期刊文献+
共找到57篇文章
< 1 2 3 >
每页显示 20 50 100
Digital Text DocumentWatermarking Based Tampering Attack Detection via Internet
1
作者 Manal Abdullah Alohali Muna Elsadig +3 位作者 Fahd N.Al-Wesabi Mesfer Al Duhayyim Anwer Mustafa Hilal Abdelwahed Motwakel 《Computer Systems Science & Engineering》 2024年第3期759-771,共13页
Owing to the rapid increase in the interchange of text information through internet networks,the reliability and security of digital content are becoming a major research problem.Tampering detection,Content authentica... Owing to the rapid increase in the interchange of text information through internet networks,the reliability and security of digital content are becoming a major research problem.Tampering detection,Content authentication,and integrity verification of digital content interchanged through the Internet were utilized to solve a major concern in information and communication technologies.The authors’difficulties were tampering detection,authentication,and integrity verification of the digital contents.This study develops an Automated Data Mining based Digital Text Document Watermarking for Tampering Attack Detection(ADMDTW-TAD)via the Internet.The DM concept is exploited in the presented ADMDTW-TAD technique to identify the document’s appropriate characteristics to embed larger watermark information.The presented secure watermarking scheme intends to transmit digital text documents over the Internet securely.Once the watermark is embedded with no damage to the original document,it is then shared with the destination.The watermark extraction process is performed to get the original document securely.The experimental validation of the ADMDTW-TAD technique is carried out under varying levels of attack volumes,and the outcomes were inspected in terms of different measures.The simulation values indicated that the ADMDTW-TAD technique improved performance over other models. 展开更多
关键词 Content authentication tampering attacks detection model SECURITY digital watermarking
下载PDF
Combining Digital Watermarks with Two-Color Bitmap Image
2
作者 SAADAAmer YANGYi-xian 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2000年第1期31-35,共5页
A technology for combining digital watermarks with two-color bitmap image based on the threshold watermarking method is presented. Our technology doesn't add any thing to the digital media, but combines the waterm... A technology for combining digital watermarks with two-color bitmap image based on the threshold watermarking method is presented. Our technology doesn't add any thing to the digital media, but combines the watermarks in two-color bitmap image by looking for some characteristic values in the bitmap and uses the relationship between the watermarks and the characteristic values to prove the copyright protection. The choice of the characteristic values depends on the choice of a cryptographic key known by the owner of the bitmap. The benefit of using a cryptographic key is to combine the watermarks with the bitmap in a high secure way. 展开更多
关键词 digital watermarks information hiding copyright protection
原文传递
Digital Watermarking Algorithm Based on Wavelet Transform and Neural Network 被引量:4
3
作者 WANG Zhenfei ZHAI Guangqun WANG Nengchao 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1667-1670,共4页
An effective blind digital watermarking algorithm based on neural networks in the wavelet domain is presented. Firstly, the host image is decomposed through wavelet transform. The significant coefficients of wavelet a... An effective blind digital watermarking algorithm based on neural networks in the wavelet domain is presented. Firstly, the host image is decomposed through wavelet transform. The significant coefficients of wavelet are selected according to the human visual system (HVS) characteristics. Watermark bits are added to them. And then effectively cooperates neural networks to learn the characteristics of the embedded watermark related to them. Because of the learning and adaptive capabilities of neural networks, the trained neural networks almost exactly recover the watermark from the watermarked image. Experimental results and comparisons with other techniques prove the effectiveness of the new algorithm. 展开更多
关键词 digital watermarking neural networks wavelet transform human visual system
下载PDF
Novel copyright protection scheme for digital content 被引量:3
4
作者 Fan Kefeng Wang Meihua +1 位作者 Mo Wei Zhao Xinhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第2期423-429,共7页
A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component anal... A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component analysis (ICA). The system includes the key for watermark extraction and the host image. The algorithm splits the original image into blocks and classifies these blocks based on visual masking, that is, noise visibility function (NVF). Watermark components with different strength are inserted into chosen direct current components of DCT coefficients according to the classifier. The watermark extraction is based on the characteristic of the statistic independence of the host image, watermark and key. Principle component analysis (PCA) whitening process and FastICA techniques are introduced to ensure a blind watermark extraction without requiring the original image. Experirnental results show the proposed technique is robust under attacks such as image filtering and adding noise, cropping and resizing. In addition, the proposed private watermarking system can be improved to the application of the DTV content protection system. 展开更多
关键词 digital content copyright protection digital watermarking noise visibility function independent component analysis.
下载PDF
A Novel Digital Audio Watermarking Scheme in the Wavelet Domain 被引量:2
5
作者 WANGXiang-yang YANGHong-ying ZHAOHong 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期311-314,共4页
We present a novel quantization-based digital audio walermarking scheme inwavelet domain. By quantizing a host audio's wavelet coefficients (Integer Lifting WaveletTransform) and utilizing the characteristics of h... We present a novel quantization-based digital audio walermarking scheme inwavelet domain. By quantizing a host audio's wavelet coefficients (Integer Lifting WaveletTransform) and utilizing the characteristics of human auditory system (HAS), the grayimage isembedded using our watermarking method. Experimental results show that the proposed watermarkingscheme is inaudible and robust against various signal processing such as noising adding, lossycompression, low pass filtering, re-sampling, and re-quantifying. 展开更多
关键词 digital audio watermarking lifting wavelet transform human auditory system chaotic sequence QUANTIZATION
下载PDF
DWT-Based Watermarking Scheme for Digital Images 被引量:2
6
作者 何泉 苏广川 《Journal of Beijing Institute of Technology》 EI CAS 2003年第2期134-137,共4页
A watermarking scheme for digital images is introduced. This method is based on discrete wavelet transform and spread spectrum technique. A discrete wavelet transformed binary signature image is expanded by an m ... A watermarking scheme for digital images is introduced. This method is based on discrete wavelet transform and spread spectrum technique. A discrete wavelet transformed binary signature image is expanded by an m sequence and added to the large wavelet coefficients of a host image with a scale factor. Good balance between transparency and robustness is achieved by the selection of the scale factor. In addition, the spread spectrum technique is adopted to increase the robustness of this watermarking scheme. The experimental results show that the proposed method is of good performance and robustness for common image operations such as JPEG lossy compression, etc. 展开更多
关键词 digital watermarking discrete wavelet transform spread spectrum
下载PDF
Transparent System for Digital Media Copyright Protection in Mobile Business 被引量:1
7
作者 YANG Cheng ZHANG Lihe +1 位作者 WANG Yongbin LIU Jianbo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1923-1926,共4页
At present, in mobile business, the secure environment in the terminal of users has not been embedded, many cryptology-based methods can not be directly used to protect the copyright of digital media. Under this situa... At present, in mobile business, the secure environment in the terminal of users has not been embedded, many cryptology-based methods can not be directly used to protect the copyright of digital media. Under this situation, a transparent system based on watermark for digital right management and digital copyright protection is proposed in this paper. The transparent system is called WDRM (watermark-based digital rights management) and transparent to users. Its core is WDRM Agent. In this paper, system inner model and procession are designed in detail at first, including the registration, the downloading, the super distribution, and the cooperation. Because the watermark embedding and the extraction algorithms are the kernel in this architecture, we also discuss how to choose and design the algorithms. Then we establish a package for all algorithms in WDRM Agent. 展开更多
关键词 mobile business information security digital copyright protection digital watermark
下载PDF
Secure and Robust Digital Watermarking: A Survey
8
作者 Chun-Lin Song Le Yang Xin Wang 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第4期343-354,共12页
A digital watermarking technique is a multi-scientific discipline which is developed rapidly in last several years for digital content protection, such as copyright protection, authentication protection, source tracin... A digital watermarking technique is a multi-scientific discipline which is developed rapidly in last several years for digital content protection, such as copyright protection, authentication protection, source tracing, etc. However, in realistic scenarios, the digital watermarking system faces significant secure issues, for example, the attackers want to remove, detect, or embed illegal watermark signals. Therefore, the aim of this contribution is to illustrate recent results of robust and secure watermarking to the signal processing community, and highlight both benefits and still open issues. Specifically, this paper is intended to introduce the concept of secure and robust digital watermarking system, and provide with problems and their countermeasures. First of all, the classic watermark model and cryptosystem will be reviewed and then, the concept of secure and robust digital watermarking system will be described. Next, the watermark attack will be classified and described. Finally, some countermeasures that can help to improve secure and robustness are considered. 展开更多
关键词 Terms--Countermeasures digital watermarking system robust SECURITY watermark attacks.
下载PDF
A Novel Video Data-Source Authentication Model Based on Digital Watermarking and MAC in Multicast
9
作者 ZHAO Anjun LU Xiangli GUO Lei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1257-1261,共5页
A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC o... A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC of the significant vid eo content, the key and instant authentication data is embedded into the insignificant video component by the MLUT (modified look-up table) video watermarking technology. We explain a method that does not require storage of each data packet for a time, thus making receiver not vulnerable to DOS (denial of service) attack. So the video packets can be authenticated instantly without large volume buffer in the receivers. TESLA (timed efficient stream loss tolerant authentication) does not explain how to select the suitable value for d, which is an important parameter in multicast source authentication. So we give a method to calculate the key disclosure delay (number of intervals). Simulation results show that the proposed algorithms improve the performance of data source authentication in multicast. 展开更多
关键词 video data authentication MULTICAST MAC(message authentication code) digital watermarking MLUT(modifled look-up table)
下载PDF
A Geometrical Transformations Resistant Digital Watermarking Based on Quantization
10
作者 SHILei HONGFan +2 位作者 LIUWei-qun HUYu-ping CHENZhuo 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期319-323,共5页
A geometrical transformations resistant digital image watermarking based on quantization is described. Taking advantage of the rotation, scale and translation invariants of discrete Fourier transform (DFT), each water... A geometrical transformations resistant digital image watermarking based on quantization is described. Taking advantage of the rotation, scale and translation invariants of discrete Fourier transform (DFT), each watermark bit is embedded into each homocentric circles around the zero frequency term in DFT domain by quantizing the magnitude vector of Fourier spectrum. The embedded sequence can be extracted by “majority principles” without restoring to the original unmarked image. The experimental results show that the watermark is invisible and robust to any combination of geometrical transformations or common image processing techniques. 展开更多
关键词 Key words digital watermarking QUANTIZATION geometrical transformation Fourier transform
下载PDF
Research on Digital Watermark Using Pre-Processing Technology
11
作者 FluGuo-bao NiuHui-fang +3 位作者 YangRui SunHong ShiHong-ling HuangTian-xi 《Wuhan University Journal of Natural Sciences》 CAS 2003年第03A期842-846,共5页
We have realized a watermark embedding system based on audio perceptual masking and brought forward a watermark detection system using pre\|processing technology. We can detect watermark from watermarked audio without... We have realized a watermark embedding system based on audio perceptual masking and brought forward a watermark detection system using pre\|processing technology. We can detect watermark from watermarked audio without original audio by using this method. The results have indicated that this embedding and detecting method is robust, on the premise of not affecting the hearing quality, it can resist those attacks such as MPEG compressing, filtering and adding white noise. 展开更多
关键词 digital watermark audio perceptual masking DFT(Discrete Fourier Transform) RLS adaptive filter
下载PDF
Digital Watermarking Scheme for Securing Textual Database Using Histogram Shifting Model
12
作者 Khalid A.El Drandaly Walid Khedr +1 位作者 Islam S.Mohamed Ayman Mohamed Mostafa 《Computers, Materials & Continua》 SCIE EI 2022年第6期5253-5270,共18页
Information security is one of the most important methods of protecting the confidentiality and privacy of internet users.The greater the volume of data,the more the need to increase the security methods for protectin... Information security is one of the most important methods of protecting the confidentiality and privacy of internet users.The greater the volume of data,the more the need to increase the security methods for protecting data from intruders.This task can be challenging for researchers in terms of managing enormous data and maintaining their safety and effectiveness.Protection of digital content is a major issue in maintaining the privacy and secrecy of data.Toward this end,digital watermarking is based on the concept of information security through the insertion and detection of an embedded watermark in an efficient manner.Recent methodologies in the research on digital watermarking result in data distortion after embedding the watermark.This scenario can reduce the efficiency of detecting watermarks as well as violate data confidentiality.This study adapts a robust reversible histogram shifting(HS)technique for textual data in relational databases.Furthermore,the study presents a digital watermarking scheme intended for document copyright protection and proof of ownership.The major advantage of the proposed watermarking scheme is that it can protect digital data and preserve data quality.To the best of our knowledge,this research methodology is promising for use in the HS expansion model for watermarking data on nonnumeric databases.In addition,the results showed that despite exposing the database to an insertion attacks at 50%and 75%of the watermark,the proposed algorithm can recovermore than half of the embedded watermark in all addition and alteration attacks cases.As a result,the watermark information can be retained and restored completely. 展开更多
关键词 Information security digital watermarking information hiding histogram shifting technique
下载PDF
Spread Spectrum Watermark Based on Wavelet Transform for Still Digital Image
13
作者 ShaoHai-mei MeiTian-can QinQian-qing 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第2期203-208,共6页
The proposed method inserts a watermark into the spectral components of the data using techniques analogous to spread spectrum communications, hiding a narrow band signal in a wideband channel. The watermark is diffic... The proposed method inserts a watermark into the spectral components of the data using techniques analogous to spread spectrum communications, hiding a narrow band signal in a wideband channel. The watermark is difficult for an attacker to remove. It is also robust to common signal and geometric distortion such as JPEG compression, cropping and scaling. In addition, the watermark can be extracted accurately without source host image at the receiver. Key words digital watermark - spread spectrum techniques - wavelet transform CLC number TN 911.73 - X 913. 2 Foundation item: Supported by Wuhan University Innovation Foundation (904270072)Biography: Shao Hai-mei (1975-), female, lecturer, research direction: wavelet application, image process, digital watermark. 展开更多
关键词 digital watermark spread spectrum techniques wavelet transform
下载PDF
Wavelet-based gray-level digital image watermarking
14
作者 牛夏牧 孙圣和 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2001年第2期111-115,共5页
The watermarking technique has been proposed as a method by hiding secret information into the image to protect the copyright of multimedia data. But most previous work focuses on the algorithms of embedding one dimen... The watermarking technique has been proposed as a method by hiding secret information into the image to protect the copyright of multimedia data. But most previous work focuses on the algorithms of embedding one dimensional watermarks or two dimensional binary digital watermarks. In this paper, a wavelet based method for embedding a gray level digital watermark into an image is proposed. By still image decomposition technique, a gray level digital watermark is decompounded into a series of bitplanes. By discrete wavelet transform ( DWT ), the host image is decomposed into multiresolution representations with hierarchical structure. The different bitplanes of the gray level watermark is embedded into the corresponding resolution of the decomposed host image. The experimental results show that the proposed techniques can successfully survive image processing operations and the lossy compression techniques such as Joint Photographic Experts Group (JPEG). 展开更多
关键词 digital watermarking discrete wavelet transform JPEG compression digital image processing
下载PDF
Efficient gray-level digital image watermarking based on vector quantization
15
作者 牛夏牧 孙圣和 陆哲明 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2001年第2期101-107,共7页
Digital watermarking has been presented as a new method for copyright protection by embedding a secret signal in a digital image or video sequence. Common digital image watermarking techniques are based on the concept... Digital watermarking has been presented as a new method for copyright protection by embedding a secret signal in a digital image or video sequence. Common digital image watermarking techniques are based on the concept of spread spectrum communications, which can be classified in two catalogues: spatial domain and transform domain based. Most of transform domain watermarking methods are based on discrete cosine transforms (DCT) and robust to JPEG lossy compression. Recently, digital image watermarking based on another important lossy compression technique, vector quantization (VQ), has been presented, which carries watermark information by codeword indices. It is secret and efficient, and is robust to VQ compression with the same codebook. However, the embedded information is less and the extraction process requires the original image. This paper presents a more efficient VQ based image watermarking method, which can embed a large gray level watermark into the original image with less extra distortion and perform the watermark extraction without the original image. In addition, the proposed watermarking algorithm is very secret because two keys are required for watermark extraction. Experimental results demonstrate the effectiveness of the proposed technique. 展开更多
关键词 Image processing vector quantization digital image watermarking
下载PDF
Image Betrayal Checking Based on the Digital Fingerprint of Images on the Internet
16
作者 余永升 陈晓苏 《Journal of Southwest Jiaotong University(English Edition)》 2010年第2期149-159,共11页
In the Internet environment, documents are easily leaked, and divulged files spread rapidly. Therefore, it is important for privacy institutions to actively check the documents on the Internet to find out whether some... In the Internet environment, documents are easily leaked, and divulged files spread rapidly. Therefore, it is important for privacy institutions to actively check the documents on the Internet to find out whether some private files have been leaked. In this paper, we put forward a scheme for active image betrayal checking on the Intemet based on the digital fingerprint, which embeds fingerprints into privacy documents, extracts codes from the Intemet images, and then fmds out the divulged files by matching two groups of codes. Due to so many documents on the Internet, the number of times of code comparison is huge, which leads to a large running time. To overcome the deficiency in practical application, we optimized the process by accurate matching methods and approximate matching method. Then a method was proposed to group objects by locality sensitive hashing (LSH) process before code comparison, in order to eliminate the vast majority of unrelated pairs. Experiments prove that this method could operate with less running time and less memory. 展开更多
关键词 Betrayal checking digital watermarking digital fingerprint Locality sensitive hashing (LSH)
下载PDF
A Robust Digital Watermarking Algorithm Based on Finite-Set Discrete Radon Transform Tight Frame
17
作者 Jiangui Zhang Huibin Qi 《Journal of Computer and Communications》 2020年第12期123-133,共11页
<div style="text-align:justify;"> Digital watermarking technology plays a powerful role in the effective protection of digital media copyright, image authentication, image sharing, image information tr... <div style="text-align:justify;"> Digital watermarking technology plays a powerful role in the effective protection of digital media copyright, image authentication, image sharing, image information transmission and other fields. Driven by strong demand, digital image watermarking technology has aroused widespread research interest and has gradually developed into one of the most active research directions in information science. In this paper, we present a novel robust digital watermarking algorithm based on discrete radon transform tight frame in finite-set (FDRT). FDRT of the zero mean image is a tight frame, the frame boundary <em><strong>A</strong></em> = <em><strong>B</strong></em> = 1, the dual of the frame is itself. The decomposition and reconstruction of the FDRT tight frame will not cause the phenomenon of image distortion. The embedding of hidden watermark is to add a weak signal to the strong background of the original image. Watermark extraction is to effectively identify the embedded weak signal. The feasibility of the watermarking algorithm is analyzed from two aspects of information hiding and robustness. We select the independent Gaussian random vector as the watermark series, and the peak signal-to-noise ratio (PSNR) as the visual degradation criterion of the watermark image. Basing the FDRT compact stand dual operator, we derived the relationship among the strength parameter, square sum of watermark series, the PSNR. Using Checkmark system, the simulation results show that the algorithm is robust enough to some very important image processing attacks such as lossy compression, MAP, filtering, segmentation, edge enhancement, jitter, quadratic modulation and general geometric attack (scaling, rotation, shearing), etc. </div> 展开更多
关键词 digital Watermarking Data Mining Discrete Radon Transform Tight Frame Copyright Protection Information Hiding Finite-Set
下载PDF
Object-Oriented Wavelet-Layered Digital Watermarking Technique
18
作者 刘晓云 虞厥邦 李明玉 《Journal of Electronic Science and Technology of China》 2005年第2期116-119,共4页
In this paper, an object-oriented digital watermarking technique is proposed in the wavelet domain for still images. According to the difference of recognition degree of the human eye to the different region of the im... In this paper, an object-oriented digital watermarking technique is proposed in the wavelet domain for still images. According to the difference of recognition degree of the human eye to the different region of the image, the image is divided into the interested region and uninterested region of human eye vision in this scheme. Using the relativity of position and the difference to ocular sensitivity of the multiresolution wavelet among each subband, the image is processed with layered watermarking append technique. Experimental results show that the proposed technique successfully survives image processing operations, additive noise and JPEG compression. 展开更多
关键词 digital watermarking OBJECT-ORIENTED wavelet transformation ocular masking
下载PDF
New Fragile Watermarking Technique to Identify Inserted Video Objects Using H.264 and Color Features
19
作者 Raheem Ogla Eman Shakar Mahmood +1 位作者 Rasha I.Ahmed Abdul Monem S.Rahma 《Computers, Materials & Continua》 SCIE EI 2023年第9期3075-3096,共22页
The transmission of video content over a network raises various issues relating to copyright authenticity,ethics,legality,and privacy.The protection of copyrighted video content is a significant issue in the video ind... The transmission of video content over a network raises various issues relating to copyright authenticity,ethics,legality,and privacy.The protection of copyrighted video content is a significant issue in the video industry,and it is essential to find effective solutions to prevent tampering and modification of digital video content during its transmission through digital media.However,there are stillmany unresolved challenges.This paper aims to address those challenges by proposing a new technique for detectingmoving objects in digital videos,which can help prove the credibility of video content by detecting any fake objects inserted by hackers.The proposed technique involves using two methods,the H.264 and the extraction color features methods,to embed and extract watermarks in video frames.The study tested the performance of the system against various attacks and found it to be robust.The evaluation was done using different metrics such as Peak-Signal-to-Noise Ratio(PSNR),Mean Squared Error(MSE),Structural Similarity Index Measure(SSIM),Bit Correction Ratio(BCR),and Normalized Correlation.The accuracy of identifying moving objects was high,ranging from 96.3%to 98.7%.The system was also able to embed a fragile watermark with a success rate of over 93.65%and had an average capacity of hiding of 78.67.The reconstructed video frames had high quality with a PSNR of at least 65.45 dB and SSIMof over 0.97,making them imperceptible to the human eye.The system also had an acceptable average time difference(T=1.227/s)compared with other state-of-the-art methods. 展开更多
关键词 Video watermarking fragile digital watermark copyright protection moving objects color image features H.264
下载PDF
A Multi-Stage Security Solution for Medical Color Images in Healthcare Applications
20
作者 Walid El-Shafai Fatma Khallaf +2 位作者 El-Sayed M.El-Rabaie Fathi E.Abd El-Samie Iman Almomani 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3599-3618,共20页
This paper presents a robust multi-stage security solution based on fusion,encryption,and watermarking processes to transmit color healthcare images,efficiently.The presented solution depends on the features of discre... This paper presents a robust multi-stage security solution based on fusion,encryption,and watermarking processes to transmit color healthcare images,efficiently.The presented solution depends on the features of discrete cosine transform(DCT),lifting wavelet transform(LWT),and singular value decomposition(SVD).The primary objective of this proposed solution is to ensure robustness for the color medical watermarked images against transmission attacks.During watermark embedding,the host color medical image is transformed into four sub-bands by employing three stages of LWT.The resulting low-frequency sub-band is then transformed by employing three stages of DCT followed by SVD operation.Furthermore,a fusion process is used for combining different watermarks into a single watermark image.This single fused image is then ciphered using Deoxyribose Nucleic Acid(DNA)encryption to strengthen the security.Then,the DNA-ciphered fused watermark is embedded in the host medical image by applying the suggested watermarking technique to obtain the watermarked image.The main contribution of this work is embedding multiple watermarks to prevent identity theft.In the presence of different multimedia attacks,several simulation tests on different colormedical images have been performed.The results prove that the proposed security solution achieves a decent imperceptibility quality with high Peak Signal-to-Noise Ratio(PSNR)values and high correlation between the extracted and original watermark images.Moreover,the watermark image extraction process succeeds in achieving high efficiency in the presence of attacks compared with related works. 展开更多
关键词 Medical images DNA encryption digital image watermarking FUSION healthcare applications
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部