期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A Secure Watermarking Algorithm Based on Coupled Map Lattice
1
作者 易翔 王蔚然 《Journal of Electronic Science and Technology of China》 2005年第1期27-29,56,共4页
Based on the nonlinear theory, a secure watermarking algorithm using wavelet transform and coupled map lattice is presented. The chaos is sensitive to initial conditions and has a good non-relevant correlation propert... Based on the nonlinear theory, a secure watermarking algorithm using wavelet transform and coupled map lattice is presented. The chaos is sensitive to initial conditions and has a good non-relevant correlation property, but the finite precision effect limits its application in practical digital watermarking system. To overcome the undesirable short period of chaos mapping and improve the security level of watermarking, the hyper-chaotic sequence is adopted in this algorithm. The watermark is mixed with the hyper-chaotic sequence and embedded in the wavelet domain of the host image. Experimental results and analysis are given to demonstrate that the proposed watermarking algorithm is transparent, robust and secure. 展开更多
关键词 digital watermarking coupled map lattice secure watermarking wavelet transform
下载PDF
Data Secure Transmission Model Based on Compressed Sensing and Digital Watermarking Technology
2
作者 WANG Chundong BAI Yi MO Xiuliang 《Wuhan University Journal of Natural Sciences》 CAS 2014年第6期505-511,共7页
Since the Internet of Things(IoT) secret information is easy to leak in data transfer,a data secure transmission model based on compressed sensing(CS) and digital watermarking technology is proposed here. Firstly,... Since the Internet of Things(IoT) secret information is easy to leak in data transfer,a data secure transmission model based on compressed sensing(CS) and digital watermarking technology is proposed here. Firstly, for node coding end, the digital watermarking technology is used to embed secret information in the conventional data carrier. Secondly, these data are reused to build the target transfer data by the CS algorithm which are called observed signals. Thirdly, these signals are transmitted to the base station through the wireless channel. After obtaining these observed signals, the decoder reconstructs the data carrier containing privacy information. Finally, the privacy information is obtained by digital watermark extraction algorithm to achieve the secret transmission of signals. By adopting the watermarking and compression sensing to hide secret information in the end of node code, the algorithm complexity and energy consumption are reduced. Meanwhile, the security of secret information is increased.The simulation results show that the method is able to accurately reconstruct the original signal and the energy consumption of the sensor node is also reduced significantly in consideration of the packet loss. 展开更多
关键词 the Internet of Things(IoT) data security com pressed sensing(CS) digital watermarking information privacy
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部