静止图像数字水印的盲检测算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
静止图像数字水印的盲检测技术在对原始载体信息、水印信息、水印嵌入提取方法与密码等基本条件一无所知的情况下,对疑似图像实施水印存在性及其相关信息的盲检测。本论文针对静止图像不同类型数字水印算法提出多个盲检测算法,并对所提出算法进行详细的性能分析和计算机仿真验证。主要研究内容及成果如下:
     第一,研究针对静止图像最低有效位(LSB)数字水印的盲检测算法。提出两种静止图像的盲检测算法。基于统计特性的盲检测算法借助图像工程理论,针对LSB替换嵌入算法,利用像素及其周围像素间的拉普拉斯值,推导了待测图像中水印信息的长度计算公式。算法对集中嵌入与分散嵌入的水印信息均有较好的检测效果,低嵌入率时仍能保证较高检出率。基于图像分割的盲检测算法利用水印实际嵌入的局部性,对待测图像进行分割,研究区域最小生成树中节点的度的分布,根据Fisher鉴别准则对待测图像实现数字水印盲检测。算法对替换嵌入与匹配嵌入的水印信息检测效果良好。
     第二,研究针对静止图像离散余弦变换(DCT)数字水印的盲检测算法。提出基于随机共振理论的盲检测算法。算法利用随机共振原理,通过吸收外界能量补充待测信息能量,放大DCT系数统计参数在水印嵌入前后的变化,选择其中变化程度较大的参数构成样本矢量,为使用支持向量机(SVM)算法实现盲检测做准备。最后在SVM算法的基础上,对集中嵌入与分散嵌入的两种常见DCT数字水印实现盲检测。仿真结果表明,该算法在嵌入强度较低时能够保证较好的检测效果。
     第三,研究针对静止图像离散小波变换(DWT)数字水印的盲检测算法。提出基于核Fisher鉴别分析(KFDA)理论的盲检测算法。算法借鉴静止图像DCT数字水印盲检测的研究成果,首先将待测信息通过随机共振系统,对其中微弱信号进行放大。然后计算并选取能够表征待测信息统计特征的样本矢量,最后选择KFDA理论实现盲检测。理论分析和仿真结果表明,算法有效提高了低嵌入强度下数字水印的盲检测率,同时大幅降低了虚警率。
     第四,研究基于数字水印及其检测理论的手持数字视频广播(DVB-H)网络发射机识别算法。其中空域识别算法将数字水印信号直接嵌入DVB-H发射机中,接收端通过检测嵌入的水印信息识别发射机。算法简单易实现,误码率(BER)性能显示由水印信息引入的失真可以忽略不计。频域识别算法将水印信息嵌入在DVB-H系统频域信号中,接收端以迭代反馈方式提取水印信号,识别发射机状态。频域识别算法较大程度改善了空域识别算法对系统的依赖性。根据水印检测理论,两种算法在嵌入强度较低的无线环境中均能检测出嵌入信息,并一定程度提高发射器的峰均比(PAPR)性能。尽管添加了额外信息,频谱利用率保持不变。
The technology of blind detection on the digital watermarking of still image needs to work without any necessary information, such as the original carrier information, watermarks information, schemes and key of embedding or extraction etc. The technology is usually used to detect existence of watermarks or some watermarks information. The dissertation proposed some blind detection schemes aiming at different type watermarking. Detailed analysis on properties and computer simulations are given for every scheme. The main topics of this dissertation are as the follows:
     Firstly, two algorihms of blind detection on LSB (Least Significant Bit) digital watermarking of still image are proposed. With the aid of image engineering, one algorithm based on statistic property uses the Laplace value of the pixel and other pixels around it to deduce length formula of watermarks in the test image. The algorithm has good detection results on both concentrated and dispersed watermarking information. It also could keep high detection probability at low embedding rate. The algorithm based on image segmentation utilizes the locality property of actual watermarking to segment the test images. It studies the distribution of node degree in MSTs. It carries out blind detection on digital watermarking according to Fisher principle. The algorithm has good detection results on the information both of replacement embedding and matching embedding.
     Secondly, the algorithm of blind detection on DCT (Discrete Cosine Transformation) digital watermarking of still image is proposed. By energy of noise, the stochastic resonance system is utilized to increase amplitude of watermarking information greatly. As a result, the difference between stego watermarking information and original information increases. Based on SVM algorithm, the blind detection is carried out on two general DCT watermark embedding methods which are concentrative embedding algorithm and dispersed embedding algorithm. Simulation results show high detection probability at low embedding strength.
     Thirdly, the algorithm of blind detection on DWT (Discrete Wavelet Transform) digital watermarking of still image is proposed. The algorithm utilizes KFDA (Kernel Fisher Discrimination Analysis) theory. With the help of research results of blind detection on DCT digital watermarking, the algorithm passes the test information by stochastic resonance system so as to amplify weak signals. Then the algorithm chooses suitable sample vector by computation. KFDA theory which is a kind of learning machine with high precision is used to realize blind detection. Both theoretical analysis and simulation results show that the algorithm improves detection probability at low embedding strength. At the same time the algorithm also decreases false alarm rate.
     Finally, algorithms of transmitter identification (TxID) method for DVB-H(Digital Video Broadcasting-Handheld) system are proposed. They are both based on digital watermarking technology. The spatial embedding algorithm embeds digital watermarking signals in the time domain of DVB-H transmitter. Receiver identifies the transmitter by detecting the embedded information. The algorithm is easy to be realized. The performance of BER shows that the distortion induced by digital watermarking information can be ignored. While the frequency embedding algorithm signals are embedded in the frequency domain of transmitter. Receiver identifies the transmitter by detecting the embedded information with the method of iteration and feedback. Compared with the spatial embedding algorithm, the frequency one improves dependence on system. According the theory of watermarking, two algorithms proposed can detect watermarking information even in wireless environment with low embedding rate. And the algorithms can improve PRPA of transmitter in some way. Although extral information is embedded, utilization rate of frequency spectrum is unchanged.
引文
[1] Jae-Woo L., A Policy of Copyright Protection Using Authentication Key Based on Digital Watermarking[C], International Conference on Multimedia and Ubiquitous Engineering, 2007, 1205-1212
    [2] Ingemar J. Cox, Matthew L.Miller, Jeffrey A.Bloom, Digital Watermarking[M], Publishing House of Electronic Industry, Jul. 2003
    [3] Rafael C. Gonzalez Richard E.Woods, Digital Image Processing Second Edition[M], Prentice Hall ,2003
    [4] Steven M.Kay, Fundamentals of Statistical Signal Processing,Volume I:Estimation Theory/Volume II:Detection Theory [M], Prentice Hall PTR, 2003
    [5]章毓晋,《图象工程(上册)—图象处理和分析》[M],清华大学出版,2001.9
    [6] Campidoglio, M., Frattolillo, F., Landolfi, F., The Copyright Protection Problem: Challenges and Suggestions[C], Fourth International Conference on Internet and Web Applications and Services, May 2009,522-526
    [7] Giakoumaki, A., Pavlopoulos, S., Koutsouris, D., Multiple Image Watermarking Applied to Health Information Management[J], IEEE Transactions on Information Technology in Biomedicine, 2006, 10(4):722-732
    [8] Ham, D., Andress, W., A circular standing wave oscillator[C], IEEE International on Solid-State Circuits Conference, 2004. Digest of Technical Papers. ISSCC. 2004, 1:380 - 533
    [9] Avcibas, I., Nasir, M., Sankur, B., Steganalysis based on image quality metrics[C], 2001 IEEE Fourth Workshop on Multimedia Signal Processing, 3-5 Oct. 2001,517– 522
    [10] Jafri, S.A.R., Baqai, S. , Robust Digital Watermarking for Wavelet-based Compression[C],IEEE 9th Workshop on Multimedia Signal Processing, 2007. 377-380
    [11] Frattolillo F., Watermarking protocol for web context[J], IEEE Transactions on Information Forensics and Security, 2007,2(3):350-363
    [12] H. Ruo-Hong, L. Huai-Lan, D. Jun ,Copyright notification and protection of multimedia courseware based on dual digital watermark[C], Proceedings - 1st International Congress on Image and Signal Processing, 2008, 5(2): 683-687
    [13] Campisi, P., Kundur, D., Neri, A., Robust digital watermarking in the ridgelet domain[J], IEEE Signal Processing Letters, 2004, 11(10):826 - 830
    [14] Martinian, E., Wornell, G.W., Chen, B., Authentication with distortion criterv[J], IEEE Transactions on Information Theory, Jul. 2005, 51(7):223-2542
    [15] Suhail, M.A., Obaidat, M.S., Digital watermarking-based DCT and JPEG model[J], IEEE Transactions on Instrumentation and Measurement, 2003,52(5): 1640 - 1647
    [16] Kejariwal, A., Gupta, S., Nicolau, A., Dutt, N.D., Gupta, R., Energy efficient watermarking on mobile devices using proxy-based partitioning[J] ,IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2006, 14(6):625-636
    [17] P. Geum-Dal, Y. Eun-Jun, Y. Kee-Young, A New Copyright Protection Scheme with Visual Cryptography[C], Future Generation Communication and Networking Symposia, 2008, 2: 60-63,
    [18] Wang, S., Zheng, D., Zhao, J., Tam, W. J., Speranza, F., An Image Quality Evaluation Method Based on Digital Watermarking[J], IEEE Transactions on Circuits and Systems for Video Technology, 2007, 17(1): 98 - 105
    [19] J.Fridrich,M.Goljan, Detecting LSB steganography in color and gray-scale image[J], IEEE Transactions on Multimedia and Security Magazine, 2001,8(4):22-28
    [20] Y.Wang, Pierre Moulin, Steganalysis of Bloc-DCT Image Steganography[C], IEEE Workshop Statistic-al Signal Processing, on 28 Sept.-1 Oct. 2003 Page(s):339 - 342
    [21] Akleylek, S., Nuriyev, U., Steganography and new implementation of steganography[C], Proceedings of the IEEE 13th Signal Processing and Communications Applications Conference, 2005, 64-67
    [22] Farid, H., Simoncelli, E.P., Differentiation of discrete multidimensional signals[J], IEEE Transactions on Image Processing, April 2004,13(4) :496 - 508
    [23] Shikata, J., Matsumoto, T.,Unconditionally Secure Steganography Against Active Attacks[J], IEEE Transactions on Information Theory, 2008, 54(6): 2690 - 2705
    [24] Vijayalakshmi, V., Zayaraz, G., Nagaraj, V., A modulo based LSB steganography method[C], International Conference on Control, Automation, Communication and Energy Conservation, INCACEC 2009. 1-4
    [25] Mehrabi, M. A., Aghaeinia, H., Abolghasemi, M., Image Steganalysis Based on Statistical Moments of Wavelet Subband Histogram of Images with Least Significant Bit planes[C], Congress onImage and Signal Processing, CISP '08. 2:768-772
    [26] Gkizeli, M., Pados, D.A., Medley, M.J., Optimal Signature Design for Spread-Spectrum Steganogra[J], IEEE Transactions on ImageProcessing,Feb.2007,16(2):391-405D
    [27] Vijayalakshmi, V., Zayaraz, G., Nagaraj, V., A modulo based LSB steganography method[C], International Conference on Control, Automation, Communication and Energy Conservation, INCACEC 2009. 1-4
    [28] Khosravirad, S.R., Eghlidos, T., Ghaemmaghami, S., Higher-order statistical steganalysis of random LSB steganography[C], IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2009, 629 - 632
    [29] Cancelli, G., Doerr, G., Cox, I.J., Barni, M., Detection of±1 LSB steganography based on the amplitude of histogram local extrema[C], 15th IEEE International Conference on Image Processing, ICIP 2008. 1288 - 129
    [30] Pevny, T., Fridrich, J., Detection of Double-Compression in JPEG Images for Applications in Steganography[J], IEEE Transactions on Information Forensics and Security, 3(2):247-258
    [31] Neeta, D., Snehal, K., Jacobs, D., Implementation of LSB steganography and its evaluation for various bits[C], International Conference on Digital Information Management, Dec. 2006 ,173– 178
    [32] Andrew D K. Steganalysis of LSB matching in grayscale images [J], IEEE Signal Processing Letters, 2005, 12(6):441-444.
    [33] Ker, A.D., Steganalysis of Embedding in Two Least-Significant Bits[J], IEEE Transactions on Information Forensics and Security, 2007, 2(1):46-54
    [34] A.D.Ker, Improved detection of LSB steganographpy in grayscale images[C], Proceedings of International Conference on Information Hiding Workshop, Springer LNCS 2004:97 - 115
    [35] K.Sullivan, O.Dabeer, U. Madhow, et. al. , LLRT based detection of LSB hiding[C], Proceedings of IEEE International Conference on Image Processing, Barcelona, 2003, 1:. 497-500
    [36] A.D.Ker, A general framework for structural steganalysis of LSB replacement[C], in Proceeding of the7th International Workshop Information Hiding:, LNCS, 2005,3727: 296– 311
    [37] Yunkai G., Xiaolong L., Bin Y., Yifeng L., Detecting LSB matching by characterizing the amplitude of histogram[J], IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2009. 1505-1508
    [38] Chen M., Fan-fan L.,Ru Z., et.al, Steganalysis of LSB Matching in Gray Images Based on Regional Correlation Analysis[C], World Congress on Computer Science and Information Engineering, 2009 WRI, 6:490-494
    [39] Mielikainen, J., LSB matching revisited[J], IEEE Signal Processing Letters, May 2006, 13(5):285-287
    [40] Mehrabi M.A., Aghaeinia, H., Abolghasemi, M., Steganalysis of LSB-Matching steganography by removing most significant bit planes[C], International Symposium on Telecommunications, IST 2008. 731 - 734
    [41] Ferreira, R., Ribeiro, B., Silva, C., et.al, Building resilient classifiers for LSB matching steganography[C], IEEE International Joint Conference on Neural Networks, 2008. IJCNN 2008. (IEEE World Congress on Computational Intelligence). 1562– 1567
    [42] Artz, D., Digital steganography: hiding data within data[J], IEEE Internet Computing,May 2001, 5(3):75-80
    [43] M. John, K.Timothy, L. Ephraim,et.al, Application of conditional entropy measures to steganalysis[C], Proceedings of SPIE - The International Society for Optical Engineering, 2006, 6072: 39-50
    [44] O.Dabeer,K.Sullivan, U.Madhow, et. al. Detection if hiding in the least significant bit[J], IEEE Trans. on Signal processing, Oct.2004, 52( 10):3046-3058
    [45] J. Fridrich, M. Goljan, Practical steganalysis of digital images:state of the ar[C], in Proceeding of SPIE Symposium on Electronic Imaging, 2002, 4675:1-13
    [46] K.Lee, Category attack for LSB steganalysis of JPEG images[C], Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5th International Workshop on Digital Watermarking , IWDW, 2006, 4283:35-48
    [47] C.Boncelet, L. Marvel, A. Raqlin, Compression-based steganalysis of LSB embedded images[C],Proceedings of SPIE - The International Society for Optical Engineering, Security, Steganography, and Watermarking of Multimedia Contents VIII - Proceedings of SPIE-IS and T Electronic Imaging,2006, 6072 : 607207
    [48] W. F. Liu, W. Guan, J.Cao, Detection of secret message in spatial LSB steganography based on contaminated data analysis[J], Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2006,43(6)1058-1064,
    [49] X.Kong,T Zhang, Xi You, D Yang, A new steganalysis approach based on both complexity estimate and statistical filter[C], in Proceeding of IEEE. Pacific-Rim Conf. on Multimedia, LNCS, 2002,2532: 434–441,
    [50] Bin Li,Fangjun Huang, Jiwu Huang, Steganalysis of LSB Greedy Embedding Algorithm for JPEG Images using Coefficient Symmetry[C], IEEE International Conference on Image Processing, ICIP 2007, 1(1): 413-416
    [51] Suhail, M.A., Obaidat, M.S., Robust Watermarking System Using SecurityEnhancement on Content Based Image Segmentation[C], 14th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2007. 1252– 1255
    [52] P.F.Felzenszwalb, D.P. Huttenlocher, Image segmentation using local variation[C], Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 1998, 98-104
    [53] Cour, T., Jianbo Shi, Recognizing objects by piecing together the Segmentation Puzzle[C],IEEE Conference on Computer Vision and Pattern Recognition, CVPR '07. 1– 8
    [54] Badran, Ehab F., Ghobashy, A., El-Shennawy, K., DCT-Based Digital Image Watermarking Via Image Segmentation Techniques[C], 4th International Conference on Information & Communications Technology, ICICT '06. 1 - 1
    [55] Pevny, T., Fridrich, J., Determining the stego algorithm for JPEG images[J], IEEE Proceedings Information Security, 2006, 153(3):77-86
    [56] Sarkar, A., Solanki, K., Madhow, U., et al., Secure Steganography: Statistical Restoration of the Second Order Dependencies for Improved Security[C], IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2007. 2(2):277-280
    [57] Sarkar, A., Nataraj, L., Manjunath, B.S., et al, Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding scheme[C], 15th IEEE International Conference on Image Processing, ICIP 2008,1292-1294
    [58] A.Briassouli and M. G.Strintzis, Locally optimum nonlinearities for DCT watermark detection[J], IEEE Transactions on Image Processing, 2004,13(12):1604-1617
    [59] Bin L., Fangjun H., Jiwu H. Steganalysis of LSB Greedy Embedding Algorithm for JPEG Images using Coefficient Symmetry[C], IEEE International Conference on Image Processing, ICIP 2007. 1:413-416
    [60] Yang, G., Zhang, H., Using Higher Order DCT Difference to Effective Improve Markov Process Based JPEG Steganalysis Detection Rate[C], Asia-Pacific Conference on Information Processing, APCIP 2009. 2:47-50
    [61] Trivedi, S., Chandramouli, R., Secret key estimation in sequential steganography[J], IEEE Transactions on Signal Processing, Feb.2005, 53(2) :746– 757
    [62] Qingzhong L., Sung, A.H., Jianyun X., et.al, Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganograph[C], 18th International Conference on Pattern Recognition, ICPR 2006. 2: 267 - 270
    [63] Babu, K.S., Raja, K.B., Kiran, K.K.,et.al, Authentication of secret information in image Steganography[C], IEEE Region 10 Conference on TENCON, 2008 ,1-6
    [64] Mehrabi, M.A., Faez, K., Bayesteh, A.R., Image Steganalysis Based on Statistical Moments of Wavelet Subband Histograms in Different Frequencies and Support Vector Machine[C], Third International Conference on Natural Computation, ICNC 2007. 3:587-590
    [65] Bo X., Jiazhen W., Xiaqin Li., Zhe Z., Passive Steganalysis Using Image Quality Metrics and Multi-class Support Vector Machine[C], Third International Conference on Natural Computation, ICNC 2007. 3:215-220
    [66] Fuxin W., Wei S., Jianjun H., Regression of SVM based robust watermarking algorithm[C], 9th International Conference on Signal Processing, ICSP 2008. 2197 - 220
    [67] Yuanhai S., Wei C., Chan L., Multiwavelet-based digital watermarking with support vector machine technique[C],, Chinese Control and Decision Conference, CCDC 2008. 4557 - 4561
    [68] Xiaosheng P., A JPEG Steganalysis Algorithm with Embedded Rate Estimation Based on Multi-class SVM[C], Congress on Image and Signal Processing, CISP '08. 5:613-615
    [69] Jing Dong, Tieniu Tan, Blind image steganalysis based on run-length histogram analysis[C], 15th IEEE International Conference on Image Processing, ICIP 2008. 2064 - 2067
    [70] H.H.P., Support Vector Machine and hyperplanes in digital watermark detection[C], IEEE Region 10 Conference TENCON 2007,1 - 4
    [71] Xiangyang W., Wei Q., Panpan N., A New Adaptive Digital Audio Watermarking Based on Support Vector Regression[J], IEEE Transactions on Audio, Speech, and Language Processing, 15(8): 2270 - 227
    [72] Cairong L., Wei Z., Haojun A., et.al, Steganalysis of Spread Spectrum Hiding Based on DWT and GMM[C], International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC '09.1:240 - 243
    [73] Abolghasemi, M., Aghainia, H., Faez, K., Mehrabi, M.A., Steganalysis of LSB Matching Based on Co-occurrence Matrix and Removing Most Significant Bit Planes[C], International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2008, 1527-1530
    [74] Harmsen J. and Pearlman W., Higher-order statistical steganalysis of palette image[C], in Processing of SPIE Security, Steganography and Watermarking of Multimedia Contents, 2003,131-142
    [75] Nello Cristianini, John Shawe-Taylor, An introduction to support vector machines and other kernel-based learning methods[M], Cambridge University Press in 2000
    [76]邱天爽,张旭秀,李小兵等,《统计信号处理——非高斯信号处理及其应用》[M],电子工业出版社,2004.5
    [77] Kuruoglu, E.E., Density parameter estimation of skewedα-stable distributions[J], IEEE Transactions on Signal Processing, Oct. 2001, 49(10): 2192 - 2201
    [78] Jin-Long Jiang, Dai-Feng Zha, Generalized Fractional Lower-Order Spectrum of Alpha Stable Distribution Process[C], 4th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM '08. 1-4
    [79] Achim, A., Kuruoglu, E.E., Image denoising using bivariateα-stable distributions in the complex wavelet domain[J], IEEE Signal Processing Letters, 2005, 12(1):17-20
    [80] Patel, A., Kosko, B., Stochastic Resonance in Continuous and Spiking Neuron Models With Levy Noise[J], IEEE Transactions on Neural Networks, Dec. 2008,19(12): 1993 - 2008
    [81] Guerriero, M., Marano, S., Matta, V.,et al., Stochastic Resonance in Sequential Detectors[J],IEEE Transactions on Signal Processing, 2009, 57(1):2-15
    [82] Harmer, G.P., Davis, B.R., Abbott, D., A review of stochastic resonance: circuits and measurement[J], IEEE Transactions on Instrumentation and Measurement, 2002,51(2): 299 - 309
    [83] Zhefei H., Jie Y., Kecheng W., Yunpeng W., Weak signal detection based on stochastic resonance combining with PSO algorithm[C], 4th IEEE Conference on Industrial Electronics and Applications, ICIEA 2009, 246 - 251
    [84] Hao Chen, Varshney, P.K., Kay, S.M., et al, Theory of the Stochastic Resonance Effect in Signal Detection: Part I—Fixed Detectors[J], IEEE Transactions on Signal Processing, Part 1,2007, 55(7) :3172 - 3184
    [85] Hao Chen, Varshney, P.K., Michels, J.H., Improving Sequential Detection Performance Via Stochastic Resonance[J], IEEE Signal Processing Letters, 2008,15:685-688
    [86] Anantharam, V., Borkar, V. S., An Information Theoretic View of Stochastic Resonance[C],IEEE International Symposium on Information Theory, ISIT 2007. 966 - 970
    [87] Dylov, Dmitry V., Fleischer, Jason W., Self-filtering of noisy images via stochastic resonanc[C], Lasers and Electro-Optics, 2009 Conference on Quantum electronics and Laser Science Conference. June 2009, 1 - 2
    [88] Xingxing W., Zhong-Ping J., Repperger, D.W., Enhancement of stochastic resonance by tuning system parameters and adding noise simultaneously[C],American Control Conference, 2006, 6 pp
    [89] Mingyang W., Yiyu Z., Le H., Wenli J., Detection of weak pulse signal via stochastic resonance[C], International Conference on Radar, 2006. CIE '06.1-4
    [90] Park, C., Padgett, W.J., New cumulative damage models for failure using stochastic processes as initial damage[J], IEEE Transactions on Reliability, Sept. 2005, 54(3) :530 - 540
    [91] Bhuiyan, M.I.H., Ahmad, M.O., Swamy, M.N.S., Wavelet-Based Despeckling of Medical Ultrasound Images with the Symmetric Normal Inverse Gaussian Prior[C], IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2007. 1 :I-721 - I-724
    [92] Eltoft, T., A new statistical model for nonRayleigh amplitude signa[C], Proceedings. 2003 International Conference on Image Processing, ICIP 2003. 1: I - 233-I-238
    [93] Edgeman, R.L., Assessing the inverse Gaussian distribution assumption[J], IEEE Transactions on Reliability, Aug. 1990, 39(3): 352– 355
    [94] Klaus-Robert M., Sebastian M.,Gunnar R. et.al, An introduction to kernel- based algorithms[J], IEEE Transactions on Neural networks, 2001,12(2):181-201
    [95] Jun-Bao,L. Jeng -Shyang P., Zhe-Ming L. et.al, Complete kernel fisher discriminant analysis of Gabor features with fractional power polynomial models for face recognition[C], IEEE International Symposium on Circuits and Systems, ISCAS 2006, 5503-5506
    [96] Yuanjian F., Pengfei Shi, Face detection based on kernel fisher dicriminant analysis[C], Proceedings of the 6th IEEE international conference on Automatic Face and Gesture Recognition, FGR’04, 204-207
    [97] Qingshan L., Hanqing L., Songde M. Improving kernel fisher disciminant analysis for face recognition[J], IEEE Transactions on Circuits and System for Video Technology, 2004,14(1):42-49
    [98] Jian Y., Alejandro F. F., Jiang-yu Y. et al., KPCA plus LDA: a complete kernel Fisher discriminant framework for feature extraction and recognition[J], IEEE Transactions on Pattern Analysis and Machine Intelligence, 2005, 27(2):230-244
    [99] Seung-Jean K., Alessandro M., Stephen B., Optimal kernel selection in kernel Fisher discriminant analysis[C], in Proceedings of the 23th International Conference on Machine Learning, 2006,351-358
    [100] Xianbin W., Wu, Y., Caron, B., Transmitter identification using embedded pseudorandom sequences[J], IEEE Transactions on Broadcasting, Sept. 2004,50(3): 244 - 252
    [101] Tae Hoon K., Young Woo S., A new transmitter identification system for ATSC DTV standard[C], IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2008, 1– 4
    [102] Xianbin W., Yiyan W., Gagnon, G., et al., Performance Analysis and Implementation of a New Position Location System Using DTV TxID Watermark[C] IEEE 64th Vehicular Technology Conference, 2006. 1 - 5
    [103] Yang, F., Hu, L. N., Gui, L., et al., Transmitter Identification With Watermark Signal in DVB-H Signal Frequency Network[J], IEEE Transactions on Broadcasting, Sept. 2009, 55(3):663-667
    [104] Rahman, M.J., Xianbin W., Sung Ik Park, et all., A novel three-stage ATSC TxID identifier for robust data broadcasting[C], IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, BMSB 2009. 1-5
    [105] Park S.I., Lee J.-Y., Kim H.M.,et al., Transmitter identification signal analyzer for single frequency network[J], IEEE Transactions on Broadcasting, Sep. 2008, 54(3):383-393
    [106] Penttinen, J., The SFN Gain in Non-interfered and Interfered DVB-H Networks[C], The Fourth International Conference on Wireless and Mobile Communications, ICWMC 2008. 294 - 299
    [107] Kratochvil, T., Ricny, V., Simulation and experimental testing of the DVB-T broadcasting in the SFN networks[C], 18th International Conference on Electronic Radio, 2008,1 - 4
    [108] Jae-young L., Sung Ik P., Heung Mook K.et al. Implementation of transmitter identification signal analyzer in single frequency network[C], International Conference on Consumer Electronics, ICCE 2008,Digest of Technical Papers, 1-2
    [109] Perez, J.R., Basterrechea, J., Morgade, J., et al., Optimization of the Coverage Area for DVB-T Single Frequency Networks Using a Particle Swarm Based Method[C], IEEE 69th Vehicular Technology Conference, VTC Spring 2009. 1-5
    [110] Bee Leong Y., Reduced complexity in-phase/quadrature-phase M-QAM turdo equalization using iterative channel estimation[J], IEEE Transactions on Wireless Communications, Jan.2003, 2(1):2-10
    [111] I.Gene D.N., Leonid R. etc, Upper and lower bounds on black-box steganography[J], Journal of Cryptology,2009, 22(3): 365-394
    [112] Fok, M.P., Prucnal, P.R., Compact and low-latency scheme for optical steganography using chirped fibre Bragg gratings[J], Electronics Letters, 2009,45(3):179-180
    [113] Xi.P.X, Study on complexity-reduced iterative equalization algorithm for mobile OFDM[J], Chinese Journal of Electronics, Jan 2009, 18(1):1024-124
    [114] Jeong-Woo J., Performance of QPSK/OFDM on frequency-selective Rayleigh fading channels[J], IEICE Transactions on Communications,2004, E87-B(5):1407-1412
    [115] Bertocco, M., Farias, M., Fortin, D., et al., Cross-Layer Measurement for the Analysis of DVB-T System Performance[J], IEEE Transactions on Instrumentation and Measurement, July 2008, 57(7):1304– 1312
    [116] Stukavec, R., Kratochvil, T., Matlab simulation of the DVB-T transmission [J], 19th International Conference on Radioelektronika, RADIOELEKTRONIKA '09. 315– 318
    [117] Angrisani, L., Farias, M., Fortin, D., Sona, A., Experimental Analysis of In-Channel Interference Effects on the Performance of a DVB-T System[J], IEEE Transactions on Instrumentation and Measurement, Aug. 2009, 58(8): 2588– 2596
    [118] Guowang M., Zhisheng N., Satisfaction oriented resource management in integrated Internet and DVB-T network providing high mobility broadband access services[C], IEEE Global Telecommunications Conference, GLOBECOM '2005, 6: 3841-3845
    [119] Wei-Lun L., Chung, C.-D., Adaptive differentially coherent orthogonally multiplexed orthogonal phase modulation over flat fading channels[J], IEEE Transactions on Wireless Communications, March 2009, 8(3): 1062 - 1066
    [120] Naoki Suehiro, Mitsutoshi Hatori, Modulatable orthogonal sequences and their applications to SSMA systems[J], IEEE Transactions on Information Theory,1988, 34(1): 45-51
    [121] Edmund Y.Lane, Joseph W.Goodman, A mathematical analysis of the DCT coefficient distributions for images[J], IEEE Transactions on Image Processing, October 2000,9(10):1661-1666
    [122]秦前清,杨宗凯,实用小波分析[M],西安电子科科技大学出版社,1998.1
    [123]韩宁闫德勤,基于支持向量机的鲁棒盲水印算法[J],计算机工程与设计,2009,22:5273-5275
    [124]李三平,张毓森,尹康银,基于支持向量机的小波图像水印算法[J],系统工程与电子技术,2008,30(2):354-357
    [125]魏为民王朔中唐振军,一类数字图像篡改的被动认证[J],东南大学学报,2007, 37( A01):58-61
    [126]彭静,数字水印算法检测标准的研究[J],电子科技大学学报,2007,36(3):566-568
    [127]孙中伟,冯登国,武传坤,基于弱信号检测理论的离散小波变换域数字水印盲检测算法[J],计算机研究与发展,2006,43(11):1920-1926
    [128]沃焱,韩国强,张波,一种新的基于特征的图像内容认证方法[J],计算机学报,2005,28(1):105-112
    [129]毛家发,林家骏,戴蒙,基于图像攻击的隐藏信息盲检测技术[J],计算机学报,2009,2:318-327
    [130]刘永亮,黄铁军,姚鸿勋,基于承诺的水印检测协议[J],高技术通讯,2006,16(11):1113-1118
    [131]陈冠雄,姚志强,一种基于量化方法的3D模型盲水印算法[J],电子与信息学报,2009,12: 2963-2968
    [132]赵启阳,尹宝林,针对非参数化检测边界水印机制的敏感度攻击[J],南京理工大学学报,2008,32(3): 291-294,332
    [133]林升梁,刘志,基于RBF核函数的支持向量机参数选择[J],浙江工业大学学报,2007,35(2):163-167
    [134]章兢,张小刚,数据挖掘算法及其工程应用[M],机械工业出版社,2006