| 研究生: |
陳文淵 Chen, Wen-Yuan |
|---|---|
| 論文名稱: |
使用振幅、頻率與相位嵌入的資訊隱藏技術比較研究 A Comparative Study of Information Hiding Schemes Using Amplitude, Frequency and Phase Embedding |
| 指導教授: |
陳進興
Chen, Chin-Hsing |
| 學位類別: |
博士 Doctor |
| 系所名稱: |
電機資訊學院 - 電機工程學系 Department of Electrical Engineering |
| 論文出版年: | 2003 |
| 畢業學年度: | 91 |
| 語文別: | 英文 |
| 論文頁數: | 126 |
| 中文關鍵詞: | 強健性浮水印 、易碎性浮水印 、資訊隱藏 、振幅鍵移 、頻率鍵移 、相位鍵移 、靜態壓縮標準 、版權保護 |
| 外文關鍵詞: | Security, Copyright Protect, JPEG, Phase Shift Keying, Frequency Shift Keying, Amplitude Shift Keying, Steganography, Robust Watermarking, Fragile Watermarking |
| 相關次數: | 點閱:145 下載:2 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
浮水印技術是網路多媒體的版權保護與認證(copyright protection and authentication)的一種有效方法。浮水印的處理可看成是一種通信過程,加入浮水印的動作就像通信通道加入雜訊一樣;加入浮水印後的影像(watermarked image)遭受破壞攻擊(attacks),就像通信通道遭受到干擾一樣。在本論文中,我們提出頻率嵌入(frequency embedding)及相位嵌入(phase embedding)兩種架構。在頻率嵌入架構上,每一個秘密位元被嵌入至數位餘弦轉換區塊(DCT block)中的兩個係數。這種方式可類比成數位通信技術上的頻率鍵移調制(FSK)而與振幅鍵移調制(ASK)有別。本論文採用高變異數區塊選擇(HVBS)的策略來增強浮水印技術的強健性(robustness),由於高變異數區塊選擇會產生同步問題,因此一種稱為雙態限制(two state constraint)的技術被用來解決同步問題。為了證明本架構的效用,我們在多種不同條件下進行模擬測試。測試的結果顯示,不論在接受JPEG的壓縮破壞或是一般的破壞,如旋轉(rotating)、放大縮小(resizing) 、局部挖除(cropping) 、塗抹(patting) 、加雜訊(noising) 、或者是模糊化處理(blurring),我們的浮水印都能清楚的取回。在有高變異數區塊選擇(WHVBS)與無高變異數區塊選擇(WOHVBS)的比較方面,實驗數據顯示有高變異數區塊選擇加上雙態限制的架構有更好的強健性且不會降低不可感知度(imperceptibility),這種效果對於粗糙的影像比平滑的影像更為強烈。在使用ASK嵌入與FSK嵌入的效果比較上,結果顯示,在接受JPEG破壞上FSK稍微優於ASK,而一般的破壞測試上ASK與FSK相差不多,但是在模糊破壞上,ASK嵌入的浮水印被摧毀而FSK嵌入則仍能清楚辨識。
在相位嵌入架構中(phase embedding),振幅提昇(amplitude boost,AB)和低振幅區塊選擇(low amplitude block selection,LABS) 被用來同時達到浮水印技術的強健性及不可感知性。其中振幅提昇技術是用來增強浮水印技術的強健性,低振幅區塊選擇則改良浮水印技術的不可感知性。為了證明本架構的有效性,壓縮破壞測試與一般破壞測試都被用來模擬驗證。實驗結果顯示使用振幅提昇與低振幅區塊選擇的架構,不論在強健性與不可感知性方面都優於沒有使用振幅提昇與低振幅區塊選擇的架構。這兩種技術使用在相位嵌入的浮水印隱藏技術上,對於平滑影像的浮水印隱藏,效果更加彰顯。
藏密(Steganography)和版權保護(copyright protection)在網際網路上是密不可分的。本論文提出一種公開鑰匙密碼(public-key)結合影像隱藏技術的架構,提供在網路上一種安全資訊交換的工具。在架構上,首先利用一種四分樹分解向量量化編碼(quadtree partition vector quantization coding,QPVQ)將秘密影像轉換成位元資料流,然後將其嵌入至封面影像(cover image)的DCT係數中。在秘密位元嵌入的過程中,一種適應性量化與適當的DCT係數選擇被用來改善封面影像的不可感知性。另一方面,Rivest,Shamir and Adleman(RSA)的公開鑰匙(public-key)加密解密的機制用來完成在網際網路上的秘密通信。我們的系統架構擁有兩項優點,一是由RSA技術的使用使得在網際網路上送收資料既方便又安全。另一是被藏密的封面影像可以經由JPEG壓縮而不會有品質下降的感覺。
Watermarking is a potential method for copyright protection and authentication of multimedia data in the internet. The watermarking process can be viewed as a communication task, where the watermark acting like information is embedded into a host image acting like noise in a communication channel which susceptible to all kinds of attacks acting like jamming. In this thesis, two novel watermarking schemes using frequency embedding and phase embedding respectively are proposed. In the first proposed (frequency embedding) scheme, a secret bit is embedded into two rather than one DCT coefficients of a block. This is analogous to the FSK as opposed to the ASK modulation in digital communication. High variance block selection (HVBS) is employed to enhance robustness. In order to solve the synchronization problem caused by HVBS, local block selection and a novel technique called two states constraint is implemented. In order to demonstrate the effectness of the proposed scheme, simulations under various conditions were conducted. The empirical results show that our proposed scheme can sustain most common attacks including JPEG compression, rotating, resizing, cropping, painting, noising and blurring etc. The comparison between using HVBS and without shows that HVBS with the two state constraint can effectively enhance robustness without the sacrifice of imperceptibility. The enhancement is much more significant for host images with fluctuation characteristics than those with smooth characteristics. The comparison between ASK and FSK shows that the extracted watermark from the latter deteriorate gracefully and that from the former is blown out as the strength of a JPEG attack is beyond a threshold. For other common attacks, the ASK and FSK perform about the same except for the blurring attack for which the extracted watermark from the latter can be clearly identified while that from the former is blown out.
In the second proposed (phase embedding) scheme, amplitude boost (AB) and low amplitude block selection (LABS) are used to achieve superior performance in terms of robustness and imperceptibility. AB is hired to increase the robustness while LABS is employed to improve the imperceptibility. In order to demonstrate the effectiveness of the proposed scheme, simulations under various conditions were conducted. The empirical results show that our proposed scheme can sustain most common attacks including JPEG compression, rotating, resizing, cropping, painting, noising and blurring etc. The comparison between using the scheme with AB and LABS properly combined and that without shows that the former can effectively enhance robustness without the sacrifice of imperceptibility. The enhancement is much more significant for host images with smooth characteristics than those with fluctuation characteristics.
Steganography and copyright protection are closed related in the internet environment. In this thesis a public-key steganography system is proposed to offer safe exchange of a stego-image in the internet. In the proposed system, the secret image is first compressed by the quadtree partition vector quantization (QPVQ) coding into the indices bits stream which is then embedded into the Discrete Cosine Transform (DCT) of the cover image. In the embedding process, adaptive quantization and appropriate DCT coefficients are used to enhance the imperceptibility of the stago-image. On the other hand, The Rivest, Shamir and Adleman (RSA) algorithm is hired to provide the mechanism of a public-key system for secure communication in the internet. Our proposed system has two advantages compared with other data hiding techniques. One is the safety and convenience offered by the RSA system to exchange data in the internet. The other is the stego-image can pass through high quality Joint Photograph Experts Group (JPEG) compression without noticeable degradation.
[1] T. Jamil, “Steganography: the Art of Hiding Information in Plain Sight,” IEEE Potential, Vol. 18, No. 1, pp. 10-12 Feb/Mar 1999.
[2] H. Berghel and L. O’Gorman, “Protecting Ownership Rights Through Digital Watermarking,” Computer, Vol. 29, Issue: 7, pp. 101-103, Jul 1996.
[3] P. Jessop, “The Business Case for Audio Watermarking,” IEEE Int’l Conference on Acoustic, Speech, and Signal Processing, Vol. 4, pp. 2077-2078, Mar 1999.
[4] R. J. Abderson and A. P. Petitcolas, “On the Limits of Steganography,” IEEE Jurnal on selected areas in communications, Vol. 16, No. 4, pp.474-482, 1998.
[5] G. J. Simmons, “The Prisoners’ Problem and the Subliminal Channel,” in Proc, CRYPTO’83, pp.51-67, 1984.
[6] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, “Information Hiding – A Survey,” Proceeding of the IEEE, Vol. 87, No. 7, pp. 1062-1078, 1999.
[7] C. D. Vleeschouwer, J. F. Delaigle and B. Macq, “Invisibility and Application Functionalities in Perceptual Watermarking-An Overview,” Proceedings of the IEEE, Vol. 90, No. 1, pp. 64-77, 2002.
[8] D. Artz, “Digital Steganography: Hiding Data within Data,” Internet Computing, IEEE, Vol. 5, Issu. 3, pp.75-80, May/Jun 2001.
[9] 黃強華和梅晟義, 霹靂圖騰劇集攻略LIVE 015, 霹靂新潮社, pp.117, Jan 2002.
[10] J. Fridrich, M. Goljan, and R. Du, “Deteting LSB Steganography in Color and Gray-Scale Images,” IEEE Trans. on Multimedia, Vol. 8, Issu. 4, pp. 22-28, 2001.
[11] R. Chandramouli and N. Memon, “Analysis of LSB Based Image Steganography Techniques,” Proceeding of Image processing, Vol. 3, pp. 1019-1022, 2001.
[12] L. M. Marvel, C. G. Boncelet, and C. T. Retter, “Spread Spectrum Image Steganography,” IEEE Trans. on Image Processing, Vol. 8 No. 8, pp.1075-1083, 1999.
[13] G. Mastronardi, M. Castellano, and F. Marino, “Steganography Effects in Various Formats of Images. A Preliminary Study,” International Workshop on Intelligent Data Acquisition and Advanced Computing System: Technology and Applications, pp.116-119, 1-4 Jul 2001.
[14] C. I. Podilchuk and E. J. Delp, “Digital Watermarking: Algorithms and Applications,” IEEE Signal Processing Magazine, Vol. 8, No. 4, pp.33-46, Jul 2001.
[15] G. Voyatzis and I. Pitas, “Protecting Digital-Image Copyrights: A Framework,” IEEE Trans. on Computer Graphics and Application, Vol. 19, No. 1, pp.18-24, 1999.
[16] D. Kirovski, H. Malvar and Y. Yacobi, “A Dual Watermarking and Fingerprinting System,” ISIT Lausanne, Switzerland, pp. 467, Jun 2002.
[17] J. K. Su and B. Girod, “on the Robustness and Imperceptibility of Digital Fingerprints,” IEEE Int’l Conference on Multimedia Computing and System, Vol. 2, pp. 530-535, 1999.
[18] C. T. Hsu and J. L. Wu, “Hidden Digital Watermarks in Images,” IEEE Trans. on Image Processing, Vol. 8, No. 1, pp.58-68, Jan 1999.
[19] M. D. Swanson, M. Kobayashi, and A. H. Tewfik, “Multimedia Data-Embedding and Watermarking Techniques,” Proceeding of the IEEE, Vol. 86. No. 6, Jun 1998.
[20] C. S. Lu, S. K. Huang, G. J. Sze and H. Y. Liao, “Cocktail Watermarking for Digital Image Protection,” IEEE Trans. on Multimedia, Vol. 2, No. 4, pp.209-224, Dec. 2000.
[21] P. M. Chen, “A Visible Watermarking Mechanism Using a Statistic Approach, “ Proceeding of ICSP, pp. 910-913, 2000.
[22] Y. Hu and S. Kwong, “Wavelet Domain Adaptive Visible Watermarking,” Electronics Letters 27th, Vol.37, No. 20, pp. 1219-1222, Sep 2001.
[23] S. P. Mohanty, K. R. Ramakrishnan and M. S. Kankanhalli, ”A DCT Domain Visible Watermarking Technique for Image, ” IEEE Int’l Conference on Multimedia and Expo, Vol. 2, pp.1029-1032, 2000.
[24] M. S. Kankanhalli and K. R. Ramakrishnon, “Adaptive Visible Watermarking of Images,” IEEE Int’l Conference on Multimedia Computing and System, Vol. 1, pp. 568-573, 1999.
[25] M. Wu and B. Liu, ”Watermarking for Image Authentication,” IEEE Int’l Conference on Image Processing, Vol. 2, pp. 437-441, 1998.
[26] D. Kundur and D. Hatzinakos, “Digital Watermarking for Telltale Tamper Proofing and Authentication,” Proceeding of the IEEE, Vol. 87. No. 7, Jul 1999.
[27] A. H. Paquet and R. K. Ward, “Wavelet-Based Digital Watermarking for Image Authentication”, Proceeding of the 2002 IEEE Canadian Conference on Electrical & Computer Engineering, pp.879-884, 2002.
[28] C. S. Lu and H. Y. Liao, “Multipurpose Watermarking for Image Authentication and Protection,” IEEE Trans. on Image Processing, Vol. 10, No. 10, pp.1579-1592, Oct. 2001.
[29] C. H. Chou and Y. C. Li, “A Perceptually Tuned Subband Image Coder Based on the Measurement of Just-Noticeable-Distortion Profile,” IEEE Trans. on Circuits Systems Video Technol., Vol.5, No.6, pp.467-476, Dec. 1995.
[30] Z. H. Wei, P. Qin and Y. Q. Fu, “Perceptual Digital Watermark of Images Using Wavelet Transform,” IEEE Trans. on Consumer Electronics, Vol. 44, No. 4, pp.1267-1272, 1998.
[31] D. C. Wu and W. H. Tsai, “Spatial-Domain Image Hiding Using Image Differencing,” IEE Proc.-Vis. Image Signal Process, Vol. 147, No. 1, pp. 29-37, Feb. 2000.
[32] R. Z. Wang, C. F. Lin and J. C. Lin, “Hiding Data in Images by Optimal Moderately-Significant-Bit Replacement,” Electronics Letters 7th, Vol. 36, No. 25, pp. 2069-2070, Dec. 2000.
[33] G. Voyatzis and I. Pitas, “Chaotic Watermarks for Embedding in The Spatial Digital Image Domain,” Proceedings of Image Processing, Vol.2, pp.432-436, 1998.
[34] A. Tefas and I. Pitas, ”Robust Spatial Image Watermarking Using Progressive Detection,” IEEE Int’l Conference on Acoustic, Speech, and Signal Processing, Vol. 3, pp.1973-1976, 2001.
[35] R. Bangaleea and H. C. S. Rughooputh, “Performance Improvement of Spread Spectrum Spatial-Domain Watermarking Scheme Through Diversity and Attack Characterization,” IEEE AFRICON. 6th , Vol. 1, pp.293-298, 2002.
[36] G. Louizis, A. Tefas and I. Pitas, “Copyright Protection of 3D Images Using Watermarks of Specific Spatial Structure,“ IEEE Int’l Conference on Multimedia and Expo, Vol. 2, pp.557-560, 2002.
[37] W. N. Lie, and L. C. Chang, “Data Hiding in Image With Adaptive Numbers of Least Significant Bits Based on The Human Visual System,” IEEE Int. Conf. on Image Processing, Vol. 28, pp. 286-290, Oct 1999.
[38] M. Kutter and S. Winkler, “A Vision-Based Masking Model for Spread-Spectrum Image Watermarking,” IEEE Trans. on Image Processing, Vol. 11, No. 1, pp. 16-25, 2002.
[39] C. S. Lu, H. Y Liao and C. J. Sze, “Combined Watermarking for Image Authentication and Protection,” IEEE Int’l Conference on Multimedia and Expo, Vol. 3, pp.1415-1418, 2000.
[40] K. J. Davis and K. Najarian, “Maximizing Strength of Digital Watermarks Using Neural Networks,“ Int’l Joint Conference on Neural Networks, Vol.4, pp.2893-2898, 2001.
[41] H. Yang, J. G. Patra and C. W. Chan, “An Artificial Network-Based Scheme for Robust Watermarking of Audio Signal,” IEEE Int’l Conference on Acoustic, Speech, and Signal Processing, Vol. 1, No. 1, pp. 1029-1032, 2002.
[42] D. Coltuc and P. Bolon, “Robust Watermarking by Histogram Specification,“ Int’l Conference on Image Processing, Vol. 2, pp. 236-239, 1999.
[43] M. Mese and P. P. Vaidyanathan, “Optimal Histogram Modification With MSE Metric, “ IEEE Int’l Conference on Acoustics, Speech, and Signal Processing, Vol. 3, pp. 1665-1668, 2001.
[44] D. Coltue, J. M. Chassery and P. Bolon, “Image Authentication by Exact Histogram Specification,“ IEEE Fourth Workshop on Multimedia Signal Processing, pp. 499-504, 2001.
[45] C. D. Vleeschouwer, J. F. Delaigle and B. Macq, “Circular Interpretation of Histogram for Reversible Watermarking,” IEEE Fourth Workshop on Multimedia Signal Processing, pp. 345-350, 2001.
[46] A. Z. Tirkel, C. F. Osborne and R. G. V. Schyndel, “Image Watermarking –A Spread Spectrum Application, “ IEEE 4th Int’l Symposium on Spread Spectrum Techniques and Applications Proceedings, Vol. 2, pp. 785-789, 1996.
[47] P. H. W. Wong, O. C. Au and J. W. C. Wong, ”Image Watermarking Using Spread Spectrum Technique in LOG-2 Spatio Domain, “ IEEE Int’l Symposium on Circuit and System, Vol. 1, pp. 224-227, 2000.
[48] I. M. Jimenez and A. N. Vazquez, “A New Spread Spectrum Watermarking Method with Self-Synchronization Capabilities,“ Int’l Conference on Image Processing, Vol. 1, pp. 415-418, 2000.
[49] R. Bangaleea and H. C. S. Rughooputh, “Performance Improvement of Spread Spectrum Spatial-Domain Watermarking Scheme Through Diversity and Attack Characterization, “ IEEE AFRICON. 6th , Vol.1, pp. 293-298, 2002.
[50] I. Donescu and E. Nguyen, “Combining Visual and Detection Models in Spread Spectrum Watermarking,” Int’l Conference on Image processing, Vol. 3, pp. 686-689, 2000.
[51] B. G. Mobasseri, “Order Biplane Watermarking of Digital Video by Direct Sequence Spread Spectrum,” Int’l Workshop on Multi-Media Database Management System, pp. 66-71, Aug 1998.
[52] J. D. Ferrer and F. Sebe, “Invertible Spread Spectrum Watermarking for Image Authentication and Multilevel Access to Precision-Critical Watermarked Images,” Proceeding of the International Conference on Information Technology: Coding and Computing, pp. 1-6, 2002.
[53] M. S. Hwang, C. C. Chang and K. F. Hwang, “A Watermarking Technique Based on One-Way Hash Functions,” IEEE Trans. on Consumer Electronics, Vol. 45, No. 2, pp. 286-294, May 1999.
[54] H. Z. Hel-Or, Y. Yitzhaki and Y. Hel-Or, “Geometric Hashing Techniques for Watermarking,” Int’l Conference on Image Processing, Vol. 2, pp. 498-501, 2001.
[55] Y. C. Chen and L. W. Chang, “A Secure and Robust Digital Watermarking Technique by The Block Cipher RC6 and Secure Hash Algorithm,” Int’l Conference on Image Processing, Vol. 2, pp. 518-521, 2001.
[56] G. Voyatzis and I. Pitas, “Application of Toral automorphisms in Image Watermarking,” IEEE International Conference on Image Processing, Vol. 3, pp. 237-240, 1996.
[57] C. C. Wang, S. C. Tai and C. S. Yu, “Repeating Image Watermarking Technique by the Visual Cryptography, “ IEICE Trans. Fundamental, Vol. E83-A, No.8, pp.1589-1598, Aug. 2000.
[58] T. S. Chen, C. C. Chang and M. S. Hwang, “A Virtual Image Cryptosystem Based upon Vector Quantization,” IEEE Trans. on Image Processing, Vol. 7, No. 10, pp.1485-1488, Oct 1998.
[59] Z. M. Lu and S. H. Sun, “Digital Image Watermarking Technique Based on Vector Quantization,” Electronic Letters 17th, Vol. 36, No. 4, pp. 303-305, Feb 2000.
[60] Z. M. Lu, J. S. Pan and S. H. Sun, “VQ-Based Digital Image Watermarking Method,” Electronic Letters 6th, Vol. 36, No. 14, pp. 1201-1202, July 2000.
[61] Y. C. Lin and C. C. Wang, “Digital Image Watermarking by Vector Quantization,” National Computer Symposium, pp. C76-C87, 1999.
[62] P. Bas, J. M. Chassery and F. Davoine, “Using the Fractal Code to Watermark Images,” Int’l Conference on Image Processing, Vol. 1, pp. 469-473, 1998.
[63] A. E. Jacquin, “Image Coding Based on A Fractal Theory of Iterated Contractive Image Transform,” IEEE Trans. on Image Processing, Vol.1 No.1, pp. 13-30, Jan 1992.
[64] Z. Ni, E. Sung and Y. Q. Shi, “Enhancing Robustness of Digital Watermarking against Geometric Attack Based on Fractal Transform,” IEEE Int’l Conference on Multimedia and Expo, Vol. 2, pp. 1033-1036, 2000.
[65] C. Hanqiang and Z. Guangxi, “A Watermarking Method Based on Fractal Self-Similarity,” The 5th Int’l Conference on Signal Processing Proceedings, Vol. 1, pp. 99-102, 2000.
[66] H. Kii, J. Onish and S. Ozawa, “The Digital Watermarking Method by Using Both Patchwork and DCT,” IEEE Int’l Conference on Multimedia Computing and System, Vol. 1, pp. 895-899, 1999.
[67] G. C. Langelaar and R. L. Lagendijk, “Optimal Differential Energy Watermarking of DCT Encoded Images and Video,” IEEE Trans. on Image Processing, Vol. 10, No. 1, pp. 148-158, 2001.
[68] C. H. Chou and C. C. Hsieh, “Robust Image Watermarking Based on The Just Noticeable Distortion Profile,“ 13th IPPR Conference on CVGIP, pp. 182-188, 2000.
[69] O. H. Kwon, Y. S. Kim and R. H. Park, “Watermarking for Still Images Using the Human Visual System in The DCT Domain,” IEEE Int’l Symposium on Circuit and System, Vol. 4, pp. 76-79, 1999.
[70] W. C. Cheng, C. W. Chu and J. S. Wang, “A Robust Watermarking Method on Discrete Cosine Transform Domain,“ 12th IPPR Conference on CVGIP, pp.191-198, 1999.
[71] C. F. Wu and W. S. Hsieh, “Digital Watermarking Using ZeroTree of DCT,” IEEE Trans. on Consumer Electronics, Vol. 46, No. 1, pp. 87-94, 2000.
[72] W. N. Lie, G. S. Lin, C. L. Wu and T. C. Wang, “Robust Image Watermarking on the DCT Domain,” ISCA 2000-IEEE International Symposium on Circuit and System, Vol. 1, pp. 228-231, May 2000.
[73] S. D. Lin and C. F. Chen, “A Robust DCT-Based Watermarking for Copyright Protection, “ IEEE Trans. on Consumer Electronics, Vol. 46, No. 3, pp. 415-421, 2000.
[74] Q. Wang and S. Sun, “DCT-Based Image-Independent Digital Watermarking,” Proceedings of ICSP 2000, pp. 942-945, 2000.
[75] C. S. Lu, “Block DCT-Based Robust Watermarking Using Side Information Extracted by Mean Filtering,” The 16th Int’l Conference on Pattern Recognition, Vol. 2, pp. 1001-1004, 2002.
[76] I. Retsas, R. Pieper and R. Cristi, “Watermarking Recovery with A DCT Based Employing Nonuniform Embedding,” Proceedings of the 13th Southeastern Symposium on System Theory, pp. 157-161, 2002.
[77] Q. Cheng and T. S. Huang, ”A DCT-Domain Blind Watermarking System Using Optimum Detection on Laplacian Model,” Int’l Conference on Image Processing, Vol. 1, pp. 454-457, 2000.
[78] M. J. Tsai, K. Y. Yu and Y. Z. Chen, ”Joint Wavelet and Spatial Transformation for Digital Watermarking,” IEEE Trans. on Consumer Electronics, Vol. 46, No. 1, pp. 241-245, 2000.
[79] Z. H. Wei, P. Qin and Y. Q. Fu, “Perceptual Digital Watermark of Images Using Wavelet Transform,” IEEE Trans. on Consumer Electronics, Vol. 44, No. 4, pp.1267-1272, 1998.
[80] L. Y. Jian and L. W. Chang, “Optimal Digital Watermarking with Wavelet Transform and Error Correction Code,” The 13th IPPR Conference on CVGIP, pp. 467-470, 2000.
[81] Y. P. Wang, M. J. Chen and P. Y. Cheng, “Robust Image Watermark with Wavelet Transform and Spread Spectrum Techniques,” Conference Record of the 34th Asilomar Conference on Signal, System and Computers, Vol. 2, pp. 1846-1850, 2000.
[82] Q. Yuan, H. Yao, W. Gao and S. Joo, ”Blind Watermarking Method Based on DWT Middle Frequency Pair,” IEEE Int’l Conference on Multimedia and Expo, Vol. 2, pp. 473-476, 2002.
[83] X. D. Zhang, K. T. Lo, J. Feng and D. Wang, “A Robust Image Watermarking Using Spatial-Frequency Feature of Wavelet Transform,” Proceedings of ICSP2000, pp. 1100-1105, 2000.
[84] Y. S. Kim, O. H. Kwon and R. H. Park, “Wavelet Based Watermarking Method for Digital Image Using the Human Visual System,” Int’l Symposium on Circuit and System, Vol. 4, pp. 80-83, 1999.
[85] P. Loo and N. kingsbury, “Digital Watermarking With Complex Wavelets,” Secure Images and Image Authentication, pp. 1-7, 2000.
[86] J. R. Kim and Y. S. Moon, “A Robust Wavelet-Based Digital Watermarking Using Level-Adaptive Thresholding,” Int’l Conference on Image Processing, Vol. 2, pp. 226-230, 1999.
[87] H. Inoue, A. Miyazaki and T. Katsura, “An Image Watermarking Method Based on The Wavelet Transform,” Int’l Conference on Image Processing, Vol. 1, pp. 296-300, 1999.
[88] H. J. Wang and C. C. J. Kuo, “Image Protection via Watermarking on Perceptually Significant Wavelet Coefficients,” 1998 IEEE Second Workshop on Multimedia Signal Processing, pp. 279-284, 1998.
[89] J. J. K. Q’Ruanaidh and T. Pun, “Rotation, Scale and Translation Invariant Digital Image Watermarking,” IEEE International Conference on Image Processing, Vol. 1, pp. 536-539, 1997.
[90] P. Premaratne and C. C. Ko, “A Novel Watermark embedding and Detection Scheme for Images in DFT Domain,” IEEE International Conference on Image Processing and its Application, Vol. 2, pp. 780-783, 1999.
[91] J. J. K. Q’Ruanaidh, W. J. Dowling and F. M. Boland, “Phase Watermarking of Digital Images,” IEEE International Conference on Image Processing, Vol. 3, pp. 239-242, 1996.
[92] M. H. Hayes, “The Reconstruction of a Multidimensional Sequence From the Phase or Magnitude of the FFT,” IEEE Trans. on Acoustics, Speech and Signal Processing, pp. 140-154, April 1992.
[93] F. Alturki and R. Mersereau, “Robust Oblivious Digital Watermarking Using Image Transform Phase Modulation,” IEEE International Conference on Image Processing, Vol. 2, pp. 84-87, 2000.
[94] F. Alturki and R. Mersereau, “An Oblivious Robust Digital Watermark Technique for Still Image Using DCT Phase Modulation,” IEEE Int’l Conference on Acoustic, Speech, and Signal Processing, Vol. 4, pp. 1975-1978, 2000.
[95] V. Solachidis and I. Pitas, “Circularly Symmetric Watermark embedding in 2-D DFT Domain,” IEEE Trans. on Image Processing, Vol. 10, No. 11, pp. 1741-1753, Nov 2001.
[96] Q. Cheng and T. S. Huang, “Optimum Detection and Decoding of Multiplicative Watermarks in DFT Domain,” IEEE Int’l Conference on Acoustic, Speech, and Signal Processing, Vol. 4, pp. 3477-3480, 2002.
[97] C. C. Tseng, “Eigenvalues and Eignevectors of Generalized DFT, Generalized DHT, DCT-IV and DST-IV Matrices,” IEEE Trans. on Signal Processing, Vol. 50, No. 4, pp. 866-877, Apr 2002.
[98] Y. Wang and J. F. Doherty, “A POCS-Based Algorithm to Attack Image Watermarks Embedded in DFT Amplitude,” Proceedings of the 43rd IEEE Midwest Symposium on Circuit and System, Vol. 3, pp. 1100-1103, 2000.
[99] S. S. Kuo, J. D. Johnston, W. Turin and S. R. Quackenbush, “Convert Audio Watermarking Using Perceptually Tuned Signal Independent Multiband Phase Modulation,” IEEE Int’l Conference on Acoustic, Speech, and Signal Processing, Vol. 2, pp. 1753-1756, 2002.
[100] C. C. Kuo and L. H. Chen, “A Study on Data Hiding for PostScript File,” The 13th IPPR Conference on CVGIP, pp. 340-347, 2000.
[101] S. H. Low, N. F. Maxemchuk and A. M. Lapone, “Document Identification for Copyright Protection Using Centroid Detection,” IEEE Trans. on Commun., Vol. 46, No. 3, pp. 372-381, Mar. 1998.
[102] J. Brassil, S. H. Low, N. F. Maxemchuk, L. O’Gorman, “Electronic Marking and Identification Techniques to Discourage Document Copying,” IEEE Journal on sel. Areas in Commun., Vol. 13, No. 8, pp. 1495-1504, Oct. 1995.
[103] J. Brassil, S. H. Low, N. F. Maxemchuk, “Copyright Protection for the Electronic Distribution of Text Documents,” Proceeding of the IEEE, Vol. 87, No.7, July 1999.
[104] S. H. Low and N. F. Maxemchuk, “Performance Comparison of Two Text Marking Methods, “ IEEE JSAC, Vol. 16, No. 4, pp. 561-572, May. 1998.
[105] K. Mastui and K. Tanaka, “Video-Stanganography: How to Secretly Embed a Signature in a Picture,” Proc. Of IMA Intellectual Property Project, Vol. 1, No. 1, 1994.
[106] N. F. Maxemuchuk and S. Low, “Marking Text Documents”, Int’l Conference on Image Processing, Vol. 3, pp. 3, 1997.
[107] M. Wu, E. Tang and B. Liu, “Data Hiding in Digital Binary Image,” IEEE Int’l Conference on Multimedia and Expo, Vol. 1, pp.393-396, 2000.
[108] H. C. A. Wang, “Data Hiding Techniques or Printed Binary Images,” Int’l Conference on Information Technology: Coding and Computing, pp.55-59, 2001.
[109] H. C. Wang, C. Y. Lin and C. C. Huang, “Data Hiding in a Bi-level Image Using Modified Digital Halftoning Techniques,” the 12th IPPP Conference on CVGIP 1999, pp.183-190, 1999.
[110] Y. C. Tseng and H. K. Pan, “Secure and Invisible Data Hiding in 2-Color Image,” IEEE INCOFOM 2001, pp. 887-896, 2001.
[111] A. Tefas, A. Nikolaidis, N. Nikolaidis, V. Solachidis, S. Tsekeridou and I. Pitas, “Statistical Analysis of Markov Chaotic Sequences for Watermarking Applications,” IEEE Int’l Symposium on Circuit and Systems, Vol. 2, pp. 57-60, 2001.
[112] I. J. Cox, J. Kilian, F. T. Leighton and T.Shamoon ”Secure Spread Spectrum Watermarking for Multimedia,” IEEE Trans. on Image Processing, Vol. 6, No. 12 pp. 1673-1687, 1997.
[113] M. S. Hsieh, D. C. Tseng and Y. H. Huang, “Hiding Digital Watermarks Using Multiresolution Wavelet Transform,” IEEE Trans. on Industrial Electronics, Vol. 48, No. 5, pp.875-882, Oct 2001.
[114] W. Zeng and B. Liu, “A Statistical Watermark Detection Technique Without Using Original Images for Resolving Rightful Ownerships of Digital Image,” IEEE Trans. on Image Processing, Vol. 8, No. 11, pp. 1534-1548, Nov. 1999.
[115] S. Voloshynovskiy, S. Pereira, T. Pun, J. Eggers and J. K. Su, “Attacks on Digital Watermarks: Classification, Estimation-Based Attacks, and Benchmarks,” IEEE Communications Magazine, Vol. 39, No. 8, pp. 118-126, August 2001.
[116] S. G. Kwon, S. H. Lee, K. K. Kwon, K. R. Kwon and K. I. Lee, “Watermark Detection Algorithm Using Statistic Decision Theory,” IEEE Int’l Conference on Multimedia and Expo, Vol. 1, pp. 561-562, 2002.
[117] C. C. Chang, K F. Hwang and Y. Lin, “A Proof of Copyright Ownership Using Moment-Preserving,” The 24th Annual Int’l Conference on Computer Software and Application, pp. 198-203, 2000.
[118] S. A. M. Gilani, I. K. Kostopouios and A. N. Skodras, “Color Image-Adaptive Watermarking,” Int’l Conference on Digital Signal Processing, Vol. 2, pp. 721-724, 2002.
[119] H. Liu, X. Kong, X. Kong and Y. Liu, “Content Based Color Image Adaptive Watermarking Scheme,” IEEE Int’l Symposium on Circuits and Systems, Vol. 2, pp. 41-44, 2001.
[120] A. Piva, F. Bartolini, V. Cappellini and M. Barni, “Exploiting the Cross-Correlation of RGB-Channels for Robust Watermarking of Color Images,” 1999 Int’l Conference on Image Processing, Vol. 1, pp. 306-310, 1999.
[121] R. Puertpan and T. Amornraksa, “Gaussian Pixel Weighting Marks in Amplitude Modulation of Color image Watermarking,” IEEE ISSPA, Kuala Lumlur, Malaysia, pp.194-197, Aug. 2001.
[122] D. Coltuc and P. Bolon, “Color Image Watermarking in HIS Space,” Int’l Conference on Image Processing, Vol. 3, pp.698-701, 2000.
[123] J. S. Cho, S. W. Shin, W. H. Lee, J. W. Kim and J. U. Choi, “Enhancement of Robustness of Image Watermarks Image watermark into Colored Image, Based on WT and DCT,” Int’l Conference on Information Technology: Coding and Computing, pp. 483-488, 2000.
[124] H. Liu, N. Chen, J. Huang, X. Huang and Y. Shi, “A Robust DWT-Based Video Watermarking Algorithm,” IEEE Int’l Symposium on Circuits and Systems, Vol. 3, pp. 631-634, 2002.
[125] C. T. Hsu and J. L. Wu, “DCT-Based Watermarking for Video,” IEEE Trans. on Consumer Electronics, Vol. 44, No. 1, pp. 206-216, Feb. 1998.
[126] B. G. Mobasseri, “Ordered Bitplane Watermarking of Digital Video by Direct Sequence Spread Spectrum,” Int’l Workshop on Multi-Media Database Management System, pp. 66-71, Aug 1998.
[127] M. D. Swanson, B. Zhu and A. H. Tewfik, “Multiresolution Scene-Based Video Watermarking Using Perceptual Models,” IEEE Journal on Selected Areas in Communications, Vol. 16, No.4, pp.540-550, May. 1998.
[128] C. T. Hsu and J. L. Wu, “Digital Watermarking for Video,” 1997 13th Int’l Conference on Digital Signal Processing Proceedings, Vol. 1, pp. 217-220, 1997.
[129] S. C. Pei, Y. H. Chen and R. F. Torng, “Digital Image and Video Watermarking Utilizing Just-Noticeable-Distortion Model,” 12th IPPR Conference on CVGIP, pp. 174-182, 1999.
[130] S. Pei and Y. H. Tai, “Digital Audio Watermarking Techniques Utilizing Human Auditory System,” 影像與識別2000, Vol. 6, No.1, pp.49-78, 2000.
[131] D. Kirovski and H. Malvar, “Robust Spread-Spectrum Audio Watermarking,” IEEE Int’l Conference on Acoustic, Speech, and Signal Processing, Vol. 3, pp. 1345-1348, 2001.
[132] M. Arnold, “Audio Watermarking: Features, Applications and Algorithm,” IEEE Int’l Conference on Multimedia and Expo, Vol. 2, pp. 1013-1016, 2000.
[133] M. F. Mansour and A. H. Tewfik, “Audio Watermarking by Time-Scale Modification,” IEEE Int’l Conference on Acoustic, Speech, and Signal Processing, Vol. 3, pp. 1353-1356, 2001.
[134] S. Saito, T. Furukawa and K. Konishi, “A Digital Watermarking for Audio Data Using Band Division Based on QMF Bank,” IEEE Int’l Conference on Acoustic, Speech, and Signal Processing, Vol. 4, pp. 3474-3476, 2002.
[135] I. K. Yeo and H. J. Kim, “Modified Patchwork Algorithm: A Novel Audio Watermarking Scheme,” Int’l Conference on Information Technology: Coding and Computing, pp.237-242, 2001.
[136] R. Lancini, F. Mapelli and S. Tubaro, “Embedding Indexing Information in Audio Signal Using Watermarking Technique,” VIPromCom-2002, 4th EURASIP-IEEE Region 8 Int’l Symposium on Video/Image Processing and Multimedia Communications, pp.257-261, June 2002.
[137] S. Haykin, Communication System, John Wiley & Sons, INC. New York, third edition, 1994, pp. 334-340.
[138] Y. C. Hou, and Y. F. Chiao, “Steganography: an efficient data hiding method,” journal of technology, vol. 15, no. 3, pp. 363-372, 2000.
[139] D. C. Wu, and W. H. Tsai, “Data Hiding in Images Via Multiple-Based Number Conversion and Lossy Compression,” IEEE Trans. on Consumer Electronics, vol. 44, No. 4, pp. 1406-1412, 1998.
[140] C. C. Wang and C. C. Chen, “Low-complexity Fractal-based Image Compression Using Two-stage Search Strategy,” Optical Engineering, Vol. 38, No. 6, pp. 1006-1013, June 1999.
[141] W. Diffie and M. E. Hellman, “New Directions in Cryptograph,” IEEE Trans. on Information Theory, Vol. IT-22, pp. 644-654, November 1976.
[142] F. Hartung, and B. Girod, “Fast Public-Key Watermarking of Compressed Video,” IEEE Int. Conf. on Image Processing, Vol. 1, pp. 528-531, Oct 1997.
[143] W. Stallings, “The RSA Algorithm” in Cryptograph and Network Security Principle and Practice, second Edition Prentice Hall International Edition, pp.173-183, 1999.
[144] H. Kuwakado and K. Koyama, “Security of RSA-Type Cryptosystem Over Elliptic Curves Against Hastad Attack,” Electronics Letters, Vol. 30, No. 22, pp. 1843-1844, 1994.
[145] L. Shuguo, Z. Runde and G. Yuanqing, “A 1024-Bit RSA Crypto-Coprocessor for smart cards,” ASIC, 2001, Proceedings, 4th international conference, pp. 352-355, 2001.
[146] M. J. B. Robshaw, “Security Estimates for 512-Bit RSA,” WESCON/’95. conference record., pp. 409-412, 1995.