期刊文献+
共找到93篇文章
< 1 2 5 >
每页显示 20 50 100
Contourlet watermarking algorithm based on Arnold scrambling and singular value decomposition 被引量:3
1
作者 陈立全 孙晓燕 +1 位作者 卢苗 邵辰 《Journal of Southeast University(English Edition)》 EI CAS 2012年第4期386-391,共6页
A new digital watermarking algorithm based on the contourlet transform is proposed to improve the robustness and anti-attack performances of digital watermarking. The algorithm uses the Arnold scrambling technique and... A new digital watermarking algorithm based on the contourlet transform is proposed to improve the robustness and anti-attack performances of digital watermarking. The algorithm uses the Arnold scrambling technique and the singular value decomposition (SVD) scheme. The Arnold scrambling technique is used to preprocess the watermark, and the SVD scheme is used to find the best suitable hiding points. After the contourlet transform of the carrier image, intermediate frequency sub-bands are decomposed to obtain the singularity values. Then the watermark bits scrambled in the Arnold rules are dispersedly embedded into the selected SVD points. Finally, the inverse contourlet transform is applied to obtain the carrier image with the watermark. In the extraction part, the watermark can be extracted by the semi-blind watermark extracting algorithm. Simulation results show that the proposed algorithm has better hiding and robustness performances than the traditional contourlet watermarking algorithm and the contourlet watermarking algorithm with SVD. Meanwhile, it has good robustness performances when the embedded watermark is attacked by Gaussian noise, salt- and-pepper noise, multiplicative noise, image scaling and image cutting attacks, etc. while security is ensured. 展开更多
关键词 digital watermarking contourlet transform Arnold scrambling singular value decomposition (SVD)
下载PDF
Digital watermarking algorithm based on neural network in multiwavelet domain 被引量:2
2
作者 王振飞 宋胜利 《Journal of Southeast University(English Edition)》 EI CAS 2007年第2期211-215,共5页
A novel blind digital watermarking algorithm based on neural networks and multiwavelet transform is presented. The host image is decomposed through multiwavelet transform. There are four subblocks in the LL- level of ... A novel blind digital watermarking algorithm based on neural networks and multiwavelet transform is presented. The host image is decomposed through multiwavelet transform. There are four subblocks in the LL- level of the multiwavelet domain and these subblocks have many similarities. Watermark bits are added to low- frequency coefficients. Because of the learning and adaptive capabilities of neural networks, the trained neural networks almost exactly recover the watermark from the watermarked image. Experimental results demonstrate that the new algorithm is robust against a variety of attacks, especially, the watermark extraction does not require the original image. 展开更多
关键词 digital watermarking neural networks multiwavelet transform
下载PDF
《荀子》“非能水也”解 被引量:1
3
作者 班吉庆 《徐州师范大学学报(哲学社会科学版)》 2001年第4期59-61,共3页
对《荀子·劝学》“非能水也”一句的解释 ,不少注本皆以“水”为“名词用如动词”。本文分析研究了《荀子》中“能”与“水”字的全部用例 ,指出 :“能”为动词 ,乃“禁得起”、“胜过”、“善于”之义 ;“水”为名词 ,不必讲成词... 对《荀子·劝学》“非能水也”一句的解释 ,不少注本皆以“水”为“名词用如动词”。本文分析研究了《荀子》中“能”与“水”字的全部用例 ,指出 :“能”为动词 ,乃“禁得起”、“胜过”、“善于”之义 ;“水”为名词 ,不必讲成词类活用。 展开更多
关键词 动词 名词 《荀子》 训诂 "非能水也" "能"字 "水"字 用法 语义 词类话用 古代汉语 语法
下载PDF
“金、木、水、火、土”五字对会计词语文化的贡献
4
作者 徐汉峰 《漯河职业技术学院学报》 2011年第1期77-80,共4页
经初步检索,在我国会计界专用的会计词语中,涉及到金、木、水、火、土五个字的会计词语有七百一十个,其中:"金"字对中国会计词语的贡献就有一百一十七个,"木"字对中国会计词语的贡献就有二百三十二个,"水"... 经初步检索,在我国会计界专用的会计词语中,涉及到金、木、水、火、土五个字的会计词语有七百一十个,其中:"金"字对中国会计词语的贡献就有一百一十七个,"木"字对中国会计词语的贡献就有二百三十二个,"水"字对中国会计词语的贡献就有二百三十九个,"火"字对中国会计词语的贡献就有二十四个,"土"字对中国会计词语的贡献就有九十八个。 展开更多
关键词 "金"字文化 "木"字文化 "水"字文化 "火"字文化 "土"字文化 会计文化
下载PDF
New Architecture of Pipeline CORDIC 被引量:1
5
作者 李滔 韩月秋 《Journal of Beijing Institute of Technology》 EI CAS 1999年第1期89-94,共6页
Aim To design an ASIC based on CORDIC(coordinate rotations digital computer) to meet the requirement of coordinate conversion in high speed radar signal processing. Methods A new pipeline CORDIC architecture easi... Aim To design an ASIC based on CORDIC(coordinate rotations digital computer) to meet the requirement of coordinate conversion in high speed radar signal processing. Methods A new pipeline CORDIC architecture easily realized in VLSI was introduced. Results and Conclusion The results of hardware simulation with FPGA show that the pipeline CORDIC architecture meets the requirement. 展开更多
关键词 CORDIC pipeline architecture ASIC design
下载PDF
也说“许浑千首湿” 被引量:1
6
作者 郭宝军 《琼州大学学报》 2002年第5期88-91,共4页
关键词 "许浑手千首湿" 诗歌 《苕溪渔隐丛话前集》 "水"字 意象 文学
下载PDF
Existence of Microsatellites in Expressed Sequence Tags of Common Carp (Cyprinus carpio L.) Available in GenBank dbEST Database 被引量:8
7
作者 HU Jingjie WANG Xiaolong HU Xiaoli BAO Zhenmin 《Journal of Ocean University of China》 SCIE CAS 2006年第1期12-20,共9页
Common carp expressed sequence tags (ESTs) were analyzed for the existence of microsatellites, or simple sequence repeats (SSRs). In the NCBI dbEST database, a total of 10612 sequences were registered before Decem... Common carp expressed sequence tags (ESTs) were analyzed for the existence of microsatellites, or simple sequence repeats (SSRs). In the NCBI dbEST database, a total of 10612 sequences were registered before December 31, 2004. A complete search of 2-6 nucleotide microsatellites resulted in the identification of 513 SSR-containing ESTs, accounting for 4.8% of the total. Cluster analysis indicated that 73 sequences of SSR-containing ESTs fell into 27 groups and the remaining 440 ESTs were independent. A total of 467 unique SSR-containing ESTs were identified. These EST-SSRs contained a vari- ety of simple sequence types, and di- and tri-nucleotide repeats were the most abundant, accounting for 42.1% and 27.9% of the whole, respectively. Of the dinucleotide repeats, CA/TG was the most abundant, followed by GA/TC. BLASTx search showed that 38.1% of the SSR loci could be associated with genes or proteins of known or unknown function. BLASTx searches of SSR-containing ESTs also showed high frequencies (98/179) of hits on zebrafish sequences. 展开更多
关键词 common carp microsatellites ESTS data mining
下载PDF
EFFECTS OF PACIFIC SSTA ON SUMMER PRECIPITATION OVER EASTERN CHINA, PART II: NUMERICAL SIMULATIONS 被引量:1
8
作者 余贞寿 孙照渤 +1 位作者 倪东鸿 曾刚 《Journal of Tropical Meteorology》 SCIE 2007年第2期113-119,共7页
Based on an observational analysis, seven numerical experiments are designed to study the impacts of Pacific SSTA on summer precipitation over eastern China and relevant physical mechanism by NCAR CCM3. The numerical ... Based on an observational analysis, seven numerical experiments are designed to study the impacts of Pacific SSTA on summer precipitation over eastern China and relevant physical mechanism by NCAR CCM3. The numerical simulation results show that preceding winter SSTA in the Kuroshio region leads to summer precipitation anomaly over the Yangtze River valleys by modifying atmospheric general circulation over eastern Asia and middle-high latitude. West Pacific subtropical high is notably affected by preceding spring SSTA over the middle and east of Equator Pacific; SSTA of the central region of middle latitude in the corresponding period causes the summer rainfall anomaly over eastern China so as to trigger the atmospheric Eurasia-Pacific teleconnection pattern. 展开更多
关键词 PACIFIC SSTA eastern China summer precipitation numerical simulations
下载PDF
NEW APPROACH TO COPYRIGHT PROTECTION OF IMAGE AGAINST GEOMETRICAL ATTACKS
9
作者 郝红杰 吴一全 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2007年第4期335-342,共8页
To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in ... To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression. 展开更多
关键词 image copyright protection digital watermarking geometrical attack Krawtchouk moment invariant
下载PDF
APPLICATION OF NONLINEAR WATERMARK TECHNIQUES IN DIGITAL LIBRARIES 被引量:1
10
作者 Zhao Jian Zhou Mingquan 《Journal of Electronics(China)》 2005年第5期524-527,共4页
A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital p... A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital products in digital library, digital watermarking has been proposed as a solution to this problem. This letter describes potential situations that nonlinear theory can be used to enhance robustness and security of the watermark in digital library. Some nonlinear watermark techniques have been enumerated. Experimental results show that the proposed scheme is superior to the general watermark scheme both in security and robustness in digital library. 展开更多
关键词 Digital library Digital watermarking NONLINEAR Copyright protection
下载PDF
Digital Watermark-based Security Technology for Geo-spatial Graphics Data 被引量:2
11
作者 JIA Peihong CHEN Yunzhen +1 位作者 MA Jinsong ZHU Dakui 《Chinese Geographical Science》 SCIE CSCD 2006年第3期276-281,共6页
The paper presents a set of techniques of digital watermarking by which copyright and user rights messages are hidden into geo-spatial graphics data,as well as techniques of compressing and encrypting the watermarked ... The paper presents a set of techniques of digital watermarking by which copyright and user rights messages are hidden into geo-spatial graphics data,as well as techniques of compressing and encrypting the watermarked geo-spatial graphics data.The technology aims at tracing and resisting the illegal distribution and duplication of the geo-spatial graphics data product,so as to effectively protect the data producer's rights as well as to facilitate the secure sharing of geo-spatial graphics data.So far in the CIS field throughout the world,few researches have been made on digital watermarking.The research is a novel exploration both in the field of security management of geo-spatial graphics data and in the applications of digital watermarking technique.An application software employing the proposed technology has been developed.A number of experimental tests on the 1:500,000 digital bathymetric chart of the South China Sea and 1:10,000 digital topographic map of Jiangsu Province have been conducted to verify the feasibility of the proposed technology. 展开更多
关键词 geo-spatial graphics data copyright protection digital watermarking stego carrier data encrypting
下载PDF
Robust digital watermarking algorithm based on continuous hyperchaotic system and discrete wavelet transform 被引量:2
12
作者 YIN Hong CHEN Zeng-qiang YUAN Zhu-zhi 《Optoelectronics Letters》 EI 2006年第5期369-372,共4页
A hyperchaos-based watermarking algorithm is developed in the wavelet domain for images.The algorithm is based on discrete wavelet transform and combines the communication model with side information.We utilize a suit... A hyperchaos-based watermarking algorithm is developed in the wavelet domain for images.The algorithm is based on discrete wavelet transform and combines the communication model with side information.We utilize a suitable scale factor to scale host image,then construct cosets for embedding digital watermarking according to scale version of the host image.Our scheme makes a tradeoff between imperceptibility and robustness,and achieves security.The extraction algorithm is a blind detection algorithm which retrieves the watermark without the original host image.In addition,we propose a new method for watermark encryption with hyperchaotic sequence.This method overcomes the drawback of small key space of chaotic sequence and improves the watermark security.Simulation results indicate that the algorithm is a well-balanced watermarking method that offers good robustness and imperceptibility. 展开更多
关键词 数字水印算法 随机系统 离散变换 鲁棒性
下载PDF
MULTI-WATERMARKING SCHEME FOR GROUP USERS BASED ON VISUAL CRYPTOGRAPHY 被引量:1
13
作者 YuanZhonglan XiaGuangsheng +1 位作者 WenQiaoyan YangYixian 《Journal of Electronics(China)》 2005年第4期364-370,共7页
All watermarks are shared into shadow images using VCS(Visual Cryptography Scheme). Only one specific shadow (as a new watermark) is embedded into the host signal and the other ones are distributed to every user in ea... All watermarks are shared into shadow images using VCS(Visual Cryptography Scheme). Only one specific shadow (as a new watermark) is embedded into the host signal and the other ones are distributed to every user in each group as a key. In the watermarking extraction procedure, users in different group can obtain different watermark by combining their shadows with the extracted one from the watermarked signal. Analysis and experimental results show that the new watermarking method is novel, secure and robust. 展开更多
关键词 Digital watermarking Visual cryptography Multi-watermarking
下载PDF
QIM digital watermarkingbased on LDPC code and messagepassingunder scalingattacks
14
作者 崔鑫 颜斌 +1 位作者 贾霞 王亚菲 《Journal of Measurement Science and Instrumentation》 CAS 2014年第1期37-40,共4页
Watermarking system based on quantization index modulation (QIM) is increasingly popular in high payload applications,but it is inherently fragile against amplitude scaling attacks.In order to resist desynchronizati... Watermarking system based on quantization index modulation (QIM) is increasingly popular in high payload applications,but it is inherently fragile against amplitude scaling attacks.In order to resist desynchronization attacks of QIM digital watermarking,a low density parity check (LDPC) code-aided QIM watermarking algorithm is proposed,and the performance of QIM watermarking system can be improved by incorporating LDPC code with message passing estimation/detection framework.Using the theory of iterative estimation and decoding,the watermark signal is decoded by the proposed algorithm through iterative estimation of amplitude scaling parameters and decoding of watermark.The performance of the proposed algorithm is closer to the dirty paper Shannon limit than that of repetition code aided algorithm when the algorithm is attacked by the additive white Gaussian noise.For constant amplitude scaling attacks,the proposed algorithm can obtain the accurate estimation of amplitude scaling parameters.The simulation result shows that the algorithm can obtain similar performance compared to the algorithm without desynchronization. 展开更多
关键词 digital watermarking quantization index modulation (QIM) message passing algorithm based on factor graph low density parity check (LDPC) code amplitude scaling attack
下载PDF
A Fast Algorithm of Cartographic Sounding Selection 被引量:3
15
作者 SUI Haigang HUA Li +1 位作者 ZHAO Haitao ZHANG Yongli 《Geo-Spatial Information Science》 2005年第4期262-268,共7页
An effective strategy and framework that adequately integrate the automated and manual processes for fast cartographic sounding selection is presented. The important submarine topographic features are extracted for im... An effective strategy and framework that adequately integrate the automated and manual processes for fast cartographic sounding selection is presented. The important submarine topographic features are extracted for important soundings selection, and an improved "influence circle" algorithm is introduced for sounding selection. For automatic configuration of soundings distribution pattern, a special algorithm considering multi factors is employed. A semi automatic method for solving the ambiguous conflicts is described. On the basis of the algorithms and strategies a system named HGIS for fast cartographic sounding selection is developed and applied in Chinese Marine Safety Administration Bureau (CMSAB). The application experiments show that the system is effective and reliable. At last some conclusions and the future work are given. 展开更多
关键词 cartographic sounding selection DEM TIN influence circle topology consistency
下载PDF
Lossless Digital Watermarking Scheme for Image Maps 被引量:2
16
作者 SUN Jianguo ZHENG Chonghui GAO Di 《China Communications》 SCIE CSCD 2014年第8期125-130,共6页
A lossless digital watermarking scheme,which was zero- perturbation on the content and graphics for the digital image maps,is proposed.During the simulation,the scheme has been utilized to model the copyright protecti... A lossless digital watermarking scheme,which was zero- perturbation on the content and graphics for the digital image maps,is proposed.During the simulation,the scheme has been utilized to model the copyright protection program as a commerce application.Compared to the traditional digital watermarking schemes,our scheme operates in redundancy areas of maps and is scalable to topology changes.Experimental results show that,with respect to the geometric attacks and image transformed,the performance of our scheme is better than the classical algorithms based space or frequency domain with much lower complexity.. 展开更多
关键词 information hiding digitalwatermarking copyright protection digitalmaps
下载PDF
Analysis of groundwater recoverable resource by numerical method in Linfen Basin of Shanxi,North China 被引量:1
17
作者 Liping BAI Yeyao WANG Jinsheng WANG 《Global Geology》 2008年第3期168-173,共6页
Calculation of the groundwater recoverable resource is the main part of groundwater resource evaluation. The three-dimensional groundwater flow model in Linfen Basin was established by GMS software. Then the numerical... Calculation of the groundwater recoverable resource is the main part of groundwater resource evaluation. The three-dimensional groundwater flow model in Linfen Basin was established by GMS software. Then the numerical model was calibrated by observed groundwater level from February to December in 2 000. Based on the calibrated model, the groundwater recoverable resource is calculated. The simulation result shows that under the given value of the groundwater recoverable resource, the groundwater level would decrease significantly in the first 1 000 days, while the water level would drop slowly in 1 000 to 2 000 days, and the water level change tend to be stable after 2000 days. 展开更多
关键词 recoverable resource GROUNDWATER GMS numerical model
下载PDF
Game Theory Based False Negative Probability of Embedded Watermark Under Unintentional and Steganalysis Attacks 被引量:1
18
作者 HU Ziquan SHE Kun +1 位作者 WANG Jianghua TANG Jianguo 《China Communications》 SCIE CSCD 2014年第5期114-123,共10页
Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,how... Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,however,do not consider the influence of steganalysis attack.This paper proposed the game theory based false negative probability to estimate the impacts of steganalysis attack,as well as unintentional attack.Specifically,game theory was used to model the collision between the embedment and steganalysis attack,and derive the optimal building embedding/attacking strategy.Such optimal playing strategies devote to calculating the attacker destructed watermark,used for calculation of the game theory based false negative probability.The experimental results show that watermark detection reliability measured using our proposed method,in comparison,can better reflect the real scenario in which the embedded watermark undergoes unintentional attack and the attacker using steganalysis attack.This paper provides a foundation for investigating countermeasures of digital watermarking community against steganalysis attack. 展开更多
关键词 digital watermarking false negative probability game theory watermark capacity steganalysis attack.
下载PDF
DCT based multipurpose watermarking technique for image copyright notification and protection 被引量:2
19
作者 姜守达 陆哲明 吴昊天 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第3期237-239,共3页
A multipurpose image watermarking technique based on DCT is proposed to notify and protect the copyright of digital products. In order to achieve this objective, the DCT coefficients of each image block are divided in... A multipurpose image watermarking technique based on DCT is proposed to notify and protect the copyright of digital products. In order to achieve this objective, the DCT coefficients of each image block are divided into two parts for embedding the visible and invisible watermarks. The visible watermark is embedded in each DC DCT coefficient and most of the AC DCT coefficients of every block, and the invisible watermark in the rest. Based on the characteristics of Human Visual System (HVS), the embedding strength of the visible watermark is varied in accordance with the underlying content of the host image. The invisible watermark is embedded in a quaternity of midrange frequencies. Experimental results show that the visible watermark is hard to remove and the invisible watermark is robust to common digital signal processing operations. 展开更多
关键词 copyright notification visible watermark HVS quantization index modulation
下载PDF
《说文解字》从“水”诸字归部理据探索
20
作者 连文娟 《辽宁工业大学学报(社会科学版)》 2021年第2期58-61,共4页
《说文解字》从"水"诸字,"水"与其他偏旁构成某一个合体字;有的归入"水部",有的据另一个偏旁归部,"以类相从"的原则起着制约作用。还有某个字与两个偏旁部首都有同义类的关系,就出现了归部两... 《说文解字》从"水"诸字,"水"与其他偏旁构成某一个合体字;有的归入"水部",有的据另一个偏旁归部,"以类相从"的原则起着制约作用。还有某个字与两个偏旁部首都有同义类的关系,就出现了归部两可的情况。也有个别从"水"字归入某部只是为了字有所归。 展开更多
关键词 《说文解字》 从"水"字 归部 以类相从 归部两可
下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部