期刊文献+
共找到501篇文章
< 1 2 26 >
每页显示 20 50 100
A blind watermarking algorithm based on DWT and SVD 被引量:2
1
作者 XUAN Chun-qing XUAN Zhi-wei +1 位作者 ZHANG Xia CHEN Bao-li 《Journal of Measurement Science and Instrumentation》 CAS 2014年第2期31-35,共5页
This paper presents a new digital image blind watermarking algorithm based on combination of discrete wavelet transform (DWT) and singular value decomposition (SVD). First of all, we make wavelet decomposition for... This paper presents a new digital image blind watermarking algorithm based on combination of discrete wavelet transform (DWT) and singular value decomposition (SVD). First of all, we make wavelet decomposition for the original image and divide the acquired low frequency sub-band into blocks. Then we make singular value decomposition for each block and embed the watermark information in the largest singular value by quantitative method. The watermark can be extracted without the original image. The experimental results show that the algorithm has a good imperceptibility and robustness. 展开更多
关键词 discrete wavelet transform singular value decomposition a blind watermarking algorithm ROBUSTNESS
在线阅读 下载PDF
A robust color image watermarking algorithm against rotation attacks 被引量:1
2
作者 韩绍程 杨金锋 +1 位作者 王蕊 贾桂敏 《Optoelectronics Letters》 EI 2018年第1期61-66,共6页
A robust digital watermarking algorithm is proposed based on quaternion wavelet transform(QWT) and discrete cosine transform(DCT) for copyright protection of color images. The luminance component Y of a host color ima... A robust digital watermarking algorithm is proposed based on quaternion wavelet transform(QWT) and discrete cosine transform(DCT) for copyright protection of color images. The luminance component Y of a host color image in YIQ space is decomposed by QWT, and then the coefficients of four low-frequency subbands are transformed by DCT. An original binary watermark scrambled by Arnold map and iterated sine chaotic system is embedded into the mid-frequency DCT coefficients of the subbands. In order to improve the performance of the proposed algorithm against rotation attacks, a rotation detection scheme is implemented before watermark extracting. The experimental results demonstrate that the proposed watermarking scheme shows strong robustness not only against common image processing attacks but also against arbitrary rotation attacks. 展开更多
关键词 QWT DCT A robust color image watermarking algorithm against rotation attacks YIQ
原文传递
A Weighted Algorithm for Watermarking Relational Databases 被引量:2
3
作者 CUI Xinchun QIN Xiaolin SHENG Gang 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期79-82,共4页
A weighted algorithm for watermarking relational databases for copyright protection is presented. The possibility of watermarking an attribute is assigned according to its weight decided by the owner of the database. ... A weighted algorithm for watermarking relational databases for copyright protection is presented. The possibility of watermarking an attribute is assigned according to its weight decided by the owner of the database. A one-way hash function and a secret key known only to the owner of the data are used to select tuples and bits to mark. By assigning high weight to significant attributes, the scheme ensures that important attributes take more chance to be marked than less important ones. Experimental results show that the proposed scheme is robust against various forms of attacks, and has perfect immunity to subset attack. 展开更多
关键词 weighted algorithm watermarking relational databases copyright protection
在线阅读 下载PDF
Embedding and Extracting Digital Watermark Based on DCT Algorithm 被引量:1
4
作者 Haiming Li Xiaoyun Guo 《Journal of Computer and Communications》 2018年第11期287-298,共12页
The principle of digital watermark is the method of adding digital watermark in the frequency domain. The digital watermark hides the watermark in digital media, such as image, voice, video, etc., so as to realize the... The principle of digital watermark is the method of adding digital watermark in the frequency domain. The digital watermark hides the watermark in digital media, such as image, voice, video, etc., so as to realize the functions of copyright protection, and identity recognition. DCT for Discrete Cosine Transform is used to transform the image pixel value and the frequency domain coefficient matrix to realize the embedding and extracting of the blind watermark in the paper. After success, the image is attacked by white noise and Gaussian low-pass filtering. The result shows that the watermark signal embedded based on the DCT algorithm is relatively robust, and can effectively resist some attack methods that use signal distortion to destroy the watermark, and has good robustness and imperceptibility. 展开更多
关键词 Digital watermark DCT algorithm White Noise GAUSSIAN LOW-PASS Filtering Robustness IMPERCEPTIBILITY
在线阅读 下载PDF
New Optimal DWT Domain Image Watermarking Technique via Genetic Algorithm
5
作者 钟宁 匡镜明 何遵文 《Journal of Beijing Institute of Technology》 EI CAS 2007年第4期465-470,共6页
A novel optimal image watermarking scheme is proposed in which the genetic algorithm (GA) is employed to obtain the improvement of algorithm performance. Arnold transform is utilized to obtain the scrambled watermark,... A novel optimal image watermarking scheme is proposed in which the genetic algorithm (GA) is employed to obtain the improvement of algorithm performance. Arnold transform is utilized to obtain the scrambled watermark, and then the embedding and extraction of watermark are implemented in digital wavelet transform (DWT) domain. During the watermarking process, GA is employed to search optimal parameters of embedding strength and times of Arnold transform to gain the optimization of watermarking performance. Simulation results show that the proposed method can improve the quality of watermarked image and give almost the same robustness of the watermark. 展开更多
关键词 image watermarking genetic algorithm (GA) digital wavelet transform (DWT)
在线阅读 下载PDF
Audio Watermarking Using Wavelet Transform and Genetic Algorithm for Realizing High Tolerance to MP3 Compression
6
作者 Shinichi Murata Yasunari Yoshitomi Hiroaki Ishii 《Journal of Information Security》 2011年第3期99-112,共14页
Recently, several digital watermarking techniques have been proposed for hiding data in the frequency domain of audio signals to protect the copyrights. However, little attention has been given to the optimal position... Recently, several digital watermarking techniques have been proposed for hiding data in the frequency domain of audio signals to protect the copyrights. However, little attention has been given to the optimal position in the frequency domain for embedding watermarks. In general, there is a tradeoff between the quality of the watermarked audio and the tolerance of watermarks to signal processing methods, such as compression. In the present study, a watermarking method developed for a visual image by using a wavelet transform was applied to an audio clip. We also improved the performance of both the quality of the watermarked audio and the extraction of watermarks after compression by the MP3 technique. To accomplish this, we created a multipurpose optimization problem for deciding the positions of watermarks in the frequency domain and obtaining a near-optimum solution. The near-optimum solution is obtained by using a genetic algorithm. The experimental results show that the proposed method generates watermarked audios of good quality and high tolerance to MP3 compression. In addition, the security was improved by using the characteristic secret key to embed and extract the watermark information. 展开更多
关键词 AUDIO watermarkING GENETIC algorithm Optimization WAVELET Transforms SECRET Key
暂未订购
Reversible Digital Image Watermarking Scheme Using Bit Replacement and Majority Algorithm Technique
7
作者 Koushik Pal Goutam Ghosh Mahua Bhattacharya 《Journal of Intelligent Learning Systems and Applications》 2012年第3期199-206,共8页
The current paper presents a new digital watermarking method through bit replacement technology, which stores mul-tiple copies of the same data that is to be hidden in a scrambled form in the cover image. In this pape... The current paper presents a new digital watermarking method through bit replacement technology, which stores mul-tiple copies of the same data that is to be hidden in a scrambled form in the cover image. In this paper an indigenous approach is described for recovering the data from the damaged copies of the data under attack by applying a majority algorithm to find the closest twin of the embedded information. A new type of non-oblivious detection method is also proposed. The improvement in performance is supported through experimental results which show much enhancement in the visual and statistical invisibility of hidden data. 展开更多
关键词 Additive Noise Salt and PEPPER Noise Compression Filtering AVERAGING Multiple watermarking MAJORITY algorithm
在线阅读 下载PDF
A New Image Watermarking Scheme Using Genetic Algorithm and Residual Numbers with Discrete Wavelet Transform
8
作者 Peter Awonnatemi Agbedemnab Mohammed Akolgo Moses Apambila Agebure 《Journal of Information Security》 2023年第4期422-436,共15页
Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presen... Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presents a new digital watermarking scheme that combines some operators of the Genetic Algorithm (GA) and the Residue Number (RN) System (RNS) to perform encryption on an image, which is embedded into a cover image for the purposes of watermarking. Thus, an image watermarking scheme uses an encrypted image. The secret image is embedded in decomposed frames of the cover image achieved by applying a three-level Discrete Wavelet Transform (DWT). This is to ensure that the secret information is not exposed even when there is a successful attack on the cover information. Content creators can prove ownership of the multimedia content by unveiling the secret information in a court of law. The proposed scheme was tested with sample data using MATLAB2022 and the results of the simulation show a great deal of imperceptibility and robustness as compared to similar existing schemes. 展开更多
关键词 Discrete Wavelet Transform (DWT) Digital watermarking Encryption Genetic algorithm (GA) Residue Number System (RNS) GARN
在线阅读 下载PDF
On Secure Digital Image Watermarking Techniques 被引量:2
9
作者 Manjit Thapa Sandeep Kumar Sood 《Journal of Information Security》 2011年第4期169-184,共16页
Digital watermarking is used to hide the information inside a signal, which can not be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different f... Digital watermarking is used to hide the information inside a signal, which can not be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the signal but protect the ownership of the content. One of the current research areas is to protect digital watermark inside the information so that ownership of the information cannot be claimed by third party. With a lot of information available on various search engines, to protect the ownership of information is a crucial area of research. In latest years, several digital watermarking techniques are presented based on discrete cosine transform (DCT), discrete wavelets transform (DWT) and discrete fourier transforms (DFT). In this paper, we propose an algorithm for digital image watermarking technique based on singular value decomposition;both of the L and U components are explored for watermarking algorithm. This technique refers to the watermark embedding algorithm and watermark extracting algorithm. The experimental results prove that the quality of the watermarked image is excellent and there is strong resistant against many geometrical attacks. 展开更多
关键词 Digital Image watermarkING SINGULAR Value Decomposition watermark Embedding algorithm watermark EXTRACTING algorithm Ratio ANALYSIS Security ANALYSIS
在线阅读 下载PDF
Watermarking Images in the Frequency Domain by Exploiting Self-Inverting Permutations
10
作者 Maria Chroni Angelos Fylakis Stavros D. Nikolopoulos 《Journal of Information Security》 2013年第2期80-91,共12页
In this work we propose efficient codec algorithms for watermarking images that are intended for uploading on the web under intellectual property protection. Headed to this direction, we recently suggested a way in wh... In this work we propose efficient codec algorithms for watermarking images that are intended for uploading on the web under intellectual property protection. Headed to this direction, we recently suggested a way in which an integer number w which being transformed into a self-inverting permutation, can be represented in a two dimensional (2D) object and thus, since images are 2D structures, we have proposed a watermarking algorithm that embeds marks on them using the 2D representation of w in the spatial domain. Based on the idea behind this technique, we now expand the usage of this concept by marking the image in the frequency domain. In particular, we propose a watermarking technique that also uses the 2D representation of self-inverting permutations and utilizes marking at specific areas thanks to partial modifications of the image’s Discrete Fourier Transform (DFT). Those modifications are made on the magnitude of specific frequency bands and they are the least possible additive information ensuring robustness and imperceptiveness. We have experimentally evaluated our algorithms using various images of different characteristics under JPEG compression. The experimental results show an improvement in comparison to the previously obtained results and they also depict the validity of our proposed codec algorithms. 展开更多
关键词 watermarkING Techniques Image watermarkING algorithms Self-Inverting PERMUTATIONS 2D REPRESENTATIONS of PERMUTATIONS ENCODING DECODING Frequency Domain Experimental Evaluation
在线阅读 下载PDF
基于图像分割技术的摄影图像数字水印算法
11
作者 赵媛 陈莹 韩烨 《移动信息》 2025年第2期302-304,共3页
由于摄影图像具有高度的复杂性和多样性,导致水印在受到攻击时完整度相对较低.针对上述问题,文中提出了基于图像分割技术的摄影图像数字水印算法.其采用Arnold变换强化图像安全,RGB转YCrCb优化色彩处理,两层离散小波变换深入剖析图像多... 由于摄影图像具有高度的复杂性和多样性,导致水印在受到攻击时完整度相对较低.针对上述问题,文中提出了基于图像分割技术的摄影图像数字水印算法.其采用Arnold变换强化图像安全,RGB转YCrCb优化色彩处理,两层离散小波变换深入剖析图像多尺度特征.通过形态学腐蚀优化与智能合并策略,深度分割预处理图像,生成清晰界定的图像块集合.选取对比度最高的子块,利用离散小波变换的低频子带结合量化抖动调制技术,隐蔽而鲁棒地将水印信息嵌入图像中.在提取阶段,能集成图像分割、Daisy变换精准定位、BSP树精细划分、Arnold逆变换精确提取并还原图像水印.实验结果表明,该设计方法能显著提升水印在多种攻击场景下的鲁棒性,确保水印信息的完整可靠. 展开更多
关键词 图像分割技术 数字水印算法 水印嵌入 水印提取
在线阅读 下载PDF
平衡鲁棒性与数据失真的可逆数据库水印方案
12
作者 王春东 李悦 《桂林理工大学学报》 北大核心 2025年第1期103-110,共8页
数据库水印在保护版权和防止数据泄露方面起着不可替代的作用,但往往数据失真度和水印鲁棒性是正相关关系,鲁棒性越高,失真度越大。针对此问题,提出了一种平衡水印鲁棒性和数据失真的最优可逆数据库水印方案(IGADEW)。该方案不再局限于... 数据库水印在保护版权和防止数据泄露方面起着不可替代的作用,但往往数据失真度和水印鲁棒性是正相关关系,鲁棒性越高,失真度越大。针对此问题,提出了一种平衡水印鲁棒性和数据失真的最优可逆数据库水印方案(IGADEW)。该方案不再局限于寻找单一最佳嵌入密钥,亦或最佳嵌入位置,而是利用遗传算法(GA)综合优化对象,设计带权目标函数来评估鲁棒性和失真度的平衡。IGADEW方案中引入基于散列函数的消息验证码(HMAC)加密、数字签名手段来保证鲁棒性,设置阈值约束来限制数据失真。可逆嵌入操作基于差值扩展(DEW)算术运算实现,并在提取阶段使用投票机制来避免检测结果的随机性。使用UCI数据集验证了方案的有效性,与现有方案相比,IGADEW对常见的插入、删除、修改攻击具有更好的鲁棒性,同时数据失真更小。 展开更多
关键词 可逆数据库水印 鲁棒性 数据失真 差值扩展 遗传算法
在线阅读 下载PDF
融合同态加密与PRNU指纹的图像设备识别与身份隐私保护方法
13
作者 张品昌 沈元章 +4 位作者 樊卫北 董振江 沈玉龙 姜晓鸿 肖甫 《通信学报》 北大核心 2025年第7期92-108,共17页
针对工业互联网环境下图像设备易被伪造与身份信息易泄露的问题,提出了一种融合同态加密与物理指纹特征的图像设备识别与身份隐私保护方法。该方法采用图像传感器的光响应非均匀性(PRNU)指纹作为设备唯一标识,并引入基于离散余弦变换(D... 针对工业互联网环境下图像设备易被伪造与身份信息易泄露的问题,提出了一种融合同态加密与物理指纹特征的图像设备识别与身份隐私保护方法。该方法采用图像传感器的光响应非均匀性(PRNU)指纹作为设备唯一标识,并引入基于离散余弦变换(DCT)与奇异值分解(SVD)的盲水印技术,建立PRNU指纹与盲水印之间的映射关系,从而提升在图像篡改场景下的识别鲁棒性。为实现隐私保护,进一步设计了基于ElGamal算法的同态加密机制,在加密域中完成身份识别过程,防止敏感信息在传输与计算过程中的泄露。实验结果表明,所提方法显著增强了识别准确性、抗篡改能力及数据隐私保护能力,具备在不可信工业通信环境中部署的可行性和实用性。 展开更多
关键词 图像设备识别 PRNU指纹 盲水印 同态加密 ElGamal算法
在线阅读 下载PDF
基于Hessenberg分解的DCHWT域立体图像双彩色盲水印算法
14
作者 韩绍程 蔡锦瑞 《印刷与数字媒体技术研究》 北大核心 2025年第3期297-308,共12页
针对目前大多数双目立体图像盲水印技术中嵌入水印容量较小且抵抗几何攻击性能不佳的问题,本研究提出一种基于Hessenberg分解的离散余弦谐小波变换(Discrete Cosine Harmonic Wavelet Transform,DCHWT)域立体图像双彩色盲水印算法。首先... 针对目前大多数双目立体图像盲水印技术中嵌入水印容量较小且抵抗几何攻击性能不佳的问题,本研究提出一种基于Hessenberg分解的离散余弦谐小波变换(Discrete Cosine Harmonic Wavelet Transform,DCHWT)域立体图像双彩色盲水印算法。首先,对双目彩色立体图像左、右视点分通道进行DCHWT变换,获取各通道低频子带后,进行非重叠分块,通过修改左、右视点图像对应通道中相同位置上每对低频系数子块Hessenberg联合分解后的Hessenberg矩阵,实现水印嵌入;其次,使用沙猫群优化(Sand Cat Swarm Optimization,SCSO)获得最佳嵌入步长,并采用基于改进Logistic映射的图像加密算法对彩色水印进行加密预处理;最后,在水印提取前,利用KAZE特征匹配对待认证的含水印图像进行几何矫正。实验结果表明,该算法可以较好地抵抗常规非几何攻击和几何攻击,具有较强的鲁棒性。 展开更多
关键词 彩色立体图像 彩色水印 Hessenberg分解 DCHWT 优化算法
在线阅读 下载PDF
基于二值图像的数字水印系统
15
作者 向羽冯 邓全莉 徐梓欣 《成都信息工程大学学报》 2025年第4期488-492,共5页
数字水印处理系统是一种用于图像中隐藏信息的技术,在需要时能够用于确认图像的真实性或所有权。设计了一种基于二值图像的数字水印处理系统,可在灰度图像中实时嵌入水印信息并对水印进行提取。水印嵌入时,先将图像转化成灰度图并将原... 数字水印处理系统是一种用于图像中隐藏信息的技术,在需要时能够用于确认图像的真实性或所有权。设计了一种基于二值图像的数字水印处理系统,可在灰度图像中实时嵌入水印信息并对水印进行提取。水印嵌入时,先将图像转化成灰度图并将原始水印信息转化为一段比特流,设计的滤波器基于灰度级别来优化误差扩散,以增强水印的隐蔽性和抗干扰能力,所设计的滤波器被集成到多尺度误差扩散算法中,以实现对水印信息的高效嵌入。水印提取时,先将二值图像分割为若干像素块,通过傅里叶变换获取像素块横、纵两个方向的特征值,判断该像素块的水印信息比特,实现对水印信息的重组和提取。 展开更多
关键词 数字水印 误差扩散算法 印刷制品防伪 二值图像
在线阅读 下载PDF
4K高清播出信号网络防护算法设计与实现
16
作者 符达辉 《微型电脑应用》 2025年第3期48-51,共4页
在受到病毒攻击干扰后,4K高清播出信号会出现清晰度降低的问题,导致视频无法正常播出。对此,提出一种网络防护算法。构建基于视频水印技术的4K高清播出信号监测模块,将水印信号输入水印编码器,通过编码、解码等一系列操作后,利用三维小... 在受到病毒攻击干扰后,4K高清播出信号会出现清晰度降低的问题,导致视频无法正常播出。对此,提出一种网络防护算法。构建基于视频水印技术的4K高清播出信号监测模块,将水印信号输入水印编码器,通过编码、解码等一系列操作后,利用三维小波变换算法调整合适的变换系数,将水印嵌入原始视频信号序列;检测嵌入水印信号的视频信号序列,当检测到视频信号序列不存在完整水印时发出报警,从而防护4K高清播出视频序列免受病毒攻击影响。实验结果表明,所提算法面对病毒攻击时展现出了较为优秀的防护能力。 展开更多
关键词 4K高清播出信号 网络防护算法 水印编码器 视频水印技术 小波变换系数
在线阅读 下载PDF
一种可抵抗几何攻击的Directionlet变换域盲水印算法 被引量:8
17
作者 刘晶 王映辉 +1 位作者 刘刚 何文娟 《电子与信息学报》 EI CSCD 北大核心 2011年第2期442-447,共6页
抵抗几何攻击是数字水印研究领域具有挑战性的课题。该文提出一种利用Directionlet变换构造水印同步信息的盲水印算法:通过边缘检测算子锁定图像边缘;利用拉格朗日定理求取边缘斜率;选取两条边缘,用其斜率构成Directionlet变换的采样矩... 抵抗几何攻击是数字水印研究领域具有挑战性的课题。该文提出一种利用Directionlet变换构造水印同步信息的盲水印算法:通过边缘检测算子锁定图像边缘;利用拉格朗日定理求取边缘斜率;选取两条边缘,用其斜率构成Directionlet变换的采样矩阵;在Directionlet变换域内自适应嵌入水印,排除几何攻击对水印检测的影响。仿真实验结果表明,该算法抵抗旋转等几何攻击具有很好的鲁棒性能。 展开更多
关键词 水印算法 Directionlet变换 拉格朗日定理 采样矩阵
在线阅读 下载PDF
ROI和轮廓波结合的医学图像盲水印算法 被引量:5
18
作者 李文娜 高立群 +1 位作者 孔祥勇 崔兆华 《哈尔滨工程大学学报》 EI CAS CSCD 北大核心 2013年第7期918-923,共6页
针对现有水印方法不能很好地实现信息隐藏和认证同时进行的不足,提出一种基于ROI和轮廓波变换域的DICOM图像水印技术.该技术应用改进的可逆差分扩展方法在DICOM图像的背景区域嵌入水印w1,即患者的隐私信息和感兴趣区域的子块均值.水印w... 针对现有水印方法不能很好地实现信息隐藏和认证同时进行的不足,提出一种基于ROI和轮廓波变换域的DICOM图像水印技术.该技术应用改进的可逆差分扩展方法在DICOM图像的背景区域嵌入水印w1,即患者的隐私信息和感兴趣区域的子块均值.水印w1嵌入后,在图像的轮廓波域中能量较大的高阶方向子带的位置上,采用轮廓波系数与8邻域均值比较的方法嵌入认证水印w2.算法实现了水印图像的盲提取,同时具有对感兴趣区域的篡改进行定位并修复的能力,保障诊断时图像的真实性和完整性.仿真实验表明,该技术具有较强的数据信息隐藏能力和较好的抗攻击能力. 展开更多
关键词 盲水印算法 医学图像 数字水印 图像认证 轮廓波变换 活动轮廓模型
在线阅读 下载PDF
基于NSCT-DWT-SVD的强鲁棒多重数字水印算法 被引量:8
19
作者 马婷 陈农田 王欣 《包装工程》 CAS CSCD 北大核心 2016年第15期50-55,共6页
目的提出基于NSCT-DWT-SVD结合的复合数字水印算法,实现水印信息的隐蔽嵌入,提高水印的鲁棒性。方法首先对水印信息进行Arnold置乱,对载体图像进行NSCT变换,将产生的与原载体图像大小相同的低频子带进行小波变换,后对小波变换的低频部... 目的提出基于NSCT-DWT-SVD结合的复合数字水印算法,实现水印信息的隐蔽嵌入,提高水印的鲁棒性。方法首先对水印信息进行Arnold置乱,对载体图像进行NSCT变换,将产生的与原载体图像大小相同的低频子带进行小波变换,后对小波变换的低频部分进行SVD分解,确定嵌入强度后将水印信息叠加到奇异值矩阵中,实现水印的嵌入。结果经仿真实验发现,该算法在保证水印嵌入信息量的前提下,满足了水印信息的隐蔽性,PSNR值达到30 d B以上,NC值达到了1,同时该算法对压缩、滤波、剪切攻击的鲁棒性较强,NC值均达到0.92以上,抵抗旋转攻击时仍能提取出较清晰的水印图像。结论该算法满足了数字水印技术要求的隐蔽性和稳健性,并且可以对数字产品起到版权保护的作用。 展开更多
关键词 DWT NSCT SVD 多重数字水印算法
在线阅读 下载PDF
一种健壮的数字水印算法及其Matlab实现 被引量:5
20
作者 刘良文 徐铭政 +1 位作者 汪亚顺 游步东 《南昌大学学报(工科版)》 CAS 2005年第1期20-22,39,共4页
作为知识产权的保护神,数字水印技术的算法理论和实现算法的技术都是当前研究的热门课题.频率域变换抵抗破坏能力较强,是水印的主流;数据置乱决定水印的成败.本文基于频率域DCT变换和密钥分散Arnold置换提出了一种新的水印算法,并给出... 作为知识产权的保护神,数字水印技术的算法理论和实现算法的技术都是当前研究的热门课题.频率域变换抵抗破坏能力较强,是水印的主流;数据置乱决定水印的成败.本文基于频率域DCT变换和密钥分散Arnold置换提出了一种新的水印算法,并给出该算法的Matlab实现方案.结果证明,这种算法达到了很好的透明性和很强的鲁棒性,而且将理论探索和技术实践比较完善地结合起来. 展开更多
关键词 数字水印 算法 鲁棒性 频率域变换
在线阅读 下载PDF
上一页 1 2 26 下一页 到第
使用帮助 返回顶部