    [84] Zhao J. and Koch E., "Embedding robust labels into images for copyright protection," International Congress on Intellectual Property Rights for Specialised Information, Knowledge and New Technologies, Vienna, Austria, Aug. 1995.
    [85] Koch E. and Zhao J., "Towards robust and hidden image copyright labeling," IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, " Greece, June 1995, pp: 123-132.
    [86] .Ruanaidh J. J. K., Dowlirig W. J. and Boland F. M., "Watermarking digital images for copyright protection," IEE Proceedings on Signal and Image Processing, 143(4), August 1996, pp: 250-256.
    [87] Craver S., Memon N., Yeo B.-L. and Yeung M., "Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications," IEEE Journal on Selected Areas in Communications, 1998, 16(4), pp: 573-586.
    [88] Zeng W. and Liu B., "A statistical watermark detection technique without using original image for resolving rightful ownerships of digital images," IEEE Trans. on Image Processing, 1999, 8(11), pp: 1534~1548.
    [89] Wang Y., Doherty J. F. and Van Dyck R. E., "A wavelet-based watermarking algorithm for ownership verification of digital images," IEEE trans, on Image Processing, 2002,11(2), pp: 77-88.
    
    [90] Qiao L., and Nahrstedt K., "Watermarking schemes and protocols for protecting rightful ownership and customer's rights," J. Vis. Commun. Image Presentation, 1998, 9(3), pp: 194-210.
    [91] Lin P.-L., "Digital watermarking models for resolving rightful ownership and authenticating legitimate customer," J. System and Software, 2001, 55(3), pp: 26-271.
    [92] Servetto S.D., Podilchuk C.I. and Ramachandran K., "Capacity issues in digital watermarking," IEEE ICIP, Chicago, Illinois, October 1998, vol. 1, pp: 445-448.
    [93] 钟桦,刘芳,焦李成,“一种新的标识符水印算法,’’电子与信息学报,2002,24(8),PP:1134-1138.
    [94] Hsu Chiou-Ting, Wu Ja-Ling, "Hiding digital watermarks in image," IEEE Trans. on Image Processing, 1999, 8(1), pp: 58-68.
    [95] Dittmann J., "Combining digital watermarks and collusion secure fingerprints for customer copy monitoring," IEE Seminar on Secure Images and Image Authentication, 2000, 6, pp: 1-6.
    [96] Maes M., Kalker T., Linnartz J.-P.M.G, Talstra J., Depovere F.G. and Haitsma J., "Digital watermarking for DVD video copy protection," IEEE Signal Processing Magazine, 2000,17(5), pp: 47 -57.
    [97] Van Schyndel R.G., Tirkel A.Z. and Osborne C.F., "A digital watermark," IEEE International Conference on Image Processing, Austin, Texas, USA, 1994, vol. 2, pp: 86-90.
    [98] Wolfgang R. B. and Delp E. J., "A watermark for digital images," Proc. IEEE Int. Conference on Image Processing, Lausanne, Switzerland, 1996, vol. 3, pp: 219-222.
    [99] Hernandez J. J., Perez-Gonzalez F., Rodriguez J. M. and Nieto G, "Performance analysis of a 2-Dmultipulse amplitude modulation scheme for data hiding and watermarking still images," IEEE Journal on Selected Areas of Communications, 1998,16(4), pp: 510-524.
    [100] Delaigie J.F., De Vleeschouwer D. and Macq B., "Low cost perceptive digital picture watermarking method," Proc. ECMAST'97, Milan, Italy, 1997, pp: 153-167.
    [101] Macq B., Delaigie J.F. and De Vleeschouwer D., "Digital watermarking," Proc. SPIE 2659: Optical Security and Counterfeit Deterrence Technique, 1996, pp:
     99-110.
    
    [102] Kutter M., Jordan F. and Bossen F., "Digital signature of color images using amplitude modulation," J. Electron. Imageing, 1998, 7(2), pp: 326-332.
    [103] Kutter M. and Winkler S., "A vision-based masking model for spread spectrum image watermarking," IEEE trans. Image Processing, 2002, 11(1), pp: 16-25.
    [104] Chen B., Design and analysis of digital watermarking, information embedding, and data hiding sustems, Ph.D Thesis, Massachusetts Institute of Technology, Cambridge, MA, June 2000.
    [105] Rongen P.M.J., Maes M. and van Overveld C.W.A.M., "Digital image watermarking by salient point modification: practical results," Proc. SPIE 3657: Security and Watermarking of Multimedia Contents, San Jose, CA, January 1999, pp: 273-282.
    [106] Maes M. and Overveld C.W.A.M, "Digital watermarking by geometric warping," Proc. IEEE International Conference on Image Processing (ICIP), Chicago, Illinois, USA 1998, vol. 1, pp: 424-446.
    [107] Bas P., Chassery J.-M. and Davoine F., "Using the fractal code to watermark images." Proc. IEEE International Conference on Image Processing (ICIP), Chicago, Illinois, USA 1998, vol. 1, pp: 469-473.
    [108] M. Kutter, "Watermarking resisting to translation, rotation, and scaling," Proc. SPIE 3528: Multimedia Systems and Applications, Boston, MA, Nov. 1998, pp. 423-431.
    [109] Kundur D. and Hatzinakos D., "Digital watermarking using multiresolution wavelet decomposition," IEEE International Conference on Acoustic, Speech and Signal Processing (ICAASP), Seattle, Washington, USA, May 1998, vol. 5, pp: 2969-2972.
    [110] Nikolaidis A. and Pitas I., "Robust watermarking of facial images based on salient geometric pattern matching," IEEE trans, on Multimedia, 2000, 2(3), pp: 172-184.
    [111] Burgett S., Koch E. and Zhao J., "A novel method for copyright labeling digitized image data," Fraunhofer Inst. Comput. Graphics, Darmstadt, Germany, Tech. Rep., Sept. 1994.
    [112] Swanson M. D., Zu B. and Tewfik A. H., "Robust data hiding for images," IEEE 7th Digital Signal Processing Workshop (DSP96), Loen, Norway, Sep. 1996, pp: 37-40.
    [113] Tao B. and Dickinson B., "Adaptive watermarking in the DCT domain," Proc.
     IEEE Intemational Conference on Image Processing, Lausanne, Switzerland, September 1996.
    [1
    
    [114] Cox I. J. and Miller M. L., "A review of watermarking and the importance of perceptual modeling." Proc. SPIE 3016: Human Vision and Electronic Imaging Ⅱ, San Jose, California, USA, Feb. 1997, pp: 92-99.
    [115] Podilchuk C. I., Zeng W., "Image-adaptive watermarking using visual models," IEEE Journal on selected areas in communication, 1998, 16(4), pp: 525~539.
    [116] Wolfgang R. B., Podilchuk C. I. and Delp E. J., "Perceptual watermarks for digital images and video," Proc. IEEE, 1999, 87(7), pp: 1108-1126.
    [117] Piva A., Barni M., Bartoloni E. and Cappellini V., "DCT-based watermarking recovering without resorting to the uncorrupted original image," Proc. IEEE International Conference on Image Processing, Santa Barbara, CA, USA, 1997,, vol. 1, p: 520.
    [118] Hemández J., Amado M. and Pérez-González F., "DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure," IEEE Trans. on Image Processing, 2000, 9(1), pp:55-68.
    [119] JPEG2000: Multimedia and Hypemedia Standards Activity [EB/OL]. http://www2.echo.Iu/oii/en/oiiaug96.html#JPEG2000, August 1996.
    [120] Nikolaidis A. and Pitas Ⅰ., "Region-based image watermarking," IEEE trans, on Image Processing, 2001, 10(11), pp:. 1726-1740.
    [121] M. Kutter, S. K. Bhattacharjee, and T. Ebrahimi. Towards second generation watermarking schemes[A]. in IEEE-ICIP'99[C]. Japan: Kobe, 1999. 320-323.
    [122] P. Bas, J-M. Chassery, B. Macq. Geometrically invariant watermarking using feature points[J]. IEEE Trans on Image Processing, 2002, 11 (9): 1014-1028.
    [123] 钟桦,数字图像信息隐藏与认证算法研究.西安电子科技大学博士学位论文,2003.
    [124] 姚俊,面向数字图像和视频内容的数字水印技术研究.西北工业大学博士学位论文,2004.
    [125] 杨恒伏,陈效威.小波域鲁棒自适应公开水印技术.软件学报,2003,14(9):1653-1660.
    [126] A. B. Watson, G. Y. Yang, J. A. Soloman, and J. Villasenor. Visibility of wavelet quantization noise[J]. IEEE Trans on Image Processing, 1997, 6(8): 1164-1175.
    [127] A. Said, W. A. Pearlman. A new fast and efficient image codec based on set partitioning in hierarchical trees[J]. IEEE Trans on Circuits and System for Video Technology, 1996, 6(3): 243-250.
    
    [128] G Depovere, T.Kalker, J.Haitsman,et al. The VIVA project: digital watermarking for broadcast monitoring. IEEE International Conference on Image Processing, Vol.2, pp:202-205, Kobe, Japan, 1999.
    [129] L.D. Strycker, P. Termont, J.Vandewege, et al. Implementation of a real-time digital watermarking process for broadcast monitoring on TriMedia VLIW processer. IEE proc. Vis. Image Signal Process, Vol.147, No.4, 2000, pp:371-376.
    [130] T. Kalker, GDepovere, J.Haitsman, et al. A video watermarking system for broadcast monitoring, In Proc.SPIE/IS&T Int.Conf. Security and Watermarking of Multimedia Contents, SPIE. Vol.3657,1999, pp: 103-112.
    [131] P.Termont, L.D.Stryker, J.Vandewege, et al. Performance measurements of a realtime digital watermarking system for broadcast monitoring. IEEE Int.Conf. Multimedia Computing and Systems, Vol.2,1999, pp:220-224.
    [132] M.Maes, T.Kalker, J.Haitsman, et al. Exploiting shift invariance to obtain a high payload in digital image watermarking. IEEE Int.Conf. Multimedia Computing and Systems, Vol.2, 1999,pp:7-12.
    [133] C.Busch, W. Funk, S.Wolthusen. Digital watermarking. from concepts to realtime video applications. IEEE Computer Graphics and Applications, Vol.1, 1999,pp:25-35.
    [134] M.Ramkumar and Ali N. Akansu. Capacity estimates for data hiding in compressed images [J].IEEE Trans on Image Processing,2001,10(8): 1252-1263.
    [135] M.L. Miller, I.J.Cox, J.A.Bloom. Watermarking in the real world: An application to DVD. Multimedia & Security Workshop. ACM Multimedia'98, Bristol UK, 1998, pp:71-76.
    [136] J.A. Bloom, I.J.Cox, T.Kalker, et al. Copy protection for DVD video. Proceedings of the IEEE, 87(7): 1267-1276,1999.
    [137] Matt L. Miller, I.J.Cox, and Jeffrey A. Bloom. Informed embedding: exploiting image and detector information during watermark insertion [C].Proceedings of the IEEE International Conference on Image Processing, vol. 3,. 1 -4,2000.
    [138] S.D.Servetto, C.I.Podilchuk and K.Ramachandran. Capacity issues in digital watermarking, in Proc.IEEE Int.Conf. Image Processing, Vol.1, Chicago,IL,Oct.4-7,1998,pp.445-448.
    [139] M. Barni, F.Bartolini,A. De Rosa, and A. Piva. Capacity of the watermark channel: How many bits can be hidden within a digital image?.Proc.SPIE, vol. 3657,pp.437-448,Jan.l999.
    
    [140] P.Moulin. A framework for evaluating the data-hiding capacity of images sources [J].IEEE Trans on Image Processing,2002,ll(9):1029-1042.
    [141] J.J.K.6 Ruanaidh and T.Pun. Rotation, scale and translation invariant spread spectrum digital image watermarking[J]. Signal Processing, Vol. 66, No.3,pp.303-317, May 1998.
    [142] A.B.Watson, G. Y. Yang, J.A. Soloman, and J.Villasenor. Visibility of wavelet quantization noise[J]. IEEE Trans on Image Processing, 1997,6(8): 1164-1175.
    [143] A.Said,W.A.Pearlman.A new fast and efficient image codec based on set partitioning in hierarchical trees[J].IEEE Trans on Circuits and System for Video Technology, 1996,6(3):243-250.
    [144] JPEG2000 final committee draft version 1.0",ISO/IEC FCD15444-1,March 2000.
    [145] R. G. van Schyndel, A.Z. Tirkel, C.F. Osborne. A Digital Watermark. IEEE International Conference on Image Processing, Vol.2, pp:86-90, Austin, Texas, USA, 1994.
    [146] I.J.Cox, M.L.Meller, J.A. Bloom. Watermarking application and their properties. In Proc. Of int. Conf. Information Technology: Coding and Computing 2000, 27-29,March,2000,pp:6-10.
    [147] M. D. Swanson, B. Zhu, A. H. Tewfik, "Multiresolution scene-based video watermarking using perceptual models," IEEE J. on selected areas in communications, 1998,16(4), pp: 540-550.
    [148] Barni M., Bartolini F. and Piva A., "Improved wavelet-based watermarking through pixel-wise masking," IEEE Trans. Image Processing, 2001, 10(5), pp: 783-791.
    [149] Pereira S. and Pun T, "Robust template matching for affine resist image watermarks," IEEE Trans, on Image Processing, 2000,9(9), pp: 1123-1129.
    [150] Solachidis V. and Pitas I., "Circularly symmetric watermark embedding in 2-D . DFT domain," IEEE Trans, on Image Processing, 2001,10(11), pp: 1741-1753.
    [151] Deguillaume F.; Csurka G, O'Ruanaidh J. J. K. and Pun T., "Robust 3D DFT video watermarking," IS&T SPIE EI'99, San Jose, CA, Jan. 1999,
    [152] O'Ruanaidh J. J. K. and Pun T, "Rotation, scale and translation invariant spread spectrum digital image watermarking," Signal Processing, 1998, 66(3), pp: 303-317.
    [153] Lin C-Y, Wu M., Bloom J.A., Miller M.L., Cox I.J. and Lui Y.M., "Rotation, Scale, and Translation Resilient Public Watermarking for Images," IEEE Trans.
     on Image Processing, 2001, 10(5), pp: 767-782.
    [1
    
    [154] Stankovic S., Duurovic I. And Pitas Ⅰ., "Watermarking in the space/spatial-frequency domain using two-dimensional radon-wigner distribution," IEEE Trans. on Image Processing, 2001, 10(4), pp: 650-658.
    [155] Barni M., Bartolini E, Piva A. and Rigacci F., "Statistical modelling of full-frame DCT coefficients," Proceedings of EUSIPCO'98, Ninth European Signal Processing Conference, Rodos, Greece," Sep. 1998, pp: 1513-1516.
    [156] Barni M., Bartolini F., De Rosa A. and Piva A., "Capacity of full frame DCT image watermarks," IEEE Trans. on Image Processing, 2000, 9(8), pp: 1450-1455.
    [157] Moulin P., "The role of information theory in watermarking and its application to image watermarking," Signal processing, 2001, 81 (6), pp: 1121-1139.
    [158] Su J. K., Eggers J. J. and Girod B., "Analysis of digital watermarks subjected to optimum linear filtering and additive noise," Signal Processing, 2001, 81(6), pp: 1141-1175.
    [159] Voloshynovskiy S., Pereira S., Iquise V. and Pun T., "Attack modelling: towards a second generation watermarking benchmark," Signal Processing, 2001, 81(6), pp: 1177-1214.
    [160] 郭磊,郭宝龙.一种新的图像水印方案.《通信学报》.Vol,5,No.5,2004,PP:20-27.
    [161] 郭磊,郭宝龙,陈龙谭,陈生潭.基于小波零树结构的图像水印算法.《西安电子科技大学学报》,Vol.30,No.5,2003,PP:677-681.
    [162] 郭磊,郭宝龙,陈生潭.一种新的有意义图像水印方案.《中国图象图形学报》,Vol.8(A),spec.2003,PP:617-620.
    [163] 郭宝龙,张永平,郭磊.基于DCT系数重构的分层认证水印算法.《西安电子科技大学学报》.Vol.31,No.1,2004,pp:1-5.
    [164] Guo Lei, Guo Bao-long. A Watermarking Scheme Using image Object Region, Proceedings of ICCIMA (5th IEEE International Conference on Computational Intelligence and Multimedia Applications), Xi'an, China, Sep. 2003, pp: 419-423.
    [165] Internationl Federation of photographic industry. Embedding signaling systems Issue 1.0, Request for Proposals, June,1997.
    [166] I.J.Cox,M.L.Miller,J.A,Bloom(著).王颖,黄志蓓(译).数字水印.电子工业出版社,2003.
    [167] V. Fotopoulos, A. N. Skodras. Improved watermark detection based on similarity diagrams. Signal Processing:Image Communication, 17 (2002),pp:337-345.
    
    [168] M.Kutter, F.A.P. Petitcolas. A fair benchmark for image watermarking systems. Electronic Imageing'99, Security and Watermarking of Multimedia Contents, SPIE, Vol.3657, pp:226-239,1999.
    [169] Perez-Gonzalez R, Hernandez J.R. and Balado R, "Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applications," Signal Processing, 2001, 81(6), pp: 1215-1238.
    [170] Baudry S., Delaigle J.-R, Sankur B., Macq B. and Maitre H., "Analyses of error correction strategies for typical communication channels in watermarking," Signal Processing, 2001, 81(6), pp: 1239-1250.
    [171] 王育民,刘建伟,通信网的安全-理论与技术,西安电子科技大学出版社,1999.
    [172] Yeung M.M. and Mintzer R, "An invisible watermarking technique for image verification," Proc. IEEE Int. Conference on Image Processing, Santa Barbara, California, 1997, vol. 2, pp: 680-683.
    [173] Fridrich J., Goljan M. and Memon N., "Further attacks on Yeung-Mintzer watermarking scheme," Proc. SPIE: Security and Watermarking of Multimedia Contents, San Jose, California, Jan. 2000, pp: 428-437.
    [174] Holliman M. and Memon N., "Counterfeiting attacks for block-wise independent watermarking techniques," IEEE Trans, on Image Processing, 2000, 9(3), pp: 432-441.
    [175] Fridrich J., Goljan M. and Baldoza A.C., "New fragile authentication watermark for images," Proc. ICIP, Vancouver, Canada, Sep. 2000, pp: 446-449.
    [176] Schneider M. and Chang S.-R, "A robust content based digital signature for image authentication," Proc. IEEE International Conf. on Image Processing, Laussane, Switzerland, Oct. 1996, pp: 227-230.
    [177] Bhattacha S. and Kutter M., "Compression tolerant image authentication," Proc. IEEE Int. Conf. on Image Processing, Chicago, Oct. 1998, pp: 435-439.
    [178] Fridrich J.; "Image watermarking for tamper detection," Proc. IEEE ICIP'98, Chicago, Oct. 1998, pp: 404-408.
    [179] Lin C-Y and Chang S-F, "A robust image authentication method distinguishing JPEG compression from malicious manipulation," IEEE Trans, on Circuits and Systems for Video Technology, 2001, 11 (2), pp: 153-168.
    [180] Radhakrishnan R. and Memon N., "On the security of the digest function in the sari image authentication system," IEEE Trans, on Circuits and Systems for
     Video Technology, 2002,12(11), pp: 1030 -1033.
    
    [181] Xie Liehua and Arce, G.R., "A class of authentication digital watermarks for secure multimedia communication," IEEE Trans, on Image Processing, 2001, 11(10), pp: 1754-1764.
    [182] Lie W-N and Li C.C., "Data hiding in images with adaptive numbers of least significant bits based on the human visual system," Proc. IEEE Int. Conf. on Image Processing, Kobe, Japan, Oct. 1999, vol. 1, pp: 286-290.
    [183] Wang R-Z., Lin C-F and Lin J-C, "Image hiding by optimal LSB substitution and genetic algorithm," Pattern Recognition, 2001, 34(3), pp: 671-683.
    [184] Lee Y.K. and Chen L.H., "High capacity image steganographic model," IEE Proc.-Vis. Image Signal Process. 2000,147(3), pp: 288-294.
    [185] Katzenbeisser S. and Petitcolas F.A.P., "Defining security in steganographic system," Proc. SPIE 4675: Security and Watermarking of Multimedia Contents IV, 2002, San Jose, California, USA, Jan. 2002, pp: 50-56.
    [186] Westfeld A. and Pfitzmann A., "Attacks on steganographic systems," Lecture Notes in Computer Science, vol. 1768, Springer-Verlag, Berlin, 2000, pp: 61-75.
    [187] Fridrich J., Goljan M. and Du R., "Reliable Detection of LSB Steganography in Grayscale and Color Images," Proc. ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, Oct. 2001, pp: 27-30.
    [188] Farid H., "Detecting steganographic message in digital images," Report TR2001-412, Dartmouth College, Hanover, NH, 2001.
    [189] I.J.Cox, M.L.Miller, A.L.McKellips. Watermarking as communication with side information. Proceedings of IEEE, Vol. 87, No.7,1999, pp:l 127-1141.
    [190] M. D. Swanson, B. Zhu, A. H. Tewfik, "Multiresolution scene-based video watermarking using perceptual models," IEEE J. on selected areas in communications, 1998, 16(4), pp: 540-550.
    [191] Barni M., Bartolini F. and Piva A., "Improved wavelet-based watermarking through pixel-wise masking," IEEE Trans. Image Processing, 2001, 10(5), pp: 783-791 .
    [192] Fridrich J., Goljan M, "Protection of digital images using self-embedding", Symposium on content security and data hiding in digital media, New Jersey Institute of Technology, May 14,1999.
    [193] Fridrich J., Goljan M, "Images with self-correcting, capabilities", ICIP'99,Kobe,Japan,Oct, 1999.
    [194] Voyatzis G. and Pitas I., "The use of watermarks in the protection of digital
     multimedia products," Proc. IEEE, 1999, 87(7), pp: 1197-1207.
    
    [195] Lu C-S, Huang S-K, Sze C-J and Liao H-Y M., "Cocktail watermarking for digital image protection," IEEE Trans, on Multimedia, 2000, 2(4), pp: 209-224.
    [196] Cox I. J., Kilian J., Leighton F. T. and Shamoon T., "Secure spread spectrum watermarking for multimedia," IEEE Trans, on Image Processing, 1997, 6(12), pp: 1674-1687.
    [197] Barni M., Bartolini R, De Rosa A. and Pfva A., "A new decoder for the optimum recovery of nonadditive watermarks," IEEE Trans, on Image Processing, 2001, 10(5), pp: 755-766.
    [198] Mintzer F., Braudaway G and Yeung M., "Effective and ineffective digital watermarks," Proc. IEEE International Conference on Image Processing, Santa Barbara, California, Oct. 1997, pp: 9-12.
    [199] Lu C-S and Liao H-Y M., "Multipurpose watermarking for image authentication and protection," IEEE Trans, on Image Processing, 2001, 10(10), pp: 1579-1592.
    [200] Hartung F. and Kutter M., "Multimedia watermarking techniques," Proceedings of the IEEE, 1999, 87(7), pp: 1079-1107.
    [201] Xia M. and Liu B., "Effect of JPEG compression on image watermark detection," IEEE International Conference on Acoustics, Speech, and Signal Processing, Salt Lake City, UT, May 2001.
    [202] Pitas I., "A method for watermark casting in digital images," IEEE Trans, on Circuits and Systems on Video Technology, 1998, 8(6), pp: 775-780.
    [203] 汪小帆,戴跃伟,茅耀斌,信息隐藏技术-方法与应用,机械工业出版社,2001.
    [204] Cox I.J. and Linnartz J.-P., "Some general methods for tampering with watermarks," IEEE Journal on Selected Areas in Communications, 1998, 16(4), pp: 587-593.
    [205] Kuhn M.G and Petitcolas F.A.P., StirMark. http://www.cl.cam.ac.uk/~fapp2/watermarking/stirmark/. .
    [206] Craver S., Yeo B.-L. and Yeung M., "Technical trials and legal tribulations," Commun. ACM, 1998,41(7), pp: 44-54.
    [207] Maes M., "Twin peaks: the histogram attack on fixed depth image watermarks," Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science), vol. 1525, Berlin, Germany: Springer-Verlag, 1998, pp: 290-305.
    [208] Kutter M., Voloshynovskiy S. and Herrigel A., "Watermark copy attack," Proc. SPIE 3971: Security and Watermarking of Multimedia Content II, San Jose,
     California USA, Jan. 2000, pp: 23-28.
    
    [209] Su J.K. and Girod B., "Fundamental performance limits of power-spectrum condition-compliant watermarks," Proc. SPIE 3971: Security & Watermarking Multimedia Contents II, San Jose, CA, USA, Jan. 2000, pp: 314-325.
    [210] Voloshynovskiy S., Herrigel A., Baumgartner N. and Pun T., "A stochastic approach to content adaptive digital image watermarking," International Workshop on Information Hiding, Dresden, Germany, Sep. 1999, Lecture Notes in Computer Science, pp: 211 -23 6.
    [211] Kutter M. and Petitcolas F.A.P., "A fair benchmark for image watermarking systems," Proc. SPIE 3657, San Jose, California, USA, Jan. 1999, pp: 25-27.
    [212] Petitcolas F.A.P., Anderson R.J. and Kuhn M.G., "Attacks on copyright marking systems," Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science), vol. 1525, Berlin, Germany: Springer-Verlag, 1998, pp: 218-238.
    [213] Craver S., Memon N., Yeo B.-L. and Yeung M.M., "Can invisible watermark resolve rightful ownerships?." Proc. SPIE 3022: Storage and Retrieval for Image and Video Database V, San Jose, CA, 1997, pp: 310-321.
    [214] Hartung F. and Kutter M, "Multimedia watermarking techniques," Proceedings of the IEEE, 1999, 87(7), pp: 1079-1107.
    [215] Craver S., Memon N., Yeo B.-L. and Yeung M., "Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications," IEEE Journal on Selected Areas in Communications, 1998, 16(4), pp: 573-586.
    [216] Zeng W. and Liu B., "A statistical watermark detection technique without using original image for resolving rightful ownerships of digital images," IEEE Trans. on Image Processing, 1999, 8(11), pp: 1534-1548.
    [217] Qiao L., and Nahrstedt K., "Watermarking schemes and protocols for protecting rightful ownership and customer's rights," J. Vis. Commun. Image Presentation, 1998, 9(3), pp: 194-210.
    [218] Lin P.-L., "Digital watermarking models for resolving rightful ownership and authenticating legitimate customer," J. System and Software, 2001, 55(3), pp: 26-271.
    [219] T.N.Pappas, "An adaptive clustering algorithm for image segmentation", IEEE Trans. On Signal Processing, Vol.40, pp:901-914, 1992.
    [220] 孙鑫等,一种基于图像特征区域的数字水印系统,计算机工程与应用,No.23,PP:1023-1027,2002
    [221] L.Itti, C.Koch,"Computational modeling of visual attention", Nature Reviews
     Neuroscience,2(3),pp: 100-112,2001.
    
    [222] P.Perona and J.Malik, "Scale-space and edge detection using anisotropic diffusion". IEEE Trans. On PAMI, 12(7),pp:629-639,1990.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700