期刊文献+
共找到335篇文章
< 1 2 17 >
每页显示 20 50 100
Securing Transmitted Color Images Using Zero Watermarking and Advanced Encryption Standard on Raspberry Pi
1
作者 Doaa Sami Khafaga Sarah M.Alhammad +3 位作者 Amal Magdi Osama ElKomy Nabil ALashin Khalid M.Hosny 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期1967-1986,共20页
Image authentication techniques have recently received a lot of attention for protecting images against unauthorized access.Due to the wide use of the Internet nowadays,the need to ensure data integrity and authentica... Image authentication techniques have recently received a lot of attention for protecting images against unauthorized access.Due to the wide use of the Internet nowadays,the need to ensure data integrity and authentication increases.Many techniques,such as watermarking and encryption,are used for securing images transmitted via the Internet.The majority of watermarking systems are PC-based,but they are not very portable.Hardwarebased watermarking methods need to be developed to accommodate real-time applications and provide portability.This paper presents hybrid data security techniques using a zero watermarking method to provide copyright protection for the transmitted color images using multi-channel orthogonal Legendre Fourier moments of fractional orders(MFrLFMs)and the advanced encryption standard(AES)algorithm on a low-cost Raspberry Pi.In order to increase embedding robustness,the watermark picture is scrambled using the Arnold method.Zero watermarking is implemented on the Raspberry Pi to produce a real-time ownership verification key.Before sending the ownership verification key and the original image to the monitoring station,we can encrypt the transmitted data with AES for additional security and hide any viewable information.The receiver next verifies the received image’s integrity to confirm its authenticity and that it has not been tampered with.We assessed the suggested algorithm’s resistance to many attacks.The suggested algorithm provides a reasonable degree of robustness while still being perceptible.The proposed method provides improved bit error rate(BER)and normalized correlation(NC)values compared to previous zero watermarking approaches.AES performance analysis is performed to demonstrate its effectiveness.Using a 256×256 image size,it takes only 2 s to apply the zero-watermark algorithm on the Raspberry Pi. 展开更多
关键词 zero watermarking Raspberry Pi advanced encryption standard
下载PDF
A Image Copyright Protection Method Using Zero-Watermark by Blockchain and IPFS 被引量:1
2
作者 Tao Chen Zhao Qiu +5 位作者 Gengquan Xie Lin Yuan Shaohua Duan Hao Guo Dahao Fu Hancheng Huang 《Journal of Information Hiding and Privacy Protection》 2021年第3期131-142,共12页
Behind the popularity of multimedia technology,the dispute over image copyright is getting worse.In the digital watermark prevention technology for copyright infringement,watermark technology is considered to be an im... Behind the popularity of multimedia technology,the dispute over image copyright is getting worse.In the digital watermark prevention technology for copyright infringement,watermark technology is considered to be an important technology to overcome data protection problems and verify the relationship between data ownership.Among the many digital watermarking technologies,zero watermarking technology has been favored in recent years.However,the existing zero watermark technology in the implementation process often needs a trusted third party to store watermarks,which may make the data too central,data storage security is low and copyright registration costs are too high,which creates a rare problem.The decentivization and information cannot be tampered of blockchain technology’s nature find new methods for image copyright protection.This paper studies the role of zero watermark algorithm in the image copyright and its complete storage and certification scheme,proposes a zero watermark image protection framework based on blockchain,and builds a system according to the framework.Combined with blockchain and zero watermarking technology,the framework uses inter IPFS(Inter Planetary File System)to solve the problem of blockchain efficient storage and sharing of large files.In addition,the application of user copyright information,image image query and image trading in the system are realized based on smart contracts,which solves the problem of lack of trusted third parties.Experiments show that the scheme is feasible and robust to various attacks. 展开更多
关键词 zero watermarking blockchain IPFS copyright protection
下载PDF
Robust Multi-Watermarking Algorithm for Medical Images Based on GoogLeNet and Henon Map
3
作者 Wenxing Zhang Jingbing Li +3 位作者 Uzair Aslam Bhatti Jing Liu Junhua Zheng Yen-Wei Chen 《Computers, Materials & Continua》 SCIE EI 2023年第4期565-586,共22页
The field of medical images has been rapidly evolving since the advent of the digital medical information era.However,medical data is susceptible to leaks and hacks during transmission.This paper proposed a robust mul... The field of medical images has been rapidly evolving since the advent of the digital medical information era.However,medical data is susceptible to leaks and hacks during transmission.This paper proposed a robust multi-watermarking algorithm for medical images based on GoogLeNet transfer learning to protect the privacy of patient data during transmission and storage,as well as to increase the resistance to geometric attacks and the capacity of embedded watermarks of watermarking algorithms.First,a pre-trained GoogLeNet network is used in this paper,based on which the parameters of several previous layers of the network are fixed and the network is fine-tuned for the constructed medical dataset,so that the pre-trained network can further learn the deep convolutional features in the medical dataset,and then the trained network is used to extract the stable feature vectors of medical images.Then,a two-dimensional Henon chaos encryption technique,which is more sensitive to initial values,is used to encrypt multiple different types of watermarked private information.Finally,the feature vector of the image is logically operated with the encrypted multiple watermark information,and the obtained key is stored in a third party,thus achieving zero watermark embedding and blind extraction.The experimental results confirmthe robustness of the algorithm from the perspective ofmultiple types of watermarks,while also demonstrating the successful embedding ofmultiple watermarks for medical images,and show that the algorithm is more resistant to geometric attacks than some conventional watermarking algorithms. 展开更多
关键词 zero watermarks GoogLeNet medical image Henon map feature vector
下载PDF
Robust Watermarking Algorithm for Medical Images Based on Non-Subsampled Shearlet Transform and Schur Decomposition
4
作者 Meng Yang Jingbing Li +2 位作者 Uzair Aslam Bhatti Chunyan Shao Yen-Wei Chen 《Computers, Materials & Continua》 SCIE EI 2023年第6期5539-5554,共16页
With the development of digitalization in healthcare,more and more information is delivered and stored in digital form,facilitating people’s lives significantly.In the meanwhile,privacy leakage and security issues co... With the development of digitalization in healthcare,more and more information is delivered and stored in digital form,facilitating people’s lives significantly.In the meanwhile,privacy leakage and security issues come along with it.Zero watermarking can solve this problem well.To protect the security of medical information and improve the algorithm’s robustness,this paper proposes a robust watermarking algorithm for medical images based on Non-Subsampled Shearlet Transform(NSST)and Schur decomposition.Firstly,the low-frequency subband image of the original medical image is obtained by NSST and chunked.Secondly,the Schur decomposition of low-frequency blocks to get stable values,extracting the maximum absolute value of the diagonal elements of the upper triangle matrix after the Schur decom-position of each low-frequency block and constructing the transition matrix from it.Then,the mean of the matrix is compared to each element’s value,creating a feature matrix by combining perceptual hashing,and selecting 32 bits as the feature sequence.Finally,the feature vector is exclusive OR(XOR)operated with the encrypted watermark information to get the zero watermark and complete registration with a third-party copyright certification center.Experimental data show that the Normalized Correlation(NC)values of watermarks extracted in random carrier medical images are above 0.5,with higher robustness than traditional algorithms,especially against geometric attacks and achieve watermark information invisibility without altering the carrier medical image. 展开更多
关键词 Non-Subsampled Shearlet Transform(NSST) Schur decomposition perceptual hashing chaotic mapping zero watermark
下载PDF
Robust Watermarking Algorithm for Medical Volume Data Based on Polar Cosine Transform and 3D-DCT
5
作者 Pengju Zhang Jingbing Li +4 位作者 Uzair Aslam Bhatti Jing Liu Yen-wei Chen Dekai Li Lei Cao 《Computers, Materials & Continua》 SCIE EI 2023年第6期5853-5870,共18页
The amount of 3D data stored and transmitted in the Internet of Medical Things(IoMT)is increasing,making protecting these medical data increasingly prominent.However,there are relatively few researches on 3D data wate... The amount of 3D data stored and transmitted in the Internet of Medical Things(IoMT)is increasing,making protecting these medical data increasingly prominent.However,there are relatively few researches on 3D data watermarking.Moreover,due to the particularity of medical data,strict data quality should be considered while protecting data security.To solve the problem,in the field of medical volume data,we proposed a robust watermarking algorithm based on Polar Cosine Transform and 3D-Discrete Cosine Transform(PCT and 3D-DCT).Each slice of the volume data was transformed by PCT to obtain feature row vector,and then the reshaped three-dimensional feature matrix was transformed by 3D-DCT.Based on the contour information of the volume data and the detail information of the inner slice,the visual feature vector was obtained by applying the per-ceptual hash.In addition,the watermark was encrypted by a multi-sensitive initial value Sine and Piecewise linear chaotic Mapping(SPM)system,and embedded as a zero watermark.The key was stored in a third party.Under the same experimental conditions,when the volume data is rotated by 80 degrees,cut 25%along the Z axis,and the JPEG compression quality is 1%,the Normalized Correlation Coefficient(NC)of the extracted watermark is 0.80,0.89,and 1.00 respectively,which are significantly higher than the comparison algorithm. 展开更多
关键词 Volume data watermark zero watermark SPM PCT and 3D-DCT
下载PDF
ROBUST ZERO-WATERMARK ALGORITHMS BASED ON NUMERICAL RELATIONSHIP BETWEEN ADJACENT BLOCKS
6
作者 Zhang Yifeng Jia Chengwei +2 位作者 Wang Xuechen Wang Kai Pei Wenjiang 《Journal of Electronics(China)》 2012年第5期392-399,共8页
In this paper, three robust zero-watermark algorithms named Direct Current coefficient RElationship (DC-RE), CUmulant combined Singular Value Decomposition (CU-SVD), and CUmulant combined Singular Value Decomposition ... In this paper, three robust zero-watermark algorithms named Direct Current coefficient RElationship (DC-RE), CUmulant combined Singular Value Decomposition (CU-SVD), and CUmulant combined Singular Value Decomposition RElationship (CU-SVD-RE) are proposed. The algorithm DC-RE gets the feature vector from the relationship of DC coefficients between adjacent blocks, CU-SVD gets the feature vector from the singular value of third-order cumulants, while CU-SVD-RE combines the essence of the first two algorithms. Specially, CU-SVD-RE gets the feature vector from the relationship between singular values of third-order cumulants. Being a cross-over studying field of watermarking and cryptography, the zero-watermark algorithms are robust without modifying the carrier. Numerical simulation obviously shows that, under geometric attacks, the performance of CU-SVD-RE and DC-RE algorithm are better and all three proposed algorithms are robust to various attacks, such as median filter, salt and pepper noise, and Gaussian low-pass filter attacks. 展开更多
关键词 zero-watermark Singular value Third-order cumulants Feature vector
下载PDF
基于以太坊的服装设计版权方案
7
作者 陈永强 周江臣 何凯 《计算机技术与发展》 2024年第8期209-214,共6页
现有的中心化服装设计版权体系中,低质量抄袭作品层出不穷,而作品的审核周期长且完成度不是非常高的阶段性成果又无法得到认可,使得创作者维权时往往缺乏这一时间段的时间证明。此外,作品的版权确权并不简洁,不利于版权的使用,数据本身... 现有的中心化服装设计版权体系中,低质量抄袭作品层出不穷,而作品的审核周期长且完成度不是非常高的阶段性成果又无法得到认可,使得创作者维权时往往缺乏这一时间段的时间证明。此外,作品的版权确权并不简洁,不利于版权的使用,数据本身也有遭受攻击的风险。为解决上述问题,提出了一个基于区块链、零水印和星际文件系统(IPFS)的服装设计版权方案。区块链的不可篡改特性保证了数据安全,使得其与传统版权保护流程能够有效结合。同时将区块链取代以往零水印中的可信知识产权保护(IPR)中央权威机构,消除了第三方带来的隐患。智能合约结合时间戳功能可以准确提供各步骤的线上记录,让创作者能更好提供作品从草稿到成品的时间线证明,以便在版权纠纷中维护自身权益。而感知哈希也能剔除掉抄袭作品,从抄袭作品的登记源头来控制低级抄袭作品的出现,保证创作者的著作权。实验表明,整体功能完善、安全性高,其中零水印方案具备可行性和有效性,作品登记和查询消耗的以太坊资源Gas成本低。 展开更多
关键词 以太坊 零水印 服装设计 智能合约 星际文件系统
下载PDF
基于组合变换域的彩色图像大容量零水印算法
8
作者 韩绍程 刘欢 《北京航空航天大学学报》 EI CAS CSCD 北大核心 2024年第7期2093-2103,共11页
针对现有大多数彩色图像零水印方案中水印嵌入容量小且抗几何攻击鲁棒性能不佳等问题,提出一种基于组合变换域和位平面分解的大容量鲁棒零水印算法。对彩色载体图像的R、G、B通道分别进行快速有限剪切波变换(FFST),并对变换后的各低频... 针对现有大多数彩色图像零水印方案中水印嵌入容量小且抗几何攻击鲁棒性能不佳等问题,提出一种基于组合变换域和位平面分解的大容量鲁棒零水印算法。对彩色载体图像的R、G、B通道分别进行快速有限剪切波变换(FFST),并对变换后的各低频子带进行非重叠分块置乱,将置乱后的各子带的分块离散余弦变换(DCT)系数用于构造四元数离散余弦变换(QDCT)系数矩阵;在每个QDCT系数矩阵中选取两个低频系数,利用其各个实部和虚部的符号极性构造8个二值鲁棒特征矩阵;将经过正交拉丁方置乱加密后的灰度水印图像按位分解,把位分解后的8个二值位平面分别与以上二值鲁棒特征矩阵进行异或并重组得到灰度级认证零水印。此外,在水印检测前,采用ORB算法对待认证图像进行几何校正。实验结果表明,所提算法水印嵌入容量和安全性高,且对于常规非几何攻击和几何攻击均具有较强的鲁棒性。 展开更多
关键词 零水印 彩色图像 灰度级水印 组合变换域 位平面分解
原文传递
基于双混沌映射的遥感图像零水印算法
9
作者 杨兵兵 闫浩文 +4 位作者 张黎明 徐欣钰 王小龙 严清博 侯昭阳 《地理与地理信息科学》 CSCD 北大核心 2024年第3期21-28,共8页
现有遥感图像零水印算法多为特定类型的遥感图像设计,普适性较差,且对水印组合攻击的鲁棒性不强。该文提出一种基于双混沌映射的遥感图像零水印算法。①对遥感图像进行非下采样剪切波变换,选取低频图像进行离散余弦变换;②对变换后的图... 现有遥感图像零水印算法多为特定类型的遥感图像设计,普适性较差,且对水印组合攻击的鲁棒性不强。该文提出一种基于双混沌映射的遥感图像零水印算法。①对遥感图像进行非下采样剪切波变换,选取低频图像进行离散余弦变换;②对变换后的图像进行分块,并对各子块进行Schur分解,通过比较每个子块上三角矩阵中第一个元素值和均值的大小构建特征矩阵;③利用一维Logistic映射置乱遥感图像,与特征矩阵进行异或运算得到一个二值序列;①结合2D-LALM-Tent映射和Arnold置乱水印图像,对前述二值序列和置乱后水印的二值序列进行异或运算得到零水印。实验表明,该算法对不同类型遥感图像的适用性较好,且对水印组合攻击的鲁棒性较强,无精度损失,可用于多种类型遥感图像的版权保护,为遥感图像的共享提供安全保障。 展开更多
关键词 双混沌映射 2D-LALM TENT映射 遥感图像 零水印算法
下载PDF
基于彩色图像Tetrolet变换的频数质心零水印算法 被引量:2
10
作者 张天骐 叶绍鹏 +1 位作者 刘鉴兴 柏浩钧 《系统工程与电子技术》 EI CSCD 北大核心 2023年第1期41-48,共8页
针对传统数字水印算法的透明性随嵌入强度的增加而下降的问题,已有许多零水印算法提出。然而大多数算法或是鲁棒性和稳定性较差,或是基于灰度图像设计的。本文提出一种基于彩色图像Tetrolet变换的频数质心零水印算法。该算法先提取彩色... 针对传统数字水印算法的透明性随嵌入强度的增加而下降的问题,已有许多零水印算法提出。然而大多数算法或是鲁棒性和稳定性较差,或是基于灰度图像设计的。本文提出一种基于彩色图像Tetrolet变换的频数质心零水印算法。该算法先提取彩色载体图像YCbCr空间的亮度分量,再对亮度分量进行Tetrolet变换获得其低频系数,再通过分块非负矩阵分解,采用计算频数质心的方法构造特征矩阵。对水印信息依次进行Polar码编码,二维交织构造出交织矩阵;最后将含有水印信息的交织方阵和特征矩阵进行异或操作生成零水印。仿真结果证明,该零水印算法可以有效抵抗非几何攻击、几何攻击以及组合攻击,水印提取归一化相关系数值在0.9以上,具有较强的鲁棒性和稳定性,且具有良好的实用性。 展开更多
关键词 零水印 彩色图像 Tetrolet变换 频数质心 鲁棒性
下载PDF
Research on secure buyer-seller watermarking protocol
11
作者 Liu Quan Chen Zheng Zhou Zude 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期370-376,384,共8页
A new buyer-seller watermarking protocol is proposed by applying a double encryption method and a novel mechanism of embedding a buyer's watermark. The protocol can effectively prevent against collusion attacks and t... A new buyer-seller watermarking protocol is proposed by applying a double encryption method and a novel mechanism of embedding a buyer's watermark. The protocol can effectively prevent against collusion attacks and the man in the middle attack if the third party is not trusted. Also, based on the proposed scheme for the first-hand transaction, a new buyer-reseller watermarking protocol and a formal multi-party watermarking protocol are also proposed. The proposed buyer-resell watermarking protocol only needs the original seller to provide transfer certificate and encryption-decryption service to support the second-hand transaction, and the multi-party watermarking protocol with distributed certificate authorities can overcome the difficulty in the combination of multicast mechanism with multiple unique watermarks and allow a seller to multicast the watermarked digital contents and key transaction information to n buyers. Furthermore, the idea of zero knowledge proof is also applied into the proposed scheme to allow the seller to take an effective control on the task performed by the third party. 展开更多
关键词 watermarking protocol zero knowledge proof distributed certification authorities.
下载PDF
面向医学图像版权和隐私保护的双水印方案
12
作者 石慧 翁科 +1 位作者 宋天然 冯泽晨 《辽宁师范大学学报(自然科学版)》 CAS 2023年第1期43-55,共13页
针对医学图像隐私泄露、非法拷贝和安全性低的问题,提出面向医学图像版权和隐私保护的双水印方案.首先提出了一种新的编码方式——LC编码,将字母变换为矩阵,利用少量数据进行编码和扩展,将病人敏感信息加密,不仅实现了隐私保护,还实现... 针对医学图像隐私泄露、非法拷贝和安全性低的问题,提出面向医学图像版权和隐私保护的双水印方案.首先提出了一种新的编码方式——LC编码,将字母变换为矩阵,利用少量数据进行编码和扩展,将病人敏感信息加密,不仅实现了隐私保护,还实现零水印和鲁棒水印的关联;然后基于LC编码、DWT变换,DCT变换,奇异值分解(SVD)和Arnold置乱,将鲁棒水印嵌入医学图像中;最后以嵌入鲁棒水印后的医学图像为载体,提取hog特征,并结合LC编码加密后的病人信息及指纹图像生成零水印,不同于传统零水印,提出的零水印方案不仅可以实现版权保护,还可以实现篡改检测.本算法通过三重安全机制,加强对病人敏感信息和医学图像版权及隐私保护.理论分析和仿真实验表明,该算法具有良好的不可见性、强鲁棒性和高安全性. 展开更多
关键词 医学图像 零水印 鲁棒水印 版权与隐私保护 LC编码
下载PDF
一种快速的零水印印刷品信息隐藏方法
13
作者 林荣胜 柯逍 《计算机仿真》 北大核心 2023年第4期186-189,194,共5页
在利用图像作为载体进行水印隐藏的时候,往往希望能对图像的像素值不修改或者减少运算修改,并能方便地提取出图像中隐藏的水印。提出一种基于零水印的算法,结合尺度不变特征转换(Scale Invariant Feature Transformation, SIFT)、奇异... 在利用图像作为载体进行水印隐藏的时候,往往希望能对图像的像素值不修改或者减少运算修改,并能方便地提取出图像中隐藏的水印。提出一种基于零水印的算法,结合尺度不变特征转换(Scale Invariant Feature Transformation, SIFT)、奇异值分解(Singular Value Decomposition, SVD)和图像金字塔等技术,实现了在对图像打印后,不需要专业的扫描仪,仅利用手机等设备拍照就能够方便地提取出隐藏在图像中的水印。实验中使用F1-score作为评判指标,达到了平均0.78以上的结果。结果表明,上述算法具有很强的鲁棒性和优秀的水印可见性。 展开更多
关键词 水印隐藏 零水印 拍照提取水印 尺度不变特征转换
下载PDF
基于DWT和SVD的鲁棒零水印算法
14
作者 王利彬 王树梅 《湖南理工学院学报(自然科学版)》 CAS 2023年第4期35-38,共4页
为了解决传统水印算法需要平衡鲁棒性和不可见性矛盾的问题,提出一种用DWT和SVD构造零水印算法的方案.利用SVD分解后U、V矩阵第一个列向量被攻击后具有稳定性的特点,采用DWT使低频区域能量集中,再使用SVD分解获取U、V矩阵.通过比较U、V... 为了解决传统水印算法需要平衡鲁棒性和不可见性矛盾的问题,提出一种用DWT和SVD构造零水印算法的方案.利用SVD分解后U、V矩阵第一个列向量被攻击后具有稳定性的特点,采用DWT使低频区域能量集中,再使用SVD分解获取U、V矩阵.通过比较U、V矩阵第一列向量的方式保证了水印的鲁棒性.同时对数字水印进行Arnold变换,既可隐藏水印信息,又可提高水印信息的安全性.由于算法采用零水印方式,故拥有良好的不可见性.实验结果表明,该算法拥有较高的鲁棒性,并且简单易行. 展开更多
关键词 零水印 离散小波变换 奇异值分解
下载PDF
基于Word2Vec的中文文本零水印算法 被引量:1
15
作者 戴夏菁 徐谊程 +1 位作者 王馨娅 佟德宇 《软件工程》 2023年第1期19-23,共5页
经典的文本鲁棒水印会修改文本内容或格式,从而降低文本的保真性和可用性,文章提出了一种基于Word2Vec的中文文本零水印算法,能够在不修改文本信息的前提下实现水印的生成和检测。首先对文本数据进行分词,统计词频并提取特征词,运用Word... 经典的文本鲁棒水印会修改文本内容或格式,从而降低文本的保真性和可用性,文章提出了一种基于Word2Vec的中文文本零水印算法,能够在不修改文本信息的前提下实现水印的生成和检测。首先对文本数据进行分词,统计词频并提取特征词,运用Word2Vec生成相应的特征词向量;然后采用SVD(奇异值分解)算法对其进行降维,并结合AES(高级加密标准)加密生成最终的零水印。水印检测时,通过对比SVD分解产生的特征值和特征向量判断版权归属。基于理论概述和实验结果综合分析,文章提出的零水印算法不需要对原始文本做任何修改,能够抵抗一定程度的增删、句型转换、同义词替换等攻击,具有一定的鲁棒性,切实有效地解决了文本的版权保护问题。 展开更多
关键词 Word2Vec SVD 零水印 中文文本 词向量
下载PDF
改进零视差像素点重组的图像数字水印算法 被引量:1
16
作者 李播阳 张频 吴江 《计算机仿真》 北大核心 2023年第2期244-248,共5页
针对三维图像数字水印无法同时保证良好的视觉感受与抗攻击性能的问题,提出基于零视差点重组的三维图像数字水印算法。利用平面点-线模型描述三维图像,将色彩从红色、绿色、蓝色等分量转变为亮度、蓝色、红色等分量。根据视距、景深等参... 针对三维图像数字水印无法同时保证良好的视觉感受与抗攻击性能的问题,提出基于零视差点重组的三维图像数字水印算法。利用平面点-线模型描述三维图像,将色彩从红色、绿色、蓝色等分量转变为亮度、蓝色、红色等分量。根据视距、景深等参数,解得各像素点的视差值,基于零视差像素点及对应窗口归一化协方差,调整各像素点坐标,得到重组图像。将重组图像作为待嵌入水印的载体图像,结合轮廓波变换策略,取得能量最大的方向图像。通过分块处理,推导出轮廓波交换系数的交换判定条件,经轮廓波逆变换、拼接、融合等操作,完成数字水印嵌入。实验结果表明,所提算法嵌入的水印视觉感知程度较低,隐秘度与安全度较高,能保证水印在取得较好视觉效果的前提下,具备较强的攻击防御能力。 展开更多
关键词 零视差 像素点重组 三维图像 数字水印 轮廓波变换系数
下载PDF
应用泰森多边形的矢量地理数据零水印算法
17
作者 李雨健 张黎明 +1 位作者 王帅 张启航 《时空信息学报》 2023年第2期235-241,共7页
传统嵌入式水印算法会对原始数据的精度造成影响,为满足高精度矢量地理数据版权保护需求,本文提出了一种应用泰森多边形的矢量地理数据零水印算法。首先,对矢量地理数据进行归一化预处理,采用Douglas-Peucker算法提取矢量地理数据的特征... 传统嵌入式水印算法会对原始数据的精度造成影响,为满足高精度矢量地理数据版权保护需求,本文提出了一种应用泰森多边形的矢量地理数据零水印算法。首先,对矢量地理数据进行归一化预处理,采用Douglas-Peucker算法提取矢量地理数据的特征点,并构建特征点的泰森多边形;然后,根据每个泰森多边形与相邻多边形周长的大小关系,确定其特征位为1或0,运用泰森多边形周长与原始水印之间的哈希映射值,确定该特征位在序列中的位置,特征序列中每一位可能会有多个不同的特征位对应,利用投票原则确定该位置的最终值;最后,将特征序列与置乱后的水印图像序列进行异或运算,生成零水印。研究表明,该算法能够抵抗平移、缩放、旋转、裁剪和简化等常见攻击手段,具有较强的鲁棒性。这可为高精度矢量地理数据版权保护提供技术参考。 展开更多
关键词 零水印 DOUGLAS-PEUCKER算法 矢量地理数据归一化 泰森多边形 鲁棒性
下载PDF
结合空域不变量的变换域零水印二次检测方案 被引量:13
18
作者 季称利 杨晓元 +2 位作者 张崇 韩益亮 魏立线 《计算机工程》 CAS CSCD 北大核心 2004年第14期105-107,115,共4页
利用变换域水印技术对诸如压缩、滤波等信号处理具有较好鲁棒性的优点,结合空域中对几何变换具有抵抗力的常量来构造与检测零水印。实验证明,方案对剪切、数模转换处理、滤波、噪声、JPEG压缩、旋转等图像处理具有较强的鲁棒性。
关键词 数字图像 零水印 二次检测 重同步 comer中心角
下载PDF
二维矢量数字地图的零水印算法 被引量:14
19
作者 张佐理 孙树森 +1 位作者 汪亚明 郑可飚 《计算机工程与设计》 CSCD 北大核心 2009年第6期1473-1475,1479,共4页
提出了一种新的二维矢量数字地图的零水印算法。该算法选择矢量地图的顶点作为重要特征,把地图按坐标进行平均分块并统计各个分块中的顶点个数,利用变换与加密构造出标志版权信息的水印图。由于该算法不对原始地图数据进行任何修改,这... 提出了一种新的二维矢量数字地图的零水印算法。该算法选择矢量地图的顶点作为重要特征,把地图按坐标进行平均分块并统计各个分块中的顶点个数,利用变换与加密构造出标志版权信息的水印图。由于该算法不对原始地图数据进行任何修改,这使得传统水印算法的稳健性、安全性和不可感知性之间的矛盾用这种特殊的方法得到了很好的解决。实验结果表明,该零水印算法能够抵抗多种常见的攻击,可以用来对矢量数字地图进行版权保护。 展开更多
关键词 矢量地图 零水印 顶点 版权保护 DXF文件
下载PDF
关系数据库零水印注册方案的研究 被引量:12
20
作者 蒙应杰 吴超 +1 位作者 张文 张秀娟 《计算机工程》 CAS CSCD 北大核心 2007年第2期133-135,138,共4页
对关系数据库的零水印方案的注册过程进行了研究,构造了关系数据库零水印的注册模型;依据注册模型提出了一套零水印注册机制,并描述了注册算法;最后分析了本方案的特点。
关键词 关系数据库 零水印 注册
下载PDF
上一页 1 2 17 下一页 到第
使用帮助 返回顶部