期刊文献+
共找到212篇文章
< 1 2 11 >
每页显示 20 50 100
Reversible Semi-Fragile Watermarking Technique for Integrity Control of Relational Database 被引量:1
1
作者 Ali Hamadou Abdoul Aziz Issaka Hassane +1 位作者 Lanciné Camara Harouna Naroua 《Engineering(科研)》 2024年第9期309-323,共15页
Reversible watermarking schemes for relational database are usually classified into two groups: robust schemes and fragile schemes. The main limitation of existing reversible fragile methods is that they cannot differ... Reversible watermarking schemes for relational database are usually classified into two groups: robust schemes and fragile schemes. The main limitation of existing reversible fragile methods is that they cannot differentiate between legal and malicious modifications. In this paper, we introduce a novel lossless semi-fragile scheme based on prediction-error expansion for content protection of relational database. In the proposed method, all attributes in a database relation are first classified according to their sensitivity to legitimate updates. Then, the watermark is embedded by expanding the prediction error of the two least significant digits of securely selected attributes. At watermark extraction, the proposed method has the ability to fully restore the original data while detecting and localizing tampering. The applicability of our method is demonstrated theoretically and experimentally. 展开更多
关键词 Semi-Fragile watermarking Integrity Control reversIBILITY Prediction-Error Expansion
在线阅读 下载PDF
A Dual Domain Robust Reversible Watermarking Algorithm for Frame Grouping Videos Using Scene Smoothness
2
作者 Yucheng Liang Ke Niu +1 位作者 Yingnan Zhang Yifei Meng 《Computers, Materials & Continua》 SCIE EI 2024年第6期5143-5174,共32页
The proposed robust reversible watermarking algorithm addresses the compatibility challenges between robustness and reversibility in existing video watermarking techniques by leveraging scene smoothness for frame grou... The proposed robust reversible watermarking algorithm addresses the compatibility challenges between robustness and reversibility in existing video watermarking techniques by leveraging scene smoothness for frame grouping videos.Grounded in the H.264 video coding standard,the algorithm first employs traditional robust watermark stitching technology to embed watermark information in the low-frequency coefficient domain of the U channel.Subsequently,it utilizes histogram migration techniques in the high-frequency coefficient domain of the U channel to embed auxiliary information,enabling successful watermark extraction and lossless recovery of the original video content.Experimental results demonstrate the algorithm’s strong imperceptibility,with each embedded frame in the experimental videos achieving a mean peak signal-to-noise ratio of 49.3830 dB and a mean structural similarity of 0.9996.Compared with the three comparison algorithms,the performance of the two experimental indexes is improved by 7.59%and 0.4%on average.At the same time,the proposed algorithm has strong robustness to both offline and online attacks:In the face of offline attacks,the average normalized correlation coefficient between the extracted watermark and the original watermark is 0.9989,and the average bit error rate is 0.0089.In the face of online attacks,the normalized correlation coefficient between the extracted watermark and the original watermark is 0.8840,and the mean bit error rate is 0.2269.Compared with the three comparison algorithms,the performance of the two experimental indexes is improved by 1.27%and 18.16%on average,highlighting the algorithm’s robustness.Furthermore,the algorithm exhibits low computational complexity,with the mean encoding and the mean decoding time differentials during experimental video processing being 3.934 and 2.273 s,respectively,underscoring its practical utility. 展开更多
关键词 Robust reversible watermarking scene smoothness dual-domain U channel H.264 encoding standard
在线阅读 下载PDF
Robust Reversible Audio Watermarking Scheme for Telemedicine and Privacy Protection 被引量:64
3
作者 Xiaorui Zhang Xun Sun +2 位作者 Xingming Sun Wei Sun Sunil Kumar Jha 《Computers, Materials & Continua》 SCIE EI 2022年第5期3035-3050,共16页
The leakage of medical audio data in telemedicine seriously violates the privacy of patients.In order to avoid the leakage of patient information in telemedicine,a two-stage reversible robust audio watermarking algori... The leakage of medical audio data in telemedicine seriously violates the privacy of patients.In order to avoid the leakage of patient information in telemedicine,a two-stage reversible robust audio watermarking algorithm is proposed to protect medical audio data.The scheme decomposes the medical audio into two independent embedding domains,embeds the robust watermark and the reversible watermark into the two domains respectively.In order to ensure the audio quality,the Hurst exponent is used to find a suitable position for watermark embedding.Due to the independence of the two embedding domains,the embedding of the second-stage reversible watermark will not affect the first-stage watermark,so the robustness of the first-stage watermark can be well maintained.In the second stage,the correlation between the sampling points in the medical audio is used to modify the hidden bits of the histogram to reduce the modification of the medical audio and reduce the distortion caused by reversible embedding.Simulation experiments show that this scheme has strong robustness against signal processing operations such as MP3 compression of 48 db,additive white Gaussian noise(AWGN)of 20 db,low-pass filtering,resampling,re-quantization and other attacks,and has good imperceptibility. 展开更多
关键词 TELEMEDICINE privacy protection audio watermarking robust reversible watermarking two-stage embedding
在线阅读 下载PDF
Reversible Natural Language Watermarking Using Synonym Substitution and Arithmetic Coding 被引量:8
4
作者 Lingyun Xiang Yan Li +2 位作者 Wei Hao Peng Yang Xiaobo Shen 《Computers, Materials & Continua》 SCIE EI 2018年第6期541-559,共19页
For protecting the copyright of a text and recovering its original content harmlessly,this paper proposes a novel reversible natural language watermarking method that combines arithmetic coding and synonym substitutio... For protecting the copyright of a text and recovering its original content harmlessly,this paper proposes a novel reversible natural language watermarking method that combines arithmetic coding and synonym substitution operations.By analyzing relative frequencies of synonymous words,synonyms employed for carrying payload are quantized into an unbalanced and redundant binary sequence.The quantized binary sequence is compressed by adaptive binary arithmetic coding losslessly to provide a spare for accommodating additional data.Then,the compressed data appended with the watermark are embedded into the cover text via synonym substitutions in an invertible manner.On the receiver side,the watermark and compressed data can be extracted by decoding the values of synonyms in the watermarked text,as a result of which the original context can be perfectly recovered by decompressing the extracted compressed data and substituting the replaced synonyms with their original synonyms.Experimental results demonstrate that the proposed method can extract the watermark successfully and achieve a lossless recovery of the original text.Additionally,it achieves a high embedding capacity. 展开更多
关键词 Arithmetic coding synonym substitution lossless compression reversible watermarking.
在线阅读 下载PDF
Reversible Watermarking Method with Low Distortion for the Secure Transmission of Medical Images 被引量:1
5
作者 Rizwan Taj Feng Tao +4 位作者 Shahzada Khurram Ateeq Ur Rehman Syed Kamran Haider Akber Abid Gardezi Saima Kanwal 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第3期1309-1324,共16页
In telemedicine,the realization of reversible watermarking through information security is an emerging research field.However,adding watermarks hinders the distribution of pixels in the cover image because it creates ... In telemedicine,the realization of reversible watermarking through information security is an emerging research field.However,adding watermarks hinders the distribution of pixels in the cover image because it creates distortions(which lead to an increase in the detection probability).In this article,we introduce a reversible watermarking method that can transmit medical images with minimal distortion and high security.The proposed method selects two adjacent gray pixels whose least significant bit(LSB)is different from the relevant message bit and then calculates the distortion degree.We use the LSB pairing method to embed the secret matrix of patient record into the cover image and exchange pixel values.Experimental results show that the designed method is robust to different attacks and has a high PSNR(peak signal-to-noise ratio)value.The MRI image quality and imperceptibility are verified by embedding a secret matrix of up to 262,688 bits to achieve an average PSNR of 51.657 dB.In addition,the proposed algorithm is tested against the latest technology on standard images,and it is found that the average PSNR of our proposed reversible watermarking technology is higher(i.e.,51.71 dB).Numerical results show that the algorithm can be extended to normal images and medical images. 展开更多
关键词 LSB reversible watermarking medical images security data distortion
在线阅读 下载PDF
Reversible Watermarking in JPEG Images Based on Modified RZL Codes and Histogram Shift
6
作者 CHEN Biao ZHANG Weiming YU Nenghai 《Wuhan University Journal of Natural Sciences》 CAS 2013年第2期126-132,共7页
Reversible watermarking has extensive applications in fields such as medical data management and forensic enforcement. In this article, we propose a modified reverse zero-run length (RZL) coding method for reversibl... Reversible watermarking has extensive applications in fields such as medical data management and forensic enforcement. In this article, we propose a modified reverse zero-run length (RZL) coding method for reversible watermarking, which intro- duces fewer modifications to cover than previous ones under the same embedding rate. By combining the coding method with his- togram shift and quantization table modification strategy, we pro- pose a novel reversible data hiding algorithm for JPEG images. Compared with previous art, when embedding the same payload, our method has an improvement of at least 2 dB in stego image's quality, which proves the effectiveness and advantage of our algo- rithm. 展开更多
关键词 reversible watermarking JPEG images image au-thentication PAYLOAD PSNR
原文传递
Reversible Audio Watermarking Algorithm Using Non-Causal Prediction
7
作者 HUO Yongjin XIANG Shijun +2 位作者 LIU Shangyi LUO Xinrong BAI Zhongliang 《Wuhan University Journal of Natural Sciences》 CAS 2013年第5期455-460,共6页
Reversible watermarking technique enables to extract embedded information without any loss of the host signal. For the reduction of the embedding distortion, a desirable reversible watermarking approach should exploit... Reversible watermarking technique enables to extract embedded information without any loss of the host signal. For the reduction of the embedding distortion, a desirable reversible watermarking approach should exploit efficient prediction way to generate prediction errors with a smaller magnitude for expansion embedding. In this paper, we present a reversible audio watermarking scheme based on a new non-causal prediction method and embedding strategy. The proposed non-causal prediction method provides non-integer prediction errors and the proposed expansion embedding strategy can proceed them for a lower embedding distortion. Experimental results have shown that the proposed reversible technique has a lower embedding distortion for the same embedding payload in comparison with the existing state-of-the-art works. 展开更多
关键词 AUDIO reversible watermarking non-causal prediction expansion embedding
原文传递
Threshold Controlled Scheme of Difference Expansion Techniques for Reversible Watermarking
8
作者 蒋历军 郭小涛 +2 位作者 杨浩 赵俊 庄天戈 《Journal of Shanghai Jiaotong university(Science)》 EI 2010年第5期541-548,共8页
Since Tian Jun proposed the difference expansion embedding technique,based on which,many reversible watermarking techniques were proposed.However,these methods do not perform well when the payload is high.In this pape... Since Tian Jun proposed the difference expansion embedding technique,based on which,many reversible watermarking techniques were proposed.However,these methods do not perform well when the payload is high.In this paper,we proposed an expandable difference threshold controlled scheme for these three methods.Experiments show that our scheme improves the performance of these three methods for heavy payload. 展开更多
关键词 difference expansion embedding technique reversible watermarking visual quality difference threshold controlled scheme
原文传递
Adaptive Reversible Visible Watermarking Based on Total Variation for BTC-Compressed Images
9
作者 Hengfu Yang Mingfang Jiang Zhichen Gao 《Computers, Materials & Continua》 SCIE EI 2023年第3期5173-5189,共17页
Few previous Reversible Visible Watermarking(RVW)schemes have both good transparency and watermark visibility.An adaptive RVW scheme that integrates Total Variation and visual perception in Block Truncation Coding(BTC... Few previous Reversible Visible Watermarking(RVW)schemes have both good transparency and watermark visibility.An adaptive RVW scheme that integrates Total Variation and visual perception in Block Truncation Coding(BTC)compressed domain,called TVB-RVW is proposed in this paper.A new mean image estimation method for BTC-compressed images is first developed with the help of Total Variation.Then,a visual perception factor computation model is devised by fusing texture and luminance characteristics.An adaptive watermark embedding strategy is used to embed the visible watermark with the effect of the visual perception factor in the BTC domain.Moreover,a lossless embedding method of the encrypted visible watermark is exploited to deter illegal watermark removal.The visible watermark can be removed since the visual perception factor and the estimated mean image remain unchanged before and after watermark embedding.Extensive experiments validate the superiority of the proposed algorithm over previous RVW schemes in BTC in terms of the visual quality of watermarked images and watermark visibility,and it can achieve a good balance between transparency and watermark visibility. 展开更多
关键词 reversible visible watermark block truncation coding visual perception total variation
在线阅读 下载PDF
Reversible Data Embedding Scheme Using Relationships between Pixel-Values and Their Neighbors
10
作者 Chia-Chen Lin Chin-Chen Chang Yi-Hui Chen 《Journal of Electronic Science and Technology》 CAS 2012年第3期238-249,共12页
Reversible data embedding is becoming a very important issue in securing images transmitted over the Internet, especially in dealing with sensitive images such as those created for military data and medical data. Base... Reversible data embedding is becoming a very important issue in securing images transmitted over the Internet, especially in dealing with sensitive images such as those created for military data and medical data. Based on the relationships between pixels and their neighbors, we propose a reversible data embedding scheme to embed hidden messages into an original image. In our proposed scheme, a two-layer data embedding approach is used for our proposed data embedding phase. Layer-1 embedding is used to hide secret data. Layer-2 embedding, which is an embedding variant of the proposed layer-1 embedding, is used to hide side information, such as the parameters required to restore the marked image. In our layer-1 embedding, the value of an embedded pixel is determined according to a predetermined threshold and the relationship between the pixel and its neighbors. In our layer-2 embedding, the similar data embedding concept is expanded to the block-based. Experimental results provide supportive data to show that the proposed scheme can provide greater hiding capacity while preserving the image quality of a marked image in comparison with previous work. 展开更多
关键词 Cover image marked image reversible data embedding watermarking.
在线阅读 下载PDF
平衡鲁棒性与数据失真的可逆数据库水印方案
11
作者 王春东 李悦 《桂林理工大学学报》 北大核心 2025年第1期103-110,共8页
数据库水印在保护版权和防止数据泄露方面起着不可替代的作用,但往往数据失真度和水印鲁棒性是正相关关系,鲁棒性越高,失真度越大。针对此问题,提出了一种平衡水印鲁棒性和数据失真的最优可逆数据库水印方案(IGADEW)。该方案不再局限于... 数据库水印在保护版权和防止数据泄露方面起着不可替代的作用,但往往数据失真度和水印鲁棒性是正相关关系,鲁棒性越高,失真度越大。针对此问题,提出了一种平衡水印鲁棒性和数据失真的最优可逆数据库水印方案(IGADEW)。该方案不再局限于寻找单一最佳嵌入密钥,亦或最佳嵌入位置,而是利用遗传算法(GA)综合优化对象,设计带权目标函数来评估鲁棒性和失真度的平衡。IGADEW方案中引入基于散列函数的消息验证码(HMAC)加密、数字签名手段来保证鲁棒性,设置阈值约束来限制数据失真。可逆嵌入操作基于差值扩展(DEW)算术运算实现,并在提取阶段使用投票机制来避免检测结果的随机性。使用UCI数据集验证了方案的有效性,与现有方案相比,IGADEW对常见的插入、删除、修改攻击具有更好的鲁棒性,同时数据失真更小。 展开更多
关键词 可逆数据库水印 鲁棒性 数据失真 差值扩展 遗传算法
在线阅读 下载PDF
面向弥散张量图像的鲁棒可逆水印算法
12
作者 李丹丹 李智 +1 位作者 郑龙 张丽 《计算机工程》 北大核心 2025年第5期279-287,共9页
弥散张量成像(DTI)是一种常用的核磁共振成像技术,为了对弥散张量图像进行版权保护,同时保证弥散张量数据的完整性,提出一种基于黎曼度量的两阶段鲁棒可逆水印算法。为了避免常规欧几里得运算在张量空间中的误差,通过对数-欧几里得变换... 弥散张量成像(DTI)是一种常用的核磁共振成像技术,为了对弥散张量图像进行版权保护,同时保证弥散张量数据的完整性,提出一种基于黎曼度量的两阶段鲁棒可逆水印算法。为了避免常规欧几里得运算在张量空间中的误差,通过对数-欧几里得变换,将弥散张量从流形空间映射到对数-欧几里得空间,利用深度学习模型提取弥散张量图像的特征并嵌入水印信息。然后,结合可逆水印算法,在嵌入鲁棒水印后恢复出高质量的弥散张量图像。实验结果表明,该算法能够抵御裁剪、旋转、高斯噪声等攻击,且算法恢复出的弥散张量误差不超过2×10^(-8),峰值信噪比(PSNR)相较于VSTNet算法提高了21%。 展开更多
关键词 鲁棒水印 可逆水印 弥散张量图像 黎曼度量 深度学习
在线阅读 下载PDF
采用IWT和自适应伪Zernike矩的鲁棒可逆水印方案
13
作者 高光勇 花锋 +2 位作者 王敏 赵传信 夏志华 《电子学报》 北大核心 2025年第5期1571-1583,共13页
鲁棒可逆水印(Robust Reversible Watermarking,RRW)是近年来信息隐藏领域中一个非常新颖和有价值的研究方向,无论是在图像的版权认证还是高保真领域都有较好发展前景.然而,现有的RRW方案抵抗几何变换、常见攻击以及联合攻击的鲁棒性较... 鲁棒可逆水印(Robust Reversible Watermarking,RRW)是近年来信息隐藏领域中一个非常新颖和有价值的研究方向,无论是在图像的版权认证还是高保真领域都有较好发展前景.然而,现有的RRW方案抵抗几何变换、常见攻击以及联合攻击的鲁棒性较差.为了解决这些问题,本文提出一种采用整数小波变换(Integer Wavelet Transfor⁃mation,IWT)和自适应伪Zernike矩的鲁棒可逆水印方案,该方案在提升水印不可感知性的同时具有可逆性和鲁棒性.首先,由原始图像通过IWT得到低频区域计算生成伪Zernike矩的幅度,然后用自适应归一化方法选择合适的矩,再通过改进的带抖动补偿量化索引调制技术将鲁棒水印嵌入到合适的伪Zernike矩中,对带水印的伪Zernike矩进行重构生成水印图像.最后计算其hash值,并将其与水印图像和原始图像之间的误差、重构误差组成辅助信息嵌入水印图像中,在无攻击的情况下实现载体图像的可逆还原.实验结果表明,本方案对常见信号处理和几何变换攻击具有鲁棒性,相较于近几年提出的RRW方案,本方案在不可见性下实现了更好的鲁棒性. 展开更多
关键词 鲁棒水印 伪ZERNIKE矩 整数小波变换 可逆性 信息隐藏
在线阅读 下载PDF
一种矢量地图同态加密域可逆水印方法
14
作者 吴柏燕 柳范硕 刘曦 《地理科学》 北大核心 2025年第4期699-710,共12页
加密技术可防止非授权用户浏览数据。可逆水印技术可用于对数据的一致性或来源进行认证,并可无损恢复原始数据。针对矢量地图数据的安全保护问题,结合加密技术和可逆水印技术,提出一种基于非对称公钥同态加密的矢量地图加密域可逆水印... 加密技术可防止非授权用户浏览数据。可逆水印技术可用于对数据的一致性或来源进行认证,并可无损恢复原始数据。针对矢量地图数据的安全保护问题,结合加密技术和可逆水印技术,提出一种基于非对称公钥同态加密的矢量地图加密域可逆水印方法。所提算法,基于加密算法的同态特性,在地图数据密文域中实现了基于改进直方图平移的可逆水印嵌入机制。对3个不同类型的地图数据进行算法实验,实验结果验证了本文算法的可行性和有效性。通过对3个地图数据的水印嵌入性能的分析及与相关明文域和密文域矢量地图可逆水印算法的比较,发现本文算法具有更大的水印容量,更好的水印透明性及更安全的数据加密效果,是一种针对矢量地图的理想的非对称同态加密域可逆水印方案。 展开更多
关键词 矢量地图 可逆水印 非对称同态加密 加密域水印 直方图平移
原文传递
基于改进频域预测误差扩展的数字遥感图像可逆水印算法
15
作者 李国燕 梁京 高琳 《天津城建大学学报》 2025年第2期129-137,共9页
笔者提出了一种基于改进频域预测误差扩展(prediction-error expansion,PEE)的遥感图像可逆水印算法.该算法基于图像复杂度将像素分类,优先选择像素值分布平滑的区域嵌入水印.为了提高预测精度,利用频域内相邻系数之间的关系提出3系数... 笔者提出了一种基于改进频域预测误差扩展(prediction-error expansion,PEE)的遥感图像可逆水印算法.该算法基于图像复杂度将像素分类,优先选择像素值分布平滑的区域嵌入水印.为了提高预测精度,利用频域内相邻系数之间的关系提出3系数加权平均预测算法,并使用所提预测算法生成预测误差直方图,通过在直方图中应用多直方图修改嵌入策略优化了嵌入性能.仿真实验结果证明,该算法在提高了嵌入容量的同时,保证了图像的视觉质量,相较于对比算法具有更好的性能表现. 展开更多
关键词 遥感图像 可逆水印 预测误差扩展 菱形预测
在线阅读 下载PDF
A Dual-Chaining Watermark Scheme for Data Integrity Protection in Internet of Things 被引量:2
16
作者 Baowei Wang Weiwen Kong +1 位作者 Wei Li Neal NXiong 《Computers, Materials & Continua》 SCIE EI 2019年第3期679-695,共17页
Chaining watermark is an effective way to verify the integrity of streaming data in wireless network environment,especially in resource-constrained sensor networks,such as the perception layer of Internet of Things ap... Chaining watermark is an effective way to verify the integrity of streaming data in wireless network environment,especially in resource-constrained sensor networks,such as the perception layer of Internet of Things applications.However,in all existing single chaining watermark schemes,how to ensure the synchronization between the data sender and the receiver is still an unsolved problem.Once the synchronization points are attacked by the adversary,existing data integrity authentication schemes are difficult to work properly,and the false negative rate might be up to 50 percent.And the additional fixed group delimiters not only increase the data size,but are also easily detected by adversaries.In this paper,we propose an effective dual-chaining watermark scheme,called DCW,for data integrity protection in smart campus IoT applications.The proposed DCW scheme has the following three characteristics:(1)In order to authenticate the integrity of the data,fragile watermarks are generated and embedded into the data in a chaining way using dynamic grouping;(2)Instead of additional fixed group delimiters,chained watermark delimiters are proposed to synchronize the both transmission sides in case of the synchronization points are tampered;(3)To achieve lossless integrity authentication,a reversible watermarking technique is applied.The experimental results and security analysis can prove that the proposed DCW scheme is able to effectively authenticate the integrity of the data with free distortion at low cost in our smart meteorological Internet of Things system. 展开更多
关键词 Dual-chaining reversible watermark integrity authentication Internet of things.
在线阅读 下载PDF
Payload Capacity Scheme for Quran Text Watermarking Based on Vowels with Kashida 被引量:1
17
作者 Ali A.R.Alkhafaji Nilam Nur Amir Sjarif +5 位作者 M.A Shahidan Nurulhuda Firdaus Mohd Azmi Haslina Md Sarkan Suriayati Chuprat Osamah Ibrahim Khalaf Ehab Nabiel Al-Khanak 《Computers, Materials & Continua》 SCIE EI 2021年第6期3865-3885,共21页
The most sensitive Arabic text available online is the digital Holy Quran.This sacred Islamic religious book is recited by all Muslims worldwide including non-Arabs as part of their worship needs.Thus,it should be pro... The most sensitive Arabic text available online is the digital Holy Quran.This sacred Islamic religious book is recited by all Muslims worldwide including non-Arabs as part of their worship needs.Thus,it should be protected from any kind of tampering to keep its invaluable meaning intact.Different characteristics of Arabic letters like the vowels(),Kashida(extended letters),and other symbols in the Holy Quran must be secured from alterations.The cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio(PSNR)and Embedding Ratio(ER).A watermarking technique with enhanced attributes must,therefore,be designed for the Quran’s text using Arabic vowels with kashida.The gap addressed by this paper is to improve the security of Arabic text in the Holy Quran by using vowels with kashida.The purpose of this paper is to enhance the Quran text watermarking scheme based on a reversing technique.The methodology consists of four phases:The first phase is a pre-processing followed by the second phase-the embedding process phase—which will hide the data after the vowels.That is,if the secret bit is“1”,then the kashida is inserted;however,the kashida is not inserted if the bit is“0”.The third phase is the extraction process and the last phase is to evaluate the performance of the proposed scheme by using PSNR(for the imperceptibility)and ER(for the capacity).The experimental results show that the proposed method of imperceptibility insertion is also optimized with the help of a reversing algorithm.The proposed strategy obtains a 90.5%capacity.Furthermore,the proposed algorithm attained 66.1%which is referred to as imperceptibility. 展开更多
关键词 Quran text watermarking Arabic text capacity IMPERCEPTIBILITY Kashida VOWELS reversing technique
在线阅读 下载PDF
基于双域标记的视频鲁棒可逆水印算法
18
作者 钮可 梁钰承 +1 位作者 孟逸飞 汪晶晶 《信息网络安全》 CSCD 北大核心 2024年第2期239-251,共13页
针对现有视频水印算法无法兼顾鲁棒性与可逆性的问题,文章提出一种基于双域标记的视频鲁棒可逆水印算法。该算法在H.264视频编码中的量化DCT系数域利用传统鲁棒水印拼接技术,嵌入水印信息;在运动矢量域利用二维直方图迁移技术,嵌入辅助... 针对现有视频水印算法无法兼顾鲁棒性与可逆性的问题,文章提出一种基于双域标记的视频鲁棒可逆水印算法。该算法在H.264视频编码中的量化DCT系数域利用传统鲁棒水印拼接技术,嵌入水印信息;在运动矢量域利用二维直方图迁移技术,嵌入辅助信息,实现解码端的水印提取与原始视频的无损恢复。实验结果表明,文章算法具有良好的不可见性,实验视频的峰值信噪比与结构相似度均值分别为44.7537 dB与0.9902,比特率扩张均在16.74%以下,同时对不同强度的失真攻击均具有强鲁棒性,实验视频的归一化互相关系数均在0.970以上,误码率均在0.068以下。 展开更多
关键词 鲁棒可逆水印 双域标记 H.264编码标准 量化DCT系数 运动矢量
在线阅读 下载PDF
面向电子航海图分发服务的多级可逆水印算法
19
作者 董箭 张明阳 +2 位作者 唐露露 陈阳 谢天 《海洋测绘》 CSCD 北大核心 2024年第1期73-78,共6页
针对电子航海图(ENC)分发过程中存在的版权归属不清、泄露责任难以认定的问题,在顾及ENC对数据扰动敏感、精度要求高特点的基础上,以高隐蔽性ENC数据多级分发版权保护为目标,提出了一种面向ENC分发服务的多级可逆水印算法。首先通过精... 针对电子航海图(ENC)分发过程中存在的版权归属不清、泄露责任难以认定的问题,在顾及ENC对数据扰动敏感、精度要求高特点的基础上,以高隐蔽性ENC数据多级分发版权保护为目标,提出了一种面向ENC分发服务的多级可逆水印算法。首先通过精度移位创造独立水印信息嵌入空间确保算法的可逆,其次通过控制水印信息嵌入的坐标位置减小对数据精度的干扰,然后利用极坐标转换的方式隐藏水印信息,最后基于水印信息的提取与再嵌入实现动态多级分发。实验结果表明:该算法具有较好的不可感知性和充足的水印容量,能有效实现ENC多级分发过程中的版权溯源,预防数据盗版。 展开更多
关键词 电子航海图 不可感知性 多级可逆水印 快速反应码 追踪溯源
在线阅读 下载PDF
基于虚拟坐标的矢量地图差值扩展可逆水印方法 被引量:4
20
作者 戴千一 吴柏燕 《地理与地理信息科学》 CSCD 北大核心 2024年第1期11-17,25,共8页
传统差值扩展技术受数据相关性限制,直接应用于矢量数据可逆水印方案易导致较低的水印容量和较大的数据失真,对顶点相关性低的矢量地图,水印效果更差。为实现更高的水印容量并控制数据失真,该文针对传统差值扩展技术提出改进:①在顶点... 传统差值扩展技术受数据相关性限制,直接应用于矢量数据可逆水印方案易导致较低的水印容量和较大的数据失真,对顶点相关性低的矢量地图,水印效果更差。为实现更高的水印容量并控制数据失真,该文针对传统差值扩展技术提出改进:①在顶点坐标之间插入虚拟坐标,以虚拟坐标为参考点计算坐标差值;②将计算得到的坐标差值直方图向左平移,使直方图峰值点与原点重合;③水印以差值扩展的方式嵌入平移后的坐标差值中。实验结果表明:该算法的水印容量为2 bit/点,至少是传统差值扩展水印容量的6倍;与传统差值扩展方法相比,数据失真更小,原始地图坐标与水印地图坐标的RMSE和地图坐标最大改变量Max-R均大幅降低,算法严格可逆且对顶点相关性低的矢量地图水印效果仍然很好。 展开更多
关键词 矢量地图 可逆水印 差值扩展 虚拟坐标 直方图平移
在线阅读 下载PDF
上一页 1 2 11 下一页 到第
使用帮助 返回顶部