期刊文献+
共找到580篇文章
< 1 2 29 >
每页显示 20 50 100
A Feature-based Robust Digital Image Watermarking Against Desynchronization Attacks 被引量:2
1
作者 Xiang-Yang Wang Jun Wu 《International Journal of Automation and computing》 EI 2007年第4期428-432,共5页
In this paper, a new content-based image watermarking scheme is proposed. The Harris-Laplace detector is adopted to extract feature points, which can survive a variety of attacks. The local characteristic regions (L... In this paper, a new content-based image watermarking scheme is proposed. The Harris-Laplace detector is adopted to extract feature points, which can survive a variety of attacks. The local characteristic regions (LCRs) are adaptively constructed based on scale-space theory. Then, the LCRs are mapped to geometrically invariant space by using image normalization technique. Finally, several copies of the digital watermark are embedded into the nonoverlapped LCRs by quantizing the magnitude vectors of discrete Fourier transform (DFT) coefficients. By binding a watermark with LCR, resilience against desynchronization attacks can be readily obtained. Simulation results show that the proposed scheme is invisible and robust against various attacks which includes common signals processing and desynchronization attacks. 展开更多
关键词 Image watermarking desynchronization attacks feature points discrete Fourier transform.
在线阅读 下载PDF
A robust color image watermarking algorithm against rotation attacks 被引量:1
2
作者 韩绍程 杨金锋 +1 位作者 王蕊 贾桂敏 《Optoelectronics Letters》 EI 2018年第1期61-66,共6页
A robust digital watermarking algorithm is proposed based on quaternion wavelet transform(QWT) and discrete cosine transform(DCT) for copyright protection of color images. The luminance component Y of a host color ima... A robust digital watermarking algorithm is proposed based on quaternion wavelet transform(QWT) and discrete cosine transform(DCT) for copyright protection of color images. The luminance component Y of a host color image in YIQ space is decomposed by QWT, and then the coefficients of four low-frequency subbands are transformed by DCT. An original binary watermark scrambled by Arnold map and iterated sine chaotic system is embedded into the mid-frequency DCT coefficients of the subbands. In order to improve the performance of the proposed algorithm against rotation attacks, a rotation detection scheme is implemented before watermark extracting. The experimental results demonstrate that the proposed watermarking scheme shows strong robustness not only against common image processing attacks but also against arbitrary rotation attacks. 展开更多
关键词 QWT DCT A robust color image watermarking algorithm against rotation attacks YIQ
原文传递
Game Theory Based False Negative Probability of Embedded Watermark Under Unintentional and Steganalysis Attacks 被引量:1
3
作者 HU Ziquan SHE Kun +1 位作者 WANG Jianghua TANG Jianguo 《China Communications》 SCIE CSCD 2014年第5期114-123,共10页
Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,how... Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,however,do not consider the influence of steganalysis attack.This paper proposed the game theory based false negative probability to estimate the impacts of steganalysis attack,as well as unintentional attack.Specifically,game theory was used to model the collision between the embedment and steganalysis attack,and derive the optimal building embedding/attacking strategy.Such optimal playing strategies devote to calculating the attacker destructed watermark,used for calculation of the game theory based false negative probability.The experimental results show that watermark detection reliability measured using our proposed method,in comparison,can better reflect the real scenario in which the embedded watermark undergoes unintentional attack and the attacker using steganalysis attack.This paper provides a foundation for investigating countermeasures of digital watermarking community against steganalysis attack. 展开更多
关键词 digital watermarking false negative probability game theory watermark capacity steganalysis attack.
在线阅读 下载PDF
Wavelet-Based Denoising Attack on Image Watermarking
4
作者 XUAN Jian-hui WANG Li-na ZHANG Huan-guo 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期279-283,共5页
In this paper,we propose wavelet-based denois-ing attack methods on imagewatermarking in discrete cosine transform(DCT)or discrete Fourier transform(DFT)domain ordiscrete wavelet transform(DWT)domain Wiener filtering ... In this paper,we propose wavelet-based denois-ing attack methods on imagewatermarking in discrete cosine transform(DCT)or discrete Fourier transform(DFT)domain ordiscrete wavelet transform(DWT)domain Wiener filtering based on wavelet transform is performed inapproximation subband to remove DCI or DFT domain watermark,and adaptive wavelet soft thresholdingis employed to remove the watermark resided in detail subbands of DWT domain. 展开更多
关键词 watermarkING watermarking attack wavelet dcnoising Wiener filter
在线阅读 下载PDF
Robust Wavelet-Based Facial Image Watermarking Against Geometric Attacks Using Coordinate System Recovery
5
作者 赵培东 谢剑英 《Journal of Beijing Institute of Technology》 EI CAS 2008年第1期46-50,共5页
A coordinate system of the original image is established using a facial feature point localization technique. After the original image transformed into a new image with the standard coordinate system, a redundant wate... A coordinate system of the original image is established using a facial feature point localization technique. After the original image transformed into a new image with the standard coordinate system, a redundant watermark is adaptively embedded in the discrete wavelet transform(DWT) domain based on the statistical characteristics of the wavelet coefficient block. The coordinate system of watermarked image is reestablished as a calibration system. Regardless of the host image rotated, scaled, or translated(RST), all the geometric attacks are eliminated while the watermarked image is transformed into the standard coordinate system. The proposed watermark detection is a blind detection. Experimental results demonstrate the proposed scheme is robust against common and geometric image processing attacks, particularly its robustness against joint geometric attacks. 展开更多
关键词 digital watermark geometric attacks coordinate system statistical characteristics
在线阅读 下载PDF
High-Pass Block Replacement Attack of Watermarking
6
作者 王慧琴 Gwenael Doerr 张小红 《China Communications》 SCIE CSCD 2011年第4期159-163,共5页
To improve the watermark benchmarks database,a new BRA(Block Replacement Attack)method is introduced in this paper.Unlike the typical BRA which exploits the self-similarity among blocks in image,the scheme utilizes th... To improve the watermark benchmarks database,a new BRA(Block Replacement Attack)method is introduced in this paper.Unlike the typical BRA which exploits the self-similarity among blocks in image,the scheme utilizes the self-similarity in various scale and orientation bands in the wavelet domain of the image.They search the replacement blocks from the blocks of the smaller sub-image at the next lower resolution.The most important advantage of this scheme is that the pyramid sub-band decomposition acts as an automatic block classifier,with the result of simplifying the block search and block matching procedures and thus making the block replacement more effective.Furthermore,an improved algorithm based on Fuzzy set theory is introduced in which the number of blocks chosen for combination are modified adaptively to obtain the candidate replacement blocks.It simplifies the procedure for searching the candidate replacement blocks.These advantages are confirmed by the experimental results,which show that the performance of the scheme is superior to typical BRA methods. 展开更多
关键词 watermarkING block replacement attack WAVELET FUZZY
在线阅读 下载PDF
Improving extraction of watermarks in color attacked watermarked images
7
作者 Abdelhamid Benhocin Lamri Laouamer +1 位作者 Laurent Tchamnda Nana Anca Christine Pascu 《通讯和计算机(中英文版)》 2009年第5期36-45,共10页
关键词 计算机 图像处理 水印图像 LSB
在线阅读 下载PDF
New Video Watermark Scheme Resistant to Super Strong Cropping Attacks
8
作者 Ming Tong Tao Chen +1 位作者 Wei Zhang Linna Dong 《Journal of Information Security》 2012年第2期138-148,共11页
Firstly, the nonnegative matrix factorization with sparseness constraints on parts of the basis matrix (NMFSCPBM) method is proposed in this paper. Secondly, the encrypted watermark is embedded into the big coefficien... Firstly, the nonnegative matrix factorization with sparseness constraints on parts of the basis matrix (NMFSCPBM) method is proposed in this paper. Secondly, the encrypted watermark is embedded into the big coefficients of the basis matrix that the host video is decomposed into by NMFSCPBM. At the same time, the watermark embedding strength is adaptively adjusted by the video motion characteristic coefficients extracted by NMFSCPBM method. On watermark detection, as long as the residual video contains the numbers of the least remaining sub-blocks, the complete basis matrix can be completely recovered through the decomposition of the nonnegative matrix of the least remaining sub-blocks in residual videos by NMFSCPBM, and then the complete watermark can be extracted. The experimental results show that the average intensity resistant to the various regular cropping of this scheme is up to 95.97% and that the average intensity resistant to the various irregular cropping of this scheme is up to 95.55%. The bit correct rate (BCR) values of the extracted watermark are always 100% under all of the above situations. It is proved that the watermark extraction is not limited by the cropping position and type in this scheme. Compared with other similar methods, the performance of resisting strong cropping is improved greatly. 展开更多
关键词 Digital watermarkING CROPPING attack Geometric attacks NONNEGATIVE Matrix FACTORIZATION (NMF) SPARSENESS Constrain
暂未订购
针对核反应堆液体区域控制系统隐蔽攻击的混合检测方案 被引量:1
9
作者 王东风 李朋然 +3 位作者 贾若彤 黄宇 孙茜 崔岩 《电力科学与工程》 2025年第5期32-40,共9页
针对隐蔽攻击破坏加压重水反应堆液体区域控制系统正常运行的问题,提出了一种结合水印和移动目标防御的主动检测方法。利用水印检测通过在控制系统的输入信号中嵌入水印,以及利用移动目标防御动态改变系统关键参数的原理,对检测方法进... 针对隐蔽攻击破坏加压重水反应堆液体区域控制系统正常运行的问题,提出了一种结合水印和移动目标防御的主动检测方法。利用水印检测通过在控制系统的输入信号中嵌入水印,以及利用移动目标防御动态改变系统关键参数的原理,对检测方法进行了改进,在实现隐蔽攻击主动检测的关键点上,通过设计无性能损失和无额外通信负担的基于水印与移动目标防御混合主动检测方法,增强了检测的精确性和系统的鲁棒性。以多种场景下的液体区域控制系统为对象进行仿真实验,实验结果表明,该方法能够在确保系统控制效果的同时,实现对隐蔽攻击的主动检测,显著提升了系统的稳定性和鲁棒性。 展开更多
关键词 隐蔽攻击 水印检测 移动目标防御 核反应堆 液体区域控制系统
在线阅读 下载PDF
基于外源样本的深度神经网络模型版权保护框架
10
作者 刘红 吴远豪 +3 位作者 李析东 吴迪 陈思旭 吴希昊 《重庆邮电大学学报(自然科学版)》 北大核心 2025年第3期405-416,共12页
深度神经网络(deep neural networks,DNN)的知识产权(intellectual property,IP)保护引起了人们的普遍关注。已有的研究提出的查询修改攻击通过修改关键样本,可以使基于后门的DNN水印方法性能下降。防御工作将数据集内样本当作关键样本... 深度神经网络(deep neural networks,DNN)的知识产权(intellectual property,IP)保护引起了人们的普遍关注。已有的研究提出的查询修改攻击通过修改关键样本,可以使基于后门的DNN水印方法性能下降。防御工作将数据集内样本当作关键样本来抵御查询修改攻击,导致模型的性能随着关键样本的增多而下降。因此,提出将具有外部特征的样本作为关键样本来解决上述问题。在目标模型的训练过程中,将外源样本与训练样本组成混合样本进行训练,将外源样本作为关键样本嵌入到模型中。当攻击者使用查询修改攻击阻止关键样本触发后门时,该样本能够顺利触发后门,从而验证版权。为了阻止关键样本伪造,设计一种不可见水印嵌入与提取机制,将水印嵌入到关键样本中,只有通过水印验证的关键样本触发后门才可以声明版权。通过实验,所提出的方法对模型微调、模型剪枝、查询修改攻击都具有较高的鲁棒性,同时伪造的关键样本无法通过版权认证。 展开更多
关键词 深度神经网络(DNN) 知识产权保护(IP) 水印 查询修改攻击
在线阅读 下载PDF
版权保护视角下的图像水印处理技术综述 被引量:1
11
作者 何春辉 葛斌 +2 位作者 徐浩 吴继冰 张翀 《计算机技术与发展》 2025年第8期1-9,共9页
据史料记载我国的版权保护技术历史悠久,最早可追溯至宋朝。随着信息技术的快速发展和版权保护意识的逐步强化,水印处理技术在数字图像版权保护领域得到了广泛应用,业界已经出现了一大批高水平的图像水印处理技术。为了更好地引导和促... 据史料记载我国的版权保护技术历史悠久,最早可追溯至宋朝。随着信息技术的快速发展和版权保护意识的逐步强化,水印处理技术在数字图像版权保护领域得到了广泛应用,业界已经出现了一大批高水平的图像水印处理技术。为了更好地引导和促进数字化图像水印处理技术的高质量发展,从数字图像的常见水印类型以及主流水印生成技术、水印攻击技术、水印处理技术常用评估指标、大规模图像水印处理数据集和水印处理技术面临的挑战和限制六个方面对数字化图像水印处理技术各自的技术特征和未来发展趋势展开了全面分析和总结。系统地梳理了相关技术优缺点,并给出了四类综合效果最优的数字化图像版权保护方案。结合上述方案可为技术研发人员或著作权人根据自身需求和应用场景选取更好的版权保护技术路线提供参考依据。数字化图像水印技术因涵盖技术、法律和伦理等诸多层面。未来可通过跨学科交叉合作来持续推动它的发展,使技术更好地服务于社会。 展开更多
关键词 版权保护 图像处理 水印生成 水印攻击 数据集 评估指标
在线阅读 下载PDF
抗时间同步攻击的鲁棒视频水印算法优化研究
12
作者 赵亚宁 严利民 《计算机仿真》 2025年第2期259-262,292,共5页
为最大限度抵抗时间同步攻击下帧置换、帧删除给视频内容带来的冲击,保证视频完整性与真实性,提出一种抗时间同步攻击的鲁棒视频水印算法优化策略。求解当前帧的帧间差分图像,更新视频背景信息,采用饱和度与亮度两个分量分割阴影与背景... 为最大限度抵抗时间同步攻击下帧置换、帧删除给视频内容带来的冲击,保证视频完整性与真实性,提出一种抗时间同步攻击的鲁棒视频水印算法优化策略。求解当前帧的帧间差分图像,更新视频背景信息,采用饱和度与亮度两个分量分割阴影与背景,获得视频连续帧运动特征;通过Arnold置乱让图像数据分布呈散乱形态,使用二阶Hadamard矩阵对混合编码采取正交变换,完成水印信号预处理;计算图像嵌入强度,运用帧离散余弦变换嵌入视频水印,令水印子矩阵和视频帧的亮度分量相互对应,引入结构张量选块机制,优化视频水印不可见性与鲁棒性,利用水印预处理逆向运算实现水印提取。实验结果表明,所提算法针对时间同步攻击具备极强的鲁棒性,提高了视频应用安全,可靠性较强。 展开更多
关键词 时间同步攻击 视频水印 特征提取 鲁棒性
在线阅读 下载PDF
Secure and Robust Digital Watermarking: A Survey
13
作者 Chun-Lin Song Le Yang Xin Wang 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第4期343-354,共12页
A digital watermarking technique is a multi-scientific discipline which is developed rapidly in last several years for digital content protection, such as copyright protection, authentication protection, source tracin... A digital watermarking technique is a multi-scientific discipline which is developed rapidly in last several years for digital content protection, such as copyright protection, authentication protection, source tracing, etc. However, in realistic scenarios, the digital watermarking system faces significant secure issues, for example, the attackers want to remove, detect, or embed illegal watermark signals. Therefore, the aim of this contribution is to illustrate recent results of robust and secure watermarking to the signal processing community, and highlight both benefits and still open issues. Specifically, this paper is intended to introduce the concept of secure and robust digital watermarking system, and provide with problems and their countermeasures. First of all, the classic watermark model and cryptosystem will be reviewed and then, the concept of secure and robust digital watermarking system will be described. Next, the watermark attack will be classified and described. Finally, some countermeasures that can help to improve secure and robustness are considered. 展开更多
关键词 Terms--Countermeasures digital watermarking system robust SECURITY watermark attacks.
在线阅读 下载PDF
基于SIFT特征点的抗缩放攻击视频数字水印算法
14
作者 王淑芳 任敬敏 任金金 《长江信息通信》 2025年第6期82-84,共3页
简单的图像变换提取特征时会忽视图像在不同尺度下的变化,导致图像遭受缩放攻击时特征点变得不稳定,进而难以准确提取水印信息,降低了水印的鲁棒性。为此,基于SIFT特征点的抗缩放攻击视频数字水印算法。首先,利用SIFT算法构建尺度空间,... 简单的图像变换提取特征时会忽视图像在不同尺度下的变化,导致图像遭受缩放攻击时特征点变得不稳定,进而难以准确提取水印信息,降低了水印的鲁棒性。为此,基于SIFT特征点的抗缩放攻击视频数字水印算法。首先,利用SIFT算法构建尺度空间,通过高斯金字塔和Hessian矩阵筛选特征点,计算描述符以提取缩放鲁棒特征。然后,用混沌调制水印后,根据SIFT描述符和策略嵌入特征区域,并用纠错编码增强。最后,重提特征点,匹配定位嵌入区,提取验证水印,全局判决确定水印存在。实验结果表明,研究方法能够显著提高数字水印算法在归一化相关系数和PSNR方面的表现,进而有效增强水印算法在面对视频缩放攻击时的鲁棒性。 展开更多
关键词 SIFT特征点 抗缩放攻击 水印嵌入 水印检测
在线阅读 下载PDF
基于RSA-QR-DWT算法的海洋气象传真系统强鲁棒性可信认证水印技术
15
作者 安琳 王福斋 张国雄 《海洋技术学报》 2025年第2期54-63,共10页
近年来,气象信息的研究和应用成为备受关注的领域,而气象信息系统作为交通运输行业的关键支持系统,起着至关重要的作用。海上气象传真系统主要通过无线电气象传真方式播发气象信息,然而,由于海上无线网络通信信道的开放性,气象传真信息... 近年来,气象信息的研究和应用成为备受关注的领域,而气象信息系统作为交通运输行业的关键支持系统,起着至关重要的作用。海上气象传真系统主要通过无线电气象传真方式播发气象信息,然而,由于海上无线网络通信信道的开放性,气象传真信息存在被篡改的风险,可能导致错误信息的传播,进而影响决策和应急措施。针对这一问题,本文提出了一种在离散小波变换(Discrete Wavelet Transform,DWT)域实现的结合非对称加密算法的李维斯特-萨莫尔-阿德曼(Rivest-Shamir-Adleman,RSA)算法和基于快速响应(Quick Response,QR)码的强鲁棒性可信认证水印技术,即RSA-QR-DWT算法。该算法首先利用RSA算法生成私钥对身份信息进行加密,并将加密后的身份信息嵌入QR码中,然后将QR码嵌入气象图像的DWT域中。实验结果显示:该算法在确保图像质量的同时,表现出鲁棒性,能够有效抵御多种攻击,从而保证了气象信息的真实性和安全性。与传统的基于最低有效位(Least Significant Bit,LSB)算法的QR码认证方法相比,RSA-QR-DWT算法在鲁棒性上展现出明显优势,能够更好地抵御旋转裁剪攻击、压缩攻击及一定程度的噪声攻击。 展开更多
关键词 海洋气象传真系统 可信认证 数字图像水印 QR码 非对称加密 抗攻击性能
在线阅读 下载PDF
基于LoRA的双阶段扩散模型水印方案
16
作者 白少杰 林立霞 +2 位作者 胡子寒 袁艺林 曹鹏 《计算机系统应用》 2025年第6期196-203,共8页
扩散模型的发展使得高质量图像生成变得更加便捷,但同时引发了生成图像的版权保护问题.现有研究通常在扩散过程中隐秘性地嵌入水印,以提升水印鲁棒性.然而,目前现有基于扩散过程的水印方案集中于嵌入固定水印,无法满足用户对水印多样化... 扩散模型的发展使得高质量图像生成变得更加便捷,但同时引发了生成图像的版权保护问题.现有研究通常在扩散过程中隐秘性地嵌入水印,以提升水印鲁棒性.然而,目前现有基于扩散过程的水印方案集中于嵌入固定水印,无法满足用户对水印多样化的需求.此外,还存在被恶意用户更换解码器规避水印的风险.为了解决上述问题,本文提出了基于LoRA的双阶段扩散模型水印方案.首先,该方案在水印编解码预训练阶段训练出水印编解码器,保证水印嵌入的稳定性;然后,在U-Net微调阶段通过LoRA和自适应注意力机制,使U-Net在保持生成质量的同时学习到第1阶段的水印模式,实现多用户定制化.实验表明,该方案在图像一致性和水印鲁棒性上均优于现有方法.在图像攻击下,水印图像的FID距离提高了0.61%,平均提取精度提升了4.9%. 展开更多
关键词 数字水印 扩散模型 LoRA 自适应嵌入 图像攻击
在线阅读 下载PDF
Robust Image Watermarking Using Local Invariant Features and Independent Component Analysis 被引量:2
17
作者 ZHANG Hanling LIU Jie 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1931-1934,共4页
This paper proposes a novel robust image watermarking scheme for digital images using local invariant features and Independent Component Analysis (ICA). Most present watermarking algorithms are unable to resist geom... This paper proposes a novel robust image watermarking scheme for digital images using local invariant features and Independent Component Analysis (ICA). Most present watermarking algorithms are unable to resist geometric distortions that desynchronize the location. The method we propose here is robust to geometric attacks. In order to resist geometric distortions, we use a local invariant feature of the image called the scale invariant feature transform, which is invariant to translation and scaling distortions. The watermark is inserted into the circular patches generated by scale-invariant key point extractor. Rotation invariance is achieved using the translation property of the polar-mapped circular patches. Our method belongs to the blind watermark category, because we use Independent Component Analysis for detection that does not need the original image during detection. Experimental results show that our method is robust against geometric distortion attacks as well as signal-processing attacks. 展开更多
关键词 robust watermarking geometrical attack watermark synchronization local invariant features
在线阅读 下载PDF
Image-Moment Based Affine Invariant Watermarking Scheme Utilizing Neural Networks 被引量:1
18
作者 吴健珍 谢剑英 杨煜普 《Journal of Beijing Institute of Technology》 EI CAS 2006年第1期71-75,共5页
A new image watermarking scheme is proposed to resist rotation, scaling and translation (RST) attacks. Six combined low order image moments are utilized to represent image information on rotation, scaling and transl... A new image watermarking scheme is proposed to resist rotation, scaling and translation (RST) attacks. Six combined low order image moments are utilized to represent image information on rotation, scaling and translation. Affine transform parameters are registered by feedforward neural networks. Watermark is adaptively embedded in discrete wavelet transform (DWT) domain while watermark extraction is carried out without original image after attacked watermarked image has been synchronized by making inverse transform through parameters learned by neural networks. Experimental results show that the proposed scheme can effectively register affine transform parameters, embed watermark more robustly and resist geometric attacks as well as JPEG2000 compression. 展开更多
关键词 digital watermark affine transform geometric attacks image moment neural networks
在线阅读 下载PDF
Quantization Based Watermarking Methods Against Valumetric Distortions 被引量:1
19
作者 Zai-Ran Wang Jing Dong Wei Wang 《International Journal of Automation and computing》 EI CSCD 2017年第6期672-685,共14页
Most of the quantization based watermarking algorithms are very sensitive to valumetric distortions, while these distortions are regarded as common processing in audio/video analysis. In recent years, watermarking met... Most of the quantization based watermarking algorithms are very sensitive to valumetric distortions, while these distortions are regarded as common processing in audio/video analysis. In recent years, watermarking methods which can resist this kind of distortions have attracted a lot of interests. But still many proposed methods can only deal with one certain kind of valumetric distortion such as amplitude scaling attack, and fail in other kinds of valumetric distortions like constant change attack, gamma correction or contrast stretching. In this paper, we propose a simple but effective method to tackle all the three kinds of valumetric distortions. This algorithm constructs an invariant domain first by spread transform which satisfies certain constraints. Then an amplitude scale invariant watermarking scheme is applied on the constructed domain. The validity of the approach has been confirmed by applying the watermarking scheme to Gaussian host data and real images. Experimental results confirm its intrinsic invariance against amplitude scaling, constant change attack and robustness improvement against nonlinear valumetric distortions. 展开更多
关键词 Quantization index modulation(QIM) watermarking valumetric distortions amplitude scaling constant change attack
原文传递
Digital watermarking for still image based on discrete fractional fourier transform 被引量:3
20
作者 牛夏牧 孙圣和 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2001年第3期309-311,共3页
Presents a digital watermarking technique based on discrete fractional Fourier transform (DFRFT), discusses the transformation of the original image by DFRFT, and the modification of DFRFT coefficients of the original... Presents a digital watermarking technique based on discrete fractional Fourier transform (DFRFT), discusses the transformation of the original image by DFRFT, and the modification of DFRFT coefficients of the original image by the information of watermark, and concludes from experimental results that the proposed technique is robust to lossy compression attack. 展开更多
关键词 watermarkING discrete fractional fourier transform lossy compression attack
在线阅读 下载PDF
上一页 1 2 29 下一页 到第
使用帮助 返回顶部