期刊文献+
共找到8,414篇文章
< 1 2 250 >
每页显示 20 50 100
Multi-Feature Fragile Image Watermarking Algorithm for Tampering Blind-Detection and Content Self-Recovery
1
作者 Qiuling Wu Hao Li +1 位作者 Mingjian Li Ming Wang 《Computers, Materials & Continua》 2026年第1期759-778,共20页
Digital watermarking technology plays an important role in detecting malicious tampering and protecting image copyright.However,in practical applications,this technology faces various problems such as severe image dis... Digital watermarking technology plays an important role in detecting malicious tampering and protecting image copyright.However,in practical applications,this technology faces various problems such as severe image distortion,inaccurate localization of the tampered regions,and difficulty in recovering content.Given these shortcomings,a fragile image watermarking algorithm for tampering blind-detection and content self-recovery is proposed.The multi-feature watermarking authentication code(AC)is constructed using texture feature of local binary patterns(LBP),direct coefficient of discrete cosine transform(DCT)and contrast feature of gray level co-occurrence matrix(GLCM)for detecting the tampered region,and the recovery code(RC)is designed according to the average grayscale value of pixels in image blocks for recovering the tampered content.Optimal pixel adjustment process(OPAP)and least significant bit(LSB)algorithms are used to embed the recovery code and authentication code into the image in a staggered manner.When detecting the integrity of the image,the authentication code comparison method and threshold judgment method are used to perform two rounds of tampering detection on the image and blindly recover the tampered content.Experimental results show that this algorithm has good transparency,strong and blind detection,and self-recovery performance against four types of malicious attacks and some conventional signal processing operations.When resisting copy-paste,text addition,cropping and vector quantization under the tampering rate(TR)10%,the average tampering detection rate is up to 94.09%,and the peak signal-to-noise ratio(PSNR)of the watermarked image and the recovered image are both greater than 41.47 and 40.31 dB,which demonstrates its excellent advantages compared with other related algorithms in recent years. 展开更多
关键词 Fragile image watermark tampering blind-detection SELF-RECOVERY multi-feature
在线阅读 下载PDF
Enhancing Deepfake Detection:Proactive Forensics Techniques Using Digital Watermarking
2
作者 Zhimao Lai Saad Arif +2 位作者 Cong Feng Guangjun Liao Chuntao Wang 《Computers, Materials & Continua》 SCIE EI 2025年第1期73-102,共30页
With the rapid advancement of visual generative models such as Generative Adversarial Networks(GANs)and stable Diffusion,the creation of highly realistic Deepfake through automated forgery has significantly progressed... With the rapid advancement of visual generative models such as Generative Adversarial Networks(GANs)and stable Diffusion,the creation of highly realistic Deepfake through automated forgery has significantly progressed.This paper examines the advancements inDeepfake detection and defense technologies,emphasizing the shift from passive detection methods to proactive digital watermarking techniques.Passive detection methods,which involve extracting features from images or videos to identify forgeries,encounter challenges such as poor performance against unknown manipulation techniques and susceptibility to counter-forensic tactics.In contrast,proactive digital watermarking techniques embed specificmarkers into images or videos,facilitating real-time detection and traceability,thereby providing a preemptive defense againstDeepfake content.We offer a comprehensive analysis of digitalwatermarking-based forensic techniques,discussing their advantages over passivemethods and highlighting four key benefits:real-time detection,embedded defense,resistance to tampering,and provision of legal evidence.Additionally,the paper identifies gaps in the literature concerning proactive forensic techniques and suggests future research directions,including cross-domain watermarking and adaptive watermarking strategies.By systematically classifying and comparing existing techniques,this review aims to contribute valuable insights for the development of more effective proactive defense strategies in Deepfake forensics. 展开更多
关键词 Deepfake proactive forensics digital watermarking TRACEABILITY detection techniques
在线阅读 下载PDF
CSRWA:Covert and Severe Attacks Resistant Watermarking Algorithm
3
作者 Balsam Dhyia Majeed Amir Hossein Taherinia +1 位作者 Hadi Sadoghi Yazdi Ahad Harati 《Computers, Materials & Continua》 SCIE EI 2025年第1期1027-1047,共21页
Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright.The watermark is embedded in significant spatial or frequency features of the media to make it more resi... Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright.The watermark is embedded in significant spatial or frequency features of the media to make it more resistant to intentional or unintentional modification.Some of these features are important perceptual features according to the human visual system(HVS),which means that the embedded watermark should be imperceptible in these features.Therefore,both the designers of watermarking algorithms and potential attackers must consider these perceptual features when carrying out their actions.The two roles will be considered in this paper when designing a robust watermarking algorithm against the most harmful attacks,like volumetric scaling,histogram equalization,and non-conventional watermarking attacks like the Denoising Convolution Neural Network(DnCNN),which must be considered in watermarking algorithm design due to its rising role in the state-of-the-art attacks.The DnCNN is initialized and trained using watermarked image samples created by our proposed Covert and Severe Attacks Resistant Watermarking Algorithm(CSRWA)to prove its robustness.For this algorithm to satisfy the robustness and imperceptibility tradeoff,implementing the Dither Modulation(DM)algorithm is boosted by utilizing the Just Noticeable Distortion(JND)principle to get an improved performance in this sense.Sensitivity,luminance,inter and intra-block contrast are used to adjust the JND values. 展开更多
关键词 Covert attack digital watermarking DnCNN JND perceptual model ROBUSTNESS
在线阅读 下载PDF
Tamper Detection in Multimodal Biometric Templates Using Fragile Watermarking and Artificial Intelligence
4
作者 Fatima Abu Siryeh Hussein Alrammahi Abdullahi Abdu İbrahim 《Computers, Materials & Continua》 2025年第9期5021-5046,共26页
Biometric template protection is essential for finger-based authentication systems,as template tampering and adversarial attacks threaten the security.This paper proposes a DCT-based fragile watermarking scheme incorp... Biometric template protection is essential for finger-based authentication systems,as template tampering and adversarial attacks threaten the security.This paper proposes a DCT-based fragile watermarking scheme incorporating AI-based tamper detection to improve the integrity and robustness of finger authentication.The system was tested against NIST SD4 and Anguli fingerprint datasets,wherein 10,000 watermarked fingerprints were employed for training.The designed approach recorded a tamper detection rate of 98.3%,performing 3–6%better than current DCT,SVD,and DWT-based watermarking approaches.The false positive rate(≤1.2%)and false negative rate(≤1.5%)were much lower compared to previous research,which maintained high reliability for template change detection.The system showed real-time performance,averaging 12–18 ms processing time per template,and is thus suitable for real-world biometric authentication scenarios.Quality analysis of fingerprints indicated that NFIQ scores were enhanced from 2.07 to 1.81,reflecting improved minutiae clarity and ridge structure preservation.The approach also exhibited strong resistance to compression and noise distortions,with the improvements in PSNR being 2 dB(JPEG compression Q=80)and the SSIM values rising by 3%–5%under noise attacks.Comparative assessment demonstrated that training with NIST SD4 data greatly improved the ridge continuity and quality of fingerprints,resulting in better match scores(260–295)when tested against Bozorth3.Smaller batch sizes(batch=2)also resulted in improved ridge clarity,whereas larger batch sizes(batch=8)resulted in distortions.The DCNN-based tamper detection model supported real-time classification,which greatly minimized template exposure to adversarial attacks and synthetic fingerprint forgeries.Results demonstrate that fragile watermarking with AI indeed greatly enhances fingerprint security,providing privacy-preserving biometric authentication with high robustness,accuracy,and computational efficiency. 展开更多
关键词 Biometric template security fragile watermarking deep learning tamper detection discrete cosine transform(DCT) fingerprint authentication NFIQ score optimization AI-driven watermarking structural similarity index(SSIM)
在线阅读 下载PDF
Image Watermarking Algorithm Base on the Second Order Derivative and Discrete Wavelet Transform
5
作者 Maazen Alsabaan Zaid Bin Faheem +1 位作者 Yuanyuan Zhu Jehad Ali 《Computers, Materials & Continua》 2025年第7期491-512,共22页
Image watermarking is a powerful tool for media protection and can provide promising results when combined with other defense mechanisms.Image watermarking can be used to protect the copyright of digital media by embe... Image watermarking is a powerful tool for media protection and can provide promising results when combined with other defense mechanisms.Image watermarking can be used to protect the copyright of digital media by embedding a unique identifier that identifies the owner of the content.Image watermarking can also be used to verify the authenticity of digital media,such as images or videos,by ascertaining the watermark information.In this paper,a mathematical chaos-based image watermarking technique is proposed using discrete wavelet transform(DWT),chaotic map,and Laplacian operator.The DWT can be used to decompose the image into its frequency components,chaos is used to provide extra security defense by encrypting the watermark signal,and the Laplacian operator with optimization is applied to the mid-frequency bands to find the sharp areas in the image.These mid-frequency bands are used to embed the watermarks by modifying the coefficients in these bands.The mid-sub-band maintains the invisible property of the watermark,and chaos combined with the second-order derivative Laplacian is vulnerable to attacks.Comprehensive experiments demonstrate that this approach is effective for common signal processing attacks,i.e.,compression,noise addition,and filtering.Moreover,this approach also maintains image quality through peak signal-to-noise ratio(PSNR)and structural similarity index metrics(SSIM).The highest achieved PSNR and SSIM values are 55.4 dB and 1.In the same way,normalized correlation(NC)values are almost 10%–20%higher than comparative research.These results support assistance in copyright protection in multimedia content. 展开更多
关键词 Discrete wavelet transform LAPLACIAN image watermarking CHAOS multimedia security
在线阅读 下载PDF
Secure and Invisible Dual Watermarking for Digital Content Based on Optimized Octonion Moments and Chaotic Metaheuristics
6
作者 Ahmed El Maloufy Mohamed Amine Tahiri +2 位作者 Ahmed Bencherqui Hicham Karmouni Mhamed Sayyouri 《Computers, Materials & Continua》 2025年第12期5789-5822,共34页
In the current digital context,safeguarding copyright is a major issue,particularly for architectural drawings produced by students.These works are frequently the result of innovative academic thinking combining creat... In the current digital context,safeguarding copyright is a major issue,particularly for architectural drawings produced by students.These works are frequently the result of innovative academic thinking combining creativity and technical precision.They are particularly vulnerable to the risk of illegal reproduction when disseminated in digital format.This research suggests,for the first time,an innovative approach to copyright protection by embedding a double digital watermark to address this challenge.The solution relies on a synergistic fusion of several sophisticated methods:Krawtchouk Optimized Octonion Moments(OKOM),Quaternion Singular Value Decomposition(QSVD),and Discrete Waveform Transform(DWT).To improve watermark embedding,the biologically inspired algorithm Chaos-White Shark Optimization(CWSO)is used,which allows dynamically adapting essential parameters such as the scaling factor of the insertion.Thus,two watermarks are inserted at the same time:an institutional logo and a student image,encoded in the main image(the architectural plan)through octonionic projections.This allows minimizing the amount of data to be integrated while increasing resistance.The suggested approach guarantees a perfect balance between the discreetness of the watermark(validated by PSNR indices>47 dB and SSIM>0.99)and its resistance to different attacks(JPEG compression,noise,rotation,resizing,filtering,etc.),as proven by the normalized correlation values(NC>0.9)obtained following the extraction.Therefore,this method represents a notable progress for securing academic works in architecture,providing an effective,discreet and reversible digital protection,which does not harm the visual appearance of the original works. 展开更多
关键词 Double digital watermarks krawtchouk moments chaos-white shark OPTIMIZATION
在线阅读 下载PDF
Joint Watermarking and Encryption for Social Image Sharing
7
作者 Conghuan Ye Shenglong Tan +3 位作者 Shi Li Jun Wang Qiankun Zuo Bing Xiong 《Computers, Materials & Continua》 2025年第5期2927-2946,共20页
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social... With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social images.However,most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial domain.In this work,the authors propose a secure social image-sharing method with watermarking/fingerprinting and encryption.First,the fingerprint code with a hierarchical community structure is designed based on social network analysis.Then,discrete wavelet transform(DWT)from block discrete cosine transform(DCT)directly is employed.After that,all codeword segments are embedded into the LL,LH,and HL subbands,respectively.The selected subbands are confused based on Game of Life(GoL),and then all subbands are diffused with singular value decomposition(SVD).Experimental results and security analysis demonstrate the security,invisibility,and robustness of our method.Further,the superiority of the technique is elaborated through comparison with some related image security algorithms.The solution not only performs the fast transformation from block DCT to one-level DWT but also protects users’privacy in multimedia social platforms.With the proposed method,JPEG image secure sharing in multimedia social platforms can be ensured. 展开更多
关键词 Multimedia security digital watermarking image encryption image sharing privacy protection
在线阅读 下载PDF
Chaos-Based Novel Watermarked Satellite Image Encryption Scheme
8
作者 Mohamed Medani Yahia Said +4 位作者 Nashwan Adnan Othman Farrukh Yuldashev Mohamed Kchaou Faisal Khaled Aldawood Bacha Rehman 《Computer Modeling in Engineering & Sciences》 2025年第4期1049-1070,共22页
Satellite images are widely used for remote sensing and defence applications,however,they are subject to a variety of threats.To ensure the security and privacy of these images,theymust be watermarked and encrypted be... Satellite images are widely used for remote sensing and defence applications,however,they are subject to a variety of threats.To ensure the security and privacy of these images,theymust be watermarked and encrypted before communication.Therefore,this paper proposes a novel watermarked satellite image encryption scheme based on chaos,Deoxyribonucleic Acid(DNA)sequence,and hash algorithm.The watermark image,DNA sequence,and plaintext image are passed through the Secure Hash Algorithm(SHA-512)to compute the initial condition(keys)for the Tangent-Delay Ellipse Reflecting Cavity Map(TD-ERCS),Henon,and Duffing chaotic maps,respectively.Through bitwise XOR and substitution,the TD-ERCS map encrypts the watermark image.The ciphered watermark image is embedded in the plaintext image.The embedded plaintext image is permuted row-wise and column-wise using the Henon chaotic map.The permuted image is then bitwise XORed with the values obtained from the Duffing map.For additional security,the XORed image is substituted through a dynamic S-Box.To evaluate the efficiency and performance of the proposed algorithm,several tests are performed which prove its resistance to various types of attacks such as brute-force and statistical attacks. 展开更多
关键词 DNA sequence TD-ERCS chaoticmap henon chaoticmap duffing chaotic system SHA-512 encryption technique watermark embedding
在线阅读 下载PDF
Cat Swarm Algorithm Generated Based on Genetic Programming Framework Applied in Digital Watermarking
9
作者 Shu-Chuan Chu Libin Fu +2 位作者 Jeng-Shyang Pan Xingsi Xue Min Liu 《Computers, Materials & Continua》 2025年第5期3135-3163,共29页
Evolutionary algorithms have been extensively utilized in practical applications.However,manually designed population updating formulas are inherently prone to the subjective influence of the designer.Genetic programm... Evolutionary algorithms have been extensively utilized in practical applications.However,manually designed population updating formulas are inherently prone to the subjective influence of the designer.Genetic programming(GP),characterized by its tree-based solution structure,is a widely adopted technique for optimizing the structure of mathematical models tailored to real-world problems.This paper introduces a GP-based framework(GPEAs)for the autonomous generation of update formulas,aiming to reduce human intervention.Partial modifications to tree-based GP have been instigated,encompassing adjustments to its initialization process and fundamental update operations such as crossover and mutation within the algorithm.By designing suitable function sets and terminal sets tailored to the selected evolutionary algorithm,and ultimately derive an improved update formula.The Cat Swarm Optimization Algorithm(CSO)is chosen as a case study,and the GP-EAs is employed to regenerate the speed update formulas of the CSO.To validate the feasibility of the GP-EAs,the comprehensive performance of the enhanced algorithm(GP-CSO)was evaluated on the CEC2017 benchmark suite.Furthermore,GP-CSO is applied to deduce suitable embedding factors,thereby improving the robustness of the digital watermarking process.The experimental results indicate that the update formulas generated through training with GP-EAs possess excellent performance scalability and practical application proficiency. 展开更多
关键词 Cat swarm algorithm genetic programming digital watermarking update mode mode generation framework
在线阅读 下载PDF
A Robust Image Watermarking Based on DWT and RDWT Combined with Mobius Transformations
10
作者 Atheer Alrammahi Hedieh Sajedi 《Computers, Materials & Continua》 2025年第7期887-918,共32页
Ensuring digital media security through robust image watermarking is essential to prevent unauthorized distribution,tampering,and copyright infringement.This study introduces a novel hybrid watermarking framework that... Ensuring digital media security through robust image watermarking is essential to prevent unauthorized distribution,tampering,and copyright infringement.This study introduces a novel hybrid watermarking framework that integrates Discrete Wavelet Transform(DWT),Redundant Discrete Wavelet Transform(RDWT),and Möbius Transformations(MT),with optimization of transformation parameters achieved via a Genetic Algorithm(GA).By combining frequency and spatial domain techniques,the proposed method significantly enhances both the imper-ceptibility and robustness of watermark embedding.The approach leverages DWT and RDWT for multi-resolution decomposition,enabling watermark insertion in frequency subbands that balance visibility and resistance to attacks.RDWT,in particular,offers shift-invariance,which improves performance under geometric transformations.Möbius transformations are employed for spatial manipulation,providing conformal mapping and spatial dispersion that fortify watermark resilience against rotation,scaling,and translation.The GA dynamically optimizes the Möbius parameters,selecting configurations that maximize robustness metrics such as Peak Signal-to-Noise Ratio(PSNR),Structural Similarity Index Measure(SSIM),Bit Error Rate(BER),and Normalized Cross-Correlation(NCC).Extensive experiments conducted on medical and standard benchmark images demonstrate the efficacy of the proposed RDWT-MT scheme.Results show that PSNR exceeds 68 dB,SSIM approaches 1.0,and BER remains at 0.0000,indicating excellent imperceptibility and perfect watermark recovery.Moreover,the method exhibits exceptional resilience to a wide range of image processing attacks,including Gaussian noise,JPEG compression,histogram equalization,and cropping,achieving NCC values close to or equal to 1.0.Comparative evaluations with state-of-the-art watermarking techniques highlight the superiority of the proposed method in terms of robustness,fidelity,and computational efficiency.The hybrid framework ensures secure,adaptive watermark embedding,making it highly suitable for applications in digital rights management,content authentication,and medical image protection.The integration of spatial and frequency domain features with evolutionary optimization presents a promising direction for future watermarking technologies. 展开更多
关键词 Digital watermarking Möbius transforms discrete wavelet transform redundant discrete wavelet transform genetic algorithm ROBUSTNESS geometric attacks
在线阅读 下载PDF
Contourlet watermarking algorithm based on Arnold scrambling and singular value decomposition 被引量:3
11
作者 陈立全 孙晓燕 +1 位作者 卢苗 邵辰 《Journal of Southeast University(English Edition)》 EI CAS 2012年第4期386-391,共6页
A new digital watermarking algorithm based on the contourlet transform is proposed to improve the robustness and anti-attack performances of digital watermarking. The algorithm uses the Arnold scrambling technique and... A new digital watermarking algorithm based on the contourlet transform is proposed to improve the robustness and anti-attack performances of digital watermarking. The algorithm uses the Arnold scrambling technique and the singular value decomposition (SVD) scheme. The Arnold scrambling technique is used to preprocess the watermark, and the SVD scheme is used to find the best suitable hiding points. After the contourlet transform of the carrier image, intermediate frequency sub-bands are decomposed to obtain the singularity values. Then the watermark bits scrambled in the Arnold rules are dispersedly embedded into the selected SVD points. Finally, the inverse contourlet transform is applied to obtain the carrier image with the watermark. In the extraction part, the watermark can be extracted by the semi-blind watermark extracting algorithm. Simulation results show that the proposed algorithm has better hiding and robustness performances than the traditional contourlet watermarking algorithm and the contourlet watermarking algorithm with SVD. Meanwhile, it has good robustness performances when the embedded watermark is attacked by Gaussian noise, salt- and-pepper noise, multiplicative noise, image scaling and image cutting attacks, etc. while security is ensured. 展开更多
关键词 digital watermarking contourlet transform Arnold scrambling singular value decomposition (SVD)
在线阅读 下载PDF
Digital watermarking algorithm based on neural network in multiwavelet domain 被引量:2
12
作者 王振飞 宋胜利 《Journal of Southeast University(English Edition)》 EI CAS 2007年第2期211-215,共5页
A novel blind digital watermarking algorithm based on neural networks and multiwavelet transform is presented. The host image is decomposed through multiwavelet transform. There are four subblocks in the LL- level of ... A novel blind digital watermarking algorithm based on neural networks and multiwavelet transform is presented. The host image is decomposed through multiwavelet transform. There are four subblocks in the LL- level of the multiwavelet domain and these subblocks have many similarities. Watermark bits are added to low- frequency coefficients. Because of the learning and adaptive capabilities of neural networks, the trained neural networks almost exactly recover the watermark from the watermarked image. Experimental results demonstrate that the new algorithm is robust against a variety of attacks, especially, the watermark extraction does not require the original image. 展开更多
关键词 digital watermarking neural networks multiwavelet transform
在线阅读 下载PDF
基于重复模式的盲水印数字图像矫正算法
13
作者 徐佳宁 席绍阳 +4 位作者 徐鑫 王琅 周越浦 朱晓强 曾丹 《工业控制计算机》 2026年第1期65-66,109,共3页
为了增强盲水印算法的鲁棒性,提出了一种基于ResNet34网络架构的盲水印图像校正方法,旨在纠正单张输入图像中的透视变形。该方法首先通过稀疏差分调制图像,微调特定像素以嵌入水印信息,形成重复模式;其次,利用ResNet34网络架构,结合大... 为了增强盲水印算法的鲁棒性,提出了一种基于ResNet34网络架构的盲水印图像校正方法,旨在纠正单张输入图像中的透视变形。该方法首先通过稀疏差分调制图像,微调特定像素以嵌入水印信息,形成重复模式;其次,利用ResNet34网络架构,结合大量合成的透视失真数据集进行训练,以预测透视图像与校正图像之间的角点偏移。实验结果表明,该算法在泛化能力、深度、精度和收敛速度方面均表现出色,并且能够有效抵御随机裁剪、高斯模糊、颜色抖动、颜色偏移和颜色压缩等攻击手段。 展开更多
关键词 盲水印 透视矫正 角点偏移
在线阅读 下载PDF
基于注意力机制的文档图像屏摄鲁棒水印方法
14
作者 张小敏 赵军智 和红杰 《计算机科学》 北大核心 2026年第1期413-422,共10页
屏摄鲁棒的水印算法在版权保护、追踪溯源等领域具有重要意义。现有的抗屏摄鲁棒水印算法大多关注于自然图像,忽视了对文档图像的研究。文档载体本身的冗余信息较少,水印的鲁棒性和不可感知性很难得到平衡。为解决这一问题,提出了一种... 屏摄鲁棒的水印算法在版权保护、追踪溯源等领域具有重要意义。现有的抗屏摄鲁棒水印算法大多关注于自然图像,忽视了对文档图像的研究。文档载体本身的冗余信息较少,水印的鲁棒性和不可感知性很难得到平衡。为解决这一问题,提出了一种基于注意力机制的文档图像屏摄鲁棒水印方法。为提升水印的不可感知性,在编码器网络中引入注意力特征融合模块,实现浅层特征和深层特征的自适应聚合。为提高算法的鲁棒提取能力,在解码器网络中设计了自适应通道与空间注意力模块,突出通道和空间维度中与水印信息高度相关的特征。同时,在屏摄噪声模拟过程中设计了摩尔纹失真层,以提高算法抵抗真实摩尔纹干扰的鲁棒性能。实验结果显示,所提方法的平均PSNR为33.4 dB,SSIM为0.9885,RMSE为5.48,在多种屏摄场景的平均提取准确率可达99.49%。在图像质量和水印鲁棒性方面,均优于现有同类方法。 展开更多
关键词 屏摄鲁棒水印 文档图像 注意力特征融合 自适应通道与空间注意力 摩尔纹失真
在线阅读 下载PDF
基于鲁棒分区水印的深度学习模型保护方法
15
作者 吕正浩 咸鹤群 《计算机科学》 北大核心 2026年第1期423-429,共7页
机器学习涉及到昂贵的数据收集和训练成本,模型所有者可能会担心自己的模型遭到未授权的复制或使用,损害到模型所有者的知识产权。因此,如何有效保护这些模型的知识产权成为一个亟待解决的问题。为此,研究人员提出了模型水印的概念。类... 机器学习涉及到昂贵的数据收集和训练成本,模型所有者可能会担心自己的模型遭到未授权的复制或使用,损害到模型所有者的知识产权。因此,如何有效保护这些模型的知识产权成为一个亟待解决的问题。为此,研究人员提出了模型水印的概念。类似于数字水印技术将水印嵌入图像的方式,模型水印通过将特定的标识嵌入机器学习模型中,以达到版权确认的目的。然而,现有的水印方案在实际应用中存在一些局限性。首先,水印的嵌入不可避免地会对模型性能产生一定影响;其次,水印可能会通过微调等技术手段被移除。针对此类问题,提出一种新型的神经网络水印方案,采用区域化和分阶段的嵌入方式。这种方法不仅旨在最大限度地减少对模型性能的影响,还力图提升水印本身的鲁棒性。在MNIST,CIFAR-10和CIFAR-100数据集上的实验验证了该方案的有效性。实验结果表明,该水印方案在保持水印存活率的同时,对模型性能的影响极小,相较于现有的基线水印方案,模型性能提升幅度最高可达18个百分点。此外,所提出的方案对微调等攻击手段表现出较强的鲁棒性,并且不受模型剪枝操作的影响。即便攻击者试图完全移除水印,也必须以显著降低模型性能为代价。 展开更多
关键词 深度神经网络 模型水印 版权验证 人工智能安全 水印鲁棒性 模型性能
在线阅读 下载PDF
WaterMark认证及澳洲座便器技术要求简介
16
作者 商蓓 段先湖 杨继芳 《佛山陶瓷》 2012年第1期42-44,共3页
本文简要介绍了卫生洁具进入澳大利亚市场需要通过的WaterMark和WELS认证,有针对性地介绍了进行认证和检验所涉及的有关标准、技术要求、星级评定规则和标签样式,并对座便器标准的主要技术指标或要求进行了解析。
关键词 watermark WELS 标准 技术要求 星级评定
在线阅读 下载PDF
一种流水线A/D转换器Multi-bit级增益误差校正方法 被引量:1
17
作者 王妍 于奇 +1 位作者 宁宁 杨谟华 《微电子学》 CAS CSCD 北大核心 2009年第3期302-305,310,共5页
提出了一种用于流水线A/D转换器multi-bit级增益误差校正的方法及其实现方案。该方法应用改进冗余位结构,通过在其子DAC输出端引入伪随机信号测量级间增益;利用此估计值在后台进行增益误差补偿。为了验证设计,对12位流水线ADC进行系统模... 提出了一种用于流水线A/D转换器multi-bit级增益误差校正的方法及其实现方案。该方法应用改进冗余位结构,通过在其子DAC输出端引入伪随机信号测量级间增益;利用此估计值在后台进行增益误差补偿。为了验证设计,对12位流水线ADC进行系统模拟,当首级有效精度为3位,且相对增益误差为±2%时,经校正后,INL均为0.16LSB,DNL分别为0.13LSB和0.14LSB,SFDR和SNDR分别提高35dB和16dB。分析表明,该方法能有效补偿multi-bit级增益偏大或偏小的误差,进而实现增益误差校正,且不会降低ADC转换范围和增加额外的比较器。 展开更多
关键词 A/D转换器 multi-bit 增益误差校正
在线阅读 下载PDF
Blind multiple watermarking algorithm for audio 被引量:2
18
作者 陈宁 朱杰 《Journal of Southeast University(English Edition)》 EI CAS 2007年第2期206-210,共5页
To make digital watermarking accomplish several goals, a new method for simultaneously embedding multiple watermarks into the same audio signal is proposed. First, the original audio signal is segmented into frames of... To make digital watermarking accomplish several goals, a new method for simultaneously embedding multiple watermarks into the same audio signal is proposed. First, the original audio signal is segmented into frames of appointed lengths and all the element watermarks are encoded to achieve a mixed watermark. Then, the binary bits in the mixed watermark are embedded into the audio frames with the echo hiding technique. The watermark extraction can be performed without an original audio signal. Furthermore, in order to enhance the extraction accuracy and the robustness of the proposed algorithm against common signal manipulations, the autocorrelafion of the power cepstrum is utilized to estimate the echo delays in the watermarked audio frames to extract the mixed watermark and the corresponding decoding method is applied to achieve the element watermarks. Computer simulation results indicate that the proposed scheme has great robustness against common signal manipulations of Mp3 compressing, re-sampling, re-quantizing, low-pass filtering and white noise addition. 展开更多
关键词 multiple watermarking echo hiding power cepstrum blind detection
在线阅读 下载PDF
智慧运维一体化平台代码防篡改技术研究
19
作者 高志琨 袁亮 +1 位作者 马彦 张洁 《电子设计工程》 2026年第1期13-16,共4页
面对复杂的篡改攻击时,运维一体化平台的脆弱性逐渐显现,使得平台代码容易被篡改。故提出基于水印加密的代码数据提取与防篡改技术。构建平台代码篡改成功表达式与篡改成功率函数,提取被篡改后的数据。将提取数据输入水印加密函数生成密... 面对复杂的篡改攻击时,运维一体化平台的脆弱性逐渐显现,使得平台代码容易被篡改。故提出基于水印加密的代码数据提取与防篡改技术。构建平台代码篡改成功表达式与篡改成功率函数,提取被篡改后的数据。将提取数据输入水印加密函数生成密文,通过聚合节点ID构建水印加密聚合函数,避免数据冗余对代码防篡改效果的负面影响。确定被篡改后数据恢复区域,构建水印索引,定位包含所需恢复数据的水印信息,获取恢复后代码数据,实现平台代码防篡改。通过实验验证结果可知,该技术平台代码安全性最高能达到70%,具有良好的防篡改效果。 展开更多
关键词 智慧运维 一体化平台 代码防篡改 水印索引 水印加密聚合函数
在线阅读 下载PDF
Robust Reversible Audio Watermarking Scheme for Telemedicine and Privacy Protection 被引量:64
20
作者 Xiaorui Zhang Xun Sun +2 位作者 Xingming Sun Wei Sun Sunil Kumar Jha 《Computers, Materials & Continua》 SCIE EI 2022年第5期3035-3050,共16页
The leakage of medical audio data in telemedicine seriously violates the privacy of patients.In order to avoid the leakage of patient information in telemedicine,a two-stage reversible robust audio watermarking algori... The leakage of medical audio data in telemedicine seriously violates the privacy of patients.In order to avoid the leakage of patient information in telemedicine,a two-stage reversible robust audio watermarking algorithm is proposed to protect medical audio data.The scheme decomposes the medical audio into two independent embedding domains,embeds the robust watermark and the reversible watermark into the two domains respectively.In order to ensure the audio quality,the Hurst exponent is used to find a suitable position for watermark embedding.Due to the independence of the two embedding domains,the embedding of the second-stage reversible watermark will not affect the first-stage watermark,so the robustness of the first-stage watermark can be well maintained.In the second stage,the correlation between the sampling points in the medical audio is used to modify the hidden bits of the histogram to reduce the modification of the medical audio and reduce the distortion caused by reversible embedding.Simulation experiments show that this scheme has strong robustness against signal processing operations such as MP3 compression of 48 db,additive white Gaussian noise(AWGN)of 20 db,low-pass filtering,resampling,re-quantization and other attacks,and has good imperceptibility. 展开更多
关键词 TELEMEDICINE privacy protection audio watermarking robust reversible watermarking two-stage embedding
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部