用户名: 密码: 验证码:
信息隐藏理论与算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
信息隐藏技术有着广泛的应用,日益受到重视。本文针对信息隐藏理论与算法进行了深入的研究,包括信息隐藏容量、水印检测、强鲁棒性水印算法、自嵌入脆弱水印算法、多功能双水印算法和可逆水印算法几个方向。
     本文的主要贡献有:
     (1)针对被动攻击下的信息隐藏系统,本文建立一个具体的信息隐藏统计模型,从安全性、失真距离度量、信道容量三个角度全面分析该模型。信道容量问题的求解抽象成一个受到平均汉明失真距离和平均安全性约束的最优化问题,只要给定需要的参数就可以运用最优化理论得到最优解。最后求解出原始载体序列和秘密信息序列均服从均匀分布时的统计模型信道容量。
     (2)量化投影(Quantized Projection,QP)技术是量化索引调制(Quantization Index Modulation,QIM)技术工作在投影域的版本,实质上是一个双边加性嵌入器。本文提出符号量化投影(Sign Quantized Projection,SQP)的概念。不同于传统QP,SQP是一个单边嵌入器。理论分析表明:SQP和QP具有相同的漏警概率和虚警概率。同时,SQP的文档水印比(Document-to-Watermark Ratio,DWR)比QP小10log10(1+γ)。
     (3)打印-扫描攻击会带给数字图像许多干扰,因此抗打印-扫描攻击的数字水印算法对鲁棒性的要求非常高。目前,绝大多数鲁棒水印算法无法抵抗打印-扫描攻击。本文利用离散小波变换(Discrete Wavelet Transformation,DWT)低频逼近子带的能量聚集效应和奇异值分解(Singular Value Decomposition,SVD)的奇异值稳定性,提出一种抗打印-扫描鲁棒零水印算法。原始图像的DWT低频逼近子带进行分块SVD,通过判断两个相邻子块最大奇异值的大小关系产生零水印。实验结果表明算法能够抵抗去同步攻击和打印-扫描攻击。
     (4)针对一些脆弱水印算法的篡改敏感性需要进一步改进和无法区分图像恶意篡改类型这些不足之处,本文提出一种基于SVD和混沌映射的自嵌入脆弱认证水印算法,将混沌映射的初值敏感性应用到图像篡改检测,并且实现区分图像恶意篡改类型功能。对图像子块进行SVD,同时利用Logistic混沌映射产生认证水印;然后利用Logistic混沌映射设计了一个子块与子块之间的映射函数,将认证水印序列嵌入在相应映射块的最低有效位(Least Significant Bit,LSB)上。实验结果表明:算法不仅对篡改非常敏感,而且能够有效地抵抗拼贴攻击和区分篡改图像内容与篡改水印。
     (5)针对单水印算法往往存在功能单一的问题,本文利用奇异值的稳定性,提出一种多功能双水印算法。先在图像分块的奇异值上嵌入鲁棒水印,然后在含鲁棒水印图像的空域LSB嵌入脆弱水印,并设计了判别恶意篡改和无意篡改的准则。实验不仅考察鲁棒水印抵抗攻击的鲁棒性,而且还考察脆弱水印对鲁棒性的影响和篡改检测与定位的能力。实验结果表明:鲁棒水印具备很强的抗攻击鲁棒性;脆弱水印对篡改敏感,而且篡改定位精确。因此算法具备版权保护和内容认证双重功能。
     (6)不同于传统的失真补偿量化索引调制(Distortion-Compensated Quantization Index Modulation,DC_QIM),本文提出了动态DC_QIM的概念。两者的区别在于量化步长和DC参数是否可变。首先推导出动态DC QIM可逆性的成立条件,然后推导出动态DC参数的可允许范围,最后利用可逆性设计一个具体的可逆水印算法。在只执行一遍时,它的数据隐藏率高达1比特每像素,高于其他可逆水印算法。另外,算法的动态特性有利于防止参数泄露。实验结果表明:不管初始条件如何,该算法既能正确解码出秘密信息,又能准确复原原始载体。
Information hiding technology has broad applications, and has been paid more and more attention. The theory and algorithm of information hiding are deeply studied in the paper, including information hiding capacity, watermark detection, watermark algorithm with strong robustness, self-embedding fragile watermark algorithm, multi-purpose dual watermark algorithm and reversible watermark algorithm.
     The attributions of the paper are:
     (1) With respect to information hiding system under passive attacks, a concrete statistical model of information hiding system is built and its performance is analyzed, including security, distortion distance metric, and channel capacity. The solution to channel capacity can be regarded, subjected to average hamming distortion distance and average security coefficient, as an optimization problem. As long as the required parameters are given, the optimization problem of channel capacity will be easily solved by using optimization theory. Finally, the channel capacity of statistical model is derived on the condition that both original cover sequence and secret information sequence obey to uniform distributions.
     (2) Quantized projection (QP) technology is the version of quantization index modulation (QIM) working in the projection domain. It essentially belongs to a double-sided additive embedder. The concept of sign quantized projection (SQP) is proposed in the paper, which differs from the conventional QP in working as a single-sided embedder. Theoretical analysis reveals that SQP has the same probability of miss and probability of false alarm as QP. In the meanwhile, the document-to-watermark ratio (DWR) of SQP is less than its counterpart of QP by 10log10(1+γ)dB.
     (3) The print-and-scan process always brings a lot disturbance to the original digital image, therefore the watermarking algorithm for print-and-scan process desires extremely high robustness. At present, most robust watermarking algorithms can't resist the print-and-scan process. A robust zero-watermark algorithm for print-and-scan process is proposed in the paper, based on the energy aggregation effect of discrete wavelet transformation's (DWT) low frequency band and the stability of singular value decomposition's (SVD) singular values. It conducts DWT with the original image, divides its low frequency band into blocks, and conducts SVD with every block. Zero-watermark is derived by judging the numerical relationship between two biggest singular values from adjacent blocks. The experimental results show that it has the ability to resist desynchronization attacks and print-and-scan process.
     (4) At present, the tamper sensitivity of some fragile watermark algorithms needs to be improved. Moreover, some fragile watermark algorithms can't distinguish image's malicious tamper type. A self-embedding fragile authentication watermark algorithm based on SVD and chaotic mapping is proposed, trying to apply chaotic mapping's initial value sensitivity to tamper detection and distinguish image's malicious tamper type. SVD is carried out on each image block, and authentication watermark is produced by using Logistic chaotic mapping. Then Logistic chaotic mapping is used to design a mapping function defined on two separate blocks, and authentication watermark sequence is embedded into the corresponding mapping block's least significant bit (LSB). The experimental results show that the algorithm is not only very sensitive to tamper, but also resists collage attack and distinguishes image content tamper from watermark tamper.
     (5) The single watermark algorithms always merely have single function. In order to overcome the drawback, a multi-purpose dual watermark algorithm is proposed in the paper, taking advantage of the stability of singular values. It divides the original image into several blocks, and inserts robust watermark into their singular values. Then it inserts the fragile watermark into LSB in the space domain of previous watermarked image. Moreover, it designs a rule to distinguish malicious tamper from unintentional tamper. It tests not only robust watermark's robustness towards attacks, but also fragile watermark's influence towards robustness as well as the ability to tamper detection and localization. The experimental results show that the robust watermark possesses strong robustness to resist attacks, and that the fragile watermark is very sensitive to tamper and has good accuracy of tamper localization. Therefore it can achieve copyright protection and content authentication at the same time.
     (6) The concept of dynamic distortion-compensated quantization index modulation (Dynamic DC-QIM) is proposed, which differs from the conventional DC-QIM in whether or not quantization step size and DC parameter are changeable. Firstly, the condition satisfying the reversibility of dynamic DC-QIM is deduced. Then, the allowable range of dynamic DC parameter is derived. Finally, the procedure of reversible watermark algorithm based on dynamic DC-QIM is designed. Its data hiding rate can achieve as high as lbpp in a single iteration, higher than its former counterparts. Furthermore, the use of dynamic characteristic is in favor of preventing its parameters from being disclosed. Experimental results show that it not only accurately decodes the secret information, but also perfectly restores the original cover, regardless of initial conditions.
引文
[1]汪小帆,戴跃伟,茅耀斌.信息隐藏技术——方法与应用[M].北京:机械工业出版社,2001.
    [2]王炳锡,陈琦,邓峰森.数字水印技术[M].西安:西安电子科技大学出版社,2003.
    [3]王朔中,张新鹏,张开文.数字密写和密写分析[M].北京:清华大学出版社,2005.
    [4]Cox I J,Miller M L.The first 50 years of electronic watermarking[J].EURASIP Journal of Applied Signal Processing,2002,2:126-132.
    [5]Tirkel A Z,et al.Electronic watermark[J].Digital Image Computing,Technology and Applications,Macquarie University,1993,1:666-673.
    [6]Schyndel R G Van,Tirkel A Z,Osborne C F.A digital watermark[C].First IEEE International Image Processing Conference,1994,2:86-90.
    [7]Katzenbeisser S, Petitcolas F A P.Information hiding techniques for steganography and digital watermarking[M].[S.1.]:Artech House,2000.
    [8]Cox I J,et al.Secure spread spectrum watermarking for multimedia[J].Technical Report 95-10,NEC Research Institute,Princeton,NJ,1995.
    [9]Kundur D,Hatzinakos D.Digital watermarking for telltale tamper-proofing and authentication [J].Proceedings of the IEEE,1999,87(7):1167-1180.
    [10]Bender W,et al.Techniques for data hiding[J].IBM Systems Journal,1996,35(3& 4):313-336.
    [11]Matsui K,Tanaka K.Video-steganography:How to secretly embed a signature in a picture[J]. IMA Intellectual Property Project Proceedings,1994,1:187-206.
    [12]Simitopoulos D,Tsaftaris S A,Boulgouris N V,et al.Compressed domain video watermarking of MPEG streams[C].Proceedings of IEEE International Conference on Multimedia and Expo Lausanne,Switzerland,2002:569-572.
    [13]Hartung F,Girod B.Watermarking of uncompressed and compressed video[J]. Signal Processing,1998,66(3):283-301.
    [14]Low S H,et al.Document marking and identification using both line and word shifting[C].Proceeding of IEEE INFO COM'95,1995:853-860.
    [15]Kutter M,Bhattacharjee S K,Ebrahimi T.Towards second generation watermarking scheme[J]. Proceedings of International Conference on Image Processing,1999,1:320-323.
    [16]温泉,孙锬锋,王树勋.零水印的概念与应用[J].电子学报,2003,31(2):214-216.
    [17]Ruanaidh J,Pun T.Rotation,scale and translation invariant spread spectrum digital image watermarking[J]. Signal Processing,1998,66(3):303-317.
    [18]Lin Ching-yang,Chang Shih-fu.Distortion modeling and invariant extraction for digital image print-and-scan process[C].Proceedings of International Symposium on Multimedia Information Processing (ISMIP),Taipei:[s.n.],1999.
    [19]牛少彰,钮心忻,杨义先等.半色调图像中数据隐藏算法[J].电子学报,2004,32(7):1180-1183.
    [20]Barreto P S L M,Kim H Y,Rijmen V.Toward secure public-key blockwise fragile authentication watermarking[A].Proceedings of 2001 IEEE International Conference on Image Processing[C],Piscataway(NJ):IEEE Signal Processing Sac,2002,2:494-497.
    [21]Lin C Y,Chang S F. A robust image authentication method distinguishing JPEG compression from malicious manipulation[J].IEEE Transactions on Circuits and Systems of Video Technology,2001,11(2):153-168.
    [22]王向阳,陈利科.一种新的自适应半脆弱水印算法.自动化学报,2007,33(4):361-366.
    [23]王向阳,杨红颖,陈利科等.基于视觉掩蔽的半脆弱水印技术研究[J].中国图象图形学报,2005,10(12):1548-1553.
    [24]王向阳,杨红颖,陈利科等.用于图像内容认证的半脆弱水印嵌入算法[J].小型微型计算机系统,2005,26(11)2017-2020.
    [25]张鸿宾,杨成.图像的自嵌入及窜改的检测和恢复算法[J].电子学报,2004,32(2):196-199.
    [26]王婷,刘江,王希常.一种用于版权保护的数字图像双水印算法[J].计算机应用,2007,27(1):240-241,245.
    [27]Barton J M. Method and apparatus for embedding authentication information within digital data.US Patent:6,115,818,1997.
    [28]Honsinger C W,Jones P,Rabbani M,et al.Lossless recovery of an original image containing embedded data.US Patent:6,278,791,2001.
    [29]Vleeschouwer C D,Delaigle J F,Macq B.Circular interpretation of histogram for reversible watermarking[C].Proceedings of IEEE 4th Workshop on Multimedia Signal Processing,2001:345-350.
    [30]Tian.Reversible data embedding using a difference expansion [J]. IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):890-896.
    [31]Kalker T,Willems F M J.Capacity bounds and constructions for reversible data hiding[C]. Proceedings of the 14th International Conference on Digital Sgnal Processing,2002,1:71-76.
    [32]Costa M.Writing on dirty paper[J].IEEE Transactions on Information Theory, 1983,29(3):439-441.
    [33]Cohen A,Lapidoth A.The gaussian watermarking game[J].IEEE Transactions on Information Theory,2002,48(6):1639-1667.
    [34]Moulin P,O'Sullivan J A.Information-theoretic analysis of information hiding [J]. IEEE Transactions on Information Theory,2003,49(3):563-593.
    [35]Somekh-Baruch A, Merhav N.On the capacity game of public watermarking system[J].IEEE Transactions on Information Theory,2004,50(3):511-524.
    [36]Somekh-Baruch A,Merhav N.On the error exponent and capacity games of private watermarking systems[J].IEEE Transactions on Information Theory, 2003,49(3):537-562.
    [37]Steinberg Y,Merhav N.Identifcation in the presence of side information with application to watermarking[J].IEEE Transactions on Information Theory,2001, 47(4):1410-1422.
    [38]Cox I J, Killian J, Leighton F T,et al.Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing,1997,6(12):1673-1690.
    [39]Chen B,Wornell G W.Quantization index modulation:a class of provably good methods for digital watermarking and information embedding[J].IEEE Transactions on Information Theory,2001,47(4):1423-1443.
    [40]Perez-Gonzalez F, Felix B, Hernandez J R.Performance analysis of existing and new methods for data hiding with known-host information in additive channels[J]. IEEE Transactions on Signal Processing,2003,4(51):960-980.
    [41]Zhong J,Huang S.Double-sided watermark embedding and detection[J].IEEE Transactions on Information Forensics and Security,2007,2(3):297-310.
    [42]Merhav N,Sabbag E.Optimal watermark embedding and detection strategies under limited detection resources[J].IEEE Transactions on Information Theory, 2008,54(1):255-274.
    [43]Barni M,Bartolini F,Cappellini V, et al. A DCT-domain system for robust image watermarking[J].Signal Processing,1998,66(3):357-372.
    [44]Bo X C,Shen L C,Chang W S. Sign correlation detector for blind image watermarking in the DCT domain[C].In:Proceedings of 2nd IEEE Pacific-Rim Conference on Multimedia (PCM'2001),Berlin,Germany:Springer-Verlag,2001, 780-787.
    [45]Ng T M,Garg H K.Maximum-likelihood detection in DWT domain image watermarking using Laplacian modeling[J].IEEE Signal Processing Letters,2005, 12(4):285-288.
    [46]Hernandez J R,Perez-Gonzalez F.Statistical analysis of watermarking schemes for copyright protection of still images[J].Proceedings of IEEE,1999,87(7):1142-1166.
    [47]Cheng Q,Huang T S.Robust optimum detection of transform domain multiplicative watermarks[J].IEEE Transactions on Signal Processing,2003,51(4): 906-924.
    [48]Huang X,Zhang B.Statistically robust detection of multiplicative spread-spectrum watermarks[J].IEEE Transactions on Information Forensics and Security,2007,2 (1):1-13.
    [49]Huang X,Zhang B.Robust detection of additive watermarks in transform domains [J].IEE Proceedings of Information Security,2006,153(3):97-106.
    [50]Briassouli A,Tsakalides P,Stouraitis A.Hidden messages in heavy-tails:DCT-domain watermark detection using alpha-stable models[J].IEEE Transactions on Multimedia,2005,7(4):700-715.
    [51]Briassouli A,Strintzis M G. Locally optimum nonlinearities for DCT watermark detection[J].IEEE Transactions on Image Processing,2004,13(12):1604-1617.
    [52]Briassouli A,Strintzis M GOptimal watermark detection under quantization in the transform domain[J].IEEE Transactions on Circuits and Systems for Video Technology,2004,14(12):1308-1319.
    [53]Zhong J,Huang S.An enhanced multiplicative spread spectrum watermarking scheme[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006,16(12):1491-1506.
    [54]Petitcolas F A P,Anderson R J,Kuhn M G.Information Hiding-A Survey[J]. Proceedings of IEEE,1999,87(7):1062-1078.
    [55]Westfeld A,Pfitzmann A.Attacks on Steganographic Systems[J].In Third International Workshop on Information Hiding,Lecture Notes in Computer Science,1768,Springer,1999:61-67.
    [56]Provos N,Honeyman P.Detecting Steganographic Content on the Internet[J].CITI Technical Report 01-11,2001.
    [57]Fridrich J,Goljan M.Practical Steganalysis of Digital Images-State of the Art[C]. In Security and Watermarking of Multimedia Contents Ⅳ,Proceedings of SPIE, 4675.San Jose,USA, January 2002,1-13.
    [58]Fridrich J,Goljan M,Du R.Detecting LSB Steganography in Color and Gray-Scale Images[J]. Magazine of IEEE Multimedia,Special Issue on Security,2001,8(4):22-28.
    [59]张新鹏,王朔中,张开文.基于统计特性的LsB密写分析[J].应用科学学报,2004,22(1):16-19.
    [60]Provos N.Defending against Statistical Steganalysis[C].In 10th USENIX Security Symposium,Washington DC,2001.
    [61]Zhang X,Wang S,Zhang K.Steganography with the Least Histogram Abnormality [J].Lecture Notes in Computer Science,2776.Springer-Verlag,2003:401-412.
    [62]Kawaguchi E,Eason R O.Principle and applications of BPCS steganography[C]. In Proceedings of SPIE:Multimedia Systems and Applications,1998,3528:464-472.
    [63]Zhang X,Wang S.Steganography using multiple-base notational system and human vision sensitivity[J].IEEE Signal Processing Letters,2005,12(1):67-70.
    [64]Zhang X,Wang S.Dynamical running coding in digital steganography[J].IEEE Signal Processing Letters,2006,13(3):165-168.
    [65]Zhang X,Wang S.Efficient steganographic embedding by exploiting modification direction[J].IEEE Communications Letters,2006,10(11):781-783.
    [66]Jarno M.LSB matching revisited[J].IEEE Signal Processing Letters,2006,13(5): 285-287.
    [67]Ker A.Steganalysis of LSB matching in greyscale images[J].IEEE Signal Processing Letters,2005,12(6):441-444.
    [1]汪小帆,戴跃伟,茅耀斌.信息隐藏技术——方法与应用[M].北京:机械工业出版社,2001.
    [2]王炳锡,陈琦,邓峰森.数字水印技术[M].西安:西安电子科技大学出版社,2003.
    [3]丁玮,阎伟齐,齐东旭.基于Arnold变换的数字图像置乱技术[J].计算机辅助设计与图形学学报,2001,13(4):338-341.
    [4]黄达人,刘九芬.小波变换域图像水印嵌入对策和算法[J].软件学报,2002,13(7):1290-1297.
    [5]陈大新.矩阵理论(修订版)[M].上海:上海交通大学出版社,2000.
    [6]刘瑞祯,谭铁牛.基于奇异值分解的数字图像水印算法[J].电子学报,2001,29(2):168-171.
    [7]Andrews H,Paterson C.Singular value decomposition image coding[J].IEEE Transactions On Communications,1976,24(4):425-432.
    [8]Cox I J, Killian J, Leighton F T, et al.Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing,1997,6(12):1673-1690.
    [9]Chen B,Wornell G W.Quantization index modulation:a class of provably good methods for digital watermarking and information embedding[J].IEEE Transactions on Information Theory,2001,47(4):1423-1443.
    [10]Perez-Gonzalez F, Felix B, Hernandez J R.Performance analysis of existing and new methods for data hiding with known-host information in additive channels[J].IEEE Transactions on Signal Processing,2003,4(51):960-980.
    [1]Servetto S D,Podilchuk C I,Ramchandran K.Capaclty issues in digital image watermarking[C].In:IEEE International Conference on Image Processing,1998,1: 445-448.
    [2]Moulin P,Mihcak M K.A framework for evaluating the data-hiding capacity of image sources[J].IEEE Transactions on Image Processing,2002,11(9):1029-1042.
    [3]Moulin P,Mihcak M K.The parallel-gaussian watermarking game[J].IEEE Transactions on Information Theory,2004,50(2):272-289.
    [4]Costa M.Writing on dirty paper[J].IEEE Transactions on Information Theory, 1983,29(3):439-441.
    [5]Cohen A,Lapidoth A.The gaussian watermarking game[J].IEEE Transactions on Information Theory,2002,48(6):1639-1667.
    [6]Moulin P,O'Sullivan J A.Information-theoretic analysis of information hiding[J]. IEEE Transactions on Information Theory,2003,49(3):563-593.
    [7]Somekh-Baruch A, Merhav N.On the capacity game of public watermarking system[J].IEEE Transactions on Information Theory,2004,50(3):511-524.
    [8]Steinberg Y,Merhav N.Identifcation in the presence of side information with application to watermarking[J].IEEE Transactions on Information Theory,2001, 47(4):1410-1422.
    [9]Anderson R J,Petitcolas F A P.On the limits of steganography[J].IEEE Journal of Selected Areas in Communications,1998,16(4):474-481.
    [10]Cachin C.An information-theoretic model for steganography[C]//Aucsmith D. Information Hiding,2nd International Workshop,Lectures Notes in Computer Science,New York:Springer,1998,306-318.
    [11]张帆,张鸿宾.图像数字水印容量分析[J].计算机工程与应用,2004,40(14).
    [12]Yaghmaee F,Jamzad M.Computing watermark capacity in images according to their quad tree[C].In:IEEE International Symposium on Signal Processing and Information Technology,2005,823-826.
    [13]柏森,曹玉强,赵波等.图像隐藏信息的容量研究[J].中国图像图形学报,2003,8(A):574-577.
    [14]Lin C Y,Chang S F.Zero-error information hiding capacity of digital images[C]. In:IEEE International Conference on Image Processing,2001,3:1007-1010.
    [15]Deepa Kundur.Implications for high capacity data hiding in the presence of lossy compression[C].Proceedings of International Conference on Information Technology:Coding and Computing,2000,1-6.
    [16]Zhang Xinpeng, Wang Shuozhong.Information capacity of quantization steganography in the presence of active attack[C].Proceedings of the 12th International Conference on Multi-media modeling,2006,385-388.
    [17]Barni M,Bartolini F,De Rosa A,et al.Capacity of full frame DCT image watermarks[J].IEEE Transaction on Image Processing,2000,9(8):1450-1455.
    [18]Ramkumar M,Akansu A N. Capacity estimates for data hiding in compressed images[J].IEEE Transactions on Image Processing,2001,10(8):1252-1263.
    [19]Wong P H W,Au O C.A capacity estimation technique for JPEG-to-JPEG image watermarking[J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):746-752.
    [20]Katti S J, Vyagreswara Rao Namuduri, Namuduri K R. A practical approach for evaluating the capacity of watermarking channel[C].Proceedings of 2005 International Conference on Intelligent Sensing and Information Processing, 2005,193-198.
    [21]Katzenbeisser S, Petitcolas F A P.Information hiding techniques for steganography and digital watermarking[M].[S.1.]:Artech House,2000.
    [22]曹佳,刘文芬,张卫命.安全限制下的隐写容量分析[J].中山大学学报(自然科学版),2004,43(增刊2):164-168.
    [23]Simmons G J.The prisoners'problem and the subliminal channel[C].In: Advances in Cryptology:Proceedings.of Crypto 83,Plenum Press,1984,51-67.
    [24]Maurer U.Authentication theory and hypothesis testing[J].IEEE Transactions on Information Theory,2000,46(4):1350-1356.
    [25]Gel'fand S,Pinsker M.Coding for channel with random parameters[J].Problems of Control and Information Theory,1980,9(1):19-31.
    [26]Cohen A,Lapidoth A.On the gaussian watermarking game[C].International Symposium on Information Theory (ISIT),Sorrento,Italy,June 2000,p.48.
    [27]Cohen A,Lapidoth A.The capacity of the vector gaussian watermarking game[C]. International Symposium on Information Theory (ISIT),Washington DC,June 2001,p.4.
    [28]Cohen A,Lapidoth A.Generalized writing on dirty paper[C].International Symposium on Information Theory (ISIT),Lausanne,Switzerland,July 2002, p.227.
    [29]Somekh-Baruch A,Merhav N.On the error exponent and capacity games of private watermarking systems[J]. IEEE Transactions on Information Theory, 2003,49(3):537-562.
    [30]Lee Y K,Chen L H.High capacity image steganographic model[J].IEE proceeding of Vision, Image and Signal Processing,2000,147(3):288-294.
    [1]Barni M,Bartolini F,Cappellini V, et al.A DCT-domain system for robust image watermarking[J].Signal Processing,1998,66(3):357-372.
    [2]Bo X C,Shen L C,Chang W S.Sign correlation detector for blind image watermarking in the DCT domain[C].In:Proceedings of 2nd IEEE Pacific-Rim Conference on Multimedia (PCM'2001),Berlin,Germany:Springer-Verlag,2001, 780-787.
    [3]Ng T M,Garg H K.Maximum-likelihood detection in DWT domain image watermarking using Laplacian modeling[J].IEEE Signal Processing Letters,2005, 12(4):285-288.
    [4]Hernandez J R,Perez-Gonzalez F.Statistical analysis of watermarking schemes for copyright protection of still images [J].Proceedings of IEEE,1999,87(7):1142-1166.
    [5]Cheng Q,Huang T S.Robust optimum detection of transform domain multiplicative watermarks[J].IEEE Transactions on Signal Processing,2003,51(4): 906-924.
    [6]Zhong J,Huang S.An enhanced multiplicative spread spectrum watermarking scheme[J].IEEE Transactions on Circuits and Systems for Video Technology, 2006,16(12):1491-1506.
    [7]Zhong J,Huang S.Double-sided watermark embedding and detection[J].IEEE Transactions on Information Forensics and Security,2007,2(3):297-310.
    [8]Huang X,Zhang B.Statistically robust detection of multiplicative spread-spectrum watermarks[J].IEEE Transactions on Information Forensics and Security,2007,2 (1):1-13.
    [9]Huang X,Zhang B.Robust detection of additive watermarks in transform domains [J].IEE Proceedings of Information Security,2006,153(3):97-106.
    [10]Briassouli A,Tsakalides P,Stouraitis A.Hidden messages in heavy-tails:DCT-domain watermark detection using alpha-stable models [J]. IEEE Transactions on Multimedia,2005,7(4):700-715.
    [11]Briassouli A,Strintzis M G.Locally optimum nonlinearities for DCT watermark detection[J].IEEE Transactions on Image Processing,2004,13(12):1604-1617.
    [12]Briassouli A,Strintzis M G.Optimal watermark detection under quantization in the transform domain[J].IEEE Transactions on Circuits and Systems for Video Technology,2004,14(12):1308-1319.
    [13]Cox I J, Killian J, Leighton F T,et al.Secure spread spectrum watermarking for multimedia[J].IEEE Transactions on Image Processing,1997,6(12):1673-1690.
    [14]Malvar H S,Florencio D A F.Improved spread spectrum:a new modulation technique for robust watermarking[J].IEEE transactions on signal processing, 2003,51(4):898-905.
    [15]Chen B,Wornell G W.Quantization index modulation:a class of provably good methods for digital watermarking and information embedding[J].IEEE Transactions on Information Theory,2001,47(4):1423-1443.
    [16]Perez-Gonzalez F,Felix B,Hernandez J R.Performance analysis of existing and new methods for data hiding with known-host information in additive channels [J].IEEE Transactions on Signal Processing,2003,4(51):960-980.
    [17]Perez-Freire L,Comesana P,Perez-Gonzalez F.Detection in quantization-based watermarking:performance and security issues[C].Proceedings of SPIE Security, Steganography,Watermarking of Multimedia Contents VII,San Jose,CA,Jan 2005, 5681:721-733.
    [18]Merhav N,Sabbag E.Optimal watermark embedding and detection strategies under limited detection resources[J].IEEE Transactions on Information Theory, 2008,54(1):255-274.
    [19]Zeng W,Liu B.A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images [J]. IEEE Transactions on Image Processsing,1999,8(11):1534-1548.
    [20]Hernandez J R,Amado M,Perez-Gonzalez F.DCT-domain watermarking techniques for still images:detector performances analysis and a new structure [J]. IEEE Transactions on Image Processsing,2000,9(1):55-68.
    [21]Nikolaidis A,Pitas I.Asymptotically optimal detection for additive watermarking in the DCT and DWT domains[J].IEEE Transactions on Image Processsing,2003, 12(5):563-571.
    [1]Lin Ching-yang,Chang Shih-fu.Distortion modeling and invariant extraction for digital image print-and-scan process[C].Proceedings of International Symposium on Multimedia Information Processing (ISMIP),Taipei:[s.n.],1999.
    [2]牛少彰,伍宏涛,谢正程等.抗打印扫描数字水印算法的鲁棒性[J].中山大学学报(自然科学版),2004,43(增刊2):1-4.
    [3]牛少彰,钮心忻,杨义先等.半色调图像中数据隐藏算法[J].电子学报,2004,32(7):1180-1183.
    [4]孙云峰,翟宏琛,杨晓苹等.傅立叶计算全息数字水印在彩色图像印刷防伪中的应用[J].光电子.激光,2008,19(7):952-955.
    [5]葛云露,年桂君,王树勋.基于Walsh编码调制的抗打印扫描数字水印算法[J].东南大学学报(自然科学版),2007,37(增刊Ⅰ):197-200.
    [6]谭论正,朱宁波,孙星明.基于文档图像的抗打印-扫描数字水印技术[J].计算机应用研究,2007,24(12):199-200,265.
    [7]黄达人,刘九芬.小波变换域图像水印嵌入对策和算法[J].软件学报,2002,13(7):1290-1297.
    [8]刘瑞祯,谭铁牛.基于奇异值分解的数字图像水印算法[J].电子学报,2001,29(2):168-171.
    [9]温泉,孙锬锋,王树勋.零水印的概念与应用[J].电子学报,2003,31(2):214-216.
    [10]许文丽,李磊,王育民.抗噪声、几何失真和JPEG压缩攻击的鲁棒数字水印方案[J].电子与信息学报,2008,30(4):933-936.
    [11]袁大洋,肖俊,王颖.数字图像水印算法抗几何攻击鲁棒性研究[J].电子与信息学报,2008,30(5):1251-1256.
    [12]李雷达,郭宝龙,表金峰.基于奇偶量化的空域抗几何攻击图像水印算法[J].电子与信息学报,2009,31(1):134-138.
    [13]Ruanaidh J,Pun T.Rotation,scale and translation invariant spread spectrum digital image watermarking[J].Signal Processing,1998,66(3):303-317.
    [1]张鸿宾,杨成.图像的自嵌入及窜改的检测和恢复算法[J].电子学报,2004,32(2):196-199.
    [2]Barreto P S L M,Kim H Y,Rijmen V.Toward secure public-key blockwise fragile authentication watermarking[A].Proceedings of 2001 IEEE International Conference on Image Processing[C],Piscataway(NJ):IEEE Signal Processing Sac, 2002,2:494-497.
    [3]Lin C Y,Chang S F. A robust image authentication method distinguishing JPEG compression from malicious manipulation[J].IEEE Transactions on Circuits and Systems of Video Technology,2001,11(2):153-168.
    [4]李春,黄继武.一种抗JPEG压缩的半脆弱图像水印算法[J].软件学报,2006,17(2):315-324.
    [5]丁科,何晨,蒋铃鸽等.基于地址码的脆弱数字水印技术[J].上海交通大学学报,2004,38(4):620-623.
    [6]张宪海,杨永田.基于脆弱水印的图像认证算法研究[J].电子学报,2007,35(1):34-39.
    [7]Tefas A,Pitas L.Image authentication using chaotic mixing systems[A]. Proceedings of 2000 IEEE International Conference on Circuits and Systems: Symposium[C],Geneva:IEEE,2000,1:216-219.
    [8]刘瑞祯,谭铁牛.基于奇异值分解的数字图像水印方法[J].电子学报,2001,29(2):168-171.
    [1]Lahouari G,Ahmed B,Mohammad K I,et al.Digital image watermarking using balanced multiwavelets[J].IEEE Transactions on Signal Processing,2006,54(4): 1519-1536.
    [2]许文丽,李磊,王育民.抗噪声、几何失真和JPEG压缩攻击的鲁棒数字水印方案[J].电子与信息学报,2008,30(4):933-936.
    [3]Yuan H,Zhang X P.Multiscale fragile watermarking based on the gaussian mixture model[J].IEEE Transactions on Image Processing,2006,15(10):3189-3200.
    [4]Barreto P S L M, Kim H Y, Rijmen V.Toward secure public-key blockwise fragile authentication watermarking[A].In:Proceedings of 2001 International Conference on Image Proceedings[C].Piscataway(NJ):IEEE Signal Processing Sac,2002,2:494-497.
    [5]贺文华.一种彩色图像内容认证混沌脆弱水印算法[J].湖南大学学报(自然科学版),2009,36(1):55-58.
    [6]张弘,王颖.基于哈希函数的小波域脆弱水印算法[J].中国科学院研究生院学报,2008,25(1):86-92.
    [7]张宪海,杨永田.基于脆弱水印的图像认证算法研究[J].电子学报,2007,35(1):34-39.
    [8]Schlauweg M,Profrock D,Palfner T,et al.Quantization-based semi-fragile public-key watermarking for secure image authentication[C].In Proceedings of SPIE,San Diego,California,USA,2005,5915:41-51.
    [9]车生兵,黄达,李光.基于视觉特性的半脆弱水印算法[J].通信学报,2007,28(10):134-140.
    [10]李春,黄继武.一种抗JPEG压缩的半脆弱图像水印算法[J].软件学报,2006,17(2):315-324.
    [11]赵怀勋,王丽娜,季称利.基于零水印和认证水印的双水印方案[J].计算机工程,2006,32(22):172-174.
    [12]王婷,刘江,王希常.一种用于版权保护的数字图像双水印算法[J].计算机应用,2007,27(1):240-241,245.
    [13]刘瑞祯,谭铁牛.基于奇异值分解的数字图像水印算法[J].电子学报,2001,29(2):168-171.
    [1]Barton J M.Method and apparatus for embedding authentication information within digital data.US Patent:6,115,818,1997.
    [2]Honsinger C W,Jones P,Rabbani M,et al.Lossless recovery of an original image containing embedded data.US Patent:6,278,791,2001.
    [3]Vleeschouwer C D,Delaigle J F,Macq B.Circular interpretation of histogram for reversible watermarking[C].Proceedings of IEEE 4th Workshop on Multimedia Signal Processing,2001:345-350.
    [4]Tian.Reversible data embedding using a difference expansion[J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):890-896.
    [5]Kalker T,Willems F M J.Capacity bounds and constructions for reversible data hiding[C].Proceedings of the 14th International Conference on Digital Signal Processing,2002,1:71-76.
    [6]Coltuc D,Tremeau A,Delp E J,et al.Simple reversible watermarking schemes[C]. Proceedings of SPIE:Security,Steganography,Watermarking Multimedia Contents VII,2005,5681:561-568.
    [7]Coltuc D,Chassery J-M.Very fast watermarking by reversible contrast mapping[J]. IEEE Signal Processing Letters,2007,14(4):255-258.
    [8]Eggers J J,Bauml R,Tzschoppe R,et al.Inverse mapping of SCS-watermarked data[C].Proceedings of Eleventh European Signal Processing Conference (EUSIPCO'2002),Toulouse, France,September 2002.
    [9]Perez-Gonzalez F,Balado F,Hernandez J R.Performance analysis of existing and new methods for data hiding with known-host information in additive channels[J]. IEEE Transactions on Signal Processing,2003,51(4):960-980.
    [10]Perez-Freire L,Comesana P,Perez-Gonzalez F.Detection in quantization-based watermarking:performance and security issues[C].Proceedings of SPIE Security, Steganography,Watermarking of Multimedia Contents VII,San Jose,CA,January 2005,5681:721-733.
    [11]Vleeschouwer C D,Delaigle J F,Macq B.Circular interpretation of bijective transformations in lossless watermarking for media asset management[J].IEEE Transactions on Multimedia,2003,5(1):97-105.
    [1]Moulin P,Mihcak M K.A framework for evaluating the data-hiding capacity of image sources[J].IEEE Transactions on Image Processing,2002,11(9):1029-1042.
    [2]Moulin P,Mihcak M K.The parallel-gaussian watermarking game[J].IEEE Transactions on Information Theory,2004,50(2):272-289.
    [3]Cohen A,Lapidoth A.The gaussian watermarking game[J].IEEE Transactions on Information Theory,2002,48(6):1639-1667.
    [4]Moulin P,O'Sullivan J A.Information-theoretic analysis of information hiding[J]. IEEE Transactions on Information Theory,2003,49(3):563-593.
    [5]Somekh-Baruch A, Merhav N.On the capacity game of public watermarking system[J].IEEE Transactions on Information Theory,2004,50(3):511-524.
    [6]Wong P H W,Au O C.A capacity estimation technique for JPEG-to-JPEG image watermarking[J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):746-752.
    [7]Somekh-Baruch A,Merhav N.On the error exponent and capacity games of private watermarking systems[J].IEEE Transactions on Information Theory, 2003,49(3):537-562.
    [8]Cohen A,Lapidoth A.Generalized writing on dirty paper[C].International Symposium on Information Theory (ISIT),Lausanne,Switzerland,July 2002, p.227.
    [9]牛少彰,伍宏涛,谢正程等.抗打印扫描数字水印算法的鲁棒性[J].中山大学学报(自然科学版),2004,43(增刊2):1-4.
    [10]牛少彰,钮心忻,杨义先等.半色调图像中数据隐藏算法[J].电子学报,2004,32(7):1180-1183.
    [11]许文丽,李磊,王育民.抗噪声、几何失真和JPEG压缩攻击的鲁棒数字水印方案[J].电子与信息学报,2008,30(4):933-936.
    [12]袁大洋,肖俊,王颖.数字图像水印算法抗几何攻击鲁棒性研究[J].电子与信息学报,2008,30(5):1251-1256.
    [13]李雷达,郭宝龙,表金峰.基于奇偶量化的空域抗几何攻击图像水印算法[J].电子与信息学报,2009,31(1):134-138.
    [14]李春,黄继武.一种抗JPEG压缩的半脆弱图像水印算法[J].软件学报,2006,17(2):315-324.
    [15]张宪海,杨永田.基于脆弱水印的图像认证算法研究[J].电子学报,2007,35(1):34-39.
    [16]刘瑞祯,谭铁牛.基于奇异值分解的数字图像水印方法[J].电子学报,2001,29(2):168-171.
    [17]Yuan H,Zhang X P.Multiscale fragile watermarking based on the gaussian mixture model[J]. IEEE Transactions on Image Processing,2006,15(10):3189-3200.
    [18]车生兵,黄达,李光.基于视觉特性的半脆弱水印算法[J].通信学报,2007,28(10):134-140.
    [19]Vleeschouwer C D,Delaigle J F,Macq B.Circular interpretation of bijective transformations in lossless watermarking for media asset management[J].IEEE Transactions on Multimedia,2003,5(1):97-105.
    [20]Tian J.Reversible data embedding using a difference expansion[J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):890-896.
    [21]Alattar A M.Reversible watermark using the difference expansion of a generalized integer transform[J].IEEE Transactions on Image Processing,2004, 13(8):1147-1156.
    [22]Kamstra L,Heijmans H J A M.Reversible data embedding into images using wavelet techniques and sorting[J].IEEE Transactions on Image Processing,2005, 14(12):2082-2090.
    [23]Yang B,Schmucker M,Funk W,et al.Integer DCT-based reversible watermarking for images using companding technique[C].Proceedings of SPIE,Security, Steganography and Watermarking of Multimedia Contents,San Jose,CA,January 2004,p.405-415.
    [24]Adams M D,Ward R K. Symmetric-extension-compatible reversible integer to integer wavelet transforms[J].IEEE Transactions on Signal Processing,2003,51 (10):2624-2636.
    [25]Li Xueyao,Zhang Min,Zhang Rubo.A new adaptive audio watermarking algorithm[C].Proceedings of the 5th World Congress on Intelligent Control and Automation,2004.
    [26]Akira Takahashi,Ryouichi Nishimura,Y6iti Suzuki.Multiple watermarks for stereo audio signals using phase-modulation techniques [J]. IEEE Transactions on Signal Processing,2005,53(2),806-815.
    [27]Cai Libin,Zhao Jiying.Audio quality measurement by using digital watermarking [C].CCECE 2004-CCGEI 2004,Niagara Falls,2004.
    [28]袁春,钟玉琢,贺玉文.基于混沌的视频流选择加密算法[J].计算机学报,2004,27(2):257-263.
    [29]Wang Yulin,Alan Pearmain.Blind MPEG-2 video watermarking robust against geometric attacks:a set of approaches in DCT domain[J].Image Processing,2006, p.1536-1543.
    [30]Kung C H,Jeng J H,Lee Y C,et al.Video watermarking using motion vector[A].In: Proceedings of 16th IPPR Conference on Computer Vision,Graphics and Image Processing[C],Taipei,China,2003,p.547-551.
    [31]Bodo Y,Laurent N,Dugelay J L.Watermarking video,hierarchical embedding in motion vectors [A].International Conference on Image Processing[C],2003,2:739-742.
    [32]Biswas S,Das S R,Petriu E M.An adaptive compressed MPEG-2 video watermarking scheme [J].IEEE Transactions on Instrumentation and Measurement,2005,54(5):1853-1861.
    [33]王朔中,张新鹏,张开文.数字密写和密写分析[M].北京:清华大学出版社,2005.
    [34]Noda H,Spaulding J,Shirazi M N,et al.Application of bit-plane decomposition steganography to JPEG2000 encoded images[J].IEEE Signal Processing Letters, 2002,9(12):410-413.
    [35]Zhang X,Wang S,Zhang K.Steganography with the Least Histogram Abnormality [J]. Lecture Notes in Computer Science,Springer-Verlag,2003,2776: 395-406.
    [36]Wu D C,Tsai W H.A steganographic method for images by pixel-value differencing[J].Pattern Recognition Letters,2003,24:1613-1626.
    [37]Zhang X,Wang S.Steganography using multiple-base notational system and human vision sensitivity [J].IEEE Signal Processing Letters,2005,12(1):67-70.
    [38]Zhang X,Wang S.Stego-encoding with error correction capability[J].IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2005,E88-A(12):3663-3667.
    [39]Zhang X,Wang S.Dynamical running coding in digital steganography [J].IEEE Signal Processing Letters,2006,13(3):165-168.
    [40]Zhang X,Wang S.Efficient steganographic embedding by exploiting modification direction [J].IEEE Communications Letters,2006,10(11):781-783.
    [41]Jarno M.LSB matching revisited[J].IEEE Signal Processing Letters,2006,13(5): 285-287.
    [42]Zhang X,Wang S. Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security[J].Pattern Recognition Letters,2004,25:331-339.
    [43]Ker A.Steganalysis of LSB matching in grayscale images[J].IEEE Signal Processing Letters,2005,12(6):441-444.
    [44]张新鹏,王朔中.对BPCS密写的统计分析[J].计算机辅助设计与图形学学报,2005,17(7):1625-1629.
    [45]张新鹏,王朔中,张开文.基于统计特性的LSB密写分析[J].应用科学学报,2004,22(1):16-19.
    [46]Fridrich J,Goljan M,Du R.Detecting LSB steganography in color and gray-scale images[J].Magazine of IEEE Multimedia,Special Issue on Security,2001,8(4):22-28.
    [47]Fridrich J,Goljan M.Practical steganalysis of digital images:state of the art[C]. Proceedings of SPIE Photonics West 2002:Electronic Imaging,Security and Watermarking of Multimedia Contents IV,2002,4675:1-13.
    [48]Provos N,Honeyman P.Detecting steganography content on the internet[J].CITI technical report,2001,1:1-11.
    [49]张涛,平西建.基于差分直方图实现LSB信息伪装的可靠检测[J].软件学报,2004,15(1):151-159.
    [50]于小亿,谭铁牛,王蕴红.基于模型的信息隐藏检测研究[J].中山大学学报(自然科学版),2004,43(增刊2):184-187.
    [51]Lie W N, Lin G S.A feature-based classification technique for blind image steganalysis[J].IEEE Transactions on Multimedia,2005,7(6):1007-1020.
    [52]Fridrich J,Soukal D,Goljan M.Maximum likelihood estimation of secret message length embedded using±k steganography in spatial domain[C].Proceedings of SPIE,Security,Steganography,and Watermarking of Multimedia Contents VI,San Jose,CA,2005,p.595-606.
    [53]张卫明,李世取,刘九芬.对空域图像LSB隐写术的提取攻击[J].计算机学报,2007,30(9):1625-1631.
    [54]郭艳卿,何德全,尤新刚等.基于整体性的隐密分析特征提取和融合方法研究[J].电子学报,2006,34(12A):2443-2446.
    [55]Rocha A,Goldenstein S.Progressive randomization for steganalysis[C].2006 IEEE 8th Workshop on Multimedia Signal Processing,2006,p.314-319.
    [56]Goljan M,Fridrich J,Holotyak T.New blind steganalysis and its implications[C]. Proceedings of SPIE,Security,Steganography,and Watermarking of Multimedia Contents Ⅵ,2006,p.1-13.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700