期刊文献+
共找到341篇文章
< 1 2 18 >
每页显示 20 50 100
Securing Transmitted Color Images Using Zero Watermarking and Advanced Encryption Standard on Raspberry Pi
1
作者 Doaa Sami Khafaga Sarah M.Alhammad +3 位作者 Amal Magdi Osama ElKomy Nabil ALashin Khalid M.Hosny 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期1967-1986,共20页
Image authentication techniques have recently received a lot of attention for protecting images against unauthorized access.Due to the wide use of the Internet nowadays,the need to ensure data integrity and authentica... Image authentication techniques have recently received a lot of attention for protecting images against unauthorized access.Due to the wide use of the Internet nowadays,the need to ensure data integrity and authentication increases.Many techniques,such as watermarking and encryption,are used for securing images transmitted via the Internet.The majority of watermarking systems are PC-based,but they are not very portable.Hardwarebased watermarking methods need to be developed to accommodate real-time applications and provide portability.This paper presents hybrid data security techniques using a zero watermarking method to provide copyright protection for the transmitted color images using multi-channel orthogonal Legendre Fourier moments of fractional orders(MFrLFMs)and the advanced encryption standard(AES)algorithm on a low-cost Raspberry Pi.In order to increase embedding robustness,the watermark picture is scrambled using the Arnold method.Zero watermarking is implemented on the Raspberry Pi to produce a real-time ownership verification key.Before sending the ownership verification key and the original image to the monitoring station,we can encrypt the transmitted data with AES for additional security and hide any viewable information.The receiver next verifies the received image’s integrity to confirm its authenticity and that it has not been tampered with.We assessed the suggested algorithm’s resistance to many attacks.The suggested algorithm provides a reasonable degree of robustness while still being perceptible.The proposed method provides improved bit error rate(BER)and normalized correlation(NC)values compared to previous zero watermarking approaches.AES performance analysis is performed to demonstrate its effectiveness.Using a 256×256 image size,it takes only 2 s to apply the zero-watermark algorithm on the Raspberry Pi. 展开更多
关键词 zero watermarking Raspberry Pi advanced encryption standard
在线阅读 下载PDF
A Image Copyright Protection Method Using Zero-Watermark by Blockchain and IPFS 被引量:1
2
作者 Tao Chen Zhao Qiu +5 位作者 Gengquan Xie Lin Yuan Shaohua Duan Hao Guo Dahao Fu Hancheng Huang 《Journal of Information Hiding and Privacy Protection》 2021年第3期131-142,共12页
Behind the popularity of multimedia technology,the dispute over image copyright is getting worse.In the digital watermark prevention technology for copyright infringement,watermark technology is considered to be an im... Behind the popularity of multimedia technology,the dispute over image copyright is getting worse.In the digital watermark prevention technology for copyright infringement,watermark technology is considered to be an important technology to overcome data protection problems and verify the relationship between data ownership.Among the many digital watermarking technologies,zero watermarking technology has been favored in recent years.However,the existing zero watermark technology in the implementation process often needs a trusted third party to store watermarks,which may make the data too central,data storage security is low and copyright registration costs are too high,which creates a rare problem.The decentivization and information cannot be tampered of blockchain technology’s nature find new methods for image copyright protection.This paper studies the role of zero watermark algorithm in the image copyright and its complete storage and certification scheme,proposes a zero watermark image protection framework based on blockchain,and builds a system according to the framework.Combined with blockchain and zero watermarking technology,the framework uses inter IPFS(Inter Planetary File System)to solve the problem of blockchain efficient storage and sharing of large files.In addition,the application of user copyright information,image image query and image trading in the system are realized based on smart contracts,which solves the problem of lack of trusted third parties.Experiments show that the scheme is feasible and robust to various attacks. 展开更多
关键词 zero watermarking blockchain IPFS copyright protection
在线阅读 下载PDF
A Novel Zero-Watermark Copyright Authentication Scheme Based on Lifting Wavelet and Harris Corner Detection 被引量:1
3
作者 FAN Li GAO Tiegang YANG Qunting 《Wuhan University Journal of Natural Sciences》 CAS 2010年第5期408-414,共7页
In this paper,a novel zero-watermark copyright authentication scheme based on Internet public certification system is proposed.This approach utilizes Haar integer wavelet transform based on a lifting scheme and adapti... In this paper,a novel zero-watermark copyright authentication scheme based on Internet public certification system is proposed.This approach utilizes Haar integer wavelet transform based on a lifting scheme and adaptive Harris corner detection to extract image features,which will be used to produce a binary feature map,and the map is very crucial to the generation of watermark registered later.By properly choosing the parameters of aforementioned techniques such as the threshold T and the radius of local feature region R,the feature map is so much more stable and distinguishing that it can be used to construct robust watermark.Simulations demonstrate that the proposed scheme is resistant to many kinds of signal processing and malicious attacks such as Gaussian blurring,additive noising,JPEG lossy compression,cropping,scaling and slight rotation operation.Compared with a relative scheme such as that of Chang's,the scheme in this paper is more practicable and reliable and can be applied to the area of copyright protection. 展开更多
关键词 zero-watermark copyright authentication Harris corner detection integer wavelet transform ROBUSTNESS
原文传递
ROBUST ZERO-WATERMARK ALGORITHMS BASED ON NUMERICAL RELATIONSHIP BETWEEN ADJACENT BLOCKS
4
作者 Zhang Yifeng Jia Chengwei +2 位作者 Wang Xuechen Wang Kai Pei Wenjiang 《Journal of Electronics(China)》 2012年第5期392-399,共8页
In this paper, three robust zero-watermark algorithms named Direct Current coefficient RElationship (DC-RE), CUmulant combined Singular Value Decomposition (CU-SVD), and CUmulant combined Singular Value Decomposition ... In this paper, three robust zero-watermark algorithms named Direct Current coefficient RElationship (DC-RE), CUmulant combined Singular Value Decomposition (CU-SVD), and CUmulant combined Singular Value Decomposition RElationship (CU-SVD-RE) are proposed. The algorithm DC-RE gets the feature vector from the relationship of DC coefficients between adjacent blocks, CU-SVD gets the feature vector from the singular value of third-order cumulants, while CU-SVD-RE combines the essence of the first two algorithms. Specially, CU-SVD-RE gets the feature vector from the relationship between singular values of third-order cumulants. Being a cross-over studying field of watermarking and cryptography, the zero-watermark algorithms are robust without modifying the carrier. Numerical simulation obviously shows that, under geometric attacks, the performance of CU-SVD-RE and DC-RE algorithm are better and all three proposed algorithms are robust to various attacks, such as median filter, salt and pepper noise, and Gaussian low-pass filter attacks. 展开更多
关键词 zero-watermark Singular value Third-order cumulants Feature vector
在线阅读 下载PDF
Robust Multi-Watermarking Algorithm for Medical Images Based on GoogLeNet and Henon Map 被引量:1
5
作者 Wenxing Zhang Jingbing Li +3 位作者 Uzair Aslam Bhatti Jing Liu Junhua Zheng Yen-Wei Chen 《Computers, Materials & Continua》 SCIE EI 2023年第4期565-586,共22页
The field of medical images has been rapidly evolving since the advent of the digital medical information era.However,medical data is susceptible to leaks and hacks during transmission.This paper proposed a robust mul... The field of medical images has been rapidly evolving since the advent of the digital medical information era.However,medical data is susceptible to leaks and hacks during transmission.This paper proposed a robust multi-watermarking algorithm for medical images based on GoogLeNet transfer learning to protect the privacy of patient data during transmission and storage,as well as to increase the resistance to geometric attacks and the capacity of embedded watermarks of watermarking algorithms.First,a pre-trained GoogLeNet network is used in this paper,based on which the parameters of several previous layers of the network are fixed and the network is fine-tuned for the constructed medical dataset,so that the pre-trained network can further learn the deep convolutional features in the medical dataset,and then the trained network is used to extract the stable feature vectors of medical images.Then,a two-dimensional Henon chaos encryption technique,which is more sensitive to initial values,is used to encrypt multiple different types of watermarked private information.Finally,the feature vector of the image is logically operated with the encrypted multiple watermark information,and the obtained key is stored in a third party,thus achieving zero watermark embedding and blind extraction.The experimental results confirmthe robustness of the algorithm from the perspective ofmultiple types of watermarks,while also demonstrating the successful embedding ofmultiple watermarks for medical images,and show that the algorithm is more resistant to geometric attacks than some conventional watermarking algorithms. 展开更多
关键词 zero watermarks GoogLeNet medical image Henon map feature vector
在线阅读 下载PDF
Robust Watermarking Algorithm for Medical Images Based on Non-Subsampled Shearlet Transform and Schur Decomposition
6
作者 Meng Yang Jingbing Li +2 位作者 Uzair Aslam Bhatti Chunyan Shao Yen-Wei Chen 《Computers, Materials & Continua》 SCIE EI 2023年第6期5539-5554,共16页
With the development of digitalization in healthcare,more and more information is delivered and stored in digital form,facilitating people’s lives significantly.In the meanwhile,privacy leakage and security issues co... With the development of digitalization in healthcare,more and more information is delivered and stored in digital form,facilitating people’s lives significantly.In the meanwhile,privacy leakage and security issues come along with it.Zero watermarking can solve this problem well.To protect the security of medical information and improve the algorithm’s robustness,this paper proposes a robust watermarking algorithm for medical images based on Non-Subsampled Shearlet Transform(NSST)and Schur decomposition.Firstly,the low-frequency subband image of the original medical image is obtained by NSST and chunked.Secondly,the Schur decomposition of low-frequency blocks to get stable values,extracting the maximum absolute value of the diagonal elements of the upper triangle matrix after the Schur decom-position of each low-frequency block and constructing the transition matrix from it.Then,the mean of the matrix is compared to each element’s value,creating a feature matrix by combining perceptual hashing,and selecting 32 bits as the feature sequence.Finally,the feature vector is exclusive OR(XOR)operated with the encrypted watermark information to get the zero watermark and complete registration with a third-party copyright certification center.Experimental data show that the Normalized Correlation(NC)values of watermarks extracted in random carrier medical images are above 0.5,with higher robustness than traditional algorithms,especially against geometric attacks and achieve watermark information invisibility without altering the carrier medical image. 展开更多
关键词 Non-Subsampled Shearlet Transform(NSST) Schur decomposition perceptual hashing chaotic mapping zero watermark
在线阅读 下载PDF
Robust Watermarking Algorithm for Medical Volume Data Based on Polar Cosine Transform and 3D-DCT
7
作者 Pengju Zhang Jingbing Li +4 位作者 Uzair Aslam Bhatti Jing Liu Yen-wei Chen Dekai Li Lei Cao 《Computers, Materials & Continua》 SCIE EI 2023年第6期5853-5870,共18页
The amount of 3D data stored and transmitted in the Internet of Medical Things(IoMT)is increasing,making protecting these medical data increasingly prominent.However,there are relatively few researches on 3D data wate... The amount of 3D data stored and transmitted in the Internet of Medical Things(IoMT)is increasing,making protecting these medical data increasingly prominent.However,there are relatively few researches on 3D data watermarking.Moreover,due to the particularity of medical data,strict data quality should be considered while protecting data security.To solve the problem,in the field of medical volume data,we proposed a robust watermarking algorithm based on Polar Cosine Transform and 3D-Discrete Cosine Transform(PCT and 3D-DCT).Each slice of the volume data was transformed by PCT to obtain feature row vector,and then the reshaped three-dimensional feature matrix was transformed by 3D-DCT.Based on the contour information of the volume data and the detail information of the inner slice,the visual feature vector was obtained by applying the per-ceptual hash.In addition,the watermark was encrypted by a multi-sensitive initial value Sine and Piecewise linear chaotic Mapping(SPM)system,and embedded as a zero watermark.The key was stored in a third party.Under the same experimental conditions,when the volume data is rotated by 80 degrees,cut 25%along the Z axis,and the JPEG compression quality is 1%,the Normalized Correlation Coefficient(NC)of the extracted watermark is 0.80,0.89,and 1.00 respectively,which are significantly higher than the comparison algorithm. 展开更多
关键词 Volume data watermark zero watermark SPM PCT and 3D-DCT
在线阅读 下载PDF
Research on secure buyer-seller watermarking protocol
8
作者 Liu Quan Chen Zheng Zhou Zude 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期370-376,384,共8页
A new buyer-seller watermarking protocol is proposed by applying a double encryption method and a novel mechanism of embedding a buyer's watermark. The protocol can effectively prevent against collusion attacks and t... A new buyer-seller watermarking protocol is proposed by applying a double encryption method and a novel mechanism of embedding a buyer's watermark. The protocol can effectively prevent against collusion attacks and the man in the middle attack if the third party is not trusted. Also, based on the proposed scheme for the first-hand transaction, a new buyer-reseller watermarking protocol and a formal multi-party watermarking protocol are also proposed. The proposed buyer-resell watermarking protocol only needs the original seller to provide transfer certificate and encryption-decryption service to support the second-hand transaction, and the multi-party watermarking protocol with distributed certificate authorities can overcome the difficulty in the combination of multicast mechanism with multiple unique watermarks and allow a seller to multicast the watermarked digital contents and key transaction information to n buyers. Furthermore, the idea of zero knowledge proof is also applied into the proposed scheme to allow the seller to take an effective control on the task performed by the third party. 展开更多
关键词 watermarking protocol zero knowledge proof distributed certification authorities.
在线阅读 下载PDF
基于遗传编码和耦合超混沌映射的多模态医学图像保护算法 被引量:2
9
作者 常锐云 冯秀芳 张昊 《太原理工大学学报》 北大核心 2025年第3期515-523,共9页
【目的】为了保证多模态医学图像的安全性,提出了一种基于遗传编码和耦合超混沌映射的多模态医学图像保护算法。【方法】在混沌序列生成阶段,提出了CMC-CTBCS耦合模型,以正弦映射(Sine)和无限折叠映射(ICMIC)作为种子映射,构建出三维Sin... 【目的】为了保证多模态医学图像的安全性,提出了一种基于遗传编码和耦合超混沌映射的多模态医学图像保护算法。【方法】在混沌序列生成阶段,提出了CMC-CTBCS耦合模型,以正弦映射(Sine)和无限折叠映射(ICMIC)作为种子映射,构建出三维Sine-ICMIC级联映射(3D-SICM),并将其应用于多模态医学图像加密的设计。图像加密阶段主要包括三部分:多模态医学图像融合算法、基于边缘检测的零水印认证算法、遗传编码选择加密算法。首先,采用基于相位一致性和局部拉普拉斯能量的NSCT域多模态医学图像融合方案,对磁共振成像(MRI)和单光子发射计算机断层成像(SPECT)进行融合,并在融合过程中实现基于边缘检测的零水印信息认证,进而生成融合后的标记图像,然后采用基于动态DNA编码和6比特RNA-S盒替换的选择性加密方案对标记图像进行加密。【结果】理论分析和数值模拟表明,该算法具有良好的安全性。 展开更多
关键词 边缘检测 DNA编码 6比特RNA-S盒 耦合混沌系统 零水印
在线阅读 下载PDF
极谐波分数傅里叶矩及其零水印算法应用 被引量:1
10
作者 徐丽云 张敏 《小型微型计算机系统》 北大核心 2025年第1期151-157,共7页
图像矩作为一种图像的全局特征描述符,已经成为模式识别和图像分析的一种有力工具.为了能够有效抵抗常见的图像处理攻击和几何攻击,本文提出了可用于描述图像特征的极谐波分数傅里叶矩和四元数极谐波分数傅里叶矩.首先,将极谐波多项式... 图像矩作为一种图像的全局特征描述符,已经成为模式识别和图像分析的一种有力工具.为了能够有效抵抗常见的图像处理攻击和几何攻击,本文提出了可用于描述图像特征的极谐波分数傅里叶矩和四元数极谐波分数傅里叶矩.首先,将极谐波多项式作为径向函数,分数傅里叶变换的核函数作为角向函数,得到了极谐波分数傅里叶矩,并分析了其相关性质.其次,将图像的极谐波分数傅里叶矩应用到零水印算法,计算和提取图像中极谐波分数傅里叶矩,随机选择合适的特征图像,并构造二值特征图像,将得到的二值特征图像与水印图像进行异或运算,构造作为零水印的特征图像.最后,针对提出的零水印算法,通过噪声、滤波、旋转、缩放进行鲁棒性和对比分析实验.实验结果表明,本文所提出的极谐波分数傅里叶矩,综合了极谐波多项式和分数傅里叶变换的优点,在零水印算法中能够有效抵抗图像处理攻击和几何攻击,与同类算法相比鲁棒性更优. 展开更多
关键词 正交矩 分数傅里叶变换 极谐波多项式 四元数 零水印
在线阅读 下载PDF
基于区块链的图像数字版权保护系统 被引量:1
11
作者 兰亚杰 马自强 +1 位作者 苗莉 胡富森 《应用科学学报》 北大核心 2025年第2期315-333,共19页
传统的版权管理方法依赖集中式服务器进行存储与验证,这会导致侵权检测困难、版权确权复杂、版权授权流程烦琐,以及缺乏有效的相似性检索机制等问题,使得为版权拥有者提供具有公信力的版权证明变得困难。为此,该文在Hyperledger Fabric... 传统的版权管理方法依赖集中式服务器进行存储与验证,这会导致侵权检测困难、版权确权复杂、版权授权流程烦琐,以及缺乏有效的相似性检索机制等问题,使得为版权拥有者提供具有公信力的版权证明变得困难。为此,该文在Hyperledger Fabric区块链网络的基础上,结合尺度不变特征变换相似性检测算法、离散余弦变换零水印算法、混沌映射图像加密算法、星际文件系统分布式存储,提出了一种图像数字版权保护系统。通过系统功能测试及性能分析发现,该系统可以实现确权图像相似性检测、版权所属权证明、去中心化加密存储、版权变更等版权维权功能。该研究为版权拥有者提供了一个透明、安全且开放的图像数字版权交易平台。 展开更多
关键词 区块链 尺度不变特征变换 离散余弦变换零水印 混沌映射 图像数字版权
在线阅读 下载PDF
基于耦合神经P系统与区块链的遥感影像零水印版权保护方法
12
作者 侯昭阳 闫浩文 +2 位作者 张黎明 马荣娟 屈睿涛 《测绘学报》 北大核心 2025年第12期2247-2261,共15页
当前主流零水印方法对遥感影像特有的光谱-空间多维特征挖掘存在不足,面对针对性攻击时稳健性较差,且依赖第三方知识产权管理机构,存在数据被篡改风险和交易互信度低的问题。为此,本文提出一种基于耦合神经P系统与区块链的遥感影像零水... 当前主流零水印方法对遥感影像特有的光谱-空间多维特征挖掘存在不足,面对针对性攻击时稳健性较差,且依赖第三方知识产权管理机构,存在数据被篡改风险和交易互信度低的问题。为此,本文提出一种基于耦合神经P系统与区块链的遥感影像零水印版权保护方法。首先,采用非下采样剪切波变换对遥感影像的R、G、B波段分别进行多尺度分解得到相应的低频分量。其次,构建多层感知的耦合神经P系统模型,模拟神经元的耦合交互关系,挖掘各低频分量的时空动态特征;同时,引入多尺度形态梯度对模型的外部输入进行优化,以增强特征的空间相关性。然后,利用非对称Tent映射生成加密特征图像,并通过置乱与异或操作构建零水印。最后,结合Hyperledger Fabric和星际文件系统构建去中心化版权注册框架,通过智能合约实现版权信息的链上存证与自动验证。试验结果表明,在面对不同强度的几何攻击、非几何攻击及其组合攻击时,本文方法的归一化相关系数均稳定保持在0.99以上,展现出了较高的稳健性与抗攻击能力。 展开更多
关键词 遥感影像 区块链 耦合神经P系统 零水印 版权保护
在线阅读 下载PDF
基于四元数分数阶广义拉盖尔图像矩的空间域零水印算法
13
作者 王晶 贾晓强 《渭南师范学院学报》 2025年第2期87-94,共8页
现有的基于空间域零水印算法缺乏图像内容信息丢失检测的能力,特别是当图像遭受大面积裁切、随机涂抹或图像行列移除等攻击,水印提取算法就会失效。为了提高零水印算法抵抗图像遭受大面积裁切攻击的鲁棒性,提出一种基于四元数分数阶广... 现有的基于空间域零水印算法缺乏图像内容信息丢失检测的能力,特别是当图像遭受大面积裁切、随机涂抹或图像行列移除等攻击,水印提取算法就会失效。为了提高零水印算法抵抗图像遭受大面积裁切攻击的鲁棒性,提出一种基于四元数分数阶广义拉盖尔图像矩的空间域零水印算法。首先介绍分数阶广义拉盖尔多项式,其次构建四元数分数阶广义拉盖尔矩及不变量,最后设计彩色图像零水印算法。实验结果证明,所提出的零水印算法对常见的几何变换攻击具有一定的鲁棒性,同时对于滤波、有损压缩,特别是对图像大尺度剪切攻击具有较好的检测能力。 展开更多
关键词 四元数 拉盖尔多项式 零水印 鲁棒性
在线阅读 下载PDF
基于四元数通用极坐标余弦变换的图像零水印算法
14
作者 赵杰 李亚文 杨滨峰 《系统仿真技术》 2025年第1期75-79,共5页
零水印技术在实际中已经开展应用,成为信息安全领域的研究热点之一。为进一步提高彩色图像零水印算法的鲁棒性,本研究提出一种基于四元数通用极坐标余弦变换(QGPCT)的图像零水印算法。首先计算图像的QGPCT系数形成特征矩阵,并进行置乱... 零水印技术在实际中已经开展应用,成为信息安全领域的研究热点之一。为进一步提高彩色图像零水印算法的鲁棒性,本研究提出一种基于四元数通用极坐标余弦变换(QGPCT)的图像零水印算法。首先计算图像的QGPCT系数形成特征矩阵,并进行置乱加密处理,然后将水印图像进行置乱加密,最后与加密后的特征矩阵共同构造图像的零水印信息。实验仿真结果表明,该算法对加噪、滤波、JPEG压缩等常用图像处理操作以及旋转、缩放等几何攻击具有较高的鲁棒性。 展开更多
关键词 零水印 四元数 通用极余弦变换
在线阅读 下载PDF
基于神经机器翻译模型的文本零水印算法
15
作者 丁长浩 于琪 王帆 《计算机与数字工程》 2025年第10期2697-2702,共6页
文本零水印作为版权保护和认证的重要手段,能够有效侦测文本信息是否被篡改或盗用。但现在文本零水印仍然面临着鲁棒性较低、对大幅度内容修改攻击抵抗性差的问题。论文针对上述问题,提出了一种基于神经机器翻译模型生成零水印的方法。... 文本零水印作为版权保护和认证的重要手段,能够有效侦测文本信息是否被篡改或盗用。但现在文本零水印仍然面临着鲁棒性较低、对大幅度内容修改攻击抵抗性差的问题。论文针对上述问题,提出了一种基于神经机器翻译模型生成零水印的方法。该方法将需要进行保护的文本输入经过预训练的神经机器翻译模型,获得原文本的译文编码及其生成过程中的信息熵值,将它们作为零水印送入可信第三方进行保存。而在进行版权验证时,算法通过计算两段译文的BLEU值与信息熵差值进行相似性验证。该方法可以有效抵抗如同义词替换攻击、内容调换、文本删减等攻击方式,提高了文本零水印在遭到攻击时的鲁棒性。 展开更多
关键词 文本零水印 神经机器翻译 信息熵
在线阅读 下载PDF
基于鲁棒零水印的半结构化电力数据追踪
16
作者 赵磊 邹云峰 +3 位作者 徐超 马玉龙 沈文 杨仪馨 《电力信息与通信技术》 2025年第1期60-67,共8页
电力数据在线上渠道对外分享过程中,可能存在数据泄露的风险,因此需要对泄露数据进行有效溯源。文章提出一种基于鲁棒零水印的半结构化电力数据追踪方法,通过嵌入不改变原始数据的零水印,在数据发生局部变动情况下仍可对泄露数据进行追... 电力数据在线上渠道对外分享过程中,可能存在数据泄露的风险,因此需要对泄露数据进行有效溯源。文章提出一种基于鲁棒零水印的半结构化电力数据追踪方法,通过嵌入不改变原始数据的零水印,在数据发生局部变动情况下仍可对泄露数据进行追踪。首先,提取出半结构化电力数据部分键值对生成特征序列,作为零水印的载体;其次,将特征序列和水印本体处理成相同数量的块;然后,结合抹除码和冗余纠错码理论,通过一个转移矩阵得到中间序列,并使用纠错码对其进行编码;最后,将纠错编码后的水印信息嵌入特征序列,生成电力数据的鲁棒零水印。在追踪过程中,通过提取与分析被追踪数据的鲁棒零水印,可以有效识别和定位数据的异动。实验和仿真验证证明该方法在保证数据安全性的同时,零水印提取成功率达98%以上。文章提出的方法对于电力系统的数据监测和异动追踪具有重要的应用价值。 展开更多
关键词 鲁棒零水印 数据安全 半结构化数据 文本水印 纠错编码 电力数据保护
在线阅读 下载PDF
结合空域不变量的变换域零水印二次检测方案 被引量:13
17
作者 季称利 杨晓元 +2 位作者 张崇 韩益亮 魏立线 《计算机工程》 CAS CSCD 北大核心 2004年第14期105-107,115,共4页
利用变换域水印技术对诸如压缩、滤波等信号处理具有较好鲁棒性的优点,结合空域中对几何变换具有抵抗力的常量来构造与检测零水印。实验证明,方案对剪切、数模转换处理、滤波、噪声、JPEG压缩、旋转等图像处理具有较强的鲁棒性。
关键词 数字图像 零水印 二次检测 重同步 comer中心角
在线阅读 下载PDF
二维矢量数字地图的零水印算法 被引量:14
18
作者 张佐理 孙树森 +1 位作者 汪亚明 郑可飚 《计算机工程与设计》 CSCD 北大核心 2009年第6期1473-1475,1479,共4页
提出了一种新的二维矢量数字地图的零水印算法。该算法选择矢量地图的顶点作为重要特征,把地图按坐标进行平均分块并统计各个分块中的顶点个数,利用变换与加密构造出标志版权信息的水印图。由于该算法不对原始地图数据进行任何修改,这... 提出了一种新的二维矢量数字地图的零水印算法。该算法选择矢量地图的顶点作为重要特征,把地图按坐标进行平均分块并统计各个分块中的顶点个数,利用变换与加密构造出标志版权信息的水印图。由于该算法不对原始地图数据进行任何修改,这使得传统水印算法的稳健性、安全性和不可感知性之间的矛盾用这种特殊的方法得到了很好的解决。实验结果表明,该零水印算法能够抵抗多种常见的攻击,可以用来对矢量数字地图进行版权保护。 展开更多
关键词 矢量地图 零水印 顶点 版权保护 DXF文件
在线阅读 下载PDF
关系数据库零水印注册方案的研究 被引量:12
19
作者 蒙应杰 吴超 +1 位作者 张文 张秀娟 《计算机工程》 CAS CSCD 北大核心 2007年第2期133-135,138,共4页
对关系数据库的零水印方案的注册过程进行了研究,构造了关系数据库零水印的注册模型;依据注册模型提出了一套零水印注册机制,并描述了注册算法;最后分析了本方案的特点。
关键词 关系数据库 零水印 注册
在线阅读 下载PDF
一种基于混沌调制的零水印算法 被引量:24
20
作者 向华 曹汉强 +1 位作者 伍凯宁 魏访 《中国图象图形学报》 CSCD 北大核心 2006年第5期720-724,共5页
数字水印是一种通过在数字媒体里嵌入秘密信息来保护知识产权的技术。由于在图像中嵌入数字水印后,会导致图像一定程度的失真,因此,近年来出现了一种新的零水印方法。针对数字水印的不可感知性和鲁棒性之间的矛盾问题,提出了一种基于混... 数字水印是一种通过在数字媒体里嵌入秘密信息来保护知识产权的技术。由于在图像中嵌入数字水印后,会导致图像一定程度的失真,因此,近年来出现了一种新的零水印方法。针对数字水印的不可感知性和鲁棒性之间的矛盾问题,提出了一种基于混沌调制的图像零水印方法,即该方法是从原始图像或测试图像的小波变换系数中提取低频子带部分小波系数的特征作为水印,而所抽取的小波系数的位置则由混沌法随机生成。实验结果表明,此算法的不可觉察性很好,并对一些诸如中值滤波、JPEG压缩、附加高斯噪声、裁剪和旋转等各种图像处理攻击有较强的鲁棒性。该方法改变了传统的向原始图像中嵌入水印信息的做法,不仅其得到的水印图像是无失真的,而且在不知道混沌初值的情况下,不可能成功地提取特征水印。 展开更多
关键词 零水印 小波变换 混沌
在线阅读 下载PDF
上一页 1 2 18 下一页 到第
使用帮助 返回顶部