用户名: 密码: 验证码:
基于DFT的矢量地理空间数据数字水印模型研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
矢量地理空间数据是国家基础设施建设和地球科学研究的支撑性成果之一,在国家经济、国防建设中占有十分重要的地位,其安全性涉及到科技协作、知识产权、国家安全等。目前,传统的加密技术已不能满足矢量地理空间数据安全的需求,迫切需要可靠的技术来保障矢量地理空间数据的安全。数字水印是随着数字化的进程而发展起来的一种信息安全前沿技术,研究矢量地理空间数据数字水印技术对于保障矢量地理空间数据的安全具有极其重要的理论意义和应用价值。
     本文以离散傅里叶变换(DFT)理论为基础,结合矢量地理空间数据的特点,对基于DFT的矢量地理空间数据数字水印理论、模型和应用进行了深入的研究与实践,主要研究内容如下:
     1.分析了矢量地理空间数据数字水印的国内外研究背景和现状,对数字水印的概念、分类、算法、应用领域和攻击方法进行了概述,介绍了DFT应用于矢量地理空间数据数字水印的优势,确定本文的研究内容。
     2.提出了基于DFT幅度的矢量地理空间数据数字水印模型。阐述了水印生成、矢量空间数据的离散傅立叶变换、水印嵌入和提取过程,通过实验验证了模型具有较好的可用性、不可见性和稳健性,同时对不同读取数据的方式所提取的水印效果做了对比,证明所有点一次参与变换后嵌入水印比各线段独立做变换后嵌入水印的效果要好。
     3.提出了基于DFT相位的矢量地理空间数据数字水印模型。并从水印嵌入、提取以及嵌入水印后载体数据的可用性、不可见性和稳健性方面与幅度模型进行了对比分析,指出两种方法的优点与缺点。
     4.提出了一种基于DFT的矢量地理空间数据综合水印模型。该模型将水印同时嵌入DFT系数的幅度和相位中,弥补了将水印单独嵌入DFT幅度和DFT相位时在稳键性方面的不足,水印容量更大,能够抵抗更多种类的攻击。
     5.研究了基于自相关的数字水印检测方法,通过自相关检测辅助水印信息的判定,使水印在检测恢复时不只依靠主观判断,而是用一种更为客观的方法来比较提取出的水印的效果。
     6.对比研究了针对浮点型数据与整数型数据的DFT幅度水印、相位水印以及综合水印的提取效果。实验表明,DFT相位水印模型针对浮点型数据的效果大大优于整数型数据,而DFT幅度水印模型相对差别不大,综合数字水印的模型浮点型数据比整数型数据的效果要好。
     7.提出了一种基于量化思想DFT的矢量地理空间数据水印的一种盲检测模型。通过可变的量化参数、不同的量化步长,对DFT幅度进行水印信息的量化嵌入。实验表明,提出的模型具有好的盲检测特性,能够较好地提取出水印信息。
     8.开发了基于DFT的矢量地理空间数据数字水印实验系统,论述了系统的总体设计和主要功能。
     最后,总结了本文的研究工作,讨论了将来可能继续的研究方向。
Vector geospatial data is a national geospatial data infrastructure and the support of Earth science research results, it occupies a very important position in the national economy, national defense building, its security relates to science and technology cooperation, intellectual property rights, national security and so on. Traditional encryption technology can no longer meet the vector geospatial data security needs; a reliable technology is needed ugently to protect the vector geospatial data security. Digital watermark is becoming a cutting-edge technology of information security with the development of digital process. The Research of vector geospatial data digital watermarking technology used to protect the vector geospatial data security is extremely important theoretical and applied value.
     Based on the theory of discrete Fourier transform (DFT) and the characteristic of vector geospatial data for digital watermarking, the study and practice of theories, models and applications about DFT-based vector geospatial data digital watermarking is carried out in-depth,
     The issues in this dissertation are as the following:
     1. The background and current research of digital watermarking for vector geospatial data at home and abroad are analyzed; the concept, classification, algorithms, applications and attacks of digital watermarking are sumarrized. By analyzing the advantages of DFT in digital watermarking for the vector geospatial data, the content of the research are brought forward.
     2. A digital watermarking model for the vector geospatial data DFT-based amplitude is designed. After analyzing digital watermarking generating, the DFT of the vector geospatial data, embedding and extracting of digital watermarking, the availability, imperceptibility, and robustness of the model are confirmed by experiment.
     3. A digital watermarking model for vector geo-spatial data DFT-based phase is designed. This model is contrasted with the model of DFT amplitude according to the embedding, extracting of digital watermarking, the availability, imperceptibility, and robustness of the carrier data with embedded watermarking. Virtues and defects of two methods are pointed out.
     4. A combined digital watermarking model for vector geospatial data DFT-based is designed. In this model, the digital watermarking is embed in the both amplitude and phase of DFT, so it makes up the defeats of the independent DFT phase model and DFT amplitude model , the capacity of digital watermarking is high, so the model can resist more kinds of attacks.
     5. The autocorrelation detection is used to assist judge the result of exacted watermarking, make sure the result is objective; moreover, the detection method can make up the limitation of the models.
     6. The carrier data type are studied by contrast, The experiment shows that the result of floating vector geo-spatial data is better than integer data by the model DFT-based phase and the result of the model DFT-based amplitude has few differences comparatively. The extracted result of the combined model is better than that of integer type.
     7. A blind detection model of the digital watermarking of vector geo-spatial data DFT-based is put forward, its understanding is from the quantization of mean value, the parameter is variable when the watermark is embedded in the amplitude of DFT, Experiments show that the model has the good detecting blind characteristics, better able to extract watermark information
     8. An experiment system for the digital watermarking of DFT-based vector geospatial data is developed.The system design and main functions are discussed.
     At last, research work is summarized and the potential research topics are discussed.
引文
[1]梅蕤蕤.数字地图版权保护[D].西安:西安电子科技大学,2002.
    [2]邬伦,刘瑜,张晶等.地理信息系统-原理、方法和应用[M].北京:科学出版社,2005.
    [3]樊廷杰.基础地理信息的安全管理[J].三晋测绘,2002.
    [4]Schyndel R G van,Tirkel A Z,Osborne C F.A digital watermark[C].First IEEE International Image Processing Conference,1994,2:86-90.
    [5]Yogesh Chauhan,P.Gupta,K.L.Majumder.Digital Watermarking of Satellite images.http://www.ee.iitb.ac.in/icvgip/papers/162.pdf.
    [6]关泽群,王贤敏,孙家抦.一种实用的遥感影像二维信息隐藏盲算法[J].武汉大学学报.(信息科学版),2004,29(4):296-301.
    [7]王贤敏,王乘,周建中等.一种新的遥感影像不同权限信息隐藏技术[J].计算机工程,2006,32(1):28-30.
    [8]M.Barni,F.Bartolini,V.Cappellini,E.Magli,G.Olmo.Near-lossless digital watermarking for copyright protection of remotely sensed images[A].In:Proc,ICARSS,Toronto,Canada,June 2002,3:1447-1449.
    [9]M.Barni,F.Bartolini,V.Cappellini,E.Magli,G.Olmo.Watermarking-based protection of remote sensing images:requirements and possible solutions[A].In:Mathematics of Data/Image Coding,Compression,and Encryption Ⅳ,with Applications[C].M.S.Schmalz,Ed,San Deigo,CA,July,2001,Proc.SPIE 4475:191-202.
    [10]M.Barni,F.Bartolini,V.Cappellini,A.Garzelli,E.Magli,G.Olmo.Watermarking Techniques for Electronic Delivery of Remote Sensing Images[J].Optical Engineering Journal"Special Section on Remote Sensing Technology and Applications",Sept,2002,41(9):2111-2119.
    [11]Sean B.Ziegiler,Hrishikesh Tamhankar,James E.Fowler,Lori Mann Bruce.Wavelet-Based watermarking of remotely sensed imagery tailored to classification performance[A].In:Proc.Of the IEEE Workshop on Advance in Techniques for Analysis of Remotely Sensed Data[C].Washington,DC,October.2003.
    [12]Gregory L.Heileman,Yunlong Yang.The Effects of Invisible Watermarking on Satellite Image Classification[A].In Proc,Of the 2003 ACM Workshop on Digital Rights Management[C],Washington,DC,USA,2003:120-132.
    [13]王贤敏,关泽群,吴沉寒.基于遥感影像特征的自适应二维信息隐藏盲算法[J].计算机工程与应用,2004,40(19):17-20.
    [14]王贤敏,关泽群,吴沉寒.遥感影像高逼真度信息隐藏盲算法[J].计算机工程与应用,2004,40(13):3-5.
    [15]罗永,成智礼,陈波,吴翊.数字高程模型数据整数小波水印算法[J].软件学报,2005,16(6):1096-1102.
    [16]Hongmei Gou,Min Wu.Fingerprinting Digital Elevation Maps.Proceedings of SPIE-The International Society for Optical Engineering,6072,Security,Steganography,and Watermarking of Multimedia Contents Ⅷ-Proceedings of.SPIE-IS and T Electronic Imaging,2006,60720Z.
    [17]刘爱利,闾国年.基于DCT域数字水印技术的DEM版权保护研究[J].地球信息科学,2008,10(2):214-223.
    [18]何密,罗永,成礼智.数字高程模型数据的无损数字水印[J].计算机工程与应用,2007,43(30):40-43.
    [19]M.Barni,F.Bartolini,A.Piva,F.Salucco.Robust Watermarking of Cartographic Images[J].EURASIP Journal on Applied Signal Processing 2002,2:197-208.
    [20]M.Barni,F.Bartolini,A.Piva,F.Salucco.Cartographic image watermarking using text-based normalization [J].Multimedia Signal Processing,2001 IEEE Fourth Workshop on Volume,Issue,2001:231-236.
    [21]Mark A.Masry.A Watermarking Algorithm for Map and Chart Images.Proceedings of the SPIE Conference on Security,Steganography and Watermarking of Multimedia Contents Ⅶ,2005.
    [22]许德合,朱长青,王奇胜.矢量地图数字水印技术的研究现状和展望[J].地理信息世界,2007,5(6):42-48.
    [23]CoxG.S,deJager.G.A survey of point pattern matching techniques and a new approach to point pattern recognition[C].Proceedings of Symposium on Communication and Signal Processing,Lesotho,1993:243-248.
    [24]贾培宏,马劲松,史照良,徐志中.GIS空间数据水印信息隐藏与加密技术方法研究[J].武汉大学学报·信息科学版,2004,29(8):747-751.
    [25]M.Samoa,Y.Matsuura and Y.Takashima.A Scheme of digital watermarking for geographical map data[C].Proceedings of the Symposium on Cryptography and Information Security,Okinama,Japan,2000:26-28.
    [26]李媛媛,许录平.用于矢量地图版权保护的数字水印[J].西安电子科技大学学报·自然科学版,2004,31(5):719-723.
    [27]Kang,H.A vector watermarking using the generalized square mask[C].Proceeding of the International Conference on Information Technology:Coding and Computing,Las Vegas,NV,USA,2001:234-236.
    [28]Ohbuchi.Robust watermarking of vector digital maps[C].Proceeding of the IEEE International Conference on Multimedia and Expo,Lausanne,Switzerland,2002,1:577-580.
    [29]王勋,林海,鲍虎军.一种鲁棒的矢量地图数字水印算法[J].计算机辅助设计与图形学学报,2004,16(10):1377-1381.
    [30]Voigt.M and C.Busch.Watermarking 2D-Vector data for geographical information systems[C].Proceedings of the SPIE,Security and Watermarking of Multimedia Content,San Jose,USA,2002,4675:621-628.
    [31]Voigt.M,C.Busch.Feature-based watermarking of 2D-vector data[C].Proceedings of the SPIE,Security and.Watermarking of Multimedia Content,Santa Clara,USA,2003,5020:359-366.
    [32]Schulz.G,Voigt.M.A high capacity watermarking system for digital maps[J].Proceedings of the 2004Multimedia and Security Workshop on Multimedia and Security,Magdeburg,Germany,2004:180-186.
    [33]W.Thoen and Bill Huber.GIS&Steganography-Part 3:Vector Steganography,Directions Magazine,http://www.directionsmag.com..2007-02-20.
    [34]Park,K.T.,K.I.Kim,H.Kang,S.-S Han.Digital geographical map watermarking using polyline interpolation[C].Proceedings of the IEEE Pacific Rim Conference on Multimedia,Hsinchu,Taiwan, 2002:58-65.
    [35]Sonnet,H.,T.Isenberg and J.Dittmann,T.Strothotte.Illustration watermarks for vector graphics[C].Proceedings of the 11th Pacific Conference on Computer Graphics and Applications,Calgary,Canada,2003:73-82.
    [36]王伟,李岩.一种鲁棒性的2D矢量图形水印算法[C].第十三届全国图象图形学术会议.南京,2006:191-196.
    [37]朱长青,杨成松,李中原.一种抗数据压缩的矢量地图数据数字水印算法[J].测绘科学技术学报,2006,23(4):281-283.
    [38]Kurihara,M.,N.Komatsu,H.Arita.Watermarking vector digital maps[C].Computer Security IPSJ(Information Processing Society of Japan),Special Interest Group Report,Tokyo,Japan,2000,2000(36):25-31.
    [39]Toyota,T.,Furukawa,A.Wada and H.Masuda.A study of the digital watermarking to the vector digital map data[C].Proceedings of IPSJ(Information Processing Society of Japan),2001,3:13-14.
    [40]Voigt,M.,B.Yang and C.Busch.Reversible watermarking of 2D-vector data[C].Proceedings of the 2004Multimedia and Security Workshop on Multimedia and Security,Magdeburg,Germany,2004,160-165.
    [41]Kitamura,I.,S.Kanai and T.Kishinami.Digital watermarking method for vector map based on wavelet transform[C].Proceedings of Annual Conference of the Geographic Information Systems Association,Tokyo,Japan,2000,9:417-421.
    [42]李媛媛,许录平.矢量图形中基于小波变换的盲水印算法[J].光子学报,2004,33(1):97-100.
    [43]杨成松,朱长青.基于小波变换的矢量地图数据数字水印算法[J].测绘科学技术学报,2007,24(1):37-39.
    [44]Ohbuchi,R.,H.Ueda,S.Endoh.Watermarking 2D vector maps in the mesh-spectral domain[C].Shape Modeling International,Seoul,Korea,2003:216-228.
    [45]Ohbuchi,R.,S.Takahashi,T.Miyazawa,and A.Mukaiyama.Watermarking 3D polygonal meshes in the mesh spectral domain[C].Proceedings of the Graphics Interface 2001,Ontario,Canada,2001:9-17.
    [46]Xu Zhou,Xuezeng Pan.Watermark Embedded in polygonal Line to Protect the Copyright of Contour Map.last accessed at http://paper.ijcsns.org,2006-02-20.
    [47]Hongmei Gou,Min Wu.Data Hiding in Curves With Application to Fingerprinting Maps[J].IEEE Transactions on signal proceeding,2005,53(10):3988-4005.
    [48]周旭,毕笃彦.基于中国剩余定理的GIS数字水印算法[J].中国图象图形学报,2004,9(5):611-615.
    [49]Nikolaldis,N.,I.Pitas and V.Solachidis.Fourier descriptors watermarking of vector graphics images[C].Proceedings of the International Conference of Image Processing,Vancouver,Canada,2000,3:10-13.
    [50]Solachidis,V.,N.Nikolaldis and I.Pitas.Watermarking polygonal lines using Fourier descriptors[C].Proceedings of the IEEE International Conference on Acoustics,Speech and Signal Processing,Istanbul,Turkey,2000,Ⅳ:1955-1958.
    [51]Nikolaldis.N.,I.Pitas and A.Giannoula.Watermarking of sets of polygonal lines using fusion techniques[C].Proceedings of the 2002 IEEE International Conference on Multimedia and Expo,Lausanne,Switzerland,2002;2:549-552.
    [52]Kitamura,I.,S.Kanai and T.Kishinami.Copyright protection of vector map using digital watermarking method based on discrete Fourier transform[C].Proceedings of the IEEE 2001 International Symposium on Geoscience and Remote Sensing,Sydney,Australia,2001,3:1191-1193.
    [53]Petitolas FAP,Anderson RJ and Kuhn M G.Information hiding- a survey.Proceedings of the IEEE,1999,87(7):1062-1078.
    [54]Hartung F and Kutter M.Multimedia watermarking techniques.Proceedings of the IEEE,1999,87(7):1079-1107.
    [55]张立和,周继军,陈伟,王颖.透视信息隐藏[M].北京:国防工业出版社,2007.
    [56]Wade Trappe,Lawrence C.Washington..邹红霞,许鹏文,李勇奇译.密码学概论[M].北京:人民邮电出版社,2004.
    [57]王丽娜,张焕国.信息隐藏技术与应用[M].武汉:武汉大学出版社,2006.
    [58]杨义先,钮心忻.数字水印理论与技术[M].北京:高等教育出版社,2006.
    [59]Bender W,et al.Techniques for data hiding.IBM Systems Journal,1996,35(3&4):313-336.
    [60]Cox I j,Miller M L.The first 50 years of electronic watermarking.EURASIP J.of Applied Signal Processing,2002,2:126-132.
    [61]陈琦,王炳锡.网络环境下的信息隐藏与数字水印技术[J].网络安全技术与应用,2001,(7):19-22.
    [62]Ingemar J.Cox,Matthew L.Miller,and Jeffrey A.Bloom著.王颖,黄志蓓等译.数字水印[M].北京:电子工业出版社,2003.
    [63]陈明奇,钮心忻,杨义先.数字水印的研究进展和应用[J].通信学报,2001,22(5):71-79.
    [64]孙圣和,陆哲明,牛夏牧等.数字水印技术及应用[M].北京:科学出版社,2004.
    [65]王炳锡,陈琦,邓峰森.数字水印技术[M].西安:西安电子科技大学出版社,2003.
    [66]刘春庆,王执铨,戴跃伟.常用数字图像水印攻击方法及基本对策[J].控制与决策,2004,19(6):601-606.
    [67]邢轻,柏森,刘耀东.水印攻击方法综述[J].重庆通信学院学报,2005,24(2):102-103.
    [68]季智,戴旭初.数字水印攻击技术及其对策分析[J].测控技术,2005,24(5):14-17.
    [69]伍凯宁,曹汉强等.数字水印攻击技术及对策研究[J].计算机应用研究,2004,9:153-154.
    [70]吴志强.图像数字水印的应用及基准测试软件[J].华东交通大学学报,2004,2:98-101.
    [71]陈更力,张青等.数字水印技术及其攻击分析[J].江汉石油学院学报,2004,26(4):202-203.
    [72]胡启明.数字水印的攻击方法和对策浅析[J].科技资讯,2006,20.220-221.
    [73]边馥苓.空间信息导论[M].北京:测绘出版社,2006.
    [74]郭仁忠.空间分析[M].北京:高等教育出版社,2001:20-21
    [75]马耀峰.胡文亮,张安定,陈逢珍.地图学原理[M].北京:科学出版社,2004.
    [76]孙家广.杨长贵.计算机图形学[M].北京:清华大学出版社,1994:341-343.
    [77]华一新,吴升,赵军喜.地理信息系统原理与技术[M].北京:解放军出版社,2001:165-166.
    [78]刘可晶.一种改进的矢量曲线数据压缩算法[J].甘肃科学学报,2005,17(3):112-115.
    [79]韦家宏.栅格、矢量结构在空间数据融合中的技术及应用初探[J].广西测绘,2003,10(1):32-35.)
    [80][美]H.J.威佛,王中德,张辉译.离散和连续傅里叶分析理论[M].北京:北京邮电学院出版社,1991:256-257.
    [81]冷建华.傅里叶变换[M].北京:清华大学出版社,2004:134-148.
    [82]樊映川等编.高等数学讲义(下册)[M].北京:人民教育出版社,1977:238-260.
    [83]南京工学院数学教研组编.工程数学--积分变换[M].北京:人民教育出版社,1979:47-55.
    [84]邹理和.数字信号处理[M].北京:国防工业出版社,1985:168-176.
    [85]冷建华.数字信号处理[M].北京:国防工业出版社,2002:232-257.
    [86]C.T.Hsu,J L Wu.Hidden signatures in images,in Proc.ICIP.1996IEEEI nt.Conf Image Processing,Vo 111 1,Lausanne.Switzerland.1996:223-226.
    [87]邓铭辉.抗几何攻击的鲁棒数字水印技术的研究[D].哈尔滨:哈尔滨工程大学.2004.
    [88]杨义先.数字水印基础教程[M].北京:人民邮电出版社,2007:198-200.
    [89]钟尚平,高庆狮.矢量地图水印归一化相关检测的可行性分析与改进[J].中国图象图形学报,2006,11(3):401-409.
    [90]朱桂斌,张邦礼.可逆线性变换的整型化及其应用[J]软件学报.2002.13(4):754-760.
    [91]Harmsen,Pearlman W A.Steganalysis of additive Noise model able information hiding.Proc.Of SPIE Electronic Imaging 5022,Santa Clara,CA,21-24.
    [92]Avcibas I,Memon ND,Sankar B.Steganalysis based on image quality metrics.Proc.Of the IEEE 4~(th) Workshop on Multimedia Signal Processing Canners,2001:517-522.
    [93]Farid H.Detecting Stefano graphic Message in Digital Images.Report TR2001-412,Dormouse college,Hanover,NH,2001.
    [94]A.Z.Tirkel,GxRankin,R,van Schyndel,W.Ho,etal.Electronic watermark.In Proc DICTA1 993,Dec.1993:666-672.
    [95]R.Gvan Schyndel,A.Z.Tirkel,and C.F.Osbome,A digital watermark,in Proc.of ICIP,Austin,Tx,1994,Nov,2:86-90.
    [96]W.Bender,D.Gruhland N.Morimoro.Techniques for data hiding,in Proc,SPIE,storage and Retrieval for Image and Video Data bases Ⅲ,san Jose,CA,Feb.9-10,1995,2420:165-173.
    [97]M.Yeung and Frederick C.Mintzer.An Invisible Watermarking Technique for image verification.1997International Conference on Image Conference.(ICIP 97) 2:680-683.
    [98]F.Mintzer,GW.Braudaway,M.Yeung.Effective and ineffective digital Water markings,in Proc.IEEE in Conf.Image Processing.Santa Barbara,CA.Oct.26-29,1997,3:9.
    [99]M.Wu and B.Liu.Watermarking for image authentication.Proceedings of the IEEE International Conference on Image Processing,Chicago,Illinois,October 1998,2:437-441.
    [100]Zhicheng Ni,Eric Sung and Yun Q.shi.Enhancing Robustness of Digital Watermarking against Geometric Attack Based on Fractal Transform.[C]2000 IEEE:1033-1036.
    [101]Wenjun zeng and Bede Liu.A statistical watermark Detection Technique without Using Original Images for Resolving Rightful ownerships of Digital images.IEEE Trans.Image Processing,1999.
    [102]Joseph.J.K.O Ruanaidh and Gabriella Csurka.A Bayesians Approach to Spread Spectrum Watermark Detection and Secure Copyright Protection for Digital Image Libraries.IEEE Conf.On CVPR'99,,Fort Collins,Colorado,USA,June23-25,1999.
    [103]J.R.Hemandez and F.Perez-Gonzalez.Statistical Analysis of Watermarking Schemes for Copyright Protection of Images.Processing of July 1999:1142-1166.
    [104]Chug T.Y,Hong M.S.Oh Y.N,et al.Digital watermarking for copyright protection of MPEG2 compressed video[J].IEEE Trans on Consumer Electronic,1998,44(3):895-901.
    [105]Hartun G.F,Girod B.Watermarking of uncompressed and compressed video[J].Signal Processing,1998,66(3):283-301.
    [106]Voyatzis G,and Pitas I.Digital image watermarking using mixing systems[J].Computer & Graphics,1998,22(4):405-416.
    [107]Barni M,Bartolini F,Cappellini V,et al.Copyright protection of digital images by embedded unperceivable marks[J].Image and Vision Computing,1998,16(12-13):897-906.
    [108]Swanson M.D,Zhu B,Tewfik A.H.Robust data hiding for images[A].Proc.of DSP'96[C]SEP.1996:37-40.
    [109]E.Koch and J.Zhao.Toward robust and hidden image copyright labeling,in Proc,IEEE Workshop Nonlinear Signal and Image Processing,Neos Marmaras;Halkidikj.Greece,June20-22,1995:452-455.
    [110]Joachim J,Eggers,Jonathan K,Su and Bernd Girod.Robustness of a blind image Watermarking scheme.ICIP 2000 Special Session on WM Vancouver,Canada Sep.10-13.
    [111]Won-Gyum Kim,Chan-Woo Lee and Don Lee.A watermarking scheme for both spatial and frequency domain to extract the Seal image without the original image.Fifth International Symposium on Signal Processing and its Applications.ISSPA'99,Brisbane,Australia,22-25,August,1999.
    [112]张健.数字水印检测技术研究[J].科技情报开发与经济,2007,17(33):212-213
    [113]杨蕊,普杰信,刘敏红,卢振泰.一种基于DCT系数特性的盲检水印算法[J].计算机应用研究,2006,(2):243-245.
    [114]汪太月,李宏伟,王志华.基于广义高斯分布的水印信号检测[J].数据采集与处理,2007,2(2):166-171.
    [115]闫小萍,张专成,冯立杰,武国斌.DWT域图像水印的精确嵌入与盲检测的实现[J],计算机工程与应用,2005,41(25):71-74.
    [116]谢耀菊,张兴周,孔凡芝,赵曾珠.彩色图像盲数字水印新算法的研究[J].应用科技,2006,33(1):4-6.
    [117]李燕萍,唐振民,钱博.基于语音参数模型的抗同步攻击音频水印算法[J].计算机工程,2008.5,34(9):177-179.
    [118]Hao-Tian Wu,Yiu-Ming Cheung.A Fragile Watermarking Scheme for 3D Meshes.MM-SEC'05,New York,New York,USA.August 1-2,2005:117-123.
    [119]Shijun Xiang,Jiwu Huangl.Analysis of D/A and A/D Conversions in Quantization-based Audio Watermarking.International Journal of Network Security,2006,13(3):230-238.
    [120]Chen,B.,Wornell,G.W.:Quantization index modulation:A class of provably good methods for digital watermarking and information embedding.IEEE Transactions on Information Theory 47(2001):1423-1443.
    [121]Miin-Luen Day,Suh-Yin Lee,I-Chang Jou.Multiple Description Watermarking Based on Quantization Index Modulus Modulation[J].Journal of information science and engineering,2007,23:1785-1800.
    [122]Mathias Sehlauweg,Dima Pr(o|¨)frock,Torsten Palfner and Erika M(u|¨)ller.Quantization-based semi-fragile public-key watermarking for secure image authentication.In Proc.of SPIE,July 2005,5915:41-51.
    [123]Brian Chen and Gregory W.Wornell.Provably robust digital watermarking.Multimedia Systems and Applications II, 1999, 3845: 43-54.
    [124] Ashwin Swaminathan, Shan He, Min Wu. Exploring QIM based Anti-Collusion Fingerprinting for Multimedia IS&T SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, CA, January 2006, 6072: 698-709.
    [125] Kaushal Solanki, Upamanyu Madhow, et al. Modeling the Print-Scan Process for Resilient Data Hiding. Security, Steganography, and Watermarking of Multimedia Contents VII, Proc. of SPE-IS&T Electronic Imaging, 2005, 5681: 418-429.
    [126] K. Sullivan, Z. Bi, U. Madhow, S. Chandrasekaran, and B. S. Manjunath. Steganalysis of Quantization Index Modulation Data hiding. Proc. IEEE International Conference on Image Processing, Singapore, Oct. 2004: 1165-1168.
    [127] Luis P'erez-Freire, Pedro Comesa na-Alfaro, et al. Detection in Quantization-Based Watermarking: Performance and Security Issues and Security Issues. Security, Steganography, and Watermarking of Multimedia Contents VII, Proceedings of the SPIE, 2005, 5681: 721-733.
    [128] J. E. Vila-Forc'en, S. Voloshynovskiy, O. Koval and T. Pun. Performance analysis of no uniform quantization-based data-hiding Security, Steganography, and Watermarking of Multimedia Contents VIII. Proceedings ofthe SPIE, 2006, 6072: 354-361.
    
    [129] J. E. Vila-Forc'en, S. Voloshynovskiy, O. Koval, T. Pun. Worst Case Additive Attack against Quantization-Based Watermarking Techniques. In IEEE 6th Workshop on Multimedia Signal Processing, Siena, Italy, 29 Sepember-1 October 2004.
    [130] Brian Chen and Gregory W. Wornell. Preprocessed and postprocessed quantization index modulation methods for digital watermarking. Proc. of SPIE: Security and Watermarking of Multimedia Contents II, 2000,3971: 48-59.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700