期刊文献+
共找到513篇文章
< 1 2 26 >
每页显示 20 50 100
Reversible Semi-Fragile Watermarking Technique for Integrity Control of Relational Database
1
作者 Ali Hamadou Abdoul Aziz Issaka Hassane +1 位作者 Lanciné Camara Harouna Naroua 《Engineering(科研)》 2024年第9期309-323,共15页
Reversible watermarking schemes for relational database are usually classified into two groups: robust schemes and fragile schemes. The main limitation of existing reversible fragile methods is that they cannot differ... Reversible watermarking schemes for relational database are usually classified into two groups: robust schemes and fragile schemes. The main limitation of existing reversible fragile methods is that they cannot differentiate between legal and malicious modifications. In this paper, we introduce a novel lossless semi-fragile scheme based on prediction-error expansion for content protection of relational database. In the proposed method, all attributes in a database relation are first classified according to their sensitivity to legitimate updates. Then, the watermark is embedded by expanding the prediction error of the two least significant digits of securely selected attributes. At watermark extraction, the proposed method has the ability to fully restore the original data while detecting and localizing tampering. The applicability of our method is demonstrated theoretically and experimentally. 展开更多
关键词 semi-fragile watermarking Integrity Control REVERSIBILITY Prediction-Error Expansion
下载PDF
Semi-Fragile Audio Watermarking Algorithm in DWT Domain 被引量:3
2
作者 LEI Min YANG Yu +1 位作者 LUO Shoushan NIU Xinxin 《China Communications》 SCIE CSCD 2010年第4期71-75,共5页
A novel semi-fragile audio watermarking algorithm in DWT domain is proposed in this paper.This method transforms the original audio into 3-layer wavelet domain and divides approximation wavelet coefficients into many ... A novel semi-fragile audio watermarking algorithm in DWT domain is proposed in this paper.This method transforms the original audio into 3-layer wavelet domain and divides approximation wavelet coefficients into many groups.Through computing mean quantization of per group,this algorithm embeds the watermark signal into the average value of the wavelet coefficients.Experimental results show that our semi-fragile audio watermarking algorithm is not only inaudible and robust against various common images processing,but also fragile to malicious modification.Especially,it can detect the tampered regions effectively. 展开更多
关键词 semi-fragile watermarking Wavelet Transform Mean Quantization Tamper Detection
下载PDF
SEMI-FRAGILE WATERMARKING ALGORITHM FOR IMAGE TAMPERS LOCALIZATION AND RECOVERY 被引量:2
3
作者 Jiang Xuemei Liu Quan 《Journal of Electronics(China)》 2008年第3期343-351,共9页
Two watermarks are embedded into the original image. One is the authentication watermark generated by secret key, which is embedded into the sub-LSB (Least Significant Bit) of the original image for tamper localizat... Two watermarks are embedded into the original image. One is the authentication watermark generated by secret key, which is embedded into the sub-LSB (Least Significant Bit) of the original image for tamper localization; the other is the recovery watermark for tamper recovering. The original image is divided into 8 x 8 blocks and each block is transformed by Discrete Cosine Transform (DCT). For each block, some lower frequency DCT coefficients are chosen to be quantized and binary encoded so as to gain the recovery watermark of each block, and the recovery watermark is embedded into the LSB of another block by chaos encryption and authentication chain technology. After the two watermarks being detected, the location of any minute changes in image can be detected, and the tampered image data can be recovered effectively. In the paper, the number of coefficients and their bit lengths are carefully chosen in order to satisfy with the payload of each block and gain the capability of self-recovering. The proposed algorithm can well resist against possible forged attacks. Experimental results show that the watermark generated by the proposed algorithm is sensitive to tiny changes in images, and it has higher accuracy of tamper localization and good capability of the tamper recovery. 展开更多
关键词 Image authentication Tamper localization Image recovery semi-fragile watermark
下载PDF
A new semi-fragile watermarking algorithm for image authentication 被引量:1
4
作者 韩德志 《Journal of Chongqing University》 CAS 2005年第1期41-46,共6页
This paper presents a new semi-fragile watermarking algorithm for image authentication which extracts image features from the low frequency domain to generate two watermarks: one for classifying of the intentional con... This paper presents a new semi-fragile watermarking algorithm for image authentication which extracts image features from the low frequency domain to generate two watermarks: one for classifying of the intentional content modification and the other for indicating the modified location. The algorithm provides an effective mechanism for image authentication. The watermark generation and watermark embedment are disposed in the image itself, and the received image authentication needs no information about the original image or watermark. The algorithm increases watermark security and prevents forged watermark. Experimental results show that the algorithm can identify intentional content modification and incidental tampering, and also indicate the location where a modification takes place. 展开更多
关键词 AUTHENTICATION semi-fragile watermarking FRAGILITY wavelet transform
下载PDF
A Weighted Algorithm for Watermarking Relational Databases 被引量:2
5
作者 CUI Xinchun QIN Xiaolin SHENG Gang 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期79-82,共4页
A weighted algorithm for watermarking relational databases for copyright protection is presented. The possibility of watermarking an attribute is assigned according to its weight decided by the owner of the database. ... A weighted algorithm for watermarking relational databases for copyright protection is presented. The possibility of watermarking an attribute is assigned according to its weight decided by the owner of the database. A one-way hash function and a secret key known only to the owner of the data are used to select tuples and bits to mark. By assigning high weight to significant attributes, the scheme ensures that important attributes take more chance to be marked than less important ones. Experimental results show that the proposed scheme is robust against various forms of attacks, and has perfect immunity to subset attack. 展开更多
关键词 weighted algorithm watermarking relational databases copyright protection
下载PDF
Secure Transmission of Compressed Medical Image Sequences on Communication Networks Using Motion Vector Watermarking
6
作者 Rafi Ullah Mohd Hilmi bin Hasan +1 位作者 Sultan Daud Khan Mussadiq Abdul Rahim 《Computers, Materials & Continua》 SCIE EI 2024年第3期3283-3301,共19页
Medical imaging plays a key role within modern hospital management systems for diagnostic purposes.Compression methodologies are extensively employed to mitigate storage demands and enhance transmission speed,all whil... Medical imaging plays a key role within modern hospital management systems for diagnostic purposes.Compression methodologies are extensively employed to mitigate storage demands and enhance transmission speed,all while upholding image quality.Moreover,an increasing number of hospitals are embracing cloud computing for patient data storage,necessitating meticulous scrutiny of server security and privacy protocols.Nevertheless,considering the widespread availability of multimedia tools,the preservation of digital data integrity surpasses the significance of compression alone.In response to this concern,we propose a secure storage and transmission solution for compressed medical image sequences,such as ultrasound images,utilizing a motion vector watermarking scheme.The watermark is generated employing an error-correcting code known as Bose-Chaudhuri-Hocquenghem(BCH)and is subsequently embedded into the compressed sequence via block-based motion vectors.In the process of watermark embedding,motion vectors are selected based on their magnitude and phase angle.When embedding watermarks,no specific spatial area,such as a region of interest(ROI),is used in the images.The embedding of watermark bits is dependent on motion vectors.Although reversible watermarking allows the restoration of the original image sequences,we use the irreversible watermarking method.The reason for this is that the use of reversible watermarks may impede the claims of ownership and legal rights.The restoration of original data or images may call into question ownership or other legal claims.The peak signal-to-noise ratio(PSNR)and structural similarity index(SSIM)serve as metrics for evaluating the watermarked image quality.Across all images,the PSNR value exceeds 46 dB,and the SSIM value exceeds 0.92.Experimental results substantiate the efficacy of the proposed technique in preserving data integrity. 展开更多
关键词 Block matching algorithm(BMA) compression full-search algorithm motion vectors ultrasound image sequence watermarking
下载PDF
A blind watermarking algorithm based on DWT and SVD 被引量:2
7
作者 XUAN Chun-qing XUAN Zhi-wei +1 位作者 ZHANG Xia CHEN Bao-li 《Journal of Measurement Science and Instrumentation》 CAS 2014年第2期31-35,共5页
This paper presents a new digital image blind watermarking algorithm based on combination of discrete wavelet transform (DWT) and singular value decomposition (SVD). First of all, we make wavelet decomposition for... This paper presents a new digital image blind watermarking algorithm based on combination of discrete wavelet transform (DWT) and singular value decomposition (SVD). First of all, we make wavelet decomposition for the original image and divide the acquired low frequency sub-band into blocks. Then we make singular value decomposition for each block and embed the watermark information in the largest singular value by quantitative method. The watermark can be extracted without the original image. The experimental results show that the algorithm has a good imperceptibility and robustness. 展开更多
关键词 discrete wavelet transform singular value decomposition a blind watermarking algorithm ROBUSTNESS
下载PDF
New Optimal DWT Domain Image Watermarking Technique via Genetic Algorithm
8
作者 钟宁 匡镜明 何遵文 《Journal of Beijing Institute of Technology》 EI CAS 2007年第4期465-470,共6页
A novel optimal image watermarking scheme is proposed in which the genetic algorithm (GA) is employed to obtain the improvement of algorithm performance. Arnold transform is utilized to obtain the scrambled watermark,... A novel optimal image watermarking scheme is proposed in which the genetic algorithm (GA) is employed to obtain the improvement of algorithm performance. Arnold transform is utilized to obtain the scrambled watermark, and then the embedding and extraction of watermark are implemented in digital wavelet transform (DWT) domain. During the watermarking process, GA is employed to search optimal parameters of embedding strength and times of Arnold transform to gain the optimization of watermarking performance. Simulation results show that the proposed method can improve the quality of watermarked image and give almost the same robustness of the watermark. 展开更多
关键词 image watermarking genetic algorithm (GA) digital wavelet transform (DWT)
下载PDF
Audio Watermarking Using Wavelet Transform and Genetic Algorithm for Realizing High Tolerance to MP3 Compression
9
作者 Shinichi Murata Yasunari Yoshitomi Hiroaki Ishii 《Journal of Information Security》 2011年第3期99-112,共14页
Recently, several digital watermarking techniques have been proposed for hiding data in the frequency domain of audio signals to protect the copyrights. However, little attention has been given to the optimal position... Recently, several digital watermarking techniques have been proposed for hiding data in the frequency domain of audio signals to protect the copyrights. However, little attention has been given to the optimal position in the frequency domain for embedding watermarks. In general, there is a tradeoff between the quality of the watermarked audio and the tolerance of watermarks to signal processing methods, such as compression. In the present study, a watermarking method developed for a visual image by using a wavelet transform was applied to an audio clip. We also improved the performance of both the quality of the watermarked audio and the extraction of watermarks after compression by the MP3 technique. To accomplish this, we created a multipurpose optimization problem for deciding the positions of watermarks in the frequency domain and obtaining a near-optimum solution. The near-optimum solution is obtained by using a genetic algorithm. The experimental results show that the proposed method generates watermarked audios of good quality and high tolerance to MP3 compression. In addition, the security was improved by using the characteristic secret key to embed and extract the watermark information. 展开更多
关键词 AUDIO watermarking GENETIC algorithm Optimization WAVELET Transforms SECRET Key
下载PDF
Reversible Digital Image Watermarking Scheme Using Bit Replacement and Majority Algorithm Technique
10
作者 Koushik Pal Goutam Ghosh Mahua Bhattacharya 《Journal of Intelligent Learning Systems and Applications》 2012年第3期199-206,共8页
The current paper presents a new digital watermarking method through bit replacement technology, which stores mul-tiple copies of the same data that is to be hidden in a scrambled form in the cover image. In this pape... The current paper presents a new digital watermarking method through bit replacement technology, which stores mul-tiple copies of the same data that is to be hidden in a scrambled form in the cover image. In this paper an indigenous approach is described for recovering the data from the damaged copies of the data under attack by applying a majority algorithm to find the closest twin of the embedded information. A new type of non-oblivious detection method is also proposed. The improvement in performance is supported through experimental results which show much enhancement in the visual and statistical invisibility of hidden data. 展开更多
关键词 Additive Noise Salt and PEPPER Noise Compression Filtering AVERAGING Multiple watermarking MAJORITY algorithm
下载PDF
A New Image Watermarking Scheme Using Genetic Algorithm and Residual Numbers with Discrete Wavelet Transform
11
作者 Peter Awonnatemi Agbedemnab Mohammed Akolgo Moses Apambila Agebure 《Journal of Information Security》 2023年第4期422-436,共15页
Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presen... Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presents a new digital watermarking scheme that combines some operators of the Genetic Algorithm (GA) and the Residue Number (RN) System (RNS) to perform encryption on an image, which is embedded into a cover image for the purposes of watermarking. Thus, an image watermarking scheme uses an encrypted image. The secret image is embedded in decomposed frames of the cover image achieved by applying a three-level Discrete Wavelet Transform (DWT). This is to ensure that the secret information is not exposed even when there is a successful attack on the cover information. Content creators can prove ownership of the multimedia content by unveiling the secret information in a court of law. The proposed scheme was tested with sample data using MATLAB2022 and the results of the simulation show a great deal of imperceptibility and robustness as compared to similar existing schemes. 展开更多
关键词 Discrete Wavelet Transform (DWT) Digital watermarking Encryption Genetic algorithm (GA) Residue Number System (RNS) GARN
下载PDF
A Robust Watermarking Scheme Based on ROI and IWT for Remote Consultation of COVID-19 被引量:4
12
作者 Xiaorui Zhang Wenfang Zhang +2 位作者 Wei Sun Tong Xu Sunil Kumar Jha 《Computers, Materials & Continua》 SCIE EI 2020年第9期1435-1452,共18页
In the current dire situation of the corona virus COVID-19,remote consultations were proposed to avoid cross-infection and regional differences in medical resources.However,the safety of digital medical imaging in rem... In the current dire situation of the corona virus COVID-19,remote consultations were proposed to avoid cross-infection and regional differences in medical resources.However,the safety of digital medical imaging in remote consultations has also attracted more and more attention from the medical industry.To ensure the integrity and security of medical images,this paper proposes a robust watermarking algorithm to authenticate and recover from the distorted medical images based on regions of interest(ROI)and integer wavelet transform(IWT).First,the medical image is divided into two different parts,regions of interest and non-interest regions.Then the integrity of ROI is verified using the hash algorithm,and the recovery data of the ROI region is calculated at the same time.Also,binary images with the basic information of patients are processed by logistic chaotic map encryption,and then the synthetic watermark is embedded in the medical carrier image using IWT transform.The performance of the proposed algorithm is tested by the simulation experiments based on the MATLAB program in CT images of the lungs.Experimental results show that the algorithm can precisely locate the distorted areas of an image and recover the original ROI on the basis of verifying image reliability.The maximum peak signal to noise ratio(PSNR)value of 51.24 has been achieved,which proves that the watermark is invisible and has strong robustness against noise,compression,and filtering attacks. 展开更多
关键词 Digital watermarking LOGISTIC hash algorithm ROI IWT
下载PDF
QIM digital watermarkingbased on LDPC code and messagepassingunder scalingattacks
13
作者 崔鑫 颜斌 +1 位作者 贾霞 王亚菲 《Journal of Measurement Science and Instrumentation》 CAS 2014年第1期37-40,共4页
Watermarking system based on quantization index modulation (QIM) is increasingly popular in high payload applications,but it is inherently fragile against amplitude scaling attacks.In order to resist desynchronizati... Watermarking system based on quantization index modulation (QIM) is increasingly popular in high payload applications,but it is inherently fragile against amplitude scaling attacks.In order to resist desynchronization attacks of QIM digital watermarking,a low density parity check (LDPC) code-aided QIM watermarking algorithm is proposed,and the performance of QIM watermarking system can be improved by incorporating LDPC code with message passing estimation/detection framework.Using the theory of iterative estimation and decoding,the watermark signal is decoded by the proposed algorithm through iterative estimation of amplitude scaling parameters and decoding of watermark.The performance of the proposed algorithm is closer to the dirty paper Shannon limit than that of repetition code aided algorithm when the algorithm is attacked by the additive white Gaussian noise.For constant amplitude scaling attacks,the proposed algorithm can obtain the accurate estimation of amplitude scaling parameters.The simulation result shows that the algorithm can obtain similar performance compared to the algorithm without desynchronization. 展开更多
关键词 digital watermarking quantization index modulation (QIM) message passing algorithm based on factor graph low density parity check (LDPC) code amplitude scaling attack
下载PDF
An H.264/AVC Video Watermarking Scheme in VLC Domain for Content Authentication 被引量:1
14
作者 Sun Tanfeng Jiang Xinghao +3 位作者 Lin Zhigao Zhou Yue Lu Huan Wang Shilin 《China Communications》 SCIE CSCD 2010年第6期30-36,共7页
A semi-fragile content authentication algorithm is proposed for low bit-rate H.264/AVC video in VLC domain. Utilizing the intra prediction mode and coded block pattern in VLC domain, the proposed algorithm chooses tho... A semi-fragile content authentication algorithm is proposed for low bit-rate H.264/AVC video in VLC domain. Utilizing the intra prediction mode and coded block pattern in VLC domain, the proposed algorithm chooses those macro-blocks from which the signature is extracted and constructs content signature at macro-block level according to the relationship among the energies of quantized low-frequency coefficients of sub-macroblocks. The signature is embedded by modifying the trailing coefficients. The experimental results show that the proposed algorithm performs well in visual quality impact and keep the bit-rate basically unchanged. In addition, the algorithm can embed signatures into I, P, B slices simultaneously and remarkably enhances the watermark capacity. By verifying the extracted signature, the algorithm can detect and locate video tampering efficiently. 展开更多
关键词 H.264/AVC video watermarking content authentication VLC domain semi-fragile watermarking
下载PDF
On Secure Digital Image Watermarking Techniques 被引量:2
15
作者 Manjit Thapa Sandeep Kumar Sood 《Journal of Information Security》 2011年第4期169-184,共16页
Digital watermarking is used to hide the information inside a signal, which can not be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different f... Digital watermarking is used to hide the information inside a signal, which can not be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the signal but protect the ownership of the content. One of the current research areas is to protect digital watermark inside the information so that ownership of the information cannot be claimed by third party. With a lot of information available on various search engines, to protect the ownership of information is a crucial area of research. In latest years, several digital watermarking techniques are presented based on discrete cosine transform (DCT), discrete wavelets transform (DWT) and discrete fourier transforms (DFT). In this paper, we propose an algorithm for digital image watermarking technique based on singular value decomposition;both of the L and U components are explored for watermarking algorithm. This technique refers to the watermark embedding algorithm and watermark extracting algorithm. The experimental results prove that the quality of the watermarked image is excellent and there is strong resistant against many geometrical attacks. 展开更多
关键词 Digital Image watermarking SINGULAR Value Decomposition watermark Embedding algorithm watermark EXTRACTING algorithm Ratio ANALYSIS Security ANALYSIS
下载PDF
Embedding and Extracting Digital Watermark Based on DCT Algorithm 被引量:1
16
作者 Haiming Li Xiaoyun Guo 《Journal of Computer and Communications》 2018年第11期287-298,共12页
The principle of digital watermark is the method of adding digital watermark in the frequency domain. The digital watermark hides the watermark in digital media, such as image, voice, video, etc., so as to realize the... The principle of digital watermark is the method of adding digital watermark in the frequency domain. The digital watermark hides the watermark in digital media, such as image, voice, video, etc., so as to realize the functions of copyright protection, and identity recognition. DCT for Discrete Cosine Transform is used to transform the image pixel value and the frequency domain coefficient matrix to realize the embedding and extracting of the blind watermark in the paper. After success, the image is attacked by white noise and Gaussian low-pass filtering. The result shows that the watermark signal embedded based on the DCT algorithm is relatively robust, and can effectively resist some attack methods that use signal distortion to destroy the watermark, and has good robustness and imperceptibility. 展开更多
关键词 Digital watermark DCT algorithm White Noise GAUSSIAN LOW-PASS Filtering Robustness IMPERCEPTIBILITY
下载PDF
High Efficiency Crypto-Watermarking System Based on Clifford-Multiwavelet for 3D Meshes Security
17
作者 Wajdi Elhamzi Malika Jallouli Yassine Bouteraa 《Computers, Materials & Continua》 SCIE EI 2022年第11期4329-4347,共19页
Since 3D mesh security has become intellectual property,3D watermarking algorithms have continued to appear to secure 3D meshes shared by remote users and saved in distant multimedia databases.The novelty of our appro... Since 3D mesh security has become intellectual property,3D watermarking algorithms have continued to appear to secure 3D meshes shared by remote users and saved in distant multimedia databases.The novelty of our approach is that it uses a new Clifford-multiwavelet transform to insert copyright data in a multiresolution domain,allowing us to greatly expand the size of the watermark.After that,our method does two rounds of insertion,each applying a different type of Clifford-wavelet transform.Before being placed into the Clifford-multiwavelet coefficients,the watermark,which is a mixture of the mesh description,source mesh signature(produced using SHA512),and a logo encrypted using the RSA(Ronald Shamir Adleman)technique,is encoded using Turbo-code.Using the Least Significant Bit method steps,data embedding involves modulation and insertion processes.Finally,the watermarked mesh is reconstructed using the inverse Cliffordmultiwavelet transform.Due to the utilization of a hybrid insertion domain,our technique has demonstrated a very high insertion rate while retaining mesh quality.The mesh is watermarked,and the extracted data is acquired in real-time.Our approach is also resistant to the most common types of attacks.Our findings reveal that the current approach improves on previous efforts. 展开更多
关键词 Digital watermarking Clifford-multiwavelet transform Multiwavelet entropy LSB method RSA algorithm RSA algorithm Turbocode 3D multiresolution meshes
下载PDF
Watermarking Images in the Frequency Domain by Exploiting Self-Inverting Permutations
18
作者 Maria Chroni Angelos Fylakis Stavros D. Nikolopoulos 《Journal of Information Security》 2013年第2期80-91,共12页
In this work we propose efficient codec algorithms for watermarking images that are intended for uploading on the web under intellectual property protection. Headed to this direction, we recently suggested a way in wh... In this work we propose efficient codec algorithms for watermarking images that are intended for uploading on the web under intellectual property protection. Headed to this direction, we recently suggested a way in which an integer number w which being transformed into a self-inverting permutation, can be represented in a two dimensional (2D) object and thus, since images are 2D structures, we have proposed a watermarking algorithm that embeds marks on them using the 2D representation of w in the spatial domain. Based on the idea behind this technique, we now expand the usage of this concept by marking the image in the frequency domain. In particular, we propose a watermarking technique that also uses the 2D representation of self-inverting permutations and utilizes marking at specific areas thanks to partial modifications of the image’s Discrete Fourier Transform (DFT). Those modifications are made on the magnitude of specific frequency bands and they are the least possible additive information ensuring robustness and imperceptiveness. We have experimentally evaluated our algorithms using various images of different characteristics under JPEG compression. The experimental results show an improvement in comparison to the previously obtained results and they also depict the validity of our proposed codec algorithms. 展开更多
关键词 watermarking Techniques Image watermarking algorithms Self-Inverting PERMUTATIONS 2D REPRESENTATIONS of PERMUTATIONS ENCODING DECODING Frequency Domain Experimental Evaluation
下载PDF
A robust tensor watermarking algorithm for diffusion-tensor images
19
作者 Chengmeng LIU Zhi LI +1 位作者 Guomei WANG Long ZHENG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2024年第3期384-397,共14页
Watermarking algorithms that use convolution neural networks have exhibited good robustness in studies of deep learning networks.However,after embedding watermark signals by convolution,the feature fusion eficiency of... Watermarking algorithms that use convolution neural networks have exhibited good robustness in studies of deep learning networks.However,after embedding watermark signals by convolution,the feature fusion eficiency of convolution is relatively low;this can easily lead to distortion in the embedded image.When distortion occurs in medical images,especially in diffusion tensor images(DTIs),the clinical value of the DTI is lost.To address this issue,a robust watermarking algorithm for DTIs implemented by fusing convolution with a Transformer is proposed to ensure the robustness of the watermark and the consistency of sampling distance,which enhances the quality of the reconstructed image of the watermarked DTIs after embedding the watermark signals.In the watermark-embedding network,Ti-weighted(Tlw)images are used as prior knowledge.The correlation between T1w images and the original DTI is proposed to calculate the most significant features from the T1w images by using the Transformer mechanism.The maximum of the correlation is used as the most significant feature weight to improve the quality of the reconstructed DTI.In the watermark extraction network,the most significant watermark features from the watermarked DTI are adequately learned by the Transformer to robustly extract the watermark signals from the watermark features.Experimental results show that the average peak signal-to-noise ratio of the watermarked DTI reaches 50.47 dB,the diffusion characteristics such as mean diffusivity and fractional anisotropy remain unchanged,and the main axis deflection angleαAc is close to 1.Our proposed algorithm can effectively protect the copyright of the DTI and barely affects the clinical diagnosis. 展开更多
关键词 Robust watermarking algorithm Transformer Image reconstruction Diffusion tensor images Soft attention Hard attention Tl-weighted images
原文传递
Image Authentication Based on Digital Signatureand Semi-Fragile Watermarking 被引量:1
20
作者 Hong-BinZhang ChengYang Xiao-MeiQuan 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第6期752-759,共8页
This paper proposes an authentication scheme for JPEG images based on digital signature and semi-fragile watermarking. It can detect and locate malicious manipulations made to the image, and verify the ownership of th... This paper proposes an authentication scheme for JPEG images based on digital signature and semi-fragile watermarking. It can detect and locate malicious manipulations made to the image, and verify the ownership of the image at the same time. The algorithm uses the invariance of the order relationship between two DCT coefficients before and after JPEG compression to embed image content dependent watermark, therefore the watermark can survive the JPEG lossy compression. Since the scheme is based on the security of the cryptographic hash function and public key algorithm, it is believed to be secure to the extent that cryptography is believed to be. Theoretical analysis and experimental results show that the proposed scheme has the desired property and good performance for image authentication. 展开更多
关键词 image authentication semi-fragile watermarking JPEG digital signature
原文传递
上一页 1 2 26 下一页 到第
使用帮助 返回顶部