期刊文献+
共找到338篇文章
< 1 2 17 >
每页显示 20 50 100
Securing Transmitted Color Images Using Zero Watermarking and Advanced Encryption Standard on Raspberry Pi
1
作者 Doaa Sami Khafaga Sarah M.Alhammad +3 位作者 Amal Magdi Osama ElKomy Nabil ALashin Khalid M.Hosny 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期1967-1986,共20页
Image authentication techniques have recently received a lot of attention for protecting images against unauthorized access.Due to the wide use of the Internet nowadays,the need to ensure data integrity and authentica... Image authentication techniques have recently received a lot of attention for protecting images against unauthorized access.Due to the wide use of the Internet nowadays,the need to ensure data integrity and authentication increases.Many techniques,such as watermarking and encryption,are used for securing images transmitted via the Internet.The majority of watermarking systems are PC-based,but they are not very portable.Hardwarebased watermarking methods need to be developed to accommodate real-time applications and provide portability.This paper presents hybrid data security techniques using a zero watermarking method to provide copyright protection for the transmitted color images using multi-channel orthogonal Legendre Fourier moments of fractional orders(MFrLFMs)and the advanced encryption standard(AES)algorithm on a low-cost Raspberry Pi.In order to increase embedding robustness,the watermark picture is scrambled using the Arnold method.Zero watermarking is implemented on the Raspberry Pi to produce a real-time ownership verification key.Before sending the ownership verification key and the original image to the monitoring station,we can encrypt the transmitted data with AES for additional security and hide any viewable information.The receiver next verifies the received image’s integrity to confirm its authenticity and that it has not been tampered with.We assessed the suggested algorithm’s resistance to many attacks.The suggested algorithm provides a reasonable degree of robustness while still being perceptible.The proposed method provides improved bit error rate(BER)and normalized correlation(NC)values compared to previous zero watermarking approaches.AES performance analysis is performed to demonstrate its effectiveness.Using a 256×256 image size,it takes only 2 s to apply the zero-watermark algorithm on the Raspberry Pi. 展开更多
关键词 zero watermarking Raspberry Pi advanced encryption standard
在线阅读 下载PDF
A Image Copyright Protection Method Using Zero-Watermark by Blockchain and IPFS 被引量:1
2
作者 Tao Chen Zhao Qiu +5 位作者 Gengquan Xie Lin Yuan Shaohua Duan Hao Guo Dahao Fu Hancheng Huang 《Journal of Information Hiding and Privacy Protection》 2021年第3期131-142,共12页
Behind the popularity of multimedia technology,the dispute over image copyright is getting worse.In the digital watermark prevention technology for copyright infringement,watermark technology is considered to be an im... Behind the popularity of multimedia technology,the dispute over image copyright is getting worse.In the digital watermark prevention technology for copyright infringement,watermark technology is considered to be an important technology to overcome data protection problems and verify the relationship between data ownership.Among the many digital watermarking technologies,zero watermarking technology has been favored in recent years.However,the existing zero watermark technology in the implementation process often needs a trusted third party to store watermarks,which may make the data too central,data storage security is low and copyright registration costs are too high,which creates a rare problem.The decentivization and information cannot be tampered of blockchain technology’s nature find new methods for image copyright protection.This paper studies the role of zero watermark algorithm in the image copyright and its complete storage and certification scheme,proposes a zero watermark image protection framework based on blockchain,and builds a system according to the framework.Combined with blockchain and zero watermarking technology,the framework uses inter IPFS(Inter Planetary File System)to solve the problem of blockchain efficient storage and sharing of large files.In addition,the application of user copyright information,image image query and image trading in the system are realized based on smart contracts,which solves the problem of lack of trusted third parties.Experiments show that the scheme is feasible and robust to various attacks. 展开更多
关键词 zero watermarking blockchain IPFS copyright protection
在线阅读 下载PDF
A Novel Zero-Watermark Copyright Authentication Scheme Based on Lifting Wavelet and Harris Corner Detection 被引量:1
3
作者 FAN Li GAO Tiegang YANG Qunting 《Wuhan University Journal of Natural Sciences》 CAS 2010年第5期408-414,共7页
In this paper,a novel zero-watermark copyright authentication scheme based on Internet public certification system is proposed.This approach utilizes Haar integer wavelet transform based on a lifting scheme and adapti... In this paper,a novel zero-watermark copyright authentication scheme based on Internet public certification system is proposed.This approach utilizes Haar integer wavelet transform based on a lifting scheme and adaptive Harris corner detection to extract image features,which will be used to produce a binary feature map,and the map is very crucial to the generation of watermark registered later.By properly choosing the parameters of aforementioned techniques such as the threshold T and the radius of local feature region R,the feature map is so much more stable and distinguishing that it can be used to construct robust watermark.Simulations demonstrate that the proposed scheme is resistant to many kinds of signal processing and malicious attacks such as Gaussian blurring,additive noising,JPEG lossy compression,cropping,scaling and slight rotation operation.Compared with a relative scheme such as that of Chang's,the scheme in this paper is more practicable and reliable and can be applied to the area of copyright protection. 展开更多
关键词 zero-watermark copyright authentication Harris corner detection integer wavelet transform ROBUSTNESS
原文传递
ROBUST ZERO-WATERMARK ALGORITHMS BASED ON NUMERICAL RELATIONSHIP BETWEEN ADJACENT BLOCKS
4
作者 Zhang Yifeng Jia Chengwei +2 位作者 Wang Xuechen Wang Kai Pei Wenjiang 《Journal of Electronics(China)》 2012年第5期392-399,共8页
In this paper, three robust zero-watermark algorithms named Direct Current coefficient RElationship (DC-RE), CUmulant combined Singular Value Decomposition (CU-SVD), and CUmulant combined Singular Value Decomposition ... In this paper, three robust zero-watermark algorithms named Direct Current coefficient RElationship (DC-RE), CUmulant combined Singular Value Decomposition (CU-SVD), and CUmulant combined Singular Value Decomposition RElationship (CU-SVD-RE) are proposed. The algorithm DC-RE gets the feature vector from the relationship of DC coefficients between adjacent blocks, CU-SVD gets the feature vector from the singular value of third-order cumulants, while CU-SVD-RE combines the essence of the first two algorithms. Specially, CU-SVD-RE gets the feature vector from the relationship between singular values of third-order cumulants. Being a cross-over studying field of watermarking and cryptography, the zero-watermark algorithms are robust without modifying the carrier. Numerical simulation obviously shows that, under geometric attacks, the performance of CU-SVD-RE and DC-RE algorithm are better and all three proposed algorithms are robust to various attacks, such as median filter, salt and pepper noise, and Gaussian low-pass filter attacks. 展开更多
关键词 zero-watermark Singular value Third-order cumulants Feature vector
在线阅读 下载PDF
基于遗传编码和耦合超混沌映射的多模态医学图像保护算法 被引量:1
5
作者 常锐云 冯秀芳 张昊 《太原理工大学学报》 北大核心 2025年第3期515-523,共9页
【目的】为了保证多模态医学图像的安全性,提出了一种基于遗传编码和耦合超混沌映射的多模态医学图像保护算法。【方法】在混沌序列生成阶段,提出了CMC-CTBCS耦合模型,以正弦映射(Sine)和无限折叠映射(ICMIC)作为种子映射,构建出三维Sin... 【目的】为了保证多模态医学图像的安全性,提出了一种基于遗传编码和耦合超混沌映射的多模态医学图像保护算法。【方法】在混沌序列生成阶段,提出了CMC-CTBCS耦合模型,以正弦映射(Sine)和无限折叠映射(ICMIC)作为种子映射,构建出三维Sine-ICMIC级联映射(3D-SICM),并将其应用于多模态医学图像加密的设计。图像加密阶段主要包括三部分:多模态医学图像融合算法、基于边缘检测的零水印认证算法、遗传编码选择加密算法。首先,采用基于相位一致性和局部拉普拉斯能量的NSCT域多模态医学图像融合方案,对磁共振成像(MRI)和单光子发射计算机断层成像(SPECT)进行融合,并在融合过程中实现基于边缘检测的零水印信息认证,进而生成融合后的标记图像,然后采用基于动态DNA编码和6比特RNA-S盒替换的选择性加密方案对标记图像进行加密。【结果】理论分析和数值模拟表明,该算法具有良好的安全性。 展开更多
关键词 边缘检测 DNA编码 6比特RNA-S盒 耦合混沌系统 零水印
在线阅读 下载PDF
极谐波分数傅里叶矩及其零水印算法应用 被引量:1
6
作者 徐丽云 张敏 《小型微型计算机系统》 北大核心 2025年第1期151-157,共7页
图像矩作为一种图像的全局特征描述符,已经成为模式识别和图像分析的一种有力工具.为了能够有效抵抗常见的图像处理攻击和几何攻击,本文提出了可用于描述图像特征的极谐波分数傅里叶矩和四元数极谐波分数傅里叶矩.首先,将极谐波多项式... 图像矩作为一种图像的全局特征描述符,已经成为模式识别和图像分析的一种有力工具.为了能够有效抵抗常见的图像处理攻击和几何攻击,本文提出了可用于描述图像特征的极谐波分数傅里叶矩和四元数极谐波分数傅里叶矩.首先,将极谐波多项式作为径向函数,分数傅里叶变换的核函数作为角向函数,得到了极谐波分数傅里叶矩,并分析了其相关性质.其次,将图像的极谐波分数傅里叶矩应用到零水印算法,计算和提取图像中极谐波分数傅里叶矩,随机选择合适的特征图像,并构造二值特征图像,将得到的二值特征图像与水印图像进行异或运算,构造作为零水印的特征图像.最后,针对提出的零水印算法,通过噪声、滤波、旋转、缩放进行鲁棒性和对比分析实验.实验结果表明,本文所提出的极谐波分数傅里叶矩,综合了极谐波多项式和分数傅里叶变换的优点,在零水印算法中能够有效抵抗图像处理攻击和几何攻击,与同类算法相比鲁棒性更优. 展开更多
关键词 正交矩 分数傅里叶变换 极谐波多项式 四元数 零水印
在线阅读 下载PDF
基于区块链的图像数字版权保护系统
7
作者 兰亚杰 马自强 +1 位作者 苗莉 胡富森 《应用科学学报》 北大核心 2025年第2期315-333,共19页
传统的版权管理方法依赖集中式服务器进行存储与验证,这会导致侵权检测困难、版权确权复杂、版权授权流程烦琐,以及缺乏有效的相似性检索机制等问题,使得为版权拥有者提供具有公信力的版权证明变得困难。为此,该文在Hyperledger Fabric... 传统的版权管理方法依赖集中式服务器进行存储与验证,这会导致侵权检测困难、版权确权复杂、版权授权流程烦琐,以及缺乏有效的相似性检索机制等问题,使得为版权拥有者提供具有公信力的版权证明变得困难。为此,该文在Hyperledger Fabric区块链网络的基础上,结合尺度不变特征变换相似性检测算法、离散余弦变换零水印算法、混沌映射图像加密算法、星际文件系统分布式存储,提出了一种图像数字版权保护系统。通过系统功能测试及性能分析发现,该系统可以实现确权图像相似性检测、版权所属权证明、去中心化加密存储、版权变更等版权维权功能。该研究为版权拥有者提供了一个透明、安全且开放的图像数字版权交易平台。 展开更多
关键词 区块链 尺度不变特征变换 离散余弦变换零水印 混沌映射 图像数字版权
在线阅读 下载PDF
Robust Multi-Watermarking Algorithm for Medical Images Based on GoogLeNet and Henon Map
8
作者 Wenxing Zhang Jingbing Li +3 位作者 Uzair Aslam Bhatti Jing Liu Junhua Zheng Yen-Wei Chen 《Computers, Materials & Continua》 SCIE EI 2023年第4期565-586,共22页
The field of medical images has been rapidly evolving since the advent of the digital medical information era.However,medical data is susceptible to leaks and hacks during transmission.This paper proposed a robust mul... The field of medical images has been rapidly evolving since the advent of the digital medical information era.However,medical data is susceptible to leaks and hacks during transmission.This paper proposed a robust multi-watermarking algorithm for medical images based on GoogLeNet transfer learning to protect the privacy of patient data during transmission and storage,as well as to increase the resistance to geometric attacks and the capacity of embedded watermarks of watermarking algorithms.First,a pre-trained GoogLeNet network is used in this paper,based on which the parameters of several previous layers of the network are fixed and the network is fine-tuned for the constructed medical dataset,so that the pre-trained network can further learn the deep convolutional features in the medical dataset,and then the trained network is used to extract the stable feature vectors of medical images.Then,a two-dimensional Henon chaos encryption technique,which is more sensitive to initial values,is used to encrypt multiple different types of watermarked private information.Finally,the feature vector of the image is logically operated with the encrypted multiple watermark information,and the obtained key is stored in a third party,thus achieving zero watermark embedding and blind extraction.The experimental results confirmthe robustness of the algorithm from the perspective ofmultiple types of watermarks,while also demonstrating the successful embedding ofmultiple watermarks for medical images,and show that the algorithm is more resistant to geometric attacks than some conventional watermarking algorithms. 展开更多
关键词 zero watermarks GoogLeNet medical image Henon map feature vector
在线阅读 下载PDF
Robust Watermarking Algorithm for Medical Images Based on Non-Subsampled Shearlet Transform and Schur Decomposition
9
作者 Meng Yang Jingbing Li +2 位作者 Uzair Aslam Bhatti Chunyan Shao Yen-Wei Chen 《Computers, Materials & Continua》 SCIE EI 2023年第6期5539-5554,共16页
With the development of digitalization in healthcare,more and more information is delivered and stored in digital form,facilitating people’s lives significantly.In the meanwhile,privacy leakage and security issues co... With the development of digitalization in healthcare,more and more information is delivered and stored in digital form,facilitating people’s lives significantly.In the meanwhile,privacy leakage and security issues come along with it.Zero watermarking can solve this problem well.To protect the security of medical information and improve the algorithm’s robustness,this paper proposes a robust watermarking algorithm for medical images based on Non-Subsampled Shearlet Transform(NSST)and Schur decomposition.Firstly,the low-frequency subband image of the original medical image is obtained by NSST and chunked.Secondly,the Schur decomposition of low-frequency blocks to get stable values,extracting the maximum absolute value of the diagonal elements of the upper triangle matrix after the Schur decom-position of each low-frequency block and constructing the transition matrix from it.Then,the mean of the matrix is compared to each element’s value,creating a feature matrix by combining perceptual hashing,and selecting 32 bits as the feature sequence.Finally,the feature vector is exclusive OR(XOR)operated with the encrypted watermark information to get the zero watermark and complete registration with a third-party copyright certification center.Experimental data show that the Normalized Correlation(NC)values of watermarks extracted in random carrier medical images are above 0.5,with higher robustness than traditional algorithms,especially against geometric attacks and achieve watermark information invisibility without altering the carrier medical image. 展开更多
关键词 Non-Subsampled Shearlet Transform(NSST) Schur decomposition perceptual hashing chaotic mapping zero watermark
在线阅读 下载PDF
Robust Watermarking Algorithm for Medical Volume Data Based on Polar Cosine Transform and 3D-DCT
10
作者 Pengju Zhang Jingbing Li +4 位作者 Uzair Aslam Bhatti Jing Liu Yen-wei Chen Dekai Li Lei Cao 《Computers, Materials & Continua》 SCIE EI 2023年第6期5853-5870,共18页
The amount of 3D data stored and transmitted in the Internet of Medical Things(IoMT)is increasing,making protecting these medical data increasingly prominent.However,there are relatively few researches on 3D data wate... The amount of 3D data stored and transmitted in the Internet of Medical Things(IoMT)is increasing,making protecting these medical data increasingly prominent.However,there are relatively few researches on 3D data watermarking.Moreover,due to the particularity of medical data,strict data quality should be considered while protecting data security.To solve the problem,in the field of medical volume data,we proposed a robust watermarking algorithm based on Polar Cosine Transform and 3D-Discrete Cosine Transform(PCT and 3D-DCT).Each slice of the volume data was transformed by PCT to obtain feature row vector,and then the reshaped three-dimensional feature matrix was transformed by 3D-DCT.Based on the contour information of the volume data and the detail information of the inner slice,the visual feature vector was obtained by applying the per-ceptual hash.In addition,the watermark was encrypted by a multi-sensitive initial value Sine and Piecewise linear chaotic Mapping(SPM)system,and embedded as a zero watermark.The key was stored in a third party.Under the same experimental conditions,when the volume data is rotated by 80 degrees,cut 25%along the Z axis,and the JPEG compression quality is 1%,the Normalized Correlation Coefficient(NC)of the extracted watermark is 0.80,0.89,and 1.00 respectively,which are significantly higher than the comparison algorithm. 展开更多
关键词 Volume data watermark zero watermark SPM PCT and 3D-DCT
在线阅读 下载PDF
基于四元数分数阶广义拉盖尔图像矩的空间域零水印算法
11
作者 王晶 贾晓强 《渭南师范学院学报》 2025年第2期87-94,共8页
现有的基于空间域零水印算法缺乏图像内容信息丢失检测的能力,特别是当图像遭受大面积裁切、随机涂抹或图像行列移除等攻击,水印提取算法就会失效。为了提高零水印算法抵抗图像遭受大面积裁切攻击的鲁棒性,提出一种基于四元数分数阶广... 现有的基于空间域零水印算法缺乏图像内容信息丢失检测的能力,特别是当图像遭受大面积裁切、随机涂抹或图像行列移除等攻击,水印提取算法就会失效。为了提高零水印算法抵抗图像遭受大面积裁切攻击的鲁棒性,提出一种基于四元数分数阶广义拉盖尔图像矩的空间域零水印算法。首先介绍分数阶广义拉盖尔多项式,其次构建四元数分数阶广义拉盖尔矩及不变量,最后设计彩色图像零水印算法。实验结果证明,所提出的零水印算法对常见的几何变换攻击具有一定的鲁棒性,同时对于滤波、有损压缩,特别是对图像大尺度剪切攻击具有较好的检测能力。 展开更多
关键词 四元数 拉盖尔多项式 零水印 鲁棒性
在线阅读 下载PDF
基于四元数通用极坐标余弦变换的图像零水印算法
12
作者 赵杰 李亚文 杨滨峰 《系统仿真技术》 2025年第1期75-79,共5页
零水印技术在实际中已经开展应用,成为信息安全领域的研究热点之一。为进一步提高彩色图像零水印算法的鲁棒性,本研究提出一种基于四元数通用极坐标余弦变换(QGPCT)的图像零水印算法。首先计算图像的QGPCT系数形成特征矩阵,并进行置乱... 零水印技术在实际中已经开展应用,成为信息安全领域的研究热点之一。为进一步提高彩色图像零水印算法的鲁棒性,本研究提出一种基于四元数通用极坐标余弦变换(QGPCT)的图像零水印算法。首先计算图像的QGPCT系数形成特征矩阵,并进行置乱加密处理,然后将水印图像进行置乱加密,最后与加密后的特征矩阵共同构造图像的零水印信息。实验仿真结果表明,该算法对加噪、滤波、JPEG压缩等常用图像处理操作以及旋转、缩放等几何攻击具有较高的鲁棒性。 展开更多
关键词 零水印 四元数 通用极余弦变换
在线阅读 下载PDF
基于鲁棒零水印的半结构化电力数据追踪
13
作者 赵磊 邹云峰 +3 位作者 徐超 马玉龙 沈文 杨仪馨 《电力信息与通信技术》 2025年第1期60-67,共8页
电力数据在线上渠道对外分享过程中,可能存在数据泄露的风险,因此需要对泄露数据进行有效溯源。文章提出一种基于鲁棒零水印的半结构化电力数据追踪方法,通过嵌入不改变原始数据的零水印,在数据发生局部变动情况下仍可对泄露数据进行追... 电力数据在线上渠道对外分享过程中,可能存在数据泄露的风险,因此需要对泄露数据进行有效溯源。文章提出一种基于鲁棒零水印的半结构化电力数据追踪方法,通过嵌入不改变原始数据的零水印,在数据发生局部变动情况下仍可对泄露数据进行追踪。首先,提取出半结构化电力数据部分键值对生成特征序列,作为零水印的载体;其次,将特征序列和水印本体处理成相同数量的块;然后,结合抹除码和冗余纠错码理论,通过一个转移矩阵得到中间序列,并使用纠错码对其进行编码;最后,将纠错编码后的水印信息嵌入特征序列,生成电力数据的鲁棒零水印。在追踪过程中,通过提取与分析被追踪数据的鲁棒零水印,可以有效识别和定位数据的异动。实验和仿真验证证明该方法在保证数据安全性的同时,零水印提取成功率达98%以上。文章提出的方法对于电力系统的数据监测和异动追踪具有重要的应用价值。 展开更多
关键词 鲁棒零水印 数据安全 半结构化数据 文本水印 纠错编码 电力数据保护
在线阅读 下载PDF
Research on secure buyer-seller watermarking protocol
14
作者 Liu Quan Chen Zheng Zhou Zude 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期370-376,384,共8页
A new buyer-seller watermarking protocol is proposed by applying a double encryption method and a novel mechanism of embedding a buyer's watermark. The protocol can effectively prevent against collusion attacks and t... A new buyer-seller watermarking protocol is proposed by applying a double encryption method and a novel mechanism of embedding a buyer's watermark. The protocol can effectively prevent against collusion attacks and the man in the middle attack if the third party is not trusted. Also, based on the proposed scheme for the first-hand transaction, a new buyer-reseller watermarking protocol and a formal multi-party watermarking protocol are also proposed. The proposed buyer-resell watermarking protocol only needs the original seller to provide transfer certificate and encryption-decryption service to support the second-hand transaction, and the multi-party watermarking protocol with distributed certificate authorities can overcome the difficulty in the combination of multicast mechanism with multiple unique watermarks and allow a seller to multicast the watermarked digital contents and key transaction information to n buyers. Furthermore, the idea of zero knowledge proof is also applied into the proposed scheme to allow the seller to take an effective control on the task performed by the third party. 展开更多
关键词 watermarking protocol zero knowledge proof distributed certification authorities.
在线阅读 下载PDF
基于以太坊的服装设计版权方案 被引量:1
15
作者 陈永强 周江臣 何凯 《计算机技术与发展》 2024年第8期209-214,共6页
现有的中心化服装设计版权体系中,低质量抄袭作品层出不穷,而作品的审核周期长且完成度不是非常高的阶段性成果又无法得到认可,使得创作者维权时往往缺乏这一时间段的时间证明。此外,作品的版权确权并不简洁,不利于版权的使用,数据本身... 现有的中心化服装设计版权体系中,低质量抄袭作品层出不穷,而作品的审核周期长且完成度不是非常高的阶段性成果又无法得到认可,使得创作者维权时往往缺乏这一时间段的时间证明。此外,作品的版权确权并不简洁,不利于版权的使用,数据本身也有遭受攻击的风险。为解决上述问题,提出了一个基于区块链、零水印和星际文件系统(IPFS)的服装设计版权方案。区块链的不可篡改特性保证了数据安全,使得其与传统版权保护流程能够有效结合。同时将区块链取代以往零水印中的可信知识产权保护(IPR)中央权威机构,消除了第三方带来的隐患。智能合约结合时间戳功能可以准确提供各步骤的线上记录,让创作者能更好提供作品从草稿到成品的时间线证明,以便在版权纠纷中维护自身权益。而感知哈希也能剔除掉抄袭作品,从抄袭作品的登记源头来控制低级抄袭作品的出现,保证创作者的著作权。实验表明,整体功能完善、安全性高,其中零水印方案具备可行性和有效性,作品登记和查询消耗的以太坊资源Gas成本低。 展开更多
关键词 以太坊 零水印 服装设计 智能合约 星际文件系统
在线阅读 下载PDF
基于双混沌映射的遥感图像零水印算法 被引量:4
16
作者 杨兵兵 闫浩文 +4 位作者 张黎明 徐欣钰 王小龙 严清博 侯昭阳 《地理与地理信息科学》 CSCD 北大核心 2024年第3期21-28,共8页
现有遥感图像零水印算法多为特定类型的遥感图像设计,普适性较差,且对水印组合攻击的鲁棒性不强。该文提出一种基于双混沌映射的遥感图像零水印算法。①对遥感图像进行非下采样剪切波变换,选取低频图像进行离散余弦变换;②对变换后的图... 现有遥感图像零水印算法多为特定类型的遥感图像设计,普适性较差,且对水印组合攻击的鲁棒性不强。该文提出一种基于双混沌映射的遥感图像零水印算法。①对遥感图像进行非下采样剪切波变换,选取低频图像进行离散余弦变换;②对变换后的图像进行分块,并对各子块进行Schur分解,通过比较每个子块上三角矩阵中第一个元素值和均值的大小构建特征矩阵;③利用一维Logistic映射置乱遥感图像,与特征矩阵进行异或运算得到一个二值序列;①结合2D-LALM-Tent映射和Arnold置乱水印图像,对前述二值序列和置乱后水印的二值序列进行异或运算得到零水印。实验表明,该算法对不同类型遥感图像的适用性较好,且对水印组合攻击的鲁棒性较强,无精度损失,可用于多种类型遥感图像的版权保护,为遥感图像的共享提供安全保障。 展开更多
关键词 双混沌映射 2D-LALM TENT映射 遥感图像 零水印算法
在线阅读 下载PDF
基于ResNet50模型的矢量地图零水印算法 被引量:1
17
作者 张永利 卢浩 《地理与地理信息科学》 CSCD 北大核心 2024年第6期1-5,共5页
针对传统矢量地图零水印算法存在的抗几何攻击和要素增删攻击能力不足等问题,该文提出一种基于ResNet50模型的矢量地图零水印算法,在不改变矢量地图数据的情况下保护地图版权。该算法通过采用道格拉斯—普克算法提取矢量地图的复杂特征... 针对传统矢量地图零水印算法存在的抗几何攻击和要素增删攻击能力不足等问题,该文提出一种基于ResNet50模型的矢量地图零水印算法,在不改变矢量地图数据的情况下保护地图版权。该算法通过采用道格拉斯—普克算法提取矢量地图的复杂特征信息,将坐标集合映射为适合ResNet50模型处理的序列,通过ResNet50模型自动提取矢量地图数据中的特征,以实现零水印的构建。选择西安市餐饮、村庄、乡镇村道矢量地图数据集作为实验数据进行算法验证,结果表明,该算法在抗几何攻击和要素增删攻击方面均表现出色,在无损版权保护方面具有广阔的应用前景。 展开更多
关键词 矢量地图 零水印 ResNet50 版权保护 地理信息安全
在线阅读 下载PDF
运用特征不变量的高精地图零水印算法 被引量:1
18
作者 张明旺 张黎明 谭涛 《地理与地理信息科学》 CSCD 北大核心 2024年第6期11-15,共5页
高精地图作为车辆导航和自动驾驶的核心组成部分,具有精度高、包含敏感信息、成本高等特点,其安全和保密至关重要。数字水印作为信息安全领域的重要工具,可以为高精地图数据提供认证和保护,但目前缺少针对高精地图的水印算法。该文根据... 高精地图作为车辆导航和自动驾驶的核心组成部分,具有精度高、包含敏感信息、成本高等特点,其安全和保密至关重要。数字水印作为信息安全领域的重要工具,可以为高精地图数据提供认证和保护,但目前缺少针对高精地图的水印算法。该文根据高精地图的特性,提出一种高精地图零水印算法:根据高精地图用于表示车道信息的参数三次曲线数量确定水印索引;利用两个车道信息节点中参数三次曲线数量的奇偶性是否相同确定水印信息;结合水印索引依照投票原则构建特征矩阵,与加密后的水印图像进行异或运算生成零水印。实验结果表明,该算法在受到较高程度的几何攻击、增删攻击后仍能提取到较完整的水印信息,具有良好的鲁棒性。 展开更多
关键词 高精地图 特征不变量 零水印 版权保护 Open DRIVE
在线阅读 下载PDF
基于NMF和Hu不变矩的遥感影像零水印算法
19
作者 库莉 耿晴 詹伟 《地理与地理信息科学》 CSCD 北大核心 2024年第6期6-10,15,共6页
为满足遥感影像数据在遭受大幅裁剪(强裁剪)后仍能有效保护版权的需求,该文提出一种基于非负矩阵分解(Nonnegative Matrix Factorization,NMF)和Hu不变矩的零水印算法。首先将原始影像数据分解为系数矩阵和基矩阵,然后计算整体Hu矩不变... 为满足遥感影像数据在遭受大幅裁剪(强裁剪)后仍能有效保护版权的需求,该文提出一种基于非负矩阵分解(Nonnegative Matrix Factorization,NMF)和Hu不变矩的零水印算法。首先将原始影像数据分解为系数矩阵和基矩阵,然后计算整体Hu矩不变量均值和分块不变量均值,将两者得到的特征值二值化后与版权信息进行异或操作以生成零水印。其中,系数矩阵及零水印需存入第三方机构,为版权验证奠定基础。在检测版权信息时,利用NMF可复原特性,从待检测数据中反算出原始数据,并提取零水印以进行版权信息比对。实验结果表明,该算法具有版权保护的唯一性和鲁棒性,尤其在抗强裁剪方面表现突出,显示出在遥感影像数据版权保护领域的应用价值。 展开更多
关键词 遥感影像 零水印 非负矩阵分解 HU矩
在线阅读 下载PDF
基于组合变换域的彩色图像大容量零水印算法
20
作者 韩绍程 刘欢 《北京航空航天大学学报》 EI CAS CSCD 北大核心 2024年第7期2093-2103,共11页
针对现有大多数彩色图像零水印方案中水印嵌入容量小且抗几何攻击鲁棒性能不佳等问题,提出一种基于组合变换域和位平面分解的大容量鲁棒零水印算法。对彩色载体图像的R、G、B通道分别进行快速有限剪切波变换(FFST),并对变换后的各低频... 针对现有大多数彩色图像零水印方案中水印嵌入容量小且抗几何攻击鲁棒性能不佳等问题,提出一种基于组合变换域和位平面分解的大容量鲁棒零水印算法。对彩色载体图像的R、G、B通道分别进行快速有限剪切波变换(FFST),并对变换后的各低频子带进行非重叠分块置乱,将置乱后的各子带的分块离散余弦变换(DCT)系数用于构造四元数离散余弦变换(QDCT)系数矩阵;在每个QDCT系数矩阵中选取两个低频系数,利用其各个实部和虚部的符号极性构造8个二值鲁棒特征矩阵;将经过正交拉丁方置乱加密后的灰度水印图像按位分解,把位分解后的8个二值位平面分别与以上二值鲁棒特征矩阵进行异或并重组得到灰度级认证零水印。此外,在水印检测前,采用ORB算法对待认证图像进行几何校正。实验结果表明,所提算法水印嵌入容量和安全性高,且对于常规非几何攻击和几何攻击均具有较强的鲁棒性。 展开更多
关键词 零水印 彩色图像 灰度级水印 组合变换域 位平面分解
原文传递
上一页 1 2 17 下一页 到第
使用帮助 返回顶部