用户名: 密码: 验证码:
数字图像无损信息隐藏方法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
自古以来,人类的信息交流方式经历了从语言、文字到数字化多媒体的历史变迁。今天,数字图像以其直观、生动和跨语言等优势,广泛地应用于国民经济的各个领域。然而,飞速发展的信息技术使得数字图像的信息安全面临严峻挑战。针对这一问题,信息隐藏作为一门新兴的交叉学科应运而生。传统的信息隐藏方法在将隐秘信息嵌入到宿主图像的过程中,往往给图像内容造成永久性失真,这成为它在医学、遥感及法庭证据等应用的重要障碍。因此,数字图像无损信息隐藏成为近年来多媒体信息安全领域的研究热点。
     本文针对无损信息隐藏方法所面临的挑战性问题,分别从可逆性、不可感知性、嵌入模型及鲁棒性等方面深入探索了数字图像无损信息隐藏的解决之道。本文的主要工作可概括如下:
     (1)提出了基于优化策略的提升无损信息隐藏方法。首先通过设计优化策略进行嵌入区域的选择,然后利用嵌入机制与参数模型实现了水印与宿主图像的无失真恢复,从而有效克服了基于直方图分布约束方法存在的可逆性不稳定问题。
     (2)考虑到不可感知性在信息隐藏中的重要作用,基于直方图旋转的嵌入模型提出了一种内容自适应的可信无损信息隐藏方法。首先利用像素调整策略对宿主图像进行预处理,有效避免了嵌入过程中的像素溢出,提高了水印图像的视觉质量;并结合人类视觉系统的感知特性,利用亮度掩膜模型进一步优化水印嵌入强度,实现了内容自适应的可信无损水印嵌入与提取。
     (3)针对因图像灰度直方图多样性而导致的水印嵌入稳定性差、适应性弱等不足,提出了一种基于统计特征的邻域选择无损信息隐藏方法。首先利用广义统计量直方图良好的分布特性有效克服了灰度直方图间的差异;在此基础上,结合直方图邻域选择构建稳定的可伸缩式嵌入区域,实现了容量的灵活控制,增强了稳定性与适应性。同时,加密与无损压缩技术的使用有效解决了边信息存储问题,提高了无损信息隐藏的安全性。
     (4)鉴于实际应用环境中隐秘攻击对水印图像的降质影响,将广义统计量直方图平移嵌入与聚类算法相结合,提出了基于聚类的空域鲁棒无损信息隐藏方法。在深入分析水印图像嵌入区域分布特性的基础上,利用k-means聚类对其进行动态划分,增强了水印抗非恶意处理的鲁棒性。实验结果表明该方法在鲁棒性、不可感知性、容量等方面均具有良好的性能,体现了广泛的适应性和良好的稳定性。
     (5)为了进一步增强水印抗非恶意处理的鲁棒性,结合高通子带小波系数分布特征,提出了基于视觉感知的频域鲁棒无损信息隐藏方法。利用属性启发式像素调整策略避免了像素溢出,在此基础上,通过直方图平移与聚类算法实现了水印的嵌入与提取,并设计了增强型像素掩膜模型来优化水印嵌入强度,实现了水印不可感知性与鲁棒性的有效折衷。
     综上所述,本文将模式分类、计算机视觉等领域的基础理论引入到无损信息隐藏的研究中,所提出的五种新方法有效克服了现有方法存在的诸如可逆性不稳定、视觉质量差、鲁棒性弱等问题,为解决无损信息隐藏面临的挑战性问题提供了新思路。
Throughout history, great changes have taken place in the way of humancommunications from language, writing to digital multimedia. The past years havewitnessed an explosion in the availability of digital images in different fields due tosuch factors as direct viewing, vividness and super-language. However, the fastdevelopment of the information technology has brought to forefront security concernswith the use of digital images. Recently, data hiding has been proposed and popularlyemployed as an effective way to solve this problem. Usually, traditional data hidingmethods cause irreversible distortion of image contents during the embedding process,which is an obstacle to their usage in such important applications as medical diagnosis,remote sensing and law enforcement. Therefore, lossless data hiding (LDH) of digitalimages has attracted increasing attention for copyright protection in multimediainformation security.
     To target the challenging problems of LDH, the paper focuses on reversibility,imperceptibility, embedding model and robustness of LDH and makes an extensivestudy of lossless data hiding for digital images. The main contents of this paper aresummarized as follows.
     (1) An improved reversibility LDH method is proposed based on the optimalstrategy. First, the stable regions for watermark embedding are picked up by the optimalstrategy. Secondly, a novel embedding mechanism together with a parameter model isdesigned to tune the embedding process. Based on this, the proposed method caneffectively overcome the unstable reversibility of the histogram distribution constraintmethod.
     (2) By taking the importance of imperceptibility to data hiding into consideration, acontent-adaptive reliable LDH method is designed on the basis of the histogramrotation-based embedding model. The host images are first preprocessed by the pixeladjustment strategy to avoid both the overflow and underflow problems of pixels, andthus to improve the visual quality of watermarked images. Thereafter, inspired by theperceptual characteristics of the human visual system, the watermark strength isoptimized with the help of the luminance masking model, leading to thecontent-adaptive, reliable and lossless data hiding.
     (3) Due to the diversity of grayscale histograms of different images, watermark embedding suffers from poor stability and adaptability. Therefore, we develop a novelframework for LDH using statistical characteristics and histogram-based neighborhoodselection. The generalized statistical quantity histogram (GSQH) is first employed todeduce the diversity of grayscale histograms. Based on this, the stable and tunableembedding regions are constructed by combining the GSQH and histogram-basedneighborhood selection, leading to flexible capacity control as well as improvement ofstability and adaptability. Moreover, the encryption and lossless compression techniquesare utilized to solve the problem of side information storage, which is helpful toenhance security of the proposed method.
     (4) In practical applications, watermarked images may be degraded byunintentional attacks to some extent. Aiming at such an issue, we propose a robustlossless data hiding (RLDH) method, which incorporates the merits of GSQH andclustering algorithms. Based on the investigation of the distribution of embeddingregions in watermarked images, the k-means clustering algorithm is adopted to dealwith their dynamic division to improve the robustness. Extensive experimental resultshave demonstrated the superiority of the proposed method from the aspects ofrobustness, imperceptibility, capacity, adaptability and stability.
     (5) To further improve robustness against unintentional attacks, a novel RLDHmethod based on visual perceptual models in the wavelet domain is proposed, whichemploys the statistical characteristics of wavelet coefficients in high-pass sub-bands.The property inspired pixel adjustment is first utilized to solve both the overflow andunderflow problems of pixels. Following this, watermark embedding and extraction isachieved by incorporating the histogram shifting and clustering techniques. Furthermore,we design an enhanced pixel-wise masking model to optimize watermark strength,leading to a good tradeoff between imperceptibility and robustness.
     In this paper, we integrate the basic theories of pattern classification and computervision into LDH and propose five novel LDH methods. By effectively overcoming thedrawbacks of the existing methods including unstable stability, poor visual quality androbustness, the proposed ones will be able to successfully address the challengingproblems facing the LDH.
引文
[1]钟香驹.从造纸术摇篮到世界造纸大国.中国造纸,24(8):62-63,2005.
    [2]李玉华.关于蔡伦及中国“造纸术”起源的探讨.华东纸业,40(3):13-18,2009.
    [3]李卓然.追溯立体照相机的起源.影像视觉.2010(12):16-17,2010.
    [4]百度百科.照相机[Online]. Available: http://baike.baidu.com/view/18863.htm.
    [5]百度百科.电影[Online]. Available: http://baike.baidu.com/view/2382.htm.
    [6]殷力欣.指向迷途的“大红灯笼”——杂谈张艺谋艺术风格的转变.艺术评论.2004(8):32-33,2004.
    [7]刘家真,秦书凰,颜晓栋等.拯救数字信息——数据安全存储与读取策略研究.北京:科学出版社,2004.
    [8]邓成.基于局部特征的鲁棒图像水印技术研究.西安电子科技大学,博士学位论文,2009.
    [9]钟桦,焦李成.自适应灰度级数字水印技术.计算机学报,25(12):1364-1370,2002.
    [10]张小华,孟红云,刘芳等.基于感兴趣区域的图像认证技术.电子与信息学报,27(1):31-34,2005.
    [11] Cox I., Miller M., and Bloom J.著,王颖,黄志蓓等译.数字水印.北京:电子工业出版社,2003.
    [12] Playboy Magazine. Playboy Enterprises International, Inc., November1972[Online].Available: http://members.i.playboy.com/Playboy-Magazine/Nov-1972-Issue/138-140.
    [13] Hutchison J. Culture, communication, and an information age Madonna. IEEE Prof. Commun.Society Newsletter,45(3):1,5-7,2001.
    [14] Brown J. Playmate meets geeks who made her a net star. Wired News,1997[Online].Available: http://www.wired.com/culture/lifestyle/news/1997/05/4000.
    [15] Designboom. Renzo rosso [Online]. Available: http://www.designboom.com/eng/interview/rosso.html.
    [16]新浪城市.关于取消张子平《千里寻水》特等奖获奖资格的证明.2010[Online]. Available:http://city.sina.com.cn/city/t/2010-07-16/14296405.html.
    [17] Petitcolas F., Anderson R. and Kuhn M. Information hiding—A survey. Proc. IEEE,87(7):1062-1078,1999.
    [18] Moulin P. and O’Sullivan J. Information-theoretic analysis of information hiding. IEEE Trans.Inform. Theory,49(3):563-593,2003.
    [19] Dittmann J., Steinebach M., and Ferri L. Watermarking protocols for authentication andownership protection based on timestamps and holograms. Proc. SPIE,2002,4675:240-251.
    [20] Andrés M., Palamidessi C., Rossum P., et al. Information hiding in probabilistic concurrentsystems. Theoretical Comput. Sci.,412(28):3072-3089,2011.
    [21] Sheng Y., Xin Z., Alam M., et al. Information hiding based on double random-phase encodingand public-key cryptography. Optics Express,17(5):3270-3284,2009.
    [22]王丽娜,张焕国,叶登攀.信息隐藏技术与应用.武汉:武汉大学出版社,2009.
    [23]葛秀慧,田浩,郭立甫等.信息隐藏原理及应用.北京:清华大学出版社,2008.
    [24]钮心忻.信息隐藏与数字水印.北京:北京邮电大学出版社,2004.
    [25]杨义先.数字水印基础教程.北京:人民邮电出版社,2007.
    [26] Herodotus. The histories. Translated by Aubrey de Sélincourt. London: Penguin Books,1996.
    [27] Zhang Z., Zhu C., and Zhao Y. Two-description image coding with steganography. IEEESignal Process. Lett.,15:887-890,2008.
    [28] Luo W., Huang F., and Huang J. Edge adaptive image steganography based on LSB matchingrevisited. IEEE Trans. Inf. Forens. Security,5(2):201-214,2010.
    [29]闫屾,赵耀,倪蓉蓉.特征融合的JPEG图像隐写分析方案.中国科技论文在线,6(1):76-82,2011.
    [30] Tian H., Zhao Y., Ni R., et al. Spread spectrum-based image watermarking resistant to rotationand scaling using radon transform. Proc. Int. Conf. Intelligent Inform. Hiding and MultimediaSignal Process.,2010:442-445.
    [31] Gao X., Deng C., Li X., et al. Geometric distortion insensitive image watermarking in affinecovariant regions. IEEE Trans. Syst. Man Cybern. C, Appl. Rev.,40(3):278-286,2010.
    [32]钟桦,张小华,焦李成.数字水印与图像认证——算法及应用.西安:西安电子科技大学出版社,2006.
    [33] Johnson N., Duric Z., Jajodia S. et al. Information hiding: steganography andwatermarking—attacks and countermeasures. J. Electron. Imaging,10(3):825-826,2001.
    [34] Johnson N. and Jajodia S. Exploring steganography: seeing the unseen. IEEE Comput.,31(2):26-34,1998.
    [35] Chung T., Hong M., Oh Y., et al. Digital watermarking for copyright protection of MPEG2compressed video. IEEE Trans. Consum. Electron.,44(3):895-901,1998.
    [36] Deng C., Gao X., Li X., et al. A local Tchebichef moments-based robust image watermarking.Signal Process.,89(8):1531-1539,2009.
    [37] Gao X., Deng C., Li X., et al. Local feature based geometric-resistant image informationhiding. Cogn. Comput.,2(2):68-77,2010.
    [38] Kang X., Yang R., and Huang J. Geometric invariant audio watermarking based on an LCMfeature. IEEE Trans. Multimedia,13(2):181-190,2011.
    [39] Kalker T., Depovere G., Haitsma J., et al. A video watermarking system for broadcastmonitoring. Proc. SPIE,1999,3657:103-112.
    [40] Birk D. and Gaines S. Using digital watermarking for securing next generation mediabroadcasts. Proc. Adv. Machine Learning and Data Analysis, LNEE48,2010:27-41.
    [41] Petrovic R., Tehranchi B., Jemili K., et al. Media monitoring, management and informationsystem. U.S. Patent2010/0228857A1, Sep.9,2010.
    [42] Craver S., Memon N., Yeo B., et al. Can invisible watermarks solve rightful ownerships? IBMTechnical Report RC20509, IBM Research,1996.
    [43] Zeng W., and Liu B. A statistical watermark detection technique without using originalimages for resolving rightful ownerships of digital images. IEEE Trans. Image Process.,8(11):1534-1548,1999.
    [44] Wong A. Multimedia transaction tracking from a mutual distrust perspective. Ph.D. Thesis,School of Electrical and Electronic Engineering, Adelaide Univ., Australia,2007.
    [45] Bhattacharyya D., Chakraborty P., Alisherov F., et al. Quantum watermarking: A review. Int. J.Security and its Applicat.,4(3):46-54,2010.
    [46] Queluz M. Authentication of digital images and video: generic models and a new contribution.Signal Processing: Image Commun.,16(5):461-475,2001.
    [47] Hu J., Huang J., Huang D., et al. Image fragile watermarking based on fusion ofmulti-resolution tamper detection. Electronics Lett.,38(24):1512-1513,2002.
    [48] Memon N. and Gilani S. Watermarking of chest CT scan medical images for contentauthentication. Int. J. Comput. Math.,88(2):265-280,2011.
    [49]吴晓云,刘红梅,黄继武.结合Zernike矩和水印的半脆弱图像认证.自动化学报,33(2):145-150,2007.
    [50] Bloom J., Cox I., Kalker T., et al. Copy protection for DVD video. Proc. IEEE,87(7):1267-1276,1999.
    [51] Belenko V. and Kuzmich V. Copy protection method for digital media. U.S. Patent7506376B2, Mar.17,2009.
    [52] Rodriguez T. Watermark communication and control systems. U.S. Patent2010/0322470A1,Dec.23,2010.
    [53] Fridrich J., Goljan M., and Du R. Lossless data embedding—new paradigm in digitalwatermarking. EURASIP J. Appl. Signal Process.,2002(2):185-196,2002.
    [54] Weng S., Zhao Y., Pan J., et al. Reversible watermarking based on invariability andadjustment on pixel pairs. IEEE Signal Process. Lett.,15:721-724,2008.
    [55] Weng S., Zhao Y., Pan J., et al. Reversible watermarking based on the invariant sum value.Proc. Int. Conf. Intelligent Syst. Design and Applicat.,2008:331-334.
    [56] Barton J. Method and apparatus for embedding authentication information within digital data.U.S. Patent5646997, Jul.8,1997.
    [57]曾宪庭.基于图像的无损信息隐藏技术研究.浙江大学,博士学位论文,2010.
    [58] Hu Y., Kwong S., and Huang J. An algorithm for removable visible watermarking. IEEETrans. Circuits Syst. Video Technol.,16(1):129-133,2006.
    [59] Veen M., Bruekers F., Leest A., et al. High capacity reversible watermarking for audio. Proc.SPIE,2003,5020:1-11.
    [60] Du R. and Fridrich J. Lossless authentication of MPEG-2video. Proc. IEEE Int. Conf. ImageProcess.,2002,2:893-896.
    [61] Dittmann J. and Benedens O. Invertible authentication for3D-meshes. Proc. SPIE,2003,5020:653-664.
    [62] Cao H. and Kot A. Lossless data embedding in electronic inks. IEEE Trans. Inf. Forens.Security,5(2):314-323,2010.
    [63] De Vleeschouwer C., Delaigle J., and Macq B. Circular interpretation of bijectivetransformations in lossless watermarking for media asset management. IEEE Trans.Multimedia,5(1):97-105,2003.
    [64]叶天语.信息隐藏理论与算法研究.北京邮电大学,博士学位论文,2009.
    [65] Chang C., Kieu T., and Wu W. A lossless data embedding technique by joint neighboringcoding. Pattern Recognition,42(7):1597-1603,2009.
    [66] Fridrich J., Goljan M., and Du R. Lossless embedding of data in digital objects. U.S. Patent7787652B1, Aug.31,2010.
    [67] Guo X. and Zhuang T. A region-based lossless watermarking scheme for enhancing securityof medical data. J. Digital Imaging,22(1):53-64,2009.
    [68] Pan W., Coatrieux G., Cuppens-Boulahia, N., et al. Medical image integrity control combiningdigital signature and lossless watermarking. Proc. Data Privacy Manage. and AutonomousSpontaneous Security, LNCS5939,2010:153-162.
    [69] Huang S., and Lin M. A high-capacity reversible data-hiding scheme for medical images. J.Medical and Biological Eng.,30(5):289-296,2010.
    [70] Kundu M. and Das S. Lossless ROI medical image watermarking technique with enhancedsecurity and high payload embedding. Proc. Int. Conf. Pattern Recognition,2010:1457-1460.
    [71] Fallahpour M., Megias D., and Ghanbari M. High capacity, reversible data hiding in medicalimages. Proc. IEEE Int. Conf. Image Process.,2009:4241-4244.
    [72]孙圣和,陆哲明,牛夏牧.数字水印技术及应用.北京:科学技术出版社,2004.
    [73] Shi Y., Ni Z., Zou D., et al. Lossless data hiding: fundamentals, algorithms and applications.Proc. Int. Symposium Circuits and Syst.,2004,2: II-33-II-36.
    [74] Shi Y. Reversible data hiding. Proc. Digital Watermarking, LNCS3304,2005:1-12.
    [75] Hu Y., Jeon B., Lin Z., et al. Analysis and comparison of typical reversible watermarkingmethods. Proc. Digital Watermarking, LNCS4283,2006:333-347.
    [76] Weng S., Zhao Y., and Pan J. Reversible watermarking techniques. Proc. IntelligentMultimedia Data Hiding, SCI58,2007:357-389.
    [77] Caldelli R., Filippini F., and Becarelli R. Reversible watermarking techniques: an overviewand a classification. EURASIP J.Inform. Security,2010:1-19.
    [78] Feng J., Lin I., Tsai C., et al. Reversible watermarking: current status and key issues. Int. J.Network Security,2(3):167-171,2006.
    [79] Macq B. Lossless multiresolution transform for image authenticating watermarking. Proc.EUSIPCO,2000:1973-1976.
    [80] Macq B. and Deweyand F. Trusted headers for medical images. Proc. DFG VIII-D IIWatermarking Workshop,1999:1-13.
    [81] Honsinger C., Jones P., Rabbani M., et al. Lossless recovery of an original image containingembedded data. U.S. Patent6278791B1, Aug.21,2001.
    [82] Fridrich J., Goljan M., and Du R. Lossless data embedding for all image formats. Proc. SPIE,2002,4675:572-583.
    [83] Fridrich J., Goljan M., and Du R. Invertible authentication. Proc. SPIE,2001,4314:197-208.
    [84] Celik M., Sharma G., Tekalp A., et al. Reversible data hiding. Proc. Int. Conf. Image Process.,2002,2: II-157-II-160.
    [85] Celik M., Sharma G., Tekalp A., et al. Lossless generalized-LSB data embedding. IEEE Trans.Image Process.,14(2):253-266,2005.
    [86] Tian J. Reversible watermarking using a difference expansion. IEEE Trans. Circuits Syst.Video Technol.,13(8):890-896,2003.
    [87] Tian J. High capacity reversible data embedding and content authentication. Proc. IEEE Int.Conf. Acoustics, Speech, and Signal Process.,2003,3: III-517-III-520.
    [88] Alattar A. Reversible watermark using the difference expansion of a generalized integertransform. IEEE Trans. Image Process.,13(8):1147-1156,2004.
    [89] Kamstra L. and Heijmans H. Reversible data embedding into images using wavelettechniques and sorting. IEEE Trans. Image Process.,14(12):2082-2090,2005.
    [90] Kim H, Sachnev V., Shi Y., et al. A novel difference expansion transform for reversible dataembedding. IEEE Trans. Inf. Forens. Security,3(3):456-465,2008.
    [91] Thodi D. and Rodriguez J. Expansion embedding techniques for reversible watermarking.IEEE Trans. Image Process.,16(3):721-730,2007.
    [92] Hu Y., Lee H., and Li J. DE-based reversible data hiding with improved overflow locationmap. IEEE Trans. Circuits Syst. Video Technol.,19(2):250-260,2009.
    [93] Wang X., Shao C., Xu X., et al. Reversible data-hiding scheme for2-D vector maps based ondifference expansion. IEEE Trans. Inf. Forens. Security,2(3):311-320,2007.
    [94] Hu Y., Lee H., Chen K., et al. Difference expaansion based reversible data hiding using twoembedding directions. IEEE Trans. Multimedia,10(8):1500-1512,2008.
    [95] Lee C., Wu H., Tsai C., et al. Adaptive lossless steganographic scheme with centralizeddifference expansion. Pattern Recognition,41(6):2097-2106,2008.
    [96]武丹,汪国昭.基于差分扩张和差分平移的无损信息隐藏算法.吉林大学学报(工学版),40(4):1071-1074,2010.
    [97] Jiang L., Guo X., Yang H., et al. Threshold controlled scheme of difference expansiontechniques for reversible watermarking. J. ShangHai JiaoTong Univ.(Sci.),15(5):541-548,2010.
    [98] Peng F., Lei Y., Long M., et al. A reversible watermarking scheme for two-dimensional CADengineering graphics based on improved difference expansion. Computer-Aided Design,43(8):1018-1024,2011.
    [99] Ni Z., Shi Y., Ansari N., et al. Reversible data hiding. IEEE Trans. Circuits Syst. VideoTechnol.,16(3):354-362,2006.
    [100] Hwang J., Kim J., and Choi J. A reversible watermarking based on histogram shifting. Proc.Digital Watermarking, LNCS,4283,2006:348-361.
    [101] Kuo W., Jiang D., and Huang Y. Reversible data hiding based on histogram. Proc. AdvancedIntelligent Computing Theories and Applicat., LNCS4682,2007:1152-1161.
    [102] Fallahpour M. Reversible image data hiding based on gradient adjusted prediction. IEICEElectron. Exp.,5(20):870-876,2008.
    [103] Tai W., Yeh C., and Chang C. Reversible data hiding based on histogram modification of pixeldifferences. IEEE Trans. Circuits Syst. Video Technol.,19(6):906-910,2009.
    [104]姚秋明,宣国荣,杨程云等.基于整数小波直方图间隙的无损数据隐藏.计算机应用.24(7):1623-1643,2007.
    [105] Xuan G., Shi Y., Chai P., et al. Optimum histogram pair based image lossless data embedding.Proc. Digital Watermarking, LNCS5041,2008:264-278.
    [106] De Vleeschouwer C., Delaigle J., and Macq B. Circular interpretation of histogram forreversible watermarking. Proc. IEEE Workshop Multimedia Signal Process.,2001:345-350.
    [107] Ni Z., Shi Y., Ansari N., et al. Robust lossless image data hiding designed for semi-fragileimage authentication. IEEE Trans. Circuits Syst. Video Technol.,18(4):497-509,2008.
    [108] Ni Z., Shi Y., Ansari N., et al. Robust lossless image data hiding. Proc. IEEE Int. Conf.Multimedia Expo,2004,3:2199-2202.
    [109] Zou D., Shi Y., and Ni Z. A semi-fragile lossless digital watermarking scheme based oninteger wavelet transform. Proc. IEEE6th Workshop Multimedia Signal Process.,2004:195-198.
    [110] Zou D., Shi Y., Ni Z., et al. A semi-fragile lossless digital watermarking scheme based oninteger wavelet transform. IEEE Trans. Circuits Syst. Video Technol.16(10):1294-1300,2006.
    [111] Zeng X., Ping L., and Pan X. A lossless robust data hiding scheme. Pattern Recognition,43(4):1656-1667,2010.
    [112] Hayat K., Puech W., and Gesquiere, G. Scalable3-D terrain visualization through reversibleJPEG2000-based blind data hiding. IEEE Trans. Multimedia,10(7):1261-1276,2008.
    [113] Chang C., Kieu D., and Chou Y. Reversible information hiding for VQ indices based onlocally adaptive coding. J. Visual Commun. and Image Representation,20(1):57-64,2009.
    [114] Shi Y., and Xuan G. Methods and apparatus for lossless data hiding. U.S. Patent7826638B2,Nov.2,2010.
    [115]王炳锡彭天强.信息隐藏技术.北京:国防工业出版社,2007.
    [116] Kim K., Lee M., Suh Y., et al. Robust lossless data hiding based on block gravity center forselective authentication. Proc. IEEE Int. Conf. Multimedia and Expo,2009:1022-1025.
    [117] Yalman Y. and Erturk I. A new histogram modification based robust image data hidingtechnique. Proc.24th Int. Symposium Comput. Inform. Sci.,2009:39-43.
    [118] Shi Y., Zou D., and Ni Z. System and method for robust lossless data hiding and recoveringfrom the integer wavelet representation. U.S. Patent7720305B2, May18,2010.
    [119] Yang Q., Gao T. and Fan L. Lossless robust data hiding scheme based on histogram shifting.Proc. Electronics and Signal Process., LNEE97,2011:937-944.
    [120] An L., Gao X., Deng C., et al. Robust lossless data hiding: analysis and evaluation. Proc. Int.Conf. High Performance Computing Simul.,2010:512-516.
    [121] Bender W., Gruhl D., Morimoto N., et al. Techniques for data hiding. IBM Syst. J.,35(3-4):313-336,1996.
    [1] Zhu B., Swanson M., and Tewfik A. When seeing isn’t believing. IEEE Signal Process. Mag.,21(2):40-49,2004.
    [2] Zhao Z., Yu N., and Li X. A novel video watermarking scheme in compression domain basedon fast motion estimation. Proc. Int. Conf. Commun. Technology,2:1878-1882,2003.
    [3] Li X. Watermarking in secure image retrieval. Pattern Recognition Lett.,24(14):2431-2434,2003.
    [4] Cao G., Zhao Y., Ni R., et al. Forensic detection of median filtering in digital images. Proc.IEEE Int. Conf. Multimedia and Expo,2010:89-94.
    [5]王丽,赵耀.利用图像特征点及自相似性的鲁棒数字水印方案.中山大学学报(自然科学版),43(Suppl.2):79-82,2004.
    [6] Luo W., Huang J., and Qiu G. JPEG error analysis and its applications to digital imageforensics. IEEE Trans. Inf. Forens. Security,5(3):480-491,2010.
    [7]康显桂,黄继武,曾文军等.数字媒体水印非协议模糊性.中国科学(F辑:信息科学),39(4):397-404,2009.
    [8] Deng C., Gao X., Peng H., et al. Histogram modification based robust image watermarkingapproach. Int. J. Multimedia Intelligence and Security,1(2):153-168,2010.
    [9] Zou D., Shi Y., and Ni Z. A semi-fragile lossless digital watermarking scheme based oninteger wavelet transform. Proc. IEEE6th Workshop Multimedia Signal Process.,2004:195-198.
    [10] Zou D., Shi Y., Ni Z., et al. A semi-fragile lossless digital watermarking scheme based oninteger wavelet transform. IEEE Trans. Circuits Syst. Video Technol.16(10):1294-1300,2006.
    [11] Zeng X., Ping L., and Pan X. A lossless robust data hiding scheme. Pattern Recognition,43(4):1656-1667,2010.
    [12] Shi Y., Zou D., and Ni Z. System and method for robust lossless data hiding and recoveringfrom the integer wavelet representation. U.S. Patent7720305B2, May18,2010.
    [13] De Vleeschouwer C., Delaigle J., and Macq B. Circular interpretation of bijectivetransformations in lossless watermarking for media asset management. IEEE Trans.Multimedia,5(1):97-105,2003.
    [14] De Vleeschouwer C., Delaigle J., and Macq B. Circular interpretation of histogram forreversible watermarking. Proc. IEEE Workshop Multimedia Signal Process.,2001:345-350.
    [15] Ni Z., Shi Y., Ansari N., et al. Robust lossless image data hiding designed for semi-fragileimage authentication. IEEE Trans. Circuits Syst. Video Technol.,18(4):497-509,2008.
    [16] Ni Z., Shi Y., Ansari N., et al. Robust lossless image data hiding. Proc. IEEE Int. Conf.Multimedia Expo,2004,3:2199-2202.
    [17] Gao X., An L., Li X., et al. Reversibility improved lossless data hiding. Signal Process.,89(10):2053-2065,2009.
    [1]杨义先.数字水印基础教程.北京:人民邮电出版社,2007.
    [2] Huang J., and Shi Y. Adaptive image watermarking scheme based on visual masking.Electronics Lett.,34(8):748-750,1998.
    [3] Kutter M., and Winkler S. A vision-based masking model for spread-spectrum imagewatermarking. IEEE Trans. Image Process.,11(1):16-25,2002.
    [4]桑茂栋,赵耀.基于几何矩的抵抗RST攻击的数字图像水印.电子与信息学报,29(1):76-80,2007.
    [5] Liu W., Dong L., and Zeng W. Optimum detection for spread-spectrum watermarking thatemploys self-masking. IEEE Trans. Inf. Forens. Security,2(4):645-654,2007.
    [6]王炳锡彭天强.信息隐藏技术.北京:国防工业出版社,2007.
    [7]孙圣和,陆哲明,牛夏牧.数字水印技术及应用.北京:科学技术出版社,2004.
    [8] De Vleeschouwer C., Delaigle J., and Macq B. Circular interpretation of bijectivetransformations in lossless watermarking for media asset management. IEEE Trans.Multimedia,5(1):97-105,2003.
    [9] De Vleeschouwer C., Delaigle J., and Macq B. Circular interpretation of histogram forreversible watermarking. Proc. IEEE Workshop Multimedia Signal Process.,2001:345-350.
    [10] Zeng X., Ping L., and Pan X. A lossless robust data hiding scheme. Pattern Recognition,43(4):1656-1667,2010.
    [11] Ni Z., Shi Y., Ansari N., et al. Robust lossless image data hiding designed for semi-fragileimage authentication. IEEE Trans. Circuits Syst. Video Technol.,18(4):497-509,2008.
    [12] Ni Z., Shi Y., Ansari N., et al. Robust lossless image data hiding. Proc. IEEE Int. Conf.Multimedia Expo,2004,3:2199-2202.
    [13] Zou D., Shi Y., and Ni Z. A semi-fragile lossless digital watermarking scheme based oninteger wavelet transform. Proc. IEEE6th Workshop Multimedia Signal Process.,2004:195-198.
    [14] Zou D., Shi Y., Ni Z., et al. A semi-fragile lossless digital watermarking scheme based oninteger wavelet transform. IEEE Trans. Circuits Syst. Video Technol.16(10):1294-1300,2006.
    [15] An L., Gao X., Deng C., et al. Robust lossless data hiding: analysis and evaluation. Proc. Int.Conf. High Performance Computing Simul.,2010:512-516.
    [16] An L., Gao X., Yuan Y., et al. Content-adaptive reliable robust lossless data embedding.Neurocomputing (Elsevier),2011, Accepted.
    [17] Xuan G., Shi Y., Chai P., et al. Optimum histogram pair based image lossless data embedding.Trans. Data Hiding Multimedia Security IV, LNCS5510,2009:84-102.
    [18] Daly S. The visible difference predictor: an algorithm for the assessment of image fidelity.Digital images and human vision. Cambridge, MA: MIT Press,1993.
    [19] Voloshynovskiy S., Herrigel A., Baumgaetner N., et al. A stochastic approach tocontent-adaptive digital image watermarking. Inform. Hiding, LNCS1768,2000:211-236.
    [20] Watson A. Digital images and human vision. Cambridge, MA: MIT Press,1993.
    [21] Liu A., Lin W., Paul M., et al. Just noticeable difference for images with decomposition modelfor separating edge and textured regions. IEEE Trans. Circuits Syst. Video Technol.,20(11):1648-1652,2010.
    [22] Gao X., Lu W., Tao D., et al. Image quality assessment based on multiscale geometricanalysis. IEEE Trans. Image Process.,18(7):1409-1423,2009.
    [23]路文.基于视觉感知的影像质量评价方法研究.西安电子科技大学,博士学位论文,2009.
    [24] Song D., and Tao D. Biologically inspired feature manifold for scene classification. IEEETrans. Image Process.,19(1):174-184,2010.
    [25] Podilchuk C., and Zeng W. Image-adaptive watermarking using visual models. IEEE J. Select.Areas Commun.,16(4):525-539,1998.
    [26]王春桃,倪江群,黄继武等.基于内容自适应的优化DWT-HMM顽健图像水印算法.通信学报,28(2):80-87,2007.
    [27] Li Q., and Cox I. Using perceptual models to improve fidelity and provide resistance tovalumetric scaling for quantization index modulation watermarking. IEEE Trans. Inf. Forens.Security,2(2):127-139,2007.
    [28] Qi H., Zheng D., and Zhao J. Human visual system based adaptive digital imagewatermarking. Signal Process.,88(1):174-188,2008.
    [29] Koz A., and Alatan A. Oblivious spatio-temporal watermarking of digital video by exploitingthe human visual system. IEEE Trans. Circuits Syst. Video Technol.,18(3):326-337,2008.
    [30] Barni M., Bartolini F., and Piva A. Improved wavelet-based watermarking through pixel-wisemasking. IEEE Trans. Image Process.,10(5):783-791,2001.
    [31] Watson A. DCT quantization matrices visually optimized for individual images. Proc. SPIE,1993,1913:202-216.
    [32] Chou C., and Li Y. A perceptually tuned subband image coder based on the measure ofjust-noticeable-distortion profile. IEEE Trans. Circuits Syst. Video Technol.,5(6):467-476,1995.
    [33] CVG-UGR image database [Online]. Available: http://decsai.ugr.es/cvg/dbimagenes/.
    [34] DICOM sample image sets [Online]. Available: http://pubimage.hcu-ge.ch:8080/.
    [35] OsiriX [Online]. Available: http://www.osirix-viewer.com/Downloads.html.
    [1] An L., Gao X., Deng C., et al. Robust lossless data hiding: analysis and evaluation. Proc. Int.Conf. High Performance Computing Simul.,2010:512-516.
    [2] Gao X., An L., Li X., et al. Reversibility improved lossless data hiding. Signal Process.,89(10):2053-2065,2009.
    [3] An L., Gao X., Yuan Y., et al. Content-adaptive reliable robust lossless data embedding.Neurocomputing (Elsevier),2011, Accepted.
    [4] Ni Z., Shi Y., Ansari N., et al. Reversible data hiding. IEEE Trans. Circuits Syst. VideoTechnol.,16(3):354-362,2006.
    [5] Hwang J., Kim J., and Choi J. A reversible watermarking based on histogram shifting. Proc.Digital Watermarking, LNCS,4283,2006:348-361.
    [6] Kuo W., Jiang D., and Huang Y. Reversible data hiding based on histogram. Proc. AdvancedIntelligent Computing Theories and Applicat., LNCS4682,2007:1152-1161.
    [7] An L., Gao X., Deng C., et al. Reversible watermarking based on statistical quantityhistogram. Proc. Adv. Multimedia Inform. Process., LNCS5879,2009:1300-1305.
    [8] Gao X., An L., Yuan Y., et al. Lossless data embedding using generalized statistical quantityhistogram. IEEE Trans. Circuits Syst. Video Technol.,21(8):1061-1070,2011.
    [9] Li F., and Perona P. A Bayesian hierarchical model for learning natural scene categories. Proc.IEEE Conf. Comput. Vision Pattern Recognit.,2005,2:524-531.
    [10] Zhang S., Tian Q., Hua G., et al. Descriptive visual words and visual phrases for imageapplications. Proc. ACM Int. Conf. Multimedia,2009:75-84.
    [11] Dalal N. and Triggs B. Histograms of oriented gradients for human detection. Proc. IEEEConf. Comput. Vision Pattern Recognit.,2005,1:886-893.
    [12] Xiang S. and Huang J. Histogram-based audio watermarking against time-scale modificationand cropping attacks. IEEE Trans. Multimedia,9(7):1357-1372,2007.
    [13] Deng C., Gao X., Li X., et al. Local histogram based geometric invariant image watermarking.Signal Process.,90(12):3256-3264,2010.
    [14] Fallahpour M. Reversible image data hiding based on gradient adjusted prediction. IEICEElectron. Exp.,5(20):870-876,2008.
    [15] Tian J. Reversible watermarking using a difference expansion. IEEE Trans. Circuits Syst.Video Technol.,13(8):890-896,2003.
    [16] Zou D., Shi Y., Ni Z., et al. A semi-fragile lossless digital watermarking scheme based oninteger wavelet transform. IEEE Trans. Circuits Syst. Video Technol.16(10):1294-1300,2006.
    [17] Cox I., Kilian J., Leighton F., et al. Secure spread spectrum watermarking for multimedia.IEEE Trans. Image Process.,6(12):1673-1687,1997.
    [18] Brodatz Textures [Online]. Available: http://www.ux.uis.no/~tranden/brodatz.html.
    [1]高新波.模糊聚类分析及其应用.西安:西安电子科技大学出版社,2004.
    [2] Zhou T. and Tao D. Fast gradient clustering. Proc. NIPS Workshop Discr. Optim. Mach.Learn.: Submodularity, Sparsity Polyhedra,2009:1-6.
    [3] Gdalyahu Y., Weinshall D., and Werman M. Self-organization in vision: stochastic clusteringfor image segmentation, perceptual grouping, and image database organization. IEEE Trans.Pattern Anal. Mach. Intell.,23(10):1053-1074,2001.
    [4] Zhang K., Gao X., Li X., et al. Partially supervised neighbor embedding for example-basedimage super-resolution. IEEE J. Sel. Topics Signal Process.,5(2):230-239,2010.
    [5] Vidal R. Subspace clustering. IEEE Signal Process. Mag.,28(2):52-68,2011.
    [6] Yoder J., Medeiros H., Park J., et al. Cluster-based distributed face tracking in cameranetworks. IEEE Trans. Image Process.,19(10):2551-2563,2010.
    [7] Hirano K., Baba Y., Matsuzawa Y., et al. Manipulation of single coiled DNA molecules bylaser clustering of microparticles. Applied Physics Lett.,80(3):515-517,2002.
    [8] Yoon S. Benini L., and De Micheli G. Co-clustering: a versatile tool for data analysis inbiomedical informatics. IEEE Trans. Inf. Technol. Biomed.,11(4):493-494,2007.
    [9] Chang C., Ye Z., and Zhang M. Fuzzy-ART based adaptive digital watermarking scheme.IEEE Trans. Circuits Syst. Video Technol.,15(1):65-81,2005.
    [10] Chang C. and Wu W. Hiding secret data adaptively in vector quantisation index tables. IEEProc. Vision, Image and Signal Process.,153(5):589-597,2006.
    [11] Gao X., An L., Yuan Y., et al. Lossless data embedding using generalized statistical quantityhistogram. IEEE Trans. Circuits Syst. Video Technol.,21(8):1061-1070,2011.
    [12] Xia T., Tao D., Mei T., et al. Multiview spectral embedding. IEEE Trans. Syst., Man, Cybern.B, Cybern.,40(6):1438-1446,2010.
    [13] An L., Gao X., Yuan Y., et al. Robust lossless data hiding using clustering and statisticalquantity histogram. Neurocomputing (Elsevier),2011, Accepted.
    [14] An L., Gao X., and Deng C. Reliable embedding for robust reversible watermarking. Proc.ACM Int. Conf. Internet Multimedia Comput. Service,2010:57-60.
    [15] Chou C., and Li Y. A perceptually tuned subband image coder based on the measure ofjust-noticeable-distortion profile. IEEE Trans. Circuits Syst. Video Technol.,5(6):467-476,1995.
    [16] De Vleeschouwer C., Delaigle J., and Macq B. Circular interpretation of bijectivetransformations in lossless watermarking for media asset management. IEEE Trans.Multimedia,5(1):97-105,2003.
    [17] Ni Z., Shi Y., Ansari N., et al. Robust lossless image data hiding designed for semi-fragileimage authentication. IEEE Trans. Circuits Syst. Video Technol.,18(4):497-509,2008.
    [18] Zou D., Shi Y., Ni Z., et al. A semi-fragile lossless digital watermarking scheme based oninteger wavelet transform. IEEE Trans. Circuits Syst. Video Technol.16(10):1294-1300,2006.
    [1]孙圣和,陆哲明,牛夏牧.数字水印技术及应用.北京:科学技术出版社,2004.
    [2]吴绍权,黄继武,黄达人.基于小波变换的自同步音频水印算法.计算机学报,27(3):365-370,2004.
    [3] Wang Y., Wu S., and Huang J. Audio watermarking scheme robust against desynchronizationbased on the dyadic wavelet transform. EURASIP J. Advances in Signal Process.,2010:1-17,2010.
    [4] Christopoulos C., Skodras A., and Ebrahimi T. The JPEG2000still image coding system: anoverview. IEEE Trans. Consumer Electronics,16(4):1103-1127,2000.
    [5] De Mallorca P. MPEG-7overview. ISO/IEC JTC1/SC29/WG11N6828,2004[Online].Available: http://mpeg.chiariglione.org/standards/mpeg-7/mpeg-7.htm.
    [6]姚秋明,宣国荣,杨程云等.基于整数小波直方图间隙的无损数据隐藏.计算机应用.24(7):1623-1643,2007.
    [7] Zou D., Shi Y., and Ni Z. A semi-fragile lossless digital watermarking scheme based oninteger wavelet transform. Proc. IEEE6th Workshop Multimedia Signal Process.,2004:195-198.
    [8] Zou D., Shi Y., Ni Z., et al. A semi-fragile lossless digital watermarking scheme based oninteger wavelet transform. IEEE Trans. Circuits Syst. Video Technol.16(10):1294-1300,2006.
    [9] De Vleeschouwer C., Delaigle J., and Macq B. Circular interpretation of bijectivetransformations in lossless watermarking for media asset management. IEEE Trans.Multimedia,5(1):97-105,2003.
    [10] An L., Gao X., Deng C., et al. Robust lossless data hiding: analysis and evaluation. Proc. Int.Conf. High Performance Computing Simul.,2010:512-516.
    [11] An L., Gao X., Li X., et al. Robust reversible watermarking via clustering and enhancedpixel-wise masking. IEEE Trans. Image Process.,2011, Under2th review.
    [12] Xuan G., Shi Y., Chai P., et al. Optimum histogram pair based image lossless data embedding.Proc. Digital Watermarking, LNCS5041,2008:264-278.
    [13] Barni M., Bartolini F., and Piva A. Improved wavelet-based watermarking through pixel-wisemasking. IEEE Trans. Image Process.,10(5):783-791,2001.
    [14] Nafornita C. A new pixel-wise mask for watermarking. Proc. ACM Multimedia and SecurityWorkshop,2007:221-228.
    [15] Lubin J. The use of psychophysical data and models in the analysis of display systemperformance. Digital images and human vision. Cambridge, MA: MIT Press,1993.
    [16] Huang Y., Huang K., Wang L., et al. Enhanced biologically inspired model. Proc. IEEE Conf.Comput. Vision Pattern Recognit.,2008:1-8.
    [17] Song D., and Tao D. Biologically inspired feature manifold for scene classification. IEEETrans. Image Process.,19(1):174-184,2010.
    [18] Li Q., and Cox I. Using perceptual models to improve fidelity and provide resistance tovalumetric scaling for quantization index modulation watermarking. IEEE Trans. Inf. Forens.Security,2(2):127-139,2007.
    [19] Cui L., and Li W. Adaptive multiwavelet-based watermarking through JPW masking. IEEETrans. Image Process.,20(4):1047-1060,2011.
    [20] Calderbank A., Daubechies I., Sweldens W., et al. Wavelet transforms that map integers tointegers. Applied and Computational Harmonic Analysis,5(3):332-369,1998.
    [21] Gao X., An L., Yuan Y., et al. Lossless data embedding using generalized statistical quantityhistogram. IEEE Trans. Circuits Syst. Video Technol.,21(8):1061-1070,2011.
    [22] Chou C., and Li Y. A perceptually tuned subband image coder based on the measure ofjust-noticeable-distortion profile. IEEE Trans. Circuits Syst. Video Technol.,5(6):467-476,1995.
    [23] Xia T., Tao D., Mei T., et al. Multiview spectral embedding. IEEE Trans. Syst., Man, Cybern.B, Cybern.,40(6):1438-1446,2010.
    [24] Sheikh H., Wang Z., Cormack L., et al.,(2003) LIVE image quality assessment database
    [Online]. Available: http://live.ece.utexas.edu/research/quality/.
    [25] Liu A., Lin W., Paul M., et al. Just noticeable difference for images with decomposition modelfor separating edge and textured regions. IEEE Trans. Circuits Syst. Video Technol.,20(11):1648-1652,2010.
    [26] Gao X., Lu W., Tao D., et al. Image quality assessment based on multiscale geometricanalysis. IEEE Trans. Image Process.,18(7):1409-1423,2009.
    [27] Ni Z., Shi Y., Ansari N., et al. Robust lossless image data hiding designed for semi-fragileimage authentication. IEEE Trans. Circuits Syst. Video Technol.,18(4):497-509,2008.
    [28] Gao X., An L., Li X., et al. Reversibility improved lossless data hiding. Signal Process.,89(10):2053-2065,2009.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700