期刊文献+
共找到1,312篇文章
< 1 2 66 >
每页显示 20 50 100
LKAW: A Robust Watermarking Method Based on Large Kernel Convolution and Adaptive Weight Assignment
1
作者 Xiaorui Zhang Rui Jiang +3 位作者 Wei Sun Aiguo Song Xindong Wei Ruohan Meng 《Computers, Materials & Continua》 SCIE EI 2023年第4期1-17,共17页
Robust watermarking requires finding invariant features under multiple attacks to ensure correct extraction.Deep learning has extremely powerful in extracting features,and watermarking algorithms based on deep learnin... Robust watermarking requires finding invariant features under multiple attacks to ensure correct extraction.Deep learning has extremely powerful in extracting features,and watermarking algorithms based on deep learning have attracted widespread attention.Most existing methods use 3×3 small kernel convolution to extract image features and embed the watermarking.However,the effective perception fields for small kernel convolution are extremely confined,so the pixels that each watermarking can affect are restricted,thus limiting the performance of the watermarking.To address these problems,we propose a watermarking network based on large kernel convolution and adaptive weight assignment for loss functions.It uses large-kernel depth-wise convolution to extract features for learning large-scale image information and subsequently projects the watermarking into a highdimensional space by 1×1 convolution to achieve adaptability in the channel dimension.Subsequently,the modification of the embedded watermarking on the cover image is extended to more pixels.Because the magnitude and convergence rates of each loss function are different,an adaptive loss weight assignment strategy is proposed to make theweights participate in the network training together and adjust theweight dynamically.Further,a high-frequency wavelet loss is proposed,by which the watermarking is restricted to only the low-frequency wavelet sub-bands,thereby enhancing the robustness of watermarking against image compression.The experimental results show that the peak signal-to-noise ratio(PSNR)of the encoded image reaches 40.12,the structural similarity(SSIM)reaches 0.9721,and the watermarking has good robustness against various types of noise. 展开更多
关键词 robust watermarking large kernel convolution adaptive loss weights high-frequency wavelet loss deep learning
下载PDF
Robust Watermarking of Mobile Video Resistant against Barrel Distortion 被引量:2
2
作者 Huawei Tian Yanhui Xiao +2 位作者 Gang Cao Jianwei Ding Bo Ou 《China Communications》 SCIE CSCD 2016年第9期131-138,共8页
In head mounted display(HMD),in order to cancel pincushion distortion,the images displayed on the mobile should be prewarped with barrel distortion.The copyright of the mobile video should be verified on both the orig... In head mounted display(HMD),in order to cancel pincushion distortion,the images displayed on the mobile should be prewarped with barrel distortion.The copyright of the mobile video should be verified on both the original view and the pre-warped virtual view.A robust watermarking resistant against barrel distortion for HMDs is proposed in this paper.Watermark mask is embedded into image in consideration of imperceptibility and robustness of watermarking.In order to detect watermark from the pre-warped image with barrel distortion,an estimation method of the barrel distortion is proposed for HMDs.Then,the same warp is enforced on the embedded watermark mask with the estimated parameters of barrel distortion.The correlation between the warped watermark and the pre-warped image is computed to predicate the existence of watermark.As shown in experimental results,watermark of mobile video can be detected not only from the original views,but also from the pre-warped virtual view.It also shows that the proposed scheme is resistant against combined barrel distortion and common post-processing,such as JPEG compression. 展开更多
关键词 mobile video HMD with mobile robust watermarking
下载PDF
Novel Blind Robust Watermarking Based on Chaotic Mixing 被引量:1
3
作者 王东建 蒋铃鸽 +1 位作者 何晨 冯国瑞 《Journal of Shanghai Jiaotong university(Science)》 EI 2004年第2期10-15,共6页
This paper proposed a novel blind robust watermarking scheme. Multi-bits watermark is embedded in the chaotic mixed image blocks. Energy of the watermark is spread to all region of the blocks instead of some individua... This paper proposed a novel blind robust watermarking scheme. Multi-bits watermark is embedded in the chaotic mixed image blocks. Energy of the watermark is spread to all region of the blocks instead of some individual pixels, which entitles the watermark with imperceptibility and high robustness. A class of 1-D Markov chaotic maps is employed to perform image block mixing and watermark encryption ensures security of the system. To prove the validity of this proposed scheme, some objective comparisons with the popular spread spectrum scheme were also presented. The simulation results show that this scheme can survive processing such as high-ratio JPEG compression, Gaussian noise pollution and histogram equalization. 展开更多
关键词 robust watermark chaotic mixing copyright protection
下载PDF
An Error-Correcting Code-Based Robust Watermarking Scheme for Stereolithographic Files 被引量:1
4
作者 Zhuorong Li Huawei Tian +2 位作者 Yanhui Xiao Yunqi Tang Anhong Wang 《Computer Systems Science & Engineering》 SCIE EI 2021年第5期247-263,共17页
Stereolithographic(STL)files have been extensively used in rapid prototyping industries as well as many other fields as watermarking algorithms to secure intellectual property and protect three-dimensional models from... Stereolithographic(STL)files have been extensively used in rapid prototyping industries as well as many other fields as watermarking algorithms to secure intellectual property and protect three-dimensional models from theft.However,to the best of our knowledge,few studies have looked at how watermarking can resist attacks that involve vertex-reordering.Here,we present a lossless and robust watermarking scheme for STL files to protect against vertexreordering attacks.Specifically,we designed a novel error-correcting code(ECC)that can correct the error of any one-bit in a bitstream by inserting several check digits.In addition,ECC is designed to make use of redundant information according to the characteristics of STL files,which introduces further robustness for defense against attacks.No modifications are made to the geometric information of the three-dimensional model,which respects the requirements of a highprecision model.The experimental results show that the proposed watermarking scheme can survive numerous kinds of attack,including rotation,scaling and translation(RST),facet reordering,and vertex-reordering attacks. 展开更多
关键词 Three-dimensional watermarking stereolithographic file robust watermarking error-correcting code
下载PDF
Robust Watermarking of Screen-Photography Based on JND
5
作者 Siyu Gu JinHan +1 位作者 Xingming Sun Yi Cao 《Computers, Materials & Continua》 SCIE EI 2022年第6期4819-4833,共15页
With the popularity of smartphones,it is often easy to maliciously leak important information by taking pictures of the phone.Robust watermarking that can resist screen photography can achieve the protection of inform... With the popularity of smartphones,it is often easy to maliciously leak important information by taking pictures of the phone.Robust watermarking that can resist screen photography can achieve the protection of information.Since the screen photo process can cause some irreversible distortion,the currently available screen photo watermarks do not consider the image content well and the visual quality is not very high.Therefore,this paper proposes a new screen-photography robust watermark.In terms of embedding region selection,the intensity-based Scale-invariant feature transform(SIFT)algorithm used for the construction of feature regions based on the density of feature points,which can make it more focused on the key content of the image;in terms of embedding strength,the Just noticeable difference(JND)model is applied to limit the intensity of the watermark embedding according to the luminance and texture of the picture to balance robustness and invisibility;after embedding watermark,the coefficients in the neighborhood are again adjusted with optimal constraints to improve the accuracy of watermark extraction.After experiments,it is shown that the method we proposed can improve the correct rate of watermark extraction,the quality of the visual aspect of the watermarked picture is also improved. 展开更多
关键词 Screen photography robust watermarking SIFT JND
下载PDF
A Dual Domain Robust Reversible Watermarking Algorithm for Frame Grouping Videos Using Scene Smoothness
6
作者 Yucheng Liang Ke Niu +1 位作者 Yingnan Zhang Yifei Meng 《Computers, Materials & Continua》 SCIE EI 2024年第6期5143-5174,共32页
The proposed robust reversible watermarking algorithm addresses the compatibility challenges between robustness and reversibility in existing video watermarking techniques by leveraging scene smoothness for frame grou... The proposed robust reversible watermarking algorithm addresses the compatibility challenges between robustness and reversibility in existing video watermarking techniques by leveraging scene smoothness for frame grouping videos.Grounded in the H.264 video coding standard,the algorithm first employs traditional robust watermark stitching technology to embed watermark information in the low-frequency coefficient domain of the U channel.Subsequently,it utilizes histogram migration techniques in the high-frequency coefficient domain of the U channel to embed auxiliary information,enabling successful watermark extraction and lossless recovery of the original video content.Experimental results demonstrate the algorithm’s strong imperceptibility,with each embedded frame in the experimental videos achieving a mean peak signal-to-noise ratio of 49.3830 dB and a mean structural similarity of 0.9996.Compared with the three comparison algorithms,the performance of the two experimental indexes is improved by 7.59%and 0.4%on average.At the same time,the proposed algorithm has strong robustness to both offline and online attacks:In the face of offline attacks,the average normalized correlation coefficient between the extracted watermark and the original watermark is 0.9989,and the average bit error rate is 0.0089.In the face of online attacks,the normalized correlation coefficient between the extracted watermark and the original watermark is 0.8840,and the mean bit error rate is 0.2269.Compared with the three comparison algorithms,the performance of the two experimental indexes is improved by 1.27%and 18.16%on average,highlighting the algorithm’s robustness.Furthermore,the algorithm exhibits low computational complexity,with the mean encoding and the mean decoding time differentials during experimental video processing being 3.934 and 2.273 s,respectively,underscoring its practical utility. 展开更多
关键词 robust reversible watermarking scene smoothness dual-domain U channel H.264 encoding standard
下载PDF
A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection 被引量:70
7
作者 Xiaorui Zhang Wenfang Zhang +2 位作者 Wei Sun Xingming Sun Sunil Kumar Jha 《Computer Systems Science & Engineering》 SCIE EI 2022年第6期1043-1056,共14页
In a telemedicine diagnosis system,the emergence of 3D imaging enables doctors to make clearer judgments,and its accuracy also directly affects doctors’diagnosis of the disease.In order to ensure the safe transmissio... In a telemedicine diagnosis system,the emergence of 3D imaging enables doctors to make clearer judgments,and its accuracy also directly affects doctors’diagnosis of the disease.In order to ensure the safe transmission and storage of medical data,a 3D medical watermarking algorithm based on wavelet transform is proposed in this paper.The proposed algorithm employs the principal component analysis(PCA)transform to reduce the data dimension,which can minimize the error between the extracted components and the original data in the mean square sense.Especially,this algorithm helps to create a bacterial foraging model based on particle swarm optimization(BF-PSO),by which the optimal wavelet coefficient is found for embedding and is used as the absolute feature of watermark embedding,thereby achieving the optimal balance between embedding capacity and imperceptibility.A series of experimental results from MATLAB software based on the standard MRI brain volume dataset demonstrate that the proposed algorithm has strong robustness and make the 3D model have small deformation after embedding the watermark. 展开更多
关键词 3-D medical watermarking robust watermarking PCA BF-PSO
下载PDF
Robust Image Watermarking Using Local Invariant Features and Independent Component Analysis 被引量:2
8
作者 ZHANG Hanling LIU Jie 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1931-1934,共4页
This paper proposes a novel robust image watermarking scheme for digital images using local invariant features and Independent Component Analysis (ICA). Most present watermarking algorithms are unable to resist geom... This paper proposes a novel robust image watermarking scheme for digital images using local invariant features and Independent Component Analysis (ICA). Most present watermarking algorithms are unable to resist geometric distortions that desynchronize the location. The method we propose here is robust to geometric attacks. In order to resist geometric distortions, we use a local invariant feature of the image called the scale invariant feature transform, which is invariant to translation and scaling distortions. The watermark is inserted into the circular patches generated by scale-invariant key point extractor. Rotation invariance is achieved using the translation property of the polar-mapped circular patches. Our method belongs to the blind watermark category, because we use Independent Component Analysis for detection that does not need the original image during detection. Experimental results show that our method is robust against geometric distortion attacks as well as signal-processing attacks. 展开更多
关键词 robust watermarking geometrical attack watermark synchronization local invariant features
下载PDF
Robust watermarking of databases in order-preserving encrypted domain
9
作者 Shijun XIANG Guanqi RUAN +1 位作者 Hao LI Jiayong HE 《Frontiers of Computer Science》 SCIE EI CSCD 2022年第2期160-168,共9页
Security of databases has always been a hot topic in the field of information security.Privacy protection can be realized by encrypting data,while data copyright can be protected by using digital watermarking technolo... Security of databases has always been a hot topic in the field of information security.Privacy protection can be realized by encrypting data,while data copyright can be protected by using digital watermarking technology.By combining these two technologies,a database’s copyright and privacy problems in the cloud can be effectively solved.Based on order-preserving encryption scheme(OPES),circular histogram and digital watermarking technology,this paper proposes a new robust watermarking scheme for protection of databases in the encrypted domain.Firstly,the OPES is used to encrypt data to avoid exposing the data in the cloud.Then,the encrypted data are grouped and modified by the use of a circular histogram for embedding a digital watermark.The common data query operations in database are available for the encrypted watermarking database.In receivers,the digital watermark and the original data can be restored through a secret key and a key table.Experimental results have shown that the proposed algorithm is robust against common database attacks in the encrypted domain. 展开更多
关键词 database copyright robust watermarking orderpreserving encryption circular histogram
原文传递
WATERMARKING AUTHENTICATION:USING THE FRAGILE MODE OR THE ROBUST MODE?
10
作者 Chen Dan Wu Qianhong Wang Yumin 《Journal of Electronics(China)》 2006年第4期549-553,共5页
Due to the lack of a unified authentication model certain mistakes occurred in the use of the wa-termarking authentication methods. To clarify the confusion, authentication models of robust and fragile wa-termarking a... Due to the lack of a unified authentication model certain mistakes occurred in the use of the wa-termarking authentication methods. To clarify the confusion, authentication models of robust and fragile wa-termarking are developed respectively in the paper. Concrete algorithms are proposed to prove the models that different Discrete Wavelet Transform (DWT) domains are utilized to embed the watermarks and quanti-zation method is presented with Just Notice Differences (JNDs) threshold as the quantization size. After the key technologies about the two methods are discussed, we detail the comparison of the two modes and rec-ommend their respective application scenarios as applicable results. 展开更多
关键词 watermarking authentication robust watermarking Fragile watermarking
下载PDF
Robust Reversible Audio Watermarking Scheme for Telemedicine and Privacy Protection 被引量:63
11
作者 Xiaorui Zhang Xun Sun +2 位作者 Xingming Sun Wei Sun Sunil Kumar Jha 《Computers, Materials & Continua》 SCIE EI 2022年第5期3035-3050,共16页
The leakage of medical audio data in telemedicine seriously violates the privacy of patients.In order to avoid the leakage of patient information in telemedicine,a two-stage reversible robust audio watermarking algori... The leakage of medical audio data in telemedicine seriously violates the privacy of patients.In order to avoid the leakage of patient information in telemedicine,a two-stage reversible robust audio watermarking algorithm is proposed to protect medical audio data.The scheme decomposes the medical audio into two independent embedding domains,embeds the robust watermark and the reversible watermark into the two domains respectively.In order to ensure the audio quality,the Hurst exponent is used to find a suitable position for watermark embedding.Due to the independence of the two embedding domains,the embedding of the second-stage reversible watermark will not affect the first-stage watermark,so the robustness of the first-stage watermark can be well maintained.In the second stage,the correlation between the sampling points in the medical audio is used to modify the hidden bits of the histogram to reduce the modification of the medical audio and reduce the distortion caused by reversible embedding.Simulation experiments show that this scheme has strong robustness against signal processing operations such as MP3 compression of 48 db,additive white Gaussian noise(AWGN)of 20 db,low-pass filtering,resampling,re-quantization and other attacks,and has good imperceptibility. 展开更多
关键词 TELEMEDICINE privacy protection audio watermarking robust reversible watermarking two-stage embedding
下载PDF
Robust Image Watermarking Based on Generative Adversarial Network 被引量:1
12
作者 Kangli Hao Guorui Feng Xinpeng Zhang 《China Communications》 SCIE CSCD 2020年第11期131-140,共10页
Digital watermark embeds information bits into digital cover such as images and videos to prove the creator’s ownership of his work.In this paper,we propose a robust image watermark algorithm based on a generative ad... Digital watermark embeds information bits into digital cover such as images and videos to prove the creator’s ownership of his work.In this paper,we propose a robust image watermark algorithm based on a generative adversarial network.This model includes two modules,generator and adversary.Generator is mainly used to generate images embedded with watermark,and decode the image damaged by noise to obtain the watermark.Adversary is used to discriminate whether the image is embedded with watermark and damage the image by noise.Based on the model Hidden(hiding data with deep networks),we add a high-pass filter in front of the discriminator,making the watermark tend to be embedded in the mid-frequency region of the image.Since the human visual system pays more attention to the central area of the image,we give a higher weight to the image center region,and a lower weight to the edge region when calculating the loss between cover and embedded image.The watermarked image obtained by this scheme has a better visual performance.Experimental results show that the proposed architecture is more robust against noise interference compared with the state-of-art schemes. 展开更多
关键词 robust image watermark deep learning generative adversarial network convolutional neural network
下载PDF
A New Robust Watermarking Algorithm for Vector Data 被引量:2
13
作者 ZHANG Lei YAN Dashun +1 位作者 JIANG Shujuan SHI Tingting 《Wuhan University Journal of Natural Sciences》 CAS 2010年第5期403-407,共5页
Because the existing vector data watermarking algorithm is insufficiently robust for compression and cropping,and has no sufficient control on map deformation,a new watermarking algorithm was proposed in this paper.It... Because the existing vector data watermarking algorithm is insufficiently robust for compression and cropping,and has no sufficient control on map deformation,a new watermarking algorithm was proposed in this paper.Its main features are:① it selected feature points and non-feature points from the sequence of Douglas,and then embedded watermarking points by wavelet transform,which is based on layer segmentation;② it enhanced the map deformation control design.Furthermore,it increased the map graphic deformation control design.The algorithm was applied to experimental data,and the test results showed that the algorithm had good robustness on graphics geometric transformation,the addition,deletion and cropping of points in graph layers.Also,the graph distortion had been well controlled. 展开更多
关键词 vector graphics Douglas Puck transform wavelet transform blind watermarking robust
原文传递
Connectivity-Based Watermarking Robust to Geometrical Attacks 被引量:1
14
作者 王宏霞 罗键 《Journal of Southwest Jiaotong University(English Edition)》 2006年第1期1-6,共6页
A novel robust watermarking scheme based on image connectivity is proposed. In the scheme, the connected objects are obtained according to selected connectivity pattern, and the gravity centers are calculated in sever... A novel robust watermarking scheme based on image connectivity is proposed. In the scheme, the connected objects are obtained according to selected connectivity pattern, and the gravity centers are calculated in several bigger objects as the reference points for watermark embedding. Based on these reference points and the center of the whole image, several sectors are formed, and the same version of watermarks is embedded into these sectors and their opposites. Thanks to the very stable gravity center of the connected objects, watermark detection is synchronized successfully. Simulation results show that the watermark can survive under both local and global geometrical distortions. 展开更多
关键词 CONNECTIVITY Digital watermarking robustNESS Geometrical distortion
下载PDF
Fragile Watermarking Based on Robust Hidden Information 被引量:1
15
作者 张新鹏 王朔中 《Journal of Shanghai University(English Edition)》 CAS 2003年第3期261-264,共4页
Block-wise fragile watermarks can be used to reveal maliciously tampered areas in multimedia products. However a forged content containing a cloned fragile watermark can be constructed by using a series of watermarked... Block-wise fragile watermarks can be used to reveal maliciously tampered areas in multimedia products. However a forged content containing a cloned fragile watermark can be constructed by using a series of watermarked data. To defeat this type of counterfeit attack, a novel fragile watermarking technique is proposed in which different pseudo-random data are selected for different host products, and the generated fragile watermark is dependent upon the selected information. While inserting the fragile watermark, the pseudo-random information is also robustly embedded into the host data. Because of the difference between the selected information, different watermarked data cannot be used to forge illegal contents containing a valid fragile watermark. 展开更多
关键词 digital watermarking information hiding fragile robust.
下载PDF
Imperceptible and Robust DWT-SVD-Based Digital Audio Watermarking Algorithm 被引量:1
16
作者 Khalid A. Darabkh 《Journal of Software Engineering and Applications》 2014年第10期859-871,共13页
Digital representation of multimedia is more advantageous than the analog one due to potentially improving the portability, efficiency, and accuracy of the information presented. Despite the challenge of having high h... Digital representation of multimedia is more advantageous than the analog one due to potentially improving the portability, efficiency, and accuracy of the information presented. Despite the challenge of having high hiding capacity like other media watermarking, still audios are likely candidates for data hiding due to their possible capabilities of achieving impressive robustness and protection against online music piracy and content identification. In this paper, we propose efficient audio watermarking embedding and extracting techniques, which mainly use Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD), in which a new matrix formation of details sub-bands is proposed. Additionally, massive experimental work was conducted to investigate the contributions of operating different watermark intensities and multiple levels of DWT to our proposed techniques. Two performance objectives are employed in this work which involve imperceptibility and robustness. To further boost the imperceptibility, we incorporate the code assignment method to our techniques that do outperform what are closely connected in the literature. 展开更多
关键词 DWT SVD IMPERCEPTIBILITY robustness Matrix Formation watermark Code ASSIGNMENT
下载PDF
Secure and Robust Digital Watermarking: A Survey
17
作者 Chun-Lin Song Le Yang Xin Wang 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第4期343-354,共12页
A digital watermarking technique is a multi-scientific discipline which is developed rapidly in last several years for digital content protection, such as copyright protection, authentication protection, source tracin... A digital watermarking technique is a multi-scientific discipline which is developed rapidly in last several years for digital content protection, such as copyright protection, authentication protection, source tracing, etc. However, in realistic scenarios, the digital watermarking system faces significant secure issues, for example, the attackers want to remove, detect, or embed illegal watermark signals. Therefore, the aim of this contribution is to illustrate recent results of robust and secure watermarking to the signal processing community, and highlight both benefits and still open issues. Specifically, this paper is intended to introduce the concept of secure and robust digital watermarking system, and provide with problems and their countermeasures. First of all, the classic watermark model and cryptosystem will be reviewed and then, the concept of secure and robust digital watermarking system will be described. Next, the watermark attack will be classified and described. Finally, some countermeasures that can help to improve secure and robustness are considered. 展开更多
关键词 Terms--Countermeasures digital watermarking system robust SECURITY watermark attacks.
下载PDF
Robustness Proof on A United Watermarking Based on CRT Theorem
18
作者 LIULi-gang CHENXiao-su XIAODao-ju HULei 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期307-310,共4页
A new method of embedding and detecting a joint watermarking is proposed. Itapplies the asmuth-bloom secret sharing scheme, which is based on CRT (Chinese remainder theorem)theorem, to the digital watermarking technol... A new method of embedding and detecting a joint watermarking is proposed. Itapplies the asmuth-bloom secret sharing scheme, which is based on CRT (Chinese remainder theorem)theorem, to the digital watermarking technology. On the base of describing the watermarkingembedding proceeding and analyzing the watermarking detection proceeding, a series of experiments isdone. The experiments emphasize on the method's robust proving and security analysis. And theexperiments show that the method can resistthe attacks of JPEG compress, geometry, noise and grayadjusting. The results of the experiments show that the method has a nice recognition of copyrightfor joint ownership. 展开更多
关键词 united digital watermarking Chinese remainder theorem robustness proof
下载PDF
基于水印技术的深度神经网络模型知识产权保护
19
作者 金彪 林翔 +3 位作者 熊金波 尤玮婧 李璇 姚志强 《计算机研究与发展》 EI CSCD 北大核心 2024年第10期2587-2606,共20页
构造一个优秀的深度神经网络(deep neural network,DNN)模型需要大量的训练数据、高性能设备以及专家智慧.DNN模型理应被视为模型所有者的知识产权(intellectual property,IP).保护DNN模型的知识产权也体现了对作为构建和训练该模型的... 构造一个优秀的深度神经网络(deep neural network,DNN)模型需要大量的训练数据、高性能设备以及专家智慧.DNN模型理应被视为模型所有者的知识产权(intellectual property,IP).保护DNN模型的知识产权也体现了对作为构建和训练该模型的数据要素价值的珍视.然而,DNN模型容易受到恶意用户的盗取、篡改和非法传播等攻击,如何有效保护其知识产权已成为学术研究的前沿热点与产业亟需攻克的难题.不同于现有相关综述,聚焦DNN模型水印的应用场景,从用于模型版权声明的鲁棒模型水印和用于模型完整性验证的脆弱模型水印2个维度出发,着重评述基于水印技术的DNN模型知识产权保护方法,探讨不同方法的特点、优势及局限性.同时,详细阐述DNN模型水印技术的实际应用情况.最后,在提炼各类方法共性技术的基础上,展望DNN模型知识产权保护的未来研究方向. 展开更多
关键词 深度神经网络 知识产权 数据要素 鲁棒模型水印 脆弱模型水印
下载PDF
基于双域标记的视频鲁棒可逆水印算法
20
作者 钮可 梁钰承 +1 位作者 孟逸飞 汪晶晶 《信息网络安全》 CSCD 北大核心 2024年第2期239-251,共13页
针对现有视频水印算法无法兼顾鲁棒性与可逆性的问题,文章提出一种基于双域标记的视频鲁棒可逆水印算法。该算法在H.264视频编码中的量化DCT系数域利用传统鲁棒水印拼接技术,嵌入水印信息;在运动矢量域利用二维直方图迁移技术,嵌入辅助... 针对现有视频水印算法无法兼顾鲁棒性与可逆性的问题,文章提出一种基于双域标记的视频鲁棒可逆水印算法。该算法在H.264视频编码中的量化DCT系数域利用传统鲁棒水印拼接技术,嵌入水印信息;在运动矢量域利用二维直方图迁移技术,嵌入辅助信息,实现解码端的水印提取与原始视频的无损恢复。实验结果表明,文章算法具有良好的不可见性,实验视频的峰值信噪比与结构相似度均值分别为44.7537 dB与0.9902,比特率扩张均在16.74%以下,同时对不同强度的失真攻击均具有强鲁棒性,实验视频的归一化互相关系数均在0.970以上,误码率均在0.068以下。 展开更多
关键词 鲁棒可逆水印 双域标记 H.264编码标准 量化DCT系数 运动矢量
下载PDF
上一页 1 2 66 下一页 到第
使用帮助 返回顶部