期刊文献+
共找到348篇文章
< 1 2 18 >
每页显示 20 50 100
Robust zero-watermarking algorithm based on discrete wavelet transform and daisy descriptors for encrypted medical image
1
作者 Yiyi Yuan Jingbing Li +3 位作者 Jing Liu Uzair Aslam Bhatti Zilong Liu Yen-wei Chen 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第1期40-53,共14页
In the intricate network environment,the secure transmission of medical images faces challenges such as information leakage and malicious tampering,significantly impacting the accuracy of disease diagnoses by medical ... In the intricate network environment,the secure transmission of medical images faces challenges such as information leakage and malicious tampering,significantly impacting the accuracy of disease diagnoses by medical professionals.To address this problem,the authors propose a robust feature watermarking algorithm for encrypted medical images based on multi-stage discrete wavelet transform(DWT),Daisy descriptor,and discrete cosine transform(DCT).The algorithm initially encrypts the original medical image through DWT-DCT and Logistic mapping.Subsequently,a 3-stage DWT transformation is applied to the encrypted medical image,with the centre point of the LL3 sub-band within its low-frequency component serving as the sampling point.The Daisy descriptor matrix for this point is then computed.Finally,a DCT transformation is performed on the Daisy descriptor matrix,and the low-frequency portion is processed using the perceptual hashing algorithm to generate a 32-bit binary feature vector for the medical image.This scheme utilises cryptographic knowledge and zero-watermarking technique to embed watermarks without modifying medical images and can extract the watermark from test images without the original image,which meets the basic re-quirements of medical image watermarking.The embedding and extraction of water-marks are accomplished in a mere 0.160 and 0.411s,respectively,with minimal computational overhead.Simulation results demonstrate the robustness of the algorithm against both conventional attacks and geometric attacks,with a notable performance in resisting rotation attacks. 展开更多
关键词 daisy descriptor DCT DWT encryption domain medical image zero-watermarkING
在线阅读 下载PDF
A Smart English Text Zero-Watermarking Approach Based on Third-Level Order and Word Mechanism of Markov Model 被引量:9
2
作者 Fahd N.Al-Wesabi 《Computers, Materials & Continua》 SCIE EI 2020年第11期1137-1156,共20页
Text information is principally dependent on the natural languages.Therefore,improving security and reliability of text information exchanged via internet network has become the most difficult challenge that researche... Text information is principally dependent on the natural languages.Therefore,improving security and reliability of text information exchanged via internet network has become the most difficult challenge that researchers encounter.Content authentication and tampering detection of digital contents have become a major concern in the area of communication and information exchange via the Internet.In this paper,an intelligent text Zero-Watermarking approach SETZWMWMM(Smart English Text Zero-Watermarking Approach Based on Mid-Level Order and Word Mechanism of Markov Model)has been proposed for the content authentication and tampering detection of English text contents.The SETZWMWMM approach embeds and detects the watermark logically without altering the original English text document.Based on Hidden Markov Model(HMM),Third level order of word mechanism is used to analyze the interrelationship between contexts of given English texts.The extracted features are used as a watermark information and integrated with digital zero-watermarking techniques.To detect eventual tampering,SETZWMWMM has been implemented and validated with attacked English text.Experiments were performed on four datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results show that our method is more sensitive and efficient for all kinds of tampering attacks with high level accuracy of tampering detection than compared methods. 展开更多
关键词 Content authentication hidden Markov model zero-watermarkING NLP tampering detection.
在线阅读 下载PDF
An Audio Zero-Watermark Scheme Based on Energy Comparing 被引量:7
3
作者 YANG Yu LEI Min +3 位作者 CHENG Mingzhi LIU Bohuai LIN Guoyuan XIAO Da 《China Communications》 SCIE CSCD 2014年第7期110-116,共7页
Zero-watermark technique,embedding watermark without modifying carriers,has been broadly applied for copyright protection of images.However,there is little research on audio zerowatermark.This paper proposes an audio ... Zero-watermark technique,embedding watermark without modifying carriers,has been broadly applied for copyright protection of images.However,there is little research on audio zerowatermark.This paper proposes an audio zero-watermark scheme based on energy relationship between adjacent audio sections.Taking use of discrete wavelet transformation(DWT),it gets power approximations,or energies,of audio segments.Then,it extracts the audio profile,i.e.the zero-watermark,according to the relative size of energies of consecutive fragments.The experimental results demonstrate that the proposed scheme is robust against general malicious attacks including noise addition,resampling,low-pass filtering,etc.,and this approach effectively solves the contradiction between inaudibility and robustness. 展开更多
关键词 zero-watermark audio water-marking scheme energy comparing
在线阅读 下载PDF
A Robust Zero-Watermarking Based on SIFT-DCT for Medical Images in the Encrypted Domain 被引量:5
4
作者 Jialing Liu Jingbing Li +4 位作者 Yenwei Chen Xiangxi Zou Jieren Cheng Yanlin Liu Uzair Aslam Bhatti 《Computers, Materials & Continua》 SCIE EI 2019年第7期363-378,共16页
Remote medical diagnosis can be realized by using the Internet,but when transmitting medical images of patients through the Internet,personal information of patients may be leaked.Aim at the security of medical inform... Remote medical diagnosis can be realized by using the Internet,but when transmitting medical images of patients through the Internet,personal information of patients may be leaked.Aim at the security of medical information system and the protection of medical images,a novel robust zero-watermarking based on SIFT-DCT(Scale Invariant Feature Transform-Discrete Cosine Transform)for medical images in the encrypted domain is proposed.Firstly,the original medical image is encrypted in transform domain based on Logistic chaotic sequence to enhance the concealment of original medical images.Then,the SIFT-DCT is used to extract the feature sequences of encrypted medical images.Next,zero-watermarking technology is used to ensure that the region of interest of medical images are not changed.Finally,the robust of the algorithm is evaluated by the correlation coefficient between the original watermark and the attacked watermark.A series of attack experiments are carried out on this method,and the results show that the algorithm is not only secure,but also robust to both traditional and geometric attacks,especially in clipping attacks. 展开更多
关键词 ROBUSTNESS CT Image zero-watermarkING SIFT-DCT encrypted domain
在线阅读 下载PDF
Audio Zero-Watermark Scheme Based on Discrete Cosine Transform-Discrete Wavelet TransformSingular Value Decomposition 被引量:7
5
作者 Min Lei Yu Yang +2 位作者 XiaoMing Liu MingZhi Cheng Rui Wang 《China Communications》 SCIE CSCD 2016年第7期117-121,共5页
Traditional watermark embedding schemes inevitably modify the data in a host audio signal and lead to the degradation of the host signal.In this paper,a novel audio zero-watermarking algorithm based on discrete wavele... Traditional watermark embedding schemes inevitably modify the data in a host audio signal and lead to the degradation of the host signal.In this paper,a novel audio zero-watermarking algorithm based on discrete wavelet transform(DWT),discrete cosine transform(DCT),and singular value decomposition(SVD) is presented.The watermark is registered by performing SVD on the coefficients generated through DWT and DCT to avoid data modification and host signal degradation.Simulation results show that the proposed zero-watermarking algorithm is strongly robust to common signal processing methods such as requantization,MP3 compression,resampling,addition of white Gaussian noise,and low-pass filtering. 展开更多
关键词 zero-watermark discrete wavelet transform discrete cosine transform singular value decomposition
在线阅读 下载PDF
A Novel Zero-Watermark Copyright Authentication Scheme Based on Lifting Wavelet and Harris Corner Detection 被引量:1
6
作者 FAN Li GAO Tiegang YANG Qunting 《Wuhan University Journal of Natural Sciences》 CAS 2010年第5期408-414,共7页
In this paper,a novel zero-watermark copyright authentication scheme based on Internet public certification system is proposed.This approach utilizes Haar integer wavelet transform based on a lifting scheme and adapti... In this paper,a novel zero-watermark copyright authentication scheme based on Internet public certification system is proposed.This approach utilizes Haar integer wavelet transform based on a lifting scheme and adaptive Harris corner detection to extract image features,which will be used to produce a binary feature map,and the map is very crucial to the generation of watermark registered later.By properly choosing the parameters of aforementioned techniques such as the threshold T and the radius of local feature region R,the feature map is so much more stable and distinguishing that it can be used to construct robust watermark.Simulations demonstrate that the proposed scheme is resistant to many kinds of signal processing and malicious attacks such as Gaussian blurring,additive noising,JPEG lossy compression,cropping,scaling and slight rotation operation.Compared with a relative scheme such as that of Chang's,the scheme in this paper is more practicable and reliable and can be applied to the area of copyright protection. 展开更多
关键词 zero-watermark copyright authentication Harris corner detection integer wavelet transform ROBUSTNESS
原文传递
A Novel Robust Zero-Watermarking Algorithm for Audio Based on Sparse Representation 被引量:1
7
作者 Longting Xu Daiyu Huang +4 位作者 Xing Guo Wei Rao Yunyun Ji Ruoyi Li Xiaochen Lu 《China Communications》 SCIE CSCD 2021年第8期237-248,共12页
Behind the prevalence of multimedia technology,digital copyright disputes are becoming increasingly serious.The digital watermarking prevention technique against the copyright infringement needs to be improved urgentl... Behind the prevalence of multimedia technology,digital copyright disputes are becoming increasingly serious.The digital watermarking prevention technique against the copyright infringement needs to be improved urgently.Among the proposed technologies,zero-watermarking has been favored recently.In order to improve the robustness of the zero-watermarking,a novel robust audio zerowatermarking method based on sparse representation is proposed.The proposed scheme is mainly based on the K-singular value decomposition(K-SVD)algorithm to construct an optimal over complete dictionary from the background audio signal.After that,the orthogonal matching pursuit(OMP)algorithm is used to calculate the sparse coefficient of the segmented test audio and generate the corresponding sparse coefficient matrix.Then,the mean value of absolute sparse coefficients in the sparse matrix of segmented speech is calculated and selected,and then comparing the mean absolute coefficient of segmented speech with the average value of the selected coefficients to realize the embedding of zero-watermarking.Experimental results show that the proposed audio zerowatermarking algorithm based on sparse representation performs effectively in resisting various common attacks.Compared with the baseline works,the proposed method has better robustness. 展开更多
关键词 zero-watermarkING K-singular value decomposition dictionary learning sparse representtion
在线阅读 下载PDF
Novel Zero-Watermarking Scheme Based on DWT-DCT 被引量:3
8
作者 Yu Yang Min Lei +2 位作者 Xiaoming Liu Zhiguo Qu Cheng Wang 《China Communications》 SCIE CSCD 2016年第7期122-126,共5页
Essential characteristics for watermark registration and detection without data modification can be used in anaudio zero-watermarking scheme.In this paper,a novel audio zero-watermarking scheme based on discrete wavel... Essential characteristics for watermark registration and detection without data modification can be used in anaudio zero-watermarking scheme.In this paper,a novel audio zero-watermarking scheme based on discrete wavelet transform(DWT) and discrete cosine transform(DCT) is presented.Thewatermark is registered by comparing the mean absolute values of the adjacent frame coefficients after DWT and DCT.Simulation results show that the proposed scheme is stronglyrobusttocommon attacks such as AWGN,downsampling,low-pass filtering,requantization,and MP3 compression.A performance analysis of the proposed scheme shows that all bit error rates after attacks are zero. 展开更多
关键词 zero-watermark discrete wavelets transform discrete cosine transform
在线阅读 下载PDF
Research on Copyright Protection Method of Material Genome Engineering Data Based on Zero-Watermarking 被引量:2
9
作者 Lulu Cui Yabin Xu 《Journal on Big Data》 2020年第2期53-62,共10页
In order to effectively solve the problem of copyright protection of materials genome engineering data,this paper proposes a method for copyright protection of materials genome engineering data based on zero-watermark... In order to effectively solve the problem of copyright protection of materials genome engineering data,this paper proposes a method for copyright protection of materials genome engineering data based on zero-watermarking technology.First,the important attribute values are selected from the materials genome engineering database;then,use the method of remainder to group the selected attribute values and extract eigenvalues;then,the eigenvalues sequence is obtained by the majority election method;finally,XOR the sequence with the actual copyright information to obtain the watermarking information and store it in the third-party authentication center.When a copyright dispute requires copyright authentication for the database to be detected.First,the zero-watermarking construction algorithm is used to obtain an eigenvalues sequence;then,this sequence is XORed with the watermarking information stored in the third-party authentication center to obtain copyright information to-be-detected.Finally,the ownership is determined by calculating the similarity between copyright information to-be-detected and copyright information that has practical significance.The experimental result shows that the zero-watermarking method proposed in this paper can effectively resist various common attacks,and can well achieve the copyright protection of material genome engineering database. 展开更多
关键词 Material genome engineering copyright protection zero-watermarkING majority voting
在线阅读 下载PDF
Application of Zero-Watermarking for Medical Image in Intelligent Sensor Network Security
10
作者 Shixin Tu Yuanyuan Jia +1 位作者 Jinglong Du Baoru Han 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第7期293-321,共29页
The field of healthcare is considered to be the most promising application of intelligent sensor networks.However,the security and privacy protection ofmedical images collected by intelligent sensor networks is a hot ... The field of healthcare is considered to be the most promising application of intelligent sensor networks.However,the security and privacy protection ofmedical images collected by intelligent sensor networks is a hot problem that has attracted more and more attention.Fortunately,digital watermarking provides an effective method to solve this problem.In order to improve the robustness of the medical image watermarking scheme,in this paper,we propose a novel zero-watermarking algorithm with the integer wavelet transform(IWT),Schur decomposition and image block energy.Specifically,we first use IWT to extract low-frequency information and divide them into non-overlapping blocks,then we decompose the sub-blocks by Schur decomposition.After that,the feature matrix is constructed according to the relationship between the image block energy and the whole image energy.At the same time,we encrypt watermarking with the logistic chaotic position scrambling.Finally,the zero-watermarking is obtained by XOR operation with the encrypted watermarking.Three indexes of peak signal-to-noise ratio,normalization coefficient(NC)and the bit error rate(BER)are used to evaluate the robustness of the algorithm.According to the experimental results,most of the NC values are around 0.9 under various attacks,while the BER values are very close to 0.These experimental results show that the proposed algorithm is more robust than the existing zero-watermarking methods,which indicates it is more suitable for medical image privacy and security protection. 展开更多
关键词 Intelligent sensor network medical image zero-watermarkING integer wavelet transform schur decomposition
在线阅读 下载PDF
ROBUST ZERO-WATERMARK ALGORITHMS BASED ON NUMERICAL RELATIONSHIP BETWEEN ADJACENT BLOCKS
11
作者 Zhang Yifeng Jia Chengwei +2 位作者 Wang Xuechen Wang Kai Pei Wenjiang 《Journal of Electronics(China)》 2012年第5期392-399,共8页
In this paper, three robust zero-watermark algorithms named Direct Current coefficient RElationship (DC-RE), CUmulant combined Singular Value Decomposition (CU-SVD), and CUmulant combined Singular Value Decomposition ... In this paper, three robust zero-watermark algorithms named Direct Current coefficient RElationship (DC-RE), CUmulant combined Singular Value Decomposition (CU-SVD), and CUmulant combined Singular Value Decomposition RElationship (CU-SVD-RE) are proposed. The algorithm DC-RE gets the feature vector from the relationship of DC coefficients between adjacent blocks, CU-SVD gets the feature vector from the singular value of third-order cumulants, while CU-SVD-RE combines the essence of the first two algorithms. Specially, CU-SVD-RE gets the feature vector from the relationship between singular values of third-order cumulants. Being a cross-over studying field of watermarking and cryptography, the zero-watermark algorithms are robust without modifying the carrier. Numerical simulation obviously shows that, under geometric attacks, the performance of CU-SVD-RE and DC-RE algorithm are better and all three proposed algorithms are robust to various attacks, such as median filter, salt and pepper noise, and Gaussian low-pass filter attacks. 展开更多
关键词 zero-watermark Singular value Third-order cumulants Feature vector
在线阅读 下载PDF
A Zero-Watermark Scheme Based on Quaternion Generalized Fourier Descriptor for Multiple Images
12
作者 Baowei Wang Weishen Wang +1 位作者 Peng Zhao Naixue Xiong 《Computers, Materials & Continua》 SCIE EI 2022年第5期2633-2652,共20页
Most of the existing zero-watermark schemes for medical images are only appropriate for a single grayscale image.When they protect a large number of medical images,repeating operations will cause a significant amount ... Most of the existing zero-watermark schemes for medical images are only appropriate for a single grayscale image.When they protect a large number of medical images,repeating operations will cause a significant amount of time and storage costs.Hence,this paper proposes an efficient zero-watermark scheme for multiple color medical images based on quaternion generalized Fourier descriptor(QGFD).Firstly,QGFD is utilized to compute the feature invariants of each color image,then the representative features of each image are selected,stacked,and reshaped to generate a feature matrix,which is then binarized to get a binary feature image.Copyright information can be converted into the copyright image by using QR code technology,which contains more information.Finally,the zero-watermark image is constructed by executing the XOR operation on the copyright image and the feature image scrambled by the Cat map.In the experiment,different parameters are selected to determine the maximum number of images that the proposed scheme can protect simultaneously while achieving good robustness.The experimental results demonstrate that the proposed scheme can effectively resist common attacks,geometric attacks and joint attacks,and effectively improve the operation efficiency of the algorithm,thus effectively decreasing the time and storage cost of copyright protection for lots of medical images. 展开更多
关键词 Copyright protection color medical image zero-watermark QGFD
在线阅读 下载PDF
基于遗传编码和耦合超混沌映射的多模态医学图像保护算法 被引量:1
13
作者 常锐云 冯秀芳 张昊 《太原理工大学学报》 北大核心 2025年第3期515-523,共9页
【目的】为了保证多模态医学图像的安全性,提出了一种基于遗传编码和耦合超混沌映射的多模态医学图像保护算法。【方法】在混沌序列生成阶段,提出了CMC-CTBCS耦合模型,以正弦映射(Sine)和无限折叠映射(ICMIC)作为种子映射,构建出三维Sin... 【目的】为了保证多模态医学图像的安全性,提出了一种基于遗传编码和耦合超混沌映射的多模态医学图像保护算法。【方法】在混沌序列生成阶段,提出了CMC-CTBCS耦合模型,以正弦映射(Sine)和无限折叠映射(ICMIC)作为种子映射,构建出三维Sine-ICMIC级联映射(3D-SICM),并将其应用于多模态医学图像加密的设计。图像加密阶段主要包括三部分:多模态医学图像融合算法、基于边缘检测的零水印认证算法、遗传编码选择加密算法。首先,采用基于相位一致性和局部拉普拉斯能量的NSCT域多模态医学图像融合方案,对磁共振成像(MRI)和单光子发射计算机断层成像(SPECT)进行融合,并在融合过程中实现基于边缘检测的零水印信息认证,进而生成融合后的标记图像,然后采用基于动态DNA编码和6比特RNA-S盒替换的选择性加密方案对标记图像进行加密。【结果】理论分析和数值模拟表明,该算法具有良好的安全性。 展开更多
关键词 边缘检测 DNA编码 6比特RNA-S盒 耦合混沌系统 零水印
在线阅读 下载PDF
极谐波分数傅里叶矩及其零水印算法应用 被引量:1
14
作者 徐丽云 张敏 《小型微型计算机系统》 北大核心 2025年第1期151-157,共7页
图像矩作为一种图像的全局特征描述符,已经成为模式识别和图像分析的一种有力工具.为了能够有效抵抗常见的图像处理攻击和几何攻击,本文提出了可用于描述图像特征的极谐波分数傅里叶矩和四元数极谐波分数傅里叶矩.首先,将极谐波多项式... 图像矩作为一种图像的全局特征描述符,已经成为模式识别和图像分析的一种有力工具.为了能够有效抵抗常见的图像处理攻击和几何攻击,本文提出了可用于描述图像特征的极谐波分数傅里叶矩和四元数极谐波分数傅里叶矩.首先,将极谐波多项式作为径向函数,分数傅里叶变换的核函数作为角向函数,得到了极谐波分数傅里叶矩,并分析了其相关性质.其次,将图像的极谐波分数傅里叶矩应用到零水印算法,计算和提取图像中极谐波分数傅里叶矩,随机选择合适的特征图像,并构造二值特征图像,将得到的二值特征图像与水印图像进行异或运算,构造作为零水印的特征图像.最后,针对提出的零水印算法,通过噪声、滤波、旋转、缩放进行鲁棒性和对比分析实验.实验结果表明,本文所提出的极谐波分数傅里叶矩,综合了极谐波多项式和分数傅里叶变换的优点,在零水印算法中能够有效抵抗图像处理攻击和几何攻击,与同类算法相比鲁棒性更优. 展开更多
关键词 正交矩 分数傅里叶变换 极谐波多项式 四元数 零水印
在线阅读 下载PDF
基于区块链的图像数字版权保护系统
15
作者 兰亚杰 马自强 +1 位作者 苗莉 胡富森 《应用科学学报》 北大核心 2025年第2期315-333,共19页
传统的版权管理方法依赖集中式服务器进行存储与验证,这会导致侵权检测困难、版权确权复杂、版权授权流程烦琐,以及缺乏有效的相似性检索机制等问题,使得为版权拥有者提供具有公信力的版权证明变得困难。为此,该文在Hyperledger Fabric... 传统的版权管理方法依赖集中式服务器进行存储与验证,这会导致侵权检测困难、版权确权复杂、版权授权流程烦琐,以及缺乏有效的相似性检索机制等问题,使得为版权拥有者提供具有公信力的版权证明变得困难。为此,该文在Hyperledger Fabric区块链网络的基础上,结合尺度不变特征变换相似性检测算法、离散余弦变换零水印算法、混沌映射图像加密算法、星际文件系统分布式存储,提出了一种图像数字版权保护系统。通过系统功能测试及性能分析发现,该系统可以实现确权图像相似性检测、版权所属权证明、去中心化加密存储、版权变更等版权维权功能。该研究为版权拥有者提供了一个透明、安全且开放的图像数字版权交易平台。 展开更多
关键词 区块链 尺度不变特征变换 离散余弦变换零水印 混沌映射 图像数字版权
在线阅读 下载PDF
基于四元数分数阶广义拉盖尔图像矩的空间域零水印算法
16
作者 王晶 贾晓强 《渭南师范学院学报》 2025年第2期87-94,共8页
现有的基于空间域零水印算法缺乏图像内容信息丢失检测的能力,特别是当图像遭受大面积裁切、随机涂抹或图像行列移除等攻击,水印提取算法就会失效。为了提高零水印算法抵抗图像遭受大面积裁切攻击的鲁棒性,提出一种基于四元数分数阶广... 现有的基于空间域零水印算法缺乏图像内容信息丢失检测的能力,特别是当图像遭受大面积裁切、随机涂抹或图像行列移除等攻击,水印提取算法就会失效。为了提高零水印算法抵抗图像遭受大面积裁切攻击的鲁棒性,提出一种基于四元数分数阶广义拉盖尔图像矩的空间域零水印算法。首先介绍分数阶广义拉盖尔多项式,其次构建四元数分数阶广义拉盖尔矩及不变量,最后设计彩色图像零水印算法。实验结果证明,所提出的零水印算法对常见的几何变换攻击具有一定的鲁棒性,同时对于滤波、有损压缩,特别是对图像大尺度剪切攻击具有较好的检测能力。 展开更多
关键词 四元数 拉盖尔多项式 零水印 鲁棒性
在线阅读 下载PDF
基于四元数通用极坐标余弦变换的图像零水印算法
17
作者 赵杰 李亚文 杨滨峰 《系统仿真技术》 2025年第1期75-79,共5页
零水印技术在实际中已经开展应用,成为信息安全领域的研究热点之一。为进一步提高彩色图像零水印算法的鲁棒性,本研究提出一种基于四元数通用极坐标余弦变换(QGPCT)的图像零水印算法。首先计算图像的QGPCT系数形成特征矩阵,并进行置乱... 零水印技术在实际中已经开展应用,成为信息安全领域的研究热点之一。为进一步提高彩色图像零水印算法的鲁棒性,本研究提出一种基于四元数通用极坐标余弦变换(QGPCT)的图像零水印算法。首先计算图像的QGPCT系数形成特征矩阵,并进行置乱加密处理,然后将水印图像进行置乱加密,最后与加密后的特征矩阵共同构造图像的零水印信息。实验仿真结果表明,该算法对加噪、滤波、JPEG压缩等常用图像处理操作以及旋转、缩放等几何攻击具有较高的鲁棒性。 展开更多
关键词 零水印 四元数 通用极余弦变换
在线阅读 下载PDF
基于鲁棒零水印的半结构化电力数据追踪
18
作者 赵磊 邹云峰 +3 位作者 徐超 马玉龙 沈文 杨仪馨 《电力信息与通信技术》 2025年第1期60-67,共8页
电力数据在线上渠道对外分享过程中,可能存在数据泄露的风险,因此需要对泄露数据进行有效溯源。文章提出一种基于鲁棒零水印的半结构化电力数据追踪方法,通过嵌入不改变原始数据的零水印,在数据发生局部变动情况下仍可对泄露数据进行追... 电力数据在线上渠道对外分享过程中,可能存在数据泄露的风险,因此需要对泄露数据进行有效溯源。文章提出一种基于鲁棒零水印的半结构化电力数据追踪方法,通过嵌入不改变原始数据的零水印,在数据发生局部变动情况下仍可对泄露数据进行追踪。首先,提取出半结构化电力数据部分键值对生成特征序列,作为零水印的载体;其次,将特征序列和水印本体处理成相同数量的块;然后,结合抹除码和冗余纠错码理论,通过一个转移矩阵得到中间序列,并使用纠错码对其进行编码;最后,将纠错编码后的水印信息嵌入特征序列,生成电力数据的鲁棒零水印。在追踪过程中,通过提取与分析被追踪数据的鲁棒零水印,可以有效识别和定位数据的异动。实验和仿真验证证明该方法在保证数据安全性的同时,零水印提取成功率达98%以上。文章提出的方法对于电力系统的数据监测和异动追踪具有重要的应用价值。 展开更多
关键词 鲁棒零水印 数据安全 半结构化数据 文本水印 纠错编码 电力数据保护
在线阅读 下载PDF
基于以太坊的服装设计版权方案 被引量:1
19
作者 陈永强 周江臣 何凯 《计算机技术与发展》 2024年第8期209-214,共6页
现有的中心化服装设计版权体系中,低质量抄袭作品层出不穷,而作品的审核周期长且完成度不是非常高的阶段性成果又无法得到认可,使得创作者维权时往往缺乏这一时间段的时间证明。此外,作品的版权确权并不简洁,不利于版权的使用,数据本身... 现有的中心化服装设计版权体系中,低质量抄袭作品层出不穷,而作品的审核周期长且完成度不是非常高的阶段性成果又无法得到认可,使得创作者维权时往往缺乏这一时间段的时间证明。此外,作品的版权确权并不简洁,不利于版权的使用,数据本身也有遭受攻击的风险。为解决上述问题,提出了一个基于区块链、零水印和星际文件系统(IPFS)的服装设计版权方案。区块链的不可篡改特性保证了数据安全,使得其与传统版权保护流程能够有效结合。同时将区块链取代以往零水印中的可信知识产权保护(IPR)中央权威机构,消除了第三方带来的隐患。智能合约结合时间戳功能可以准确提供各步骤的线上记录,让创作者能更好提供作品从草稿到成品的时间线证明,以便在版权纠纷中维护自身权益。而感知哈希也能剔除掉抄袭作品,从抄袭作品的登记源头来控制低级抄袭作品的出现,保证创作者的著作权。实验表明,整体功能完善、安全性高,其中零水印方案具备可行性和有效性,作品登记和查询消耗的以太坊资源Gas成本低。 展开更多
关键词 以太坊 零水印 服装设计 智能合约 星际文件系统
在线阅读 下载PDF
基于双混沌映射的遥感图像零水印算法 被引量:4
20
作者 杨兵兵 闫浩文 +4 位作者 张黎明 徐欣钰 王小龙 严清博 侯昭阳 《地理与地理信息科学》 CSCD 北大核心 2024年第3期21-28,共8页
现有遥感图像零水印算法多为特定类型的遥感图像设计,普适性较差,且对水印组合攻击的鲁棒性不强。该文提出一种基于双混沌映射的遥感图像零水印算法。①对遥感图像进行非下采样剪切波变换,选取低频图像进行离散余弦变换;②对变换后的图... 现有遥感图像零水印算法多为特定类型的遥感图像设计,普适性较差,且对水印组合攻击的鲁棒性不强。该文提出一种基于双混沌映射的遥感图像零水印算法。①对遥感图像进行非下采样剪切波变换,选取低频图像进行离散余弦变换;②对变换后的图像进行分块,并对各子块进行Schur分解,通过比较每个子块上三角矩阵中第一个元素值和均值的大小构建特征矩阵;③利用一维Logistic映射置乱遥感图像,与特征矩阵进行异或运算得到一个二值序列;①结合2D-LALM-Tent映射和Arnold置乱水印图像,对前述二值序列和置乱后水印的二值序列进行异或运算得到零水印。实验表明,该算法对不同类型遥感图像的适用性较好,且对水印组合攻击的鲁棒性较强,无精度损失,可用于多种类型遥感图像的版权保护,为遥感图像的共享提供安全保障。 展开更多
关键词 双混沌映射 2D-LALM TENT映射 遥感图像 零水印算法
在线阅读 下载PDF
上一页 1 2 18 下一页 到第
使用帮助 返回顶部