DOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , )

Similar documents
A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform

A SEMI-FRAGILE WATERMARKING SCHEME FOR IMAGE TAMPER LOCALIZATION AND RECOVERY

A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression

Image Authentication and Recovery Scheme Based on Watermarking Technique

Feature Based Watermarking Algorithm by Adopting Arnold Transform

FRAGILE WATERMARKING USING SUBBAND CODING

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

An Improved Performance of Watermarking In DWT Domain Using SVD

A Novel Method for Block Size Forensics Based on Morphological Operations

A Flexible Scheme of Self Recovery for Digital Image Protection

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning

IEEE TRANSACTIONS ON BROADCASTING, VOL. 51, NO. 1, MARCH

Image coding based on multiband wavelet and adaptive quad-tree partition

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

Robust Image Watermarking based on DCT-DWT- SVD Method

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

Implementation of ContourLet Transform For Copyright Protection of Color Images

Comparison of DWT-CRT And TLDCT-CRT Methods In Digital Watermarking

Digital watermarking techniques for JPEG2000 scalable image coding

Reversible Watermarking in JPEG Images Based on Modified RZL Codes and Histogram Shift

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

VIDEO WATERMARKING ALGORITHM FOR CONTENT AUTHORISATION

Collaborative Image Compression Algorithm In Wireless Multimedia Sensor Networks

Reversible Authentication Watermark for Image

Robust copyright protection scheme for digital images using the low-band characteristic

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Data Hiding in Video

Attack Detection in Watermarked Images with PSNR and RGB Intensity

Image Error Concealment Based on Watermarking

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

An Improved DWT-SVD based Digital Watermarking Algorithm for Images Pracheta Bansal 1, R.P.Mahapatra 2 and Divya Gupta 3

Combined Hashing/Watermarking Method for Image Authentication

A NOVEL SECURE, IMPERCEPTIBLE AND ROBUST CDMA DIGITAL IMAGE WATERMARKING IN JPEG-YCBCR CHANNEL USING DWT2

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

Digital Image Watermarking Using DWT Based DCT Technique

DOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , )

A New DCT Based Watermarking Method Using Luminance Component

arxiv: v1 [cs.cr] 31 Dec 2018

Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting

A New Spatial q-log Domain for Image Watermarking

Image Authentication and Recovery Using BCH Error-Correcting Codes

Robust Lossless Data Hiding. Outline

An Adaptive Color Image Visible Watermark Algorithm Supporting for Interested Area and its Application System Based on Internet

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

Robust Steganography Using Texture Synthesis

Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform

Adaptive Quantization for Video Compression in Frequency Domain

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

A Reversible Data Hiding Scheme for BTC- Compressed Images

Multilayer Data Embedding Using Reduced Difference Expansion

DWT Domain Information Hiding Approach Using Detail Sub-band Feature Adjustment

Digital Image Steganography Using Bit Flipping

A New Approach to Compressed Image Steganography Using Wavelet Transform

YET Another Steganographic Scheme (YASS) [1] is a

Implementation of H.264/AVC Video Authentication System Using Watermark

Primal Sketch Based Adaptive Perceptual JND Model for Digital Watermarking

A Novel Message Decomposing and Embedding Scheme for Image Steganography

REVERSIBLE DATA HIDING SCHEME BASED ON PREDICTION ERROR SORTING AND DOUBLE PREDICTION.

Implementation and Comparison of Watermarking Algorithms using DWT

Peak-Shaped-Based Steganographic Technique for MP3 Audio

Interleaving Max-Min Difference Histogram Shifting Data Hiding Method

Robust DWT Based Technique for Digital Watermarking

DWT-SVD based Multiple Watermarking Techniques

On domain selection for additive, blind image watermarking

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

Embedded Rate Scalable Wavelet-Based Image Coding Algorithm with RPSWS

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

An Improved Blind Watermarking Scheme in Wavelet Domain

Fragile Watermarking Based on LBP for Blind Tamper Detection in Images

A Robust Image Hiding Method Using Wavelet Technique *

Digital Watermarking Algorithm for Embedding Color Image using Two Level DWT

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

A Survey of Fragile Watermarking-based Image Authentication Techniques

Quality Estimation of Video Transmitted over an Additive WGN Channel based on Digital Watermarking and Wavelet Transform

A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION

Digital Image Watermarking Using DWT and SLR Technique Against Geometric Attacks

Digital Image Watermarking Scheme Based on LWT and DCT

DYNAMIC BINARY LOCATION BASED MULTI-WATERMARK EMBEDDING ALGORITHM IN DWT

Image Denoising Methods Based on Wavelet Transform and Threshold Functions

IAJIT First. Online Publication. Semi Fragile Watermarking for Content based Image Authentication and Recovery in the DWT-DCT domains. 1.

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM

Transparent Data Hiding for True Color Images

International Journal of Modern Trends in Engineering and Research

A SEMI-FRAGILE WATERMARKING SCHEME FOR IMAGE AUTHENTICATION AND TAMPER-PROOFING

Fast Watermarking of Traffic Images Secure Transmission in Effective Representation Mode

The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement

Transcription:

ISSN 1000-9825, CODEN RUXUEW E-mail: jos@iscasaccn Journal of Software, Vol17, No2, February 2006, pp315 324 http://wwwjosorgcn DOI: 101360/jos170315 Tel/Fax: +86-10-62562563 2006 by Journal of Software All rights reserved JPEG 1,2 1,3+, 1 (, 510275) 2 (, 510310) 3 (, 510275) A Semi-Fragile Image Watermarking Resisting to JPEG LI Chun 1,2, HUANG Ji-Wu 1,3+ 1 (School of Information Science and Technology, Sun Yat-Sen University, Guangzhou 510275, China) 2 (China Electronics Technology Group Corporation No7 Research Institute, Guangzhou 510310, China) 3 (Guangdong Key Laboratory of Information Security Technology, Guangzhou 510275, China) + Corresponding author: E-mail: isshjw@mailsysueducn Li C, Huang JW A semi-fragile image watermarking resisting to JPEG Journal of Software, 2006,17(2): 315 324 http://wwwjosorgcn/1000-9825/17/315htm Abstract: Semi-Fragile watermark has attracted attention due to its important role in content authentication for multimedia In order to differentiate incidental attacks and malicious attacks, semi-fragile watermark must be robust against content-protection image processing Semi-fragile watermark resisting to JPEG compression while maintaining high detection ability to tamper has been the emphasis in this area In this paper, a semi-fragile watermarking algorithm to resist JPEG is proposed based on the fact that most of the coefficients of high frequency have the same relative energy relations after JPEG compression The experimental results demonstrate that the proposed algorithm has the advantages such as simple computation complexity, big embedding capability, good robustness to JPEG, and exact location for tamper Key words: : semi-fragile watermarking; digital watermarking; JPEG; wavelet coefficient, JPEG,, JPEG JPEG, JPEG,,, JPEG, : ; ;JPEG; : TP309 : A Supported by the National Natural Science Foundation of China under Grant Nos60133020, 60325208, 60403045 ( ); the Natural Science Foundation of Guangdong Province of China under Grant No04205407 ( ) Received 2005-01-19; Accepted 2005-08-15

316 Journal of Software Vol17, No2, February 2006, : ;( ), ( ), ( ),, [1],, 3 : [2,3], ( JPEG ), JPEG, JPEG Ho Li JPEG, DCT JPEG [4] [5],Zhang JPEG, Zhou (ECC) JPEG [6] Hu [7] HVS,, [8],Hu,, JPEG JPEG, JPEG JPEG, JPEG,, JPEG, JPEG,, JPEG, 1 2 3 1 JPEG Lie Chang [9],Lin Chang DCT JPEG [10], DWT JPEG, JPEG 1 Lena Baboon Boat Goldhill Lake Milkdrop Fig1 Images used for testing the relationship between the neighboring wavelet coefficients 1 JPEG (512 512) JPEG, HH 1,HL 1,LH 1,LL 1 4 LH 1 1 2, [a 1 a 2 ], d=a 1 a 2 d>g(g,g 0), d 0, ;, d< g, d<0,

: JPEG 317 a1 HL 1, 2 1( ),, d=a1 a 2 a2 LH 1, JPEG,LH 1 HL 1, 1(,LH 1,HL 1 ) LH 1,HL 1, 2 (,LH 1,HL 1 ) 1 2 LL 1, JPEG,,, LL 1 JPEG,,, HL 1 LH 1 1 2 : (1) JPEG,LH 1,, HL 1,,LH 1, HL 1, JPEG, LH 1 JPEG,HL 1 (2) JPEG,LH 1 HL 1 (3) JPEG,, g JPEG Table 1 The relationship between the neighboring wavelet coefficients Quality in high frequency subbands of the images under JPEG 1 JPEG 90 80 70 60 50 Image g LH 1 HL 1 LH 1 HL 1 LH 1 HL 1 LH 1 HL 1 LH 1 HL 1 0 0786 0770 0718 0711 0679 0666 0651 0632 0636 0613 Lena 1 0844 0828 0773 0766 0731 0720 0681 0662 0665 0640 2 0894 0878 0829 0823 0787 0774 0715 0696 0697 0671 3 0928 0923 0842 0848 0790 0785 0751 0729 0732 0701 0 0916 0928 0864 0897 0827 0868 0798 0838 0771 0821 Baboon 1 0942 0950 0891 0917 0854 0890 0819 0857 0790 0839 2 0962 0967 0913 0936 0876 0909 0839 0876 0808 0857 3 0978 0982 0932 0953 0892 0924 0857 0894 0828 0874 0 0834 0785 0766 0735 0729 0710 0703 0689 0686 0677 Boat 1 0882 0843 0818 0799 0784 0770 0733 0731 0715 0715 2 0921 0899 0871 0857 0840 0832 0766 0782 0745 0762 3 0949 0943 0879 0892 0836 0861 0802 0838 0779 0812 0 0862 0867 0794 0824 0747 0791 0716 0767 0689 0749 Goldhill 1 0900 0907 0833 0861 0786 0828 0741 0796 0710 0780 2 0932 0939 0871 0894 0824 0861 0768 0828 0734 0809 3 0958 0963 0888 0923 0834 0888 0795 0856 0757 0835 0 0843 0858 0780 0804 0740 0768 0711 0741 0688 0724 Lake 1 0888 0899 0822 0844 0784 0810 0742 0775 0716 0754 2 0928 0931 0865 0880 0827 0846 0773 0808 0745 0785 3 0956 0963 0892 0911 0841 0868 0800 0836 0776 0811 0 0770 0777 0697 0726 0664 0687 0636 0658 0611 0638 Milkdrop 1 0829 0838 0754 0781 0713 0744 0669 0693 0638 0671 2 0883 0893 0811 0836 0770 0796 0701 0732 0668 0703 3 0925 0934 0827 0872 0772 0820 0731 0768 0697 0733

318 Journal of Software Vol17, No2, February 2006 Table 2 The relationship between the neighboring wavelet coefficients in high frequency 2 Quality subbands of the images under JPEG after changing the slip windows JPEG 90 80 70 60 50 Image g LH 1 HL 1 LH 1 HL 1 LH 1 HL 1 LH 1 HL 1 LH 1 HL 1 0 0730 0702 0643 0640 0616 0613 0594 0594 0587 0585 Lena 1 0788 0767 0699 0698 0669 0669 0618 0614 0608 0603 2 0851 0832 0768 0774 0738 0741 0646 0641 0630 0628 3 0876 0845 0753 0751 0705 0702 0675 0671 0654 0652 0 0882 0896 0812 0834 0763 0792 0732 0760 0707 0736 Baboon 1 0912 0920 0843 0862 0795 0821 0751 0779 0724 0753 2 0938 0942 0871 0885 0823 0848 0770 0798 0742 0770 3 0959 0961 0887 0898 0830 0852 0789 0816 0759 0786 0 0778 0709 0692 0660 0656 0634 0627 0622 0615 0611 Boat 1 0832 0779 0753 0722 0714 0694 0651 0658 0636 0642 2 0884 0846 0815 0791 0770 0754 0678 0697 0660 0678 3 0909 0883 0805 0803 0753 0768 0710 0743 0688 0718 0 0816 0788 0713 0715 0666 0674 0628 0649 0611 0634 Goldhill 1 0858 0836 0759 0762 0707 0716 0646 0674 0625 0656 2 0898 0881 0799 0805 0752 0760 0665 0702 0638 0676 3 0925 0913 0805 0819 0734 0766 0684 0729 0654 0701 0 0798 0800 0709 0713 0667 0669 0639 0646 0621 0634 Lake 1 0848 0844 0751 0760 0709 0713 0659 0669 0640 0656 2 0891 0884 0798 0802 0753 0752 0685 0695 0661 0677 3 0926 0923 0818 0820 0752 0755 0708 0719 0679 0699 0 0697 0695 0618 0625 0590 0598 0574 0583 0562 0570 Milkdrop 1 0763 0763 0672 0679 0634 0647 0592 0606 0580 0590 2 0825 0827 0734 0738 0694 0703 0611 0627 0598 0609 3 0851 0854 0712 0727 0665 0683 0633 0650 0612 0627 2 JPEG 21 m m, (m/4) (m/4),, LH 1 2 2, LH 1 256 256, 4 1,, a11 a12 2 2 a21 a 22 bit 0, a 11 a 12 >g a 21 a 22 >g(g,g 0);, a 11,a 21, a 12,a 22, bit 1, a 11 a 12 < g a 21 a 22 < g;, a 11,a 21, a11 a12 a 12,a 22, HL 1, 2 2, a21 a 22 bit 0, a11 a 21 >g a 12 a 22 >g;, a 11,a 12, a 21,a 22, bit 1, a 11 a 21 < g a 12 a 22 < g;, a 11,a 12, a 21,a 22,,, ±(g+1) 22,LH 1 HL 1 2, (LH 1,HL 1 ), JPEG

: JPEG 319, PSNR 21,PSNR bit 0,1, LH 1 HL 1,, PSNR, PSNR, avr_lh avr_hl, : W 1 H 1 2 2 [ p(2 x, y) p(2x + 1, y)] y= 0 x= 0 avr _ LH = H W H 1 W 1 2 2 [ px (,2 y) px (,2y+ 1)] x= 0 y= 0 avr _ HL = (2) H W H W,p(x,y) (x,y) LH 1,HL 1,, PSNR, PSNR avr_lh avr_hl 3 Table 3 The average variance of neighboring wavelet coefficients of test images 3 2 2 Image Lena Baboon Boat Goldhill Lake Milkdrop avr_lh 112229 6 544563 7 356649 6 217793 4 204904 0 113178 8 avr_hl 41880 6 1 6722 98452 5 165427 3 276399 1 89611 6 512 512 8bits, g(g=0) LH 1 HL 1 128 128,, 4 Table 4 PSNR for embedding watermark into different sub-bands of high frequency of test images 4 PSNR Image Lena Baboon Boat Goldhill Lake Milkdrop PSNR (LH 1 ) 41132 2 35027 6 36632 0 38423 0 38146 5 39863 1 PSNR (HL 1 ) 44220 4 30057 5 41843 9 39487 4 37251 3 43113 4 3 4, PSNR 23, 21,,, ±(g+1),, g+1 g+1 min{avr_lh,avr_hl},,, avr_lh avr_hl, 5 (g=0), a11 a12, 2 2, a21 a 22 (1) LH 1, a 11 +a 21 >a 12 +a 22, bit 0, 1; HL 1, a 11 +a 12 >a 21 +a 22, bit 0, 1

320 Journal of Software Vol17, No2, February 2006 Table 5 Alteration of average variance of neighboring wavelet coefficients of test images after embedding watermarking 5 Image Lena Baboon Boat Goldhill Lake Milkdrop Embedded sub-band HL 1 LH 1 HL 1 HL 1 LH 1 HL 1 The average variance of near wavelet coefficients before embedding watermarking 41880 6 544563 7 98452 5 165427 3 204904 0 89611 6 The average variance of near wavelet coefficients after embedding watermarking 25926 4 276699 9 52719 2 79552 1 81149 5 57864 9 24 241 [11], D ( i, j) = W ( i, j) W ( i, j) (3),, 0, ; 1, [11], : S={ }; S dense ={ }; S sparse ={ }; S total =S dense +S sparse ; λ=s total /S; δ=s sparse /S dense : λ, λ=0,; λ>0, δ, δ T(T ),, δ<t, T, [8] T,,, 05 242,,, ;,,,, [11],,,,, II :, x(i,j), x(i 1,j),x(i,j 1),x(i,j+1),x(i+1,j) x(i,j), x(i 1,j 1), x(i 1,j+1),x(i+1,j 1),x(i+1,j+1) x(i,j) II : ( ),,, II: (1) ; (2),, II,, II,,, 2, 25, [12],

: JPEG 321,,, Key, m n P H ={P 1 H, P 2 H,,P m H } P W ={P 0 W,P 1 W,,P n W },, Key, Key, Key Key, P H 128 128 2 32768 P W,, [( 2 ) ] = 2, Key 3 31 g 23, g+1 min{avr_lh,avr_hl},, HL 1 LH 1, g 0 g min{ avr _ LH, avr _ HL} 1 512 512 8bits lena,baboon,milkdrop g 0,1,2,3,4,5, 2 (a) Original images (a) (b) Watermarked images, g=2 (b),g=2 Fig2 2, PSNR g, 3, 3(a)~ 3(c) Lena,Baboon,Milkdrop (a) (b) (c) Fig3 The relationship between PSNR and g 3 PSNR g

322 Journal of Software Vol17, No2, February 2006 Lena 90,80,70,60,50 JPEG,, 241 δ, (T=05) 6, Y,N Table 6 Watermark data extracted from watermarked Lena after JPEG Watermark data g 6 δ extracted from watermarked Lena after JPEG Lena Quality factor 90 80 70 60 50 1 2065 2 1633 0 1004 1 0565 6 0429 5 2 4439 7 3419 2 2249 3 1145 0 07176 1 Y Y Y Y N 2 Y Y Y Y Y 6, T 05,g=2, 50 JPEG 4, 4(a), 4(b)~ 4(f) g=2, 90,80,70,60,50 (a) (b) (c) (d) (e) (f) Fig4 Robustness of the watermark resisting to JPEG 4 JPEG, JPEG g 32,, 5 (a) Embedded watermark image(g=1), the area in broken line (b) Image after tamper will be replaced by the original image (a) (g=1), (b) (c) Extracted watermark (δ=00942) (d) Final difference image (c) (δ=00942) (d) Fig5 Location for tamper 5

: JPEG 323 33 7, [6,13] Lena, Table 7 Performance comparison with other algorithms 7 Size of host Size of Precision of orientation Quality factor of PSNR (db) image watermark for tamper resisting to JPEG This paper (g=1) 512 512 128 128 Very exactly 4342 60 Reference [6] 256 256 1024 Commonly 44 70 Reference [13] 512 512 64 64 Relatively exactly 4356 65, PSNR, [6,13] 4, JPEG [13], [14] 4 JPEG : (1) JPEG,, JPEG (2),, (3),, References: [1] Hua XS, Shi QY Research on fragile watermarking problems Journal of Image and Graphics, 2001,6(11):1089 1095 (in Chinese with English abstract) [2] Lin ET, Delp EJ A review of fragile image watermarks In: Proc of the ACM Multimedia and Security Workshop Orlando: ACM Press, 1999 25 29 [3] Fridrich J Methods for tamper detection in digital images In: Proc of the ACM Workshop on Multimedia and Security Orlando: ACM Press, 1999 19 23 [4] Ho CK, Li CT Semi-Fragile watermarking scheme for authentication of JPEG images In: Proc of the Int l Conf on Information Technology: Coding and Computing 2004 Piscaterway: IEEE Press, 2004 7 11 [5] Zhang J, Zhang CT Semi-Fragile watermarking for JPEG2000 image authentication ACTA Electronica Sinica, 2004,32(1): 157 160 (in Chinese with English abstract) [6] Zhou X, Duan XH, Wang DX A semi-fragile watermark scheme for image authentication In: Proc of the 10th Int l Conf on Multimedia Modelling Piscaterway: IEEE Press, 2004 374 377 [7] Hu JQ, Huang JW, Huang DR A DWT-based fragile watermarking tolerant of JPEG compression In: Proc of Int l Workshop on Digital Watermarking 2002 LNCS 2613, Berlin: Springer-Verlag, 2003 179 188 [8] Hu JQ Fragile watermarking: Methods and applications [PhD Thesis] Guangzhou: Sun Yat-Sen University, 2003 (in Chinese with English abstract) [9] Lie WN, Chang LC Robust and high-quality time-domain audio watermarking subject to psychoacoustic masking In: Proc of the 2001 IEEE Int l Symp on Circuits and Systems Piscaterway: IEEE Press, 45 48

324 Journal of Software Vol17, No2, February 2006 [10] Lin CY, Chang SF A robust image authentication method distinguishing JPEG compression from malicious manipulation IEEE Trans on Circuits and Systems of Video Technology, 2001,11(2):153 168 [11] Hu JQ, Huang JW, Huang DR, Shi YQ Image fragile watermarking based on fusion of multi-resolution tamper detection Electronics Letters, 2002,38(24):1512 1513 [12] Yan WQ, Zou JC, Qi DX A novel digital image scrambling method Journal of North China University of Technology, 2002,14(1):1 7 (in Chinese with English abstract) [13] Sun R, Sun H, Yao TR A SVD- and quantization based semi-fragile watermarking technique for image authentication In: Proc of the 6th Int l Conf on Signal Processing Beijing, 2002 1592 1595 [14] Katzenbeiseer S, Petitcolas FAP; Wu QX, et al, Trans Information Hiding Techniques for Steganography and Digital Watermarking Beijing: Posts & Telecom Press, 2001 (in Chinese) : [1],,2001,6(11):1089 1095 [5], JPEG2000,2004,32(1):157 160 [8] [ ] :,2003 [12],, DES,2002,14(1):1 7 [14] Katzenbeiseer S, Petitcolas FAP;,, :,2001 (1982 ),,,, (1962 ),,,,,,