期刊文献+
共找到585篇文章
< 1 2 30 >
每页显示 20 50 100
A Feature-based Robust Digital Image Watermarking Against Desynchronization Attacks 被引量:2
1
作者 Xiang-Yang Wang Jun Wu 《International Journal of Automation and computing》 EI 2007年第4期428-432,共5页
In this paper, a new content-based image watermarking scheme is proposed. The Harris-Laplace detector is adopted to extract feature points, which can survive a variety of attacks. The local characteristic regions (L... In this paper, a new content-based image watermarking scheme is proposed. The Harris-Laplace detector is adopted to extract feature points, which can survive a variety of attacks. The local characteristic regions (LCRs) are adaptively constructed based on scale-space theory. Then, the LCRs are mapped to geometrically invariant space by using image normalization technique. Finally, several copies of the digital watermark are embedded into the nonoverlapped LCRs by quantizing the magnitude vectors of discrete Fourier transform (DFT) coefficients. By binding a watermark with LCR, resilience against desynchronization attacks can be readily obtained. Simulation results show that the proposed scheme is invisible and robust against various attacks which includes common signals processing and desynchronization attacks. 展开更多
关键词 Image watermarking desynchronization attacks feature points discrete Fourier transform.
在线阅读 下载PDF
A robust color image watermarking algorithm against rotation attacks 被引量:1
2
作者 韩绍程 杨金锋 +1 位作者 王蕊 贾桂敏 《Optoelectronics Letters》 EI 2018年第1期61-66,共6页
A robust digital watermarking algorithm is proposed based on quaternion wavelet transform(QWT) and discrete cosine transform(DCT) for copyright protection of color images. The luminance component Y of a host color ima... A robust digital watermarking algorithm is proposed based on quaternion wavelet transform(QWT) and discrete cosine transform(DCT) for copyright protection of color images. The luminance component Y of a host color image in YIQ space is decomposed by QWT, and then the coefficients of four low-frequency subbands are transformed by DCT. An original binary watermark scrambled by Arnold map and iterated sine chaotic system is embedded into the mid-frequency DCT coefficients of the subbands. In order to improve the performance of the proposed algorithm against rotation attacks, a rotation detection scheme is implemented before watermark extracting. The experimental results demonstrate that the proposed watermarking scheme shows strong robustness not only against common image processing attacks but also against arbitrary rotation attacks. 展开更多
关键词 QWT DCT A robust color image watermarking algorithm against rotation attacks YIQ
原文传递
Game Theory Based False Negative Probability of Embedded Watermark Under Unintentional and Steganalysis Attacks 被引量:1
3
作者 HU Ziquan SHE Kun +1 位作者 WANG Jianghua TANG Jianguo 《China Communications》 SCIE CSCD 2014年第5期114-123,共10页
Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,how... Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,however,do not consider the influence of steganalysis attack.This paper proposed the game theory based false negative probability to estimate the impacts of steganalysis attack,as well as unintentional attack.Specifically,game theory was used to model the collision between the embedment and steganalysis attack,and derive the optimal building embedding/attacking strategy.Such optimal playing strategies devote to calculating the attacker destructed watermark,used for calculation of the game theory based false negative probability.The experimental results show that watermark detection reliability measured using our proposed method,in comparison,can better reflect the real scenario in which the embedded watermark undergoes unintentional attack and the attacker using steganalysis attack.This paper provides a foundation for investigating countermeasures of digital watermarking community against steganalysis attack. 展开更多
关键词 digital watermarking false negative probability game theory watermark capacity steganalysis attack.
在线阅读 下载PDF
Wavelet-Based Denoising Attack on Image Watermarking
4
作者 XUAN Jian-hui WANG Li-na ZHANG Huan-guo 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期279-283,共5页
In this paper,we propose wavelet-based denois-ing attack methods on imagewatermarking in discrete cosine transform(DCT)or discrete Fourier transform(DFT)domain ordiscrete wavelet transform(DWT)domain Wiener filtering ... In this paper,we propose wavelet-based denois-ing attack methods on imagewatermarking in discrete cosine transform(DCT)or discrete Fourier transform(DFT)domain ordiscrete wavelet transform(DWT)domain Wiener filtering based on wavelet transform is performed inapproximation subband to remove DCI or DFT domain watermark,and adaptive wavelet soft thresholdingis employed to remove the watermark resided in detail subbands of DWT domain. 展开更多
关键词 watermarkING watermarking attack wavelet dcnoising Wiener filter
在线阅读 下载PDF
Robust Wavelet-Based Facial Image Watermarking Against Geometric Attacks Using Coordinate System Recovery
5
作者 赵培东 谢剑英 《Journal of Beijing Institute of Technology》 EI CAS 2008年第1期46-50,共5页
A coordinate system of the original image is established using a facial feature point localization technique. After the original image transformed into a new image with the standard coordinate system, a redundant wate... A coordinate system of the original image is established using a facial feature point localization technique. After the original image transformed into a new image with the standard coordinate system, a redundant watermark is adaptively embedded in the discrete wavelet transform(DWT) domain based on the statistical characteristics of the wavelet coefficient block. The coordinate system of watermarked image is reestablished as a calibration system. Regardless of the host image rotated, scaled, or translated(RST), all the geometric attacks are eliminated while the watermarked image is transformed into the standard coordinate system. The proposed watermark detection is a blind detection. Experimental results demonstrate the proposed scheme is robust against common and geometric image processing attacks, particularly its robustness against joint geometric attacks. 展开更多
关键词 digital watermark geometric attacks coordinate system statistical characteristics
在线阅读 下载PDF
High-Pass Block Replacement Attack of Watermarking
6
作者 王慧琴 Gwenael Doerr 张小红 《China Communications》 SCIE CSCD 2011年第4期159-163,共5页
To improve the watermark benchmarks database,a new BRA(Block Replacement Attack)method is introduced in this paper.Unlike the typical BRA which exploits the self-similarity among blocks in image,the scheme utilizes th... To improve the watermark benchmarks database,a new BRA(Block Replacement Attack)method is introduced in this paper.Unlike the typical BRA which exploits the self-similarity among blocks in image,the scheme utilizes the self-similarity in various scale and orientation bands in the wavelet domain of the image.They search the replacement blocks from the blocks of the smaller sub-image at the next lower resolution.The most important advantage of this scheme is that the pyramid sub-band decomposition acts as an automatic block classifier,with the result of simplifying the block search and block matching procedures and thus making the block replacement more effective.Furthermore,an improved algorithm based on Fuzzy set theory is introduced in which the number of blocks chosen for combination are modified adaptively to obtain the candidate replacement blocks.It simplifies the procedure for searching the candidate replacement blocks.These advantages are confirmed by the experimental results,which show that the performance of the scheme is superior to typical BRA methods. 展开更多
关键词 watermarkING block replacement attack WAVELET FUZZY
在线阅读 下载PDF
Improving extraction of watermarks in color attacked watermarked images
7
作者 Abdelhamid Benhocin Lamri Laouamer +1 位作者 Laurent Tchamnda Nana Anca Christine Pascu 《通讯和计算机(中英文版)》 2009年第5期36-45,共10页
关键词 计算机 图像处理 水印图像 LSB
在线阅读 下载PDF
New Video Watermark Scheme Resistant to Super Strong Cropping Attacks
8
作者 Ming Tong Tao Chen +1 位作者 Wei Zhang Linna Dong 《Journal of Information Security》 2012年第2期138-148,共11页
Firstly, the nonnegative matrix factorization with sparseness constraints on parts of the basis matrix (NMFSCPBM) method is proposed in this paper. Secondly, the encrypted watermark is embedded into the big coefficien... Firstly, the nonnegative matrix factorization with sparseness constraints on parts of the basis matrix (NMFSCPBM) method is proposed in this paper. Secondly, the encrypted watermark is embedded into the big coefficients of the basis matrix that the host video is decomposed into by NMFSCPBM. At the same time, the watermark embedding strength is adaptively adjusted by the video motion characteristic coefficients extracted by NMFSCPBM method. On watermark detection, as long as the residual video contains the numbers of the least remaining sub-blocks, the complete basis matrix can be completely recovered through the decomposition of the nonnegative matrix of the least remaining sub-blocks in residual videos by NMFSCPBM, and then the complete watermark can be extracted. The experimental results show that the average intensity resistant to the various regular cropping of this scheme is up to 95.97% and that the average intensity resistant to the various irregular cropping of this scheme is up to 95.55%. The bit correct rate (BCR) values of the extracted watermark are always 100% under all of the above situations. It is proved that the watermark extraction is not limited by the cropping position and type in this scheme. Compared with other similar methods, the performance of resisting strong cropping is improved greatly. 展开更多
关键词 Digital watermarkING CROPPING attack Geometric attacks NONNEGATIVE Matrix FACTORIZATION (NMF) SPARSENESS Constrain
暂未订购
一种金字塔增强的抗噪水印方法:面向鲁棒高质量的图像保护
9
作者 姜昊 姚宇晗 +5 位作者 王嘉豪 李星辰 王丁科 汤新坤 李俊韬 寇菲菲 《智能系统学报》 北大核心 2026年第1期72-82,共11页
针对数字媒体中图像易被非法盗用和篡改的问题,鲁棒的盲水印技术至关重要。然而,现有方法难以在抵抗现实噪声攻击的同时,保持高提取精度与高视觉质量。为此,本文提出一种金字塔增强的抗噪水印方法(pyramid-enhanced noise-resilient wat... 针对数字媒体中图像易被非法盗用和篡改的问题,鲁棒的盲水印技术至关重要。然而,现有方法难以在抵抗现实噪声攻击的同时,保持高提取精度与高视觉质量。为此,本文提出一种金字塔增强的抗噪水印方法(pyramid-enhanced noise-resilient watermarking,PENRW)方法,通过金字塔多尺度特征嵌入与解码质量增强模块,在强噪声下实现了高精度水印提取与最小的图像质量损失。实验结果表明,该方法在鲁棒性和视觉保真度上均优于当前最优模型。 展开更多
关键词 盲水印 信息隐藏 版权保护 多尺度特征 鲁棒性 噪声攻击 端到端学习 深度水印
在线阅读 下载PDF
Secure and Robust Digital Watermarking: A Survey
10
作者 Chun-Lin Song Le Yang Xin Wang 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第4期343-354,共12页
A digital watermarking technique is a multi-scientific discipline which is developed rapidly in last several years for digital content protection, such as copyright protection, authentication protection, source tracin... A digital watermarking technique is a multi-scientific discipline which is developed rapidly in last several years for digital content protection, such as copyright protection, authentication protection, source tracing, etc. However, in realistic scenarios, the digital watermarking system faces significant secure issues, for example, the attackers want to remove, detect, or embed illegal watermark signals. Therefore, the aim of this contribution is to illustrate recent results of robust and secure watermarking to the signal processing community, and highlight both benefits and still open issues. Specifically, this paper is intended to introduce the concept of secure and robust digital watermarking system, and provide with problems and their countermeasures. First of all, the classic watermark model and cryptosystem will be reviewed and then, the concept of secure and robust digital watermarking system will be described. Next, the watermark attack will be classified and described. Finally, some countermeasures that can help to improve secure and robustness are considered. 展开更多
关键词 Terms--Countermeasures digital watermarking system robust SECURITY watermark attacks.
在线阅读 下载PDF
大语言模型在人工智能生成语料判别中的应用
11
作者 张元杰 徐现彩 +1 位作者 杨凯 张庆涛 《移动信息》 2026年第2期185-187,共3页
人工智能生成文本的滥用对信息治理形成了重大挑战,但现有检测技术因依赖于单维特征与静态策略,难以应对这种动态对抗。文中提出了一种SRAG十GEMA多模态融合检测框架,基于语义角色分层解析与跨模态关联建模来精准识别生成文本的分布偏... 人工智能生成文本的滥用对信息治理形成了重大挑战,但现有检测技术因依赖于单维特征与静态策略,难以应对这种动态对抗。文中提出了一种SRAG十GEMA多模态融合检测框架,基于语义角色分层解析与跨模态关联建模来精准识别生成文本的分布偏移及语义断裂特征。实验数据显示,该框架对抗性文本检测的F1-score达93.7%,较传统方法提升了19.8%,在动态水印攻击下稳定性保持在85%以上,社交媒体误检率降至6.5%,为学术诚信维护与版权追溯提供了技术支撑。 展开更多
关键词 多模态融合检测 语义角色分层解析 动态水印技术 对抗性攻击
在线阅读 下载PDF
对抗样本生成、防御与应用研究综述
12
作者 张家伟 吴昊 +5 位作者 袁霖 王昊 程鑫 罗向阳 马宾 王金伟 《中国图象图形学报》 北大核心 2026年第1期62-81,共20页
得益于愈发优异的性能,深度神经网络越来越多地应用在日常生活的各个方面,成为各领域中主导决策或辅助决策的重要角色。然而,对抗样本的发现对深度神经网络的可靠性和安全性构成重大威胁,极大限制了其在高度关注安全性的领域的应用。因... 得益于愈发优异的性能,深度神经网络越来越多地应用在日常生活的各个方面,成为各领域中主导决策或辅助决策的重要角色。然而,对抗样本的发现对深度神经网络的可靠性和安全性构成重大威胁,极大限制了其在高度关注安全性的领域的应用。因此,研究者针对对抗样本展开了诸多研究。本文首先介绍对抗样本的研究背景及术语定义,并将现有的对抗攻击技术分成白盒攻击和黑盒攻击,其中白盒攻击包括基于优化、梯度和生成3种攻击,黑盒攻击包括基于迁移、查询两种攻击;其次,详细介绍现有的3种对抗防御策略,分别为对抗训练、对抗检测和对抗去噪;接着,列举对抗样本应用的两种典型技术,包括对抗隐写和对抗水印;最后,指出现有对抗样本在攻击、防御研究中存在的不足之处和值得进一步探索的领域。 展开更多
关键词 对抗样本(AE) 对抗攻击 对抗防御 对抗隐写 对抗水印
原文传递
Robust Image Watermarking Using Local Invariant Features and Independent Component Analysis 被引量:2
13
作者 ZHANG Hanling LIU Jie 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1931-1934,共4页
This paper proposes a novel robust image watermarking scheme for digital images using local invariant features and Independent Component Analysis (ICA). Most present watermarking algorithms are unable to resist geom... This paper proposes a novel robust image watermarking scheme for digital images using local invariant features and Independent Component Analysis (ICA). Most present watermarking algorithms are unable to resist geometric distortions that desynchronize the location. The method we propose here is robust to geometric attacks. In order to resist geometric distortions, we use a local invariant feature of the image called the scale invariant feature transform, which is invariant to translation and scaling distortions. The watermark is inserted into the circular patches generated by scale-invariant key point extractor. Rotation invariance is achieved using the translation property of the polar-mapped circular patches. Our method belongs to the blind watermark category, because we use Independent Component Analysis for detection that does not need the original image during detection. Experimental results show that our method is robust against geometric distortion attacks as well as signal-processing attacks. 展开更多
关键词 robust watermarking geometrical attack watermark synchronization local invariant features
在线阅读 下载PDF
Image-Moment Based Affine Invariant Watermarking Scheme Utilizing Neural Networks 被引量:1
14
作者 吴健珍 谢剑英 杨煜普 《Journal of Beijing Institute of Technology》 EI CAS 2006年第1期71-75,共5页
A new image watermarking scheme is proposed to resist rotation, scaling and translation (RST) attacks. Six combined low order image moments are utilized to represent image information on rotation, scaling and transl... A new image watermarking scheme is proposed to resist rotation, scaling and translation (RST) attacks. Six combined low order image moments are utilized to represent image information on rotation, scaling and translation. Affine transform parameters are registered by feedforward neural networks. Watermark is adaptively embedded in discrete wavelet transform (DWT) domain while watermark extraction is carried out without original image after attacked watermarked image has been synchronized by making inverse transform through parameters learned by neural networks. Experimental results show that the proposed scheme can effectively register affine transform parameters, embed watermark more robustly and resist geometric attacks as well as JPEG2000 compression. 展开更多
关键词 digital watermark affine transform geometric attacks image moment neural networks
在线阅读 下载PDF
Quantization Based Watermarking Methods Against Valumetric Distortions 被引量:1
15
作者 Zai-Ran Wang Jing Dong Wei Wang 《International Journal of Automation and computing》 EI CSCD 2017年第6期672-685,共14页
Most of the quantization based watermarking algorithms are very sensitive to valumetric distortions, while these distortions are regarded as common processing in audio/video analysis. In recent years, watermarking met... Most of the quantization based watermarking algorithms are very sensitive to valumetric distortions, while these distortions are regarded as common processing in audio/video analysis. In recent years, watermarking methods which can resist this kind of distortions have attracted a lot of interests. But still many proposed methods can only deal with one certain kind of valumetric distortion such as amplitude scaling attack, and fail in other kinds of valumetric distortions like constant change attack, gamma correction or contrast stretching. In this paper, we propose a simple but effective method to tackle all the three kinds of valumetric distortions. This algorithm constructs an invariant domain first by spread transform which satisfies certain constraints. Then an amplitude scale invariant watermarking scheme is applied on the constructed domain. The validity of the approach has been confirmed by applying the watermarking scheme to Gaussian host data and real images. Experimental results confirm its intrinsic invariance against amplitude scaling, constant change attack and robustness improvement against nonlinear valumetric distortions. 展开更多
关键词 Quantization index modulation(QIM) watermarking valumetric distortions amplitude scaling constant change attack
原文传递
Digital watermarking for still image based on discrete fractional fourier transform 被引量:3
16
作者 牛夏牧 孙圣和 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2001年第3期309-311,共3页
Presents a digital watermarking technique based on discrete fractional Fourier transform (DFRFT), discusses the transformation of the original image by DFRFT, and the modification of DFRFT coefficients of the original... Presents a digital watermarking technique based on discrete fractional Fourier transform (DFRFT), discusses the transformation of the original image by DFRFT, and the modification of DFRFT coefficients of the original image by the information of watermark, and concludes from experimental results that the proposed technique is robust to lossy compression attack. 展开更多
关键词 watermarkING discrete fractional fourier transform lossy compression attack
在线阅读 下载PDF
Difference Energy Based Blind Image Watermarking Resisting to Geometrical Distortions
17
作者 YU Yanwei LU Zhengding LING Hefei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1882-1886,共5页
In this paper a blind image watermarking that can resist to rotation, scaling and translation (RST) attacks is proposed. Based on the spread spectrum, the watermark is modulated before embedding. The logpolar mapped... In this paper a blind image watermarking that can resist to rotation, scaling and translation (RST) attacks is proposed. Based on the spread spectrum, the watermark is modulated before embedding. The logpolar mapped discrete fourier transform (LPM-DFT) magnitude of a disk, a part of the origin image, constitutes the RST-invariant domain, where the origin of the LPM is the center of the disk and the sampling rates of the LPM are constant. After the middle frequency band of LPM-DFT magnitude, namely the watermark-embedding domain, is grouped according to the watermark length, the watermark is embedded by adjusting the difference between the two sub-region energy in each group. To improve the imperceptibility, the watermark-embedding domain is shuffled before embedding and the watermark is not embedded directly into the watermark-embedding domain. In watermark detection procedure, neither the original image nor any knowledge about the distortions is required. Experimental results show that the proposed scheme is very robust against RST distortion and common image processing attacks. 展开更多
关键词 image watermarking geometrical attacks INVARIANCE ROBUSTNESS
在线阅读 下载PDF
New scheme of dynamic traitor tracing against the immediate rebroadcast attack
18
作者 苏加军 王新梅 《Journal of Beijing Institute of Technology》 EI CAS 2015年第1期128-132,共5页
Traitor tracing schemes are introduced to combat the piracy scenarios. The notation of dynamic traitor tracing is proposed by Fiat and Tassa, which fights against rebroadcast of decrypted content. In this paper, using... Traitor tracing schemes are introduced to combat the piracy scenarios. The notation of dynamic traitor tracing is proposed by Fiat and Tassa, which fights against rebroadcast of decrypted content. In this paper, using the idea of searching user address level by level, a new dynamic traitor tracing scheme based on a multilevel structure of user set is constructed. The scheme proposed can efficiently combat with the immediate rebroadcast attack, and possesses lower tracing complexity. Importantly, the tracing scheme can be applicable to systems with different sizes of subscriber sets. 展开更多
关键词 traitor tracing copyright protection rebroadcast attack watermarkING
在线阅读 下载PDF
Measuring Watermarking Robustness Using Fractal Dimensions
19
作者 Abdelhamid Benhocine Lamri Laouamer +1 位作者 Laurent, Tchamnda Nana Anca Christine Pascu 《通讯和计算机(中英文版)》 2010年第1期10-20,共11页
关键词 彩色图像水印 分形维数 测量 KOLMOGOROV 稳健性 鲁棒性水印 峰值信噪比 纹理图像
在线阅读 下载PDF
基于外源样本的深度神经网络模型版权保护框架 被引量:1
20
作者 刘红 吴远豪 +3 位作者 李析东 吴迪 陈思旭 吴希昊 《重庆邮电大学学报(自然科学版)》 北大核心 2025年第3期405-416,共12页
深度神经网络(deep neural networks,DNN)的知识产权(intellectual property,IP)保护引起了人们的普遍关注。已有的研究提出的查询修改攻击通过修改关键样本,可以使基于后门的DNN水印方法性能下降。防御工作将数据集内样本当作关键样本... 深度神经网络(deep neural networks,DNN)的知识产权(intellectual property,IP)保护引起了人们的普遍关注。已有的研究提出的查询修改攻击通过修改关键样本,可以使基于后门的DNN水印方法性能下降。防御工作将数据集内样本当作关键样本来抵御查询修改攻击,导致模型的性能随着关键样本的增多而下降。因此,提出将具有外部特征的样本作为关键样本来解决上述问题。在目标模型的训练过程中,将外源样本与训练样本组成混合样本进行训练,将外源样本作为关键样本嵌入到模型中。当攻击者使用查询修改攻击阻止关键样本触发后门时,该样本能够顺利触发后门,从而验证版权。为了阻止关键样本伪造,设计一种不可见水印嵌入与提取机制,将水印嵌入到关键样本中,只有通过水印验证的关键样本触发后门才可以声明版权。通过实验,所提出的方法对模型微调、模型剪枝、查询修改攻击都具有较高的鲁棒性,同时伪造的关键样本无法通过版权认证。 展开更多
关键词 深度神经网络(DNN) 知识产权保护(IP) 水印 查询修改攻击
在线阅读 下载PDF
上一页 1 2 30 下一页 到第
使用帮助 返回顶部