期刊文献+
共找到500篇文章
< 1 2 25 >
每页显示 20 50 100
A blind watermarking algorithm based on DWT and SVD 被引量:2
1
作者 XUAN Chun-qing XUAN Zhi-wei +1 位作者 ZHANG Xia CHEN Bao-li 《Journal of Measurement Science and Instrumentation》 CAS 2014年第2期31-35,共5页
This paper presents a new digital image blind watermarking algorithm based on combination of discrete wavelet transform (DWT) and singular value decomposition (SVD). First of all, we make wavelet decomposition for... This paper presents a new digital image blind watermarking algorithm based on combination of discrete wavelet transform (DWT) and singular value decomposition (SVD). First of all, we make wavelet decomposition for the original image and divide the acquired low frequency sub-band into blocks. Then we make singular value decomposition for each block and embed the watermark information in the largest singular value by quantitative method. The watermark can be extracted without the original image. The experimental results show that the algorithm has a good imperceptibility and robustness. 展开更多
关键词 discrete wavelet transform singular value decomposition a blind watermarking algorithm ROBUSTNESS
在线阅读 下载PDF
A robust color image watermarking algorithm against rotation attacks 被引量:1
2
作者 韩绍程 杨金锋 +1 位作者 王蕊 贾桂敏 《Optoelectronics Letters》 EI 2018年第1期61-66,共6页
A robust digital watermarking algorithm is proposed based on quaternion wavelet transform(QWT) and discrete cosine transform(DCT) for copyright protection of color images. The luminance component Y of a host color ima... A robust digital watermarking algorithm is proposed based on quaternion wavelet transform(QWT) and discrete cosine transform(DCT) for copyright protection of color images. The luminance component Y of a host color image in YIQ space is decomposed by QWT, and then the coefficients of four low-frequency subbands are transformed by DCT. An original binary watermark scrambled by Arnold map and iterated sine chaotic system is embedded into the mid-frequency DCT coefficients of the subbands. In order to improve the performance of the proposed algorithm against rotation attacks, a rotation detection scheme is implemented before watermark extracting. The experimental results demonstrate that the proposed watermarking scheme shows strong robustness not only against common image processing attacks but also against arbitrary rotation attacks. 展开更多
关键词 QWT DCT A robust color image watermarking algorithm against rotation attacks YIQ
原文传递
A Weighted Algorithm for Watermarking Relational Databases 被引量:2
3
作者 CUI Xinchun QIN Xiaolin SHENG Gang 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期79-82,共4页
A weighted algorithm for watermarking relational databases for copyright protection is presented. The possibility of watermarking an attribute is assigned according to its weight decided by the owner of the database. ... A weighted algorithm for watermarking relational databases for copyright protection is presented. The possibility of watermarking an attribute is assigned according to its weight decided by the owner of the database. A one-way hash function and a secret key known only to the owner of the data are used to select tuples and bits to mark. By assigning high weight to significant attributes, the scheme ensures that important attributes take more chance to be marked than less important ones. Experimental results show that the proposed scheme is robust against various forms of attacks, and has perfect immunity to subset attack. 展开更多
关键词 weighted algorithm watermarking relational databases copyright protection
在线阅读 下载PDF
Embedding and Extracting Digital Watermark Based on DCT Algorithm 被引量:1
4
作者 Haiming Li Xiaoyun Guo 《Journal of Computer and Communications》 2018年第11期287-298,共12页
The principle of digital watermark is the method of adding digital watermark in the frequency domain. The digital watermark hides the watermark in digital media, such as image, voice, video, etc., so as to realize the... The principle of digital watermark is the method of adding digital watermark in the frequency domain. The digital watermark hides the watermark in digital media, such as image, voice, video, etc., so as to realize the functions of copyright protection, and identity recognition. DCT for Discrete Cosine Transform is used to transform the image pixel value and the frequency domain coefficient matrix to realize the embedding and extracting of the blind watermark in the paper. After success, the image is attacked by white noise and Gaussian low-pass filtering. The result shows that the watermark signal embedded based on the DCT algorithm is relatively robust, and can effectively resist some attack methods that use signal distortion to destroy the watermark, and has good robustness and imperceptibility. 展开更多
关键词 Digital watermark DCT algorithm White Noise GAUSSIAN LOW-PASS Filtering Robustness IMPERCEPTIBILITY
在线阅读 下载PDF
New Optimal DWT Domain Image Watermarking Technique via Genetic Algorithm
5
作者 钟宁 匡镜明 何遵文 《Journal of Beijing Institute of Technology》 EI CAS 2007年第4期465-470,共6页
A novel optimal image watermarking scheme is proposed in which the genetic algorithm (GA) is employed to obtain the improvement of algorithm performance. Arnold transform is utilized to obtain the scrambled watermark,... A novel optimal image watermarking scheme is proposed in which the genetic algorithm (GA) is employed to obtain the improvement of algorithm performance. Arnold transform is utilized to obtain the scrambled watermark, and then the embedding and extraction of watermark are implemented in digital wavelet transform (DWT) domain. During the watermarking process, GA is employed to search optimal parameters of embedding strength and times of Arnold transform to gain the optimization of watermarking performance. Simulation results show that the proposed method can improve the quality of watermarked image and give almost the same robustness of the watermark. 展开更多
关键词 image watermarking genetic algorithm (GA) digital wavelet transform (DWT)
在线阅读 下载PDF
Audio Watermarking Using Wavelet Transform and Genetic Algorithm for Realizing High Tolerance to MP3 Compression
6
作者 Shinichi Murata Yasunari Yoshitomi Hiroaki Ishii 《Journal of Information Security》 2011年第3期99-112,共14页
Recently, several digital watermarking techniques have been proposed for hiding data in the frequency domain of audio signals to protect the copyrights. However, little attention has been given to the optimal position... Recently, several digital watermarking techniques have been proposed for hiding data in the frequency domain of audio signals to protect the copyrights. However, little attention has been given to the optimal position in the frequency domain for embedding watermarks. In general, there is a tradeoff between the quality of the watermarked audio and the tolerance of watermarks to signal processing methods, such as compression. In the present study, a watermarking method developed for a visual image by using a wavelet transform was applied to an audio clip. We also improved the performance of both the quality of the watermarked audio and the extraction of watermarks after compression by the MP3 technique. To accomplish this, we created a multipurpose optimization problem for deciding the positions of watermarks in the frequency domain and obtaining a near-optimum solution. The near-optimum solution is obtained by using a genetic algorithm. The experimental results show that the proposed method generates watermarked audios of good quality and high tolerance to MP3 compression. In addition, the security was improved by using the characteristic secret key to embed and extract the watermark information. 展开更多
关键词 AUDIO watermarkING GENETIC algorithm Optimization WAVELET Transforms SECRET Key
暂未订购
Reversible Digital Image Watermarking Scheme Using Bit Replacement and Majority Algorithm Technique
7
作者 Koushik Pal Goutam Ghosh Mahua Bhattacharya 《Journal of Intelligent Learning Systems and Applications》 2012年第3期199-206,共8页
The current paper presents a new digital watermarking method through bit replacement technology, which stores mul-tiple copies of the same data that is to be hidden in a scrambled form in the cover image. In this pape... The current paper presents a new digital watermarking method through bit replacement technology, which stores mul-tiple copies of the same data that is to be hidden in a scrambled form in the cover image. In this paper an indigenous approach is described for recovering the data from the damaged copies of the data under attack by applying a majority algorithm to find the closest twin of the embedded information. A new type of non-oblivious detection method is also proposed. The improvement in performance is supported through experimental results which show much enhancement in the visual and statistical invisibility of hidden data. 展开更多
关键词 Additive Noise Salt and PEPPER Noise Compression Filtering AVERAGING Multiple watermarking MAJORITY algorithm
在线阅读 下载PDF
A New Image Watermarking Scheme Using Genetic Algorithm and Residual Numbers with Discrete Wavelet Transform
8
作者 Peter Awonnatemi Agbedemnab Mohammed Akolgo Moses Apambila Agebure 《Journal of Information Security》 2023年第4期422-436,共15页
Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presen... Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presents a new digital watermarking scheme that combines some operators of the Genetic Algorithm (GA) and the Residue Number (RN) System (RNS) to perform encryption on an image, which is embedded into a cover image for the purposes of watermarking. Thus, an image watermarking scheme uses an encrypted image. The secret image is embedded in decomposed frames of the cover image achieved by applying a three-level Discrete Wavelet Transform (DWT). This is to ensure that the secret information is not exposed even when there is a successful attack on the cover information. Content creators can prove ownership of the multimedia content by unveiling the secret information in a court of law. The proposed scheme was tested with sample data using MATLAB2022 and the results of the simulation show a great deal of imperceptibility and robustness as compared to similar existing schemes. 展开更多
关键词 Discrete Wavelet Transform (DWT) Digital watermarking Encryption Genetic algorithm (GA) Residue Number System (RNS) GARN
在线阅读 下载PDF
基于图像分割技术的摄影图像数字水印算法
9
作者 赵媛 陈莹 韩烨 《移动信息》 2025年第2期302-304,共3页
由于摄影图像具有高度的复杂性和多样性,导致水印在受到攻击时完整度相对较低.针对上述问题,文中提出了基于图像分割技术的摄影图像数字水印算法.其采用Arnold变换强化图像安全,RGB转YCrCb优化色彩处理,两层离散小波变换深入剖析图像多... 由于摄影图像具有高度的复杂性和多样性,导致水印在受到攻击时完整度相对较低.针对上述问题,文中提出了基于图像分割技术的摄影图像数字水印算法.其采用Arnold变换强化图像安全,RGB转YCrCb优化色彩处理,两层离散小波变换深入剖析图像多尺度特征.通过形态学腐蚀优化与智能合并策略,深度分割预处理图像,生成清晰界定的图像块集合.选取对比度最高的子块,利用离散小波变换的低频子带结合量化抖动调制技术,隐蔽而鲁棒地将水印信息嵌入图像中.在提取阶段,能集成图像分割、Daisy变换精准定位、BSP树精细划分、Arnold逆变换精确提取并还原图像水印.实验结果表明,该设计方法能显著提升水印在多种攻击场景下的鲁棒性,确保水印信息的完整可靠. 展开更多
关键词 图像分割技术 数字水印算法 水印嵌入 水印提取
在线阅读 下载PDF
平衡鲁棒性与数据失真的可逆数据库水印方案
10
作者 王春东 李悦 《桂林理工大学学报》 北大核心 2025年第1期103-110,共8页
数据库水印在保护版权和防止数据泄露方面起着不可替代的作用,但往往数据失真度和水印鲁棒性是正相关关系,鲁棒性越高,失真度越大。针对此问题,提出了一种平衡水印鲁棒性和数据失真的最优可逆数据库水印方案(IGADEW)。该方案不再局限于... 数据库水印在保护版权和防止数据泄露方面起着不可替代的作用,但往往数据失真度和水印鲁棒性是正相关关系,鲁棒性越高,失真度越大。针对此问题,提出了一种平衡水印鲁棒性和数据失真的最优可逆数据库水印方案(IGADEW)。该方案不再局限于寻找单一最佳嵌入密钥,亦或最佳嵌入位置,而是利用遗传算法(GA)综合优化对象,设计带权目标函数来评估鲁棒性和失真度的平衡。IGADEW方案中引入基于散列函数的消息验证码(HMAC)加密、数字签名手段来保证鲁棒性,设置阈值约束来限制数据失真。可逆嵌入操作基于差值扩展(DEW)算术运算实现,并在提取阶段使用投票机制来避免检测结果的随机性。使用UCI数据集验证了方案的有效性,与现有方案相比,IGADEW对常见的插入、删除、修改攻击具有更好的鲁棒性,同时数据失真更小。 展开更多
关键词 可逆数据库水印 鲁棒性 数据失真 差值扩展 遗传算法
在线阅读 下载PDF
融合同态加密与PRNU指纹的图像设备识别与身份隐私保护方法
11
作者 张品昌 沈元章 +4 位作者 樊卫北 董振江 沈玉龙 姜晓鸿 肖甫 《通信学报》 北大核心 2025年第7期92-108,共17页
针对工业互联网环境下图像设备易被伪造与身份信息易泄露的问题,提出了一种融合同态加密与物理指纹特征的图像设备识别与身份隐私保护方法。该方法采用图像传感器的光响应非均匀性(PRNU)指纹作为设备唯一标识,并引入基于离散余弦变换(D... 针对工业互联网环境下图像设备易被伪造与身份信息易泄露的问题,提出了一种融合同态加密与物理指纹特征的图像设备识别与身份隐私保护方法。该方法采用图像传感器的光响应非均匀性(PRNU)指纹作为设备唯一标识,并引入基于离散余弦变换(DCT)与奇异值分解(SVD)的盲水印技术,建立PRNU指纹与盲水印之间的映射关系,从而提升在图像篡改场景下的识别鲁棒性。为实现隐私保护,进一步设计了基于ElGamal算法的同态加密机制,在加密域中完成身份识别过程,防止敏感信息在传输与计算过程中的泄露。实验结果表明,所提方法显著增强了识别准确性、抗篡改能力及数据隐私保护能力,具备在不可信工业通信环境中部署的可行性和实用性。 展开更多
关键词 图像设备识别 PRNU指纹 盲水印 同态加密 ElGamal算法
在线阅读 下载PDF
基于Hessenberg分解的DCHWT域立体图像双彩色盲水印算法
12
作者 韩绍程 蔡锦瑞 《印刷与数字媒体技术研究》 北大核心 2025年第3期297-308,共12页
针对目前大多数双目立体图像盲水印技术中嵌入水印容量较小且抵抗几何攻击性能不佳的问题,本研究提出一种基于Hessenberg分解的离散余弦谐小波变换(Discrete Cosine Harmonic Wavelet Transform,DCHWT)域立体图像双彩色盲水印算法。首先... 针对目前大多数双目立体图像盲水印技术中嵌入水印容量较小且抵抗几何攻击性能不佳的问题,本研究提出一种基于Hessenberg分解的离散余弦谐小波变换(Discrete Cosine Harmonic Wavelet Transform,DCHWT)域立体图像双彩色盲水印算法。首先,对双目彩色立体图像左、右视点分通道进行DCHWT变换,获取各通道低频子带后,进行非重叠分块,通过修改左、右视点图像对应通道中相同位置上每对低频系数子块Hessenberg联合分解后的Hessenberg矩阵,实现水印嵌入;其次,使用沙猫群优化(Sand Cat Swarm Optimization,SCSO)获得最佳嵌入步长,并采用基于改进Logistic映射的图像加密算法对彩色水印进行加密预处理;最后,在水印提取前,利用KAZE特征匹配对待认证的含水印图像进行几何矫正。实验结果表明,该算法可以较好地抵抗常规非几何攻击和几何攻击,具有较强的鲁棒性。 展开更多
关键词 彩色立体图像 彩色水印 Hessenberg分解 DCHWT 优化算法
在线阅读 下载PDF
基于二值图像的数字水印系统
13
作者 向羽冯 邓全莉 徐梓欣 《成都信息工程大学学报》 2025年第4期488-492,共5页
数字水印处理系统是一种用于图像中隐藏信息的技术,在需要时能够用于确认图像的真实性或所有权。设计了一种基于二值图像的数字水印处理系统,可在灰度图像中实时嵌入水印信息并对水印进行提取。水印嵌入时,先将图像转化成灰度图并将原... 数字水印处理系统是一种用于图像中隐藏信息的技术,在需要时能够用于确认图像的真实性或所有权。设计了一种基于二值图像的数字水印处理系统,可在灰度图像中实时嵌入水印信息并对水印进行提取。水印嵌入时,先将图像转化成灰度图并将原始水印信息转化为一段比特流,设计的滤波器基于灰度级别来优化误差扩散,以增强水印的隐蔽性和抗干扰能力,所设计的滤波器被集成到多尺度误差扩散算法中,以实现对水印信息的高效嵌入。水印提取时,先将二值图像分割为若干像素块,通过傅里叶变换获取像素块横、纵两个方向的特征值,判断该像素块的水印信息比特,实现对水印信息的重组和提取。 展开更多
关键词 数字水印 误差扩散算法 印刷制品防伪 二值图像
在线阅读 下载PDF
4K高清播出信号网络防护算法设计与实现
14
作者 符达辉 《微型电脑应用》 2025年第3期48-51,共4页
在受到病毒攻击干扰后,4K高清播出信号会出现清晰度降低的问题,导致视频无法正常播出。对此,提出一种网络防护算法。构建基于视频水印技术的4K高清播出信号监测模块,将水印信号输入水印编码器,通过编码、解码等一系列操作后,利用三维小... 在受到病毒攻击干扰后,4K高清播出信号会出现清晰度降低的问题,导致视频无法正常播出。对此,提出一种网络防护算法。构建基于视频水印技术的4K高清播出信号监测模块,将水印信号输入水印编码器,通过编码、解码等一系列操作后,利用三维小波变换算法调整合适的变换系数,将水印嵌入原始视频信号序列;检测嵌入水印信号的视频信号序列,当检测到视频信号序列不存在完整水印时发出报警,从而防护4K高清播出视频序列免受病毒攻击影响。实验结果表明,所提算法面对病毒攻击时展现出了较为优秀的防护能力。 展开更多
关键词 4K高清播出信号 网络防护算法 水印编码器 视频水印技术 小波变换系数
在线阅读 下载PDF
On Secure Digital Image Watermarking Techniques 被引量:2
15
作者 Manjit Thapa Sandeep Kumar Sood 《Journal of Information Security》 2011年第4期169-184,共16页
Digital watermarking is used to hide the information inside a signal, which can not be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different f... Digital watermarking is used to hide the information inside a signal, which can not be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the signal but protect the ownership of the content. One of the current research areas is to protect digital watermark inside the information so that ownership of the information cannot be claimed by third party. With a lot of information available on various search engines, to protect the ownership of information is a crucial area of research. In latest years, several digital watermarking techniques are presented based on discrete cosine transform (DCT), discrete wavelets transform (DWT) and discrete fourier transforms (DFT). In this paper, we propose an algorithm for digital image watermarking technique based on singular value decomposition;both of the L and U components are explored for watermarking algorithm. This technique refers to the watermark embedding algorithm and watermark extracting algorithm. The experimental results prove that the quality of the watermarked image is excellent and there is strong resistant against many geometrical attacks. 展开更多
关键词 Digital Image watermarkING SINGULAR Value Decomposition watermark Embedding algorithm watermark EXTRACTING algorithm Ratio ANALYSIS Security ANALYSIS
在线阅读 下载PDF
Watermarking Images in the Frequency Domain by Exploiting Self-Inverting Permutations
16
作者 Maria Chroni Angelos Fylakis Stavros D. Nikolopoulos 《Journal of Information Security》 2013年第2期80-91,共12页
In this work we propose efficient codec algorithms for watermarking images that are intended for uploading on the web under intellectual property protection. Headed to this direction, we recently suggested a way in wh... In this work we propose efficient codec algorithms for watermarking images that are intended for uploading on the web under intellectual property protection. Headed to this direction, we recently suggested a way in which an integer number w which being transformed into a self-inverting permutation, can be represented in a two dimensional (2D) object and thus, since images are 2D structures, we have proposed a watermarking algorithm that embeds marks on them using the 2D representation of w in the spatial domain. Based on the idea behind this technique, we now expand the usage of this concept by marking the image in the frequency domain. In particular, we propose a watermarking technique that also uses the 2D representation of self-inverting permutations and utilizes marking at specific areas thanks to partial modifications of the image’s Discrete Fourier Transform (DFT). Those modifications are made on the magnitude of specific frequency bands and they are the least possible additive information ensuring robustness and imperceptiveness. We have experimentally evaluated our algorithms using various images of different characteristics under JPEG compression. The experimental results show an improvement in comparison to the previously obtained results and they also depict the validity of our proposed codec algorithms. 展开更多
关键词 watermarkING Techniques Image watermarkING algorithms Self-Inverting PERMUTATIONS 2D REPRESENTATIONS of PERMUTATIONS ENCODING DECODING Frequency Domain Experimental Evaluation
在线阅读 下载PDF
基于双混沌映射的遥感图像零水印算法 被引量:4
17
作者 杨兵兵 闫浩文 +4 位作者 张黎明 徐欣钰 王小龙 严清博 侯昭阳 《地理与地理信息科学》 CSCD 北大核心 2024年第3期21-28,共8页
现有遥感图像零水印算法多为特定类型的遥感图像设计,普适性较差,且对水印组合攻击的鲁棒性不强。该文提出一种基于双混沌映射的遥感图像零水印算法。①对遥感图像进行非下采样剪切波变换,选取低频图像进行离散余弦变换;②对变换后的图... 现有遥感图像零水印算法多为特定类型的遥感图像设计,普适性较差,且对水印组合攻击的鲁棒性不强。该文提出一种基于双混沌映射的遥感图像零水印算法。①对遥感图像进行非下采样剪切波变换,选取低频图像进行离散余弦变换;②对变换后的图像进行分块,并对各子块进行Schur分解,通过比较每个子块上三角矩阵中第一个元素值和均值的大小构建特征矩阵;③利用一维Logistic映射置乱遥感图像,与特征矩阵进行异或运算得到一个二值序列;①结合2D-LALM-Tent映射和Arnold置乱水印图像,对前述二值序列和置乱后水印的二值序列进行异或运算得到零水印。实验表明,该算法对不同类型遥感图像的适用性较好,且对水印组合攻击的鲁棒性较强,无精度损失,可用于多种类型遥感图像的版权保护,为遥感图像的共享提供安全保障。 展开更多
关键词 双混沌映射 2D-LALM TENT映射 遥感图像 零水印算法
在线阅读 下载PDF
A robust tensor watermarking algorithm for diffusion-tensor images 被引量:1
18
作者 Chengmeng LIU Zhi LI +1 位作者 Guomei WANG Long ZHENG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2024年第3期384-397,共14页
Watermarking algorithms that use convolution neural networks have exhibited good robustness in studies of deep learning networks.However,after embedding watermark signals by convolution,the feature fusion eficiency of... Watermarking algorithms that use convolution neural networks have exhibited good robustness in studies of deep learning networks.However,after embedding watermark signals by convolution,the feature fusion eficiency of convolution is relatively low;this can easily lead to distortion in the embedded image.When distortion occurs in medical images,especially in diffusion tensor images(DTIs),the clinical value of the DTI is lost.To address this issue,a robust watermarking algorithm for DTIs implemented by fusing convolution with a Transformer is proposed to ensure the robustness of the watermark and the consistency of sampling distance,which enhances the quality of the reconstructed image of the watermarked DTIs after embedding the watermark signals.In the watermark-embedding network,Ti-weighted(Tlw)images are used as prior knowledge.The correlation between T1w images and the original DTI is proposed to calculate the most significant features from the T1w images by using the Transformer mechanism.The maximum of the correlation is used as the most significant feature weight to improve the quality of the reconstructed DTI.In the watermark extraction network,the most significant watermark features from the watermarked DTI are adequately learned by the Transformer to robustly extract the watermark signals from the watermark features.Experimental results show that the average peak signal-to-noise ratio of the watermarked DTI reaches 50.47 dB,the diffusion characteristics such as mean diffusivity and fractional anisotropy remain unchanged,and the main axis deflection angleαAc is close to 1.Our proposed algorithm can effectively protect the copyright of the DTI and barely affects the clinical diagnosis. 展开更多
关键词 Robust watermarking algorithm Transformer Image reconstruction Diffusion tensor images Soft attention Hard attention Tl-weighted images
原文传递
基于语义的无线水印安全通信技术验证 被引量:1
19
作者 樊仁和 苟文龙 武刚 《移动通信》 2024年第2期97-103,共7页
随着近年来计算机网络技术、通信技术以及数字处理技术的飞速发展,互联网与人们的生活紧密相联。在带来极大便利的同时,也存在着各类信息窃取与版权盗用事件,数字水印技术应运而生。为达到鲁棒性与透明性的最优平衡,提出了一种基于语义... 随着近年来计算机网络技术、通信技术以及数字处理技术的飞速发展,互联网与人们的生活紧密相联。在带来极大便利的同时,也存在着各类信息窃取与版权盗用事件,数字水印技术应运而生。为达到鲁棒性与透明性的最优平衡,提出了一种基于语义的无线水印安全通信技术。首先通过融合语义内容信息,达到提升数字水印通信的安全性的目的。其次分析了DWT、DCT、DFT等传统水印的不足,并采用遗传算法优化的方式来完善数字水印技术。这一过程中,还涵盖了使用基础和多层自编码器生成数字水印的方法,实现了基于DCT-DWT-SVD的数字水印算法以及相应遗传算法优化,以达到鲁棒性和透明性之间的最佳平衡。最后,论文还根据802.11a协议,为SDR平台设计了相应的发射机和接收机,全面展示了整个通信过程。 展开更多
关键词 数字水印 语义信息 自编码器 遗传算法 DCT-DWT-SVD 802.11a协议 通信安全
在线阅读 下载PDF
新颖的内容自适应图像篡改检测与自恢复算法研究
20
作者 李明月 毕秀丽 刘波 《重庆邮电大学学报(自然科学版)》 CSCD 北大核心 2024年第4期797-806,共10页
针对在原始图像中嵌入大量的水印(认证水印和参考水印)容易造成图像失真的问题,提出嵌入少量参考水印的方法。为了减小图像失真,提出将少量的参考水印信息嵌入在原始图像的边缘、轮廓等区域的方法。在恢复篡改区域时,提出利用图像修复... 针对在原始图像中嵌入大量的水印(认证水印和参考水印)容易造成图像失真的问题,提出嵌入少量参考水印的方法。为了减小图像失真,提出将少量的参考水印信息嵌入在原始图像的边缘、轮廓等区域的方法。在恢复篡改区域时,提出利用图像修复算法将篡改块匹配问题转化为非局部自相似图像块的最小化问题,复制攻击图像本身的相似信息来恢复篡改区域。实验结果表明,在水印容量为0.015626的情况下,该算法得到嵌入水印后图像的峰值信噪比(peak signal to noise ratio,PSNR)均值超过60 dB,恢复图像的PSNR均值超过40 dB。 展开更多
关键词 水印 图像恢复 图像修复算法 篡改检测 自恢复
在线阅读 下载PDF
上一页 1 2 25 下一页 到第
使用帮助 返回顶部