期刊文献+
共找到1,406篇文章
< 1 2 71 >
每页显示 20 50 100
Digital Watermarking Secure Scheme for Remote Sensing Image Protection 被引量:7
1
作者 Guanghui Yuan Qi Hao 《China Communications》 SCIE CSCD 2020年第4期88-98,共11页
As a means of copyright protection for multimedia data, digital watermarking technology has attracted more and more attention in various research fields. Researchers have begun to explore the feasibility of applying i... As a means of copyright protection for multimedia data, digital watermarking technology has attracted more and more attention in various research fields. Researchers have begun to explore the feasibility of applying it to remote sensing data recently. Because of the particularity of remote sensing image, higher requirements are put forward for its security and management, especially for the copyright protection, illegal use and authenticity identification of remote sensing image data. Therefore, this paper proposes to use image watermarking technology to achieve comprehensive security protection of remote sensing image data, while the use of cryptography technology increases the applicability and security of watermarking technology. The experimental results show that the scheme of remote sensing image digital watermarking technology has good performance in the imperceptibility and robustness of watermarking. 展开更多
关键词 data security WATERMARK REMOTE sensing image protection
下载PDF
NEW APPROACH TO COPYRIGHT PROTECTION OF IMAGE AGAINST GEOMETRICAL ATTACKS
2
作者 郝红杰 吴一全 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2007年第4期335-342,共8页
To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in ... To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression. 展开更多
关键词 image copyright protection digital watermarking geometrical attack Krawtchouk moment invariant
下载PDF
Privacy Protection for Medical Images Based on DenseNet and Coverless Steganography 被引量:2
3
作者 Yun Tan Jiaohua Qin +3 位作者 Hao Tang Xuyu Xiang Ling Tan Neal NXiong 《Computers, Materials & Continua》 SCIE EI 2020年第9期1797-1817,共21页
With the development of the internet of medical things(IoMT),the privacy protection problem has become more and more critical.In this paper,we propose a privacy protection scheme for medical images based on DenseNet a... With the development of the internet of medical things(IoMT),the privacy protection problem has become more and more critical.In this paper,we propose a privacy protection scheme for medical images based on DenseNet and coverless steganography.For a given group of medical images of one patient,DenseNet is used to regroup the images based on feature similarity comparison.Then the mapping indexes can be constructed based on LBP feature and hash generation.After mapping the privacy information with the hash sequences,the corresponding mapped indexes of secret information will be packed together with the medical images group and released to the authorized user.The user can extract the privacy information successfully with a similar method of feature analysis and index construction.The simulation results show good performance of robustness.And the hiding success rate also shows good feasibility and practicability for application.Since the medical images are kept original without embedding and modification,the performance of crack resistance is outstanding and can keep better quality for diagnosis compared with traditional schemes with data embedding. 展开更多
关键词 Privacy protection medical image coverless steganography DenseNet LBP
下载PDF
A Dual Model Watermarking Framework for Copyright Protection in Image Processing Networks 被引量:1
4
作者 Yuhang Meng Xianyi Chen +2 位作者 Xingming Sun Yu Liu Guo Wei 《Computers, Materials & Continua》 SCIE EI 2023年第4期831-844,共14页
Image processing networks have gained great success in many fields,and thus the issue of copyright protection for image processing networks hasbecome a focus of attention. Model watermarking techniques are widely used... Image processing networks have gained great success in many fields,and thus the issue of copyright protection for image processing networks hasbecome a focus of attention. Model watermarking techniques are widely usedin model copyright protection, but there are two challenges: (1) designinguniversal trigger sample watermarking for different network models is stilla challenge;(2) existing methods of copyright protection based on trigger swatermarking are difficult to resist forgery attacks. In this work, we propose adual model watermarking framework for copyright protection in image processingnetworks. The trigger sample watermark is embedded in the trainingprocess of the model, which can effectively verify the model copyright. And wedesign a common method for generating trigger sample watermarks based ongenerative adversarial networks, adaptively generating trigger sample watermarksaccording to different models. The spatial watermark is embedded intothe model output. When an attacker steals model copyright using a forgedtrigger sample watermark, which can be correctly extracted to distinguishbetween the piratical and the protected model. The experiments show that theproposed framework has good performance in different image segmentationnetworks of UNET, UNET++, and FCN (fully convolutional network), andeffectively resists forgery attacks. 展开更多
关键词 image processing networks copyright protection model watermark
下载PDF
Semi-Fragile Watermarking for Copyright Protection and Image Authentication
5
作者 HUANGJi-feng 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期284-288,共5页
In this paper, we propose a semi-fragile wattr-marking technology forcopyright protection and image authentication We transform the image into wavelet domain and groupthe four adjacent wavelet coefficients Utilizing t... In this paper, we propose a semi-fragile wattr-marking technology forcopyright protection and image authentication We transform the image into wavelet domain and groupthe four adjacent wavelet coefficients Utilizing the characteristics of the humanvisual system, weembed a digital signal into the average of the four adjacent wavelet coefficients since the mean hasbetter stability than single wavelet coefficient. This method neednt original image when extractsthe watermark. Experimental results show the effectiveness of this method which is robust to commonimage process and fragile to malicious attack. 展开更多
关键词 semi-fiagile watermark image authentication copyright protection wavelettransform
下载PDF
Research on Software Design of Image Copyright Protection in the Field of Education
6
作者 Yu Huang Zhengyue Han +2 位作者 Zhenjie Wu Hanyue Zhang Rong Wu 《International Journal of Communications, Network and System Sciences》 2022年第4期43-52,共10页
Nowadays, image copyright protection is one of the key points of information security in the field of education. Based on the transient property of human vision, the anti-theft and copyright protection strategies are ... Nowadays, image copyright protection is one of the key points of information security in the field of education. Based on the transient property of human vision, the anti-theft and copyright protection strategies are proposed based on the idea of animation synthesis. In this paper, experiments are designed and compared from multiple perspectives. The results show that the strategy based on animation synthesis can not only ensure the browsing effect of images, but also effectively achieve the purpose of preventing interception via screenshot and protecting the legitimate rights of the original images. 展开更多
关键词 Copyright protection image Anti-Theft Screenshot Animation Synthesis
下载PDF
DESIGN OF IRREGULAR LDPC CODE WITH UNEQUAL ERROR PROTECTION PROPERTY AND ITS PERFORMANCE ANALYSIS ON IMAGE TRANSMISSION
7
作者 Wang Ruihua Yin Liuguo +1 位作者 Yu Quan Lu Jianhua 《Journal of Electronics(China)》 2005年第6期658-662,共5页
Based on the property that high degree variable nodes within an irregular LowDensity Parity-Check (LDPC) code have more powerful error-correcting capability than that of low degree variable nodes, a group of irregular... Based on the property that high degree variable nodes within an irregular LowDensity Parity-Check (LDPC) code have more powerful error-correcting capability than that of low degree variable nodes, a group of irregular LDPC codes with Unequal Error Protection (UEP)property is designed in this letter. Simulation results show that the transmission quality of the image may be effectively improved with this class of irregular LDPC code. 展开更多
关键词 Irregular Low-Density Parity-Check (LDPC) code Unequal Error protection (UEP) image transmission
下载PDF
A Cover-Independent Deep Image Hiding Method Based on Domain Attention Mechanism
8
作者 Nannan Wu Xianyi Chen +1 位作者 James Msughter Adeke Junjie Zhao 《Computers, Materials & Continua》 SCIE EI 2024年第3期3001-3019,共19页
Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding.However,these approaches have some limitations.For example,a cover image lacks s... Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding.However,these approaches have some limitations.For example,a cover image lacks self-adaptability,information leakage,or weak concealment.To address these issues,this study proposes a universal and adaptable image-hiding method.First,a domain attention mechanism is designed by combining the Atrous convolution,which makes better use of the relationship between the secret image domain and the cover image domain.Second,to improve perceived human similarity,perceptual loss is incorporated into the training process.The experimental results are promising,with the proposed method achieving an average pixel discrepancy(APD)of 1.83 and a peak signal-to-noise ratio(PSNR)value of 40.72 dB between the cover and stego images,indicative of its high-quality output.Furthermore,the structural similarity index measure(SSIM)reaches 0.985 while the learned perceptual image patch similarity(LPIPS)remarkably registers at 0.0001.Moreover,self-testing and cross-experiments demonstrate the model’s adaptability and generalization in unknown hidden spaces,making it suitable for diverse computer vision tasks. 展开更多
关键词 Deep image hiding attention mechanism privacy protection data security visual quality
下载PDF
An Algorithm for Medical Imagining Compression That Is Oriented to ROI-Characteristics Protection
9
作者 Renjun Shuai Yang Shen Jing Pan 《Journal of Applied Mathematics and Physics》 2015年第7期854-861,共8页
In order to protect the ROI (region of interest) characteristics while greatly improving medical imaging compression ratio, we are proposing an algorithm for medical imagining compression that is oriented to ROI-chara... In order to protect the ROI (region of interest) characteristics while greatly improving medical imaging compression ratio, we are proposing an algorithm for medical imagining compression that is oriented to ROI-characteristics protection. Firstly, an improved ROI segmentation algorithm is put forward based on the analysis of the ROI segmentation. Then, after the ROI segmented, the ROI edge is extracted and encoded with Freeman chain coding. Finally, the ROI is compressed by lossless compression with shearlet;the ROB (region of background) is compressed by the method of high ratio lossy compression combining with Wavelet and Fractal. Simulation results show that the ROI is segmented precisely. It holds edge integrity and has high quality reconstruction processed by the presented method, helping protect ROI characteristics while greatly improving the compression ratio. 展开更多
关键词 MEDICAL imaging Compression ROI CHARACTERISTICS protecting Segmentation CHAIN CODING Shearlet
下载PDF
Carving Thumbnail/s and Embedded JPEG Files Using Image Pattern Matching
10
作者 Nurul Azma Abdullah Rosziati Ibrahim Kamaruddin Malik Mohamad 《Journal of Software Engineering and Applications》 2013年第3期62-66,共5页
Images (typically JPEG) are used as evidence against cyber perpetrators. Typically the file is carved using standard patterns. Many concentrate on carving JPEG files and overlook the important of thumbnail in assistin... Images (typically JPEG) are used as evidence against cyber perpetrators. Typically the file is carved using standard patterns. Many concentrate on carving JPEG files and overlook the important of thumbnail in assisting forensic investigation. However, a new unique pattern is used to detect thumbnail/s and embedded JPEG file. This paper is to introduce a tool call PattrecCarv to recognize thumbnail/s or embedded JPEG files using unique hex patterns (UHP). A tool called PattrecCarv is developed to automatically carve thumbnail/s and embedded JPEG files using DFRWS 2006 and DFRWS 2007 datasets. The tool successfully recovers 11.5% more thumbnails and embedded JPEG files than PredClus. 展开更多
关键词 Component JPEG image Pattern MATCHING file CARVING DFRWS 2006/07 THUMBNAIL
下载PDF
基于SQL-SERVER2005的Image图像文件存取的应用 被引量:1
11
作者 武俊生 《电力学报》 2008年第6期492-494,共3页
结合某工厂数据库项目开发实例,通过VB2005语言在SQL-SERVER2005数据库中使用Image数据类型,采用基于流文件的形式对Image文件进行存、取、显示的方法,达到了项目存储和读取、显示图像数据文件的要求,并对实现的方法及关键技术结合源代... 结合某工厂数据库项目开发实例,通过VB2005语言在SQL-SERVER2005数据库中使用Image数据类型,采用基于流文件的形式对Image文件进行存、取、显示的方法,达到了项目存储和读取、显示图像数据文件的要求,并对实现的方法及关键技术结合源代码进行了阐述。 展开更多
关键词 数据库 图像文件存取
下载PDF
浅谈磁盘镜像工具WinImage的使用方法
12
作者 杨永战 蔺莉霞 《电脑学习》 2004年第3期60-61,共2页
介绍磁盘工具WinImage的使用方法熏如制作软、硬盘镜像文件熏编辑、复制镜像文件熏ISO文件的制作与还原熏整理镜像碎片及磁盘格式化等操作。
关键词 Winimage 磁盘 镜像 ISO文件 碎片 格式化 共享软件
下载PDF
Chaos-Based Multipurpose Image Watermarking Algorithm 被引量:2
13
作者 ZHU Congxu LIAO Xuefeng LI Zhihua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1675-1678,共4页
To achieve the goal of image content authentication and copyright protection simultaneously, this paper presents a novel image dual watermarking method based on chaotic map. Firstly, the host image was split into many... To achieve the goal of image content authentication and copyright protection simultaneously, this paper presents a novel image dual watermarking method based on chaotic map. Firstly, the host image was split into many nonoverlapping small blocks, and the block-wise discrete cosine transform (DCT) is computed. Secondly, the robust watermarks, shuffled by the chaotic sequences, are embedded in the DC coefficients of blocks to achieve the goal of copyright protection. The semi-fragile watermarks, generated by chaotic map, are embedded in the AC coefficients of blocks to obtain the aim of image authentication. Both of them can be extracted without the original image. Simulation results demonstrate the effectiveness of our algorithm in terms of robustness and fragility. 展开更多
关键词 copyright protection image authentication multipurpose watermarking chaos theory
下载PDF
Privacy‐preserving remote sensing images recognition based on limited visual cryptography 被引量:3
14
作者 Denghui Zhang Muhammad Shafiq +2 位作者 Liguo Wang Gautam Srivastava Shoulin Yin 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第4期1166-1177,共12页
With the arrival of new data acquisition platforms derived from the Internet of Things(IoT),this paper goes beyond the understanding of traditional remote sensing technologies.Deep fusion of remote sensing and compute... With the arrival of new data acquisition platforms derived from the Internet of Things(IoT),this paper goes beyond the understanding of traditional remote sensing technologies.Deep fusion of remote sensing and computer vision has hit the industrial world and makes it possible to apply Artificial intelligence to solve problems such as automatic extraction of information and image interpretation.However,due to the complex architecture of IoT and the lack of a unified security protection mechanism,devices in remote sensing are vulnerable to privacy leaks when sharing data.It is necessary to design a security scheme suitable for computation‐limited devices in IoT,since traditional encryption methods are based on computational complexity.Visual Cryptography(VC)is a threshold scheme for images that can be decoded directly by the human visual system when superimposing encrypted images.The stacking‐to‐see feature and simple Boolean decryption operation make VC an ideal solution for privacy‐preserving recognition for large‐scale remote sensing images in IoT.In this study,the secure and efficient transmission of high‐resolution remote sensing images by meaningful VC is achieved.By diffusing the error between the encryption block and the original block to adjacent blocks,the degradation of quality in recovery images is mitigated.By fine‐tuning the pre‐trained model from large‐scale datasets,we improve the recognition performance of small encryption datasets for remote sensing images.The experimental results show that the proposed lightweight privacy‐preserving recognition framework maintains high recognition performance while enhancing security. 展开更多
关键词 activity recognition feature extraction image classification KNN privacy protection remote monitoring remote sensing
下载PDF
DWT-Based Robust Color Image Watermarking Scheme 被引量:1
15
作者 刘连山 李人厚 高琦 《Journal of Southwest Jiaotong University(English Edition)》 2005年第2期130-134,共5页
A scheme of embedding an encrypted watermark into the green component of a color image is proposed. The embedding process is implemented in the discrete wavelet transformation (DWT) domain, The original binary water... A scheme of embedding an encrypted watermark into the green component of a color image is proposed. The embedding process is implemented in the discrete wavelet transformation (DWT) domain, The original binary watermark image is firstly encrypted through scrambling technique, and then spread with two orthogonal pseudo-random sequences whose mean values are equal to zero, and finally embedded into the DWT low frequency sub-band of green components, The coefficients whose energies are larger than the others are selected to hide watermark, and the hidden watermark strength is determined by the energy ratio between the selected coefficients energies and the mean energy of the subband. The experiment results demonstrate that the proposed watermarking scheme is very robust against the attacks such as additive noise, low-pass filtering, scaling, cropping image, row (or column ) deleting, and }PEG compression. 展开更多
关键词 Digital watermark Discrete wavelet transformation Color image Copyright protection
下载PDF
Zero Watermarking Algorithm for Medical Image Based on Resnet50-DCT 被引量:1
16
作者 Mingshuai Sheng Jingbing Li +3 位作者 Uzair Aslam Bhatti Jing Liu Mengxing Huang Yen-Wei Chen 《Computers, Materials & Continua》 SCIE EI 2023年第4期293-309,共17页
Medical images are used as a diagnostic tool, so protecting theirconfidentiality has long been a topic of study. From this, we propose aResnet50-DCT-based zero watermarking algorithm for use with medicalimages. To beg... Medical images are used as a diagnostic tool, so protecting theirconfidentiality has long been a topic of study. From this, we propose aResnet50-DCT-based zero watermarking algorithm for use with medicalimages. To begin, we use Resnet50, a pre-training network, to draw out thedeep features of medical images. Then the deep features are transformedby DCT transform and the perceptual hash function is used to generatethe feature vector. The original watermark is chaotic scrambled to get theencrypted watermark, and the watermark information is embedded into theoriginal medical image by XOR operation, and the logical key vector isobtained and saved at the same time. Similarly, the same feature extractionmethod is used to extract the deep features of the medical image to be testedand generate the feature vector. Later, the XOR operation is carried outbetween the feature vector and the logical key vector, and the encryptedwatermark is extracted and decrypted to get the restored watermark;thenormalized correlation coefficient (NC) of the original watermark and therestored watermark is calculated to determine the ownership and watermarkinformation of the medical image to be tested. After calculation, most ofthe NC values are greater than 0.50. The experimental results demonstratethe algorithm’s robustness, invisibility, and security, as well as its ability toaccurately extract watermark information. The algorithm also shows goodresistance to conventional attacks and geometric attacks. 展开更多
关键词 Medical images deep residual network resnet50-DCT privacy protection ROBUSTNESS security
下载PDF
A ROBUST METHOD FOR FINGERPRINTING DIGITAL IMAGES
17
作者 Saad Amer 《Journal of Electronics(China)》 2001年第3期193-203,共11页
In this paper, a method to fingerprint digital images is proposed, and different watermarked copies with different identification string are made. After determining the number of the customers and the length of the wa... In this paper, a method to fingerprint digital images is proposed, and different watermarked copies with different identification string are made. After determining the number of the customers and the length of the watermark string, this method chooses some values inside the digital image using a characteristic function, and adds watermarks to these values in a way that can protect the product against the attacks happened by comparing two fingerprinted copies.The watermarks are a string of binary numbers -1s and 1s. Every customer will be distinguished by a series of 1s and -1s generated by a pseudo-random generator. The owner of the image can determine the number of customers and the length of the string as well as this method will add another watermarking values to watermark string to protect the product. 展开更多
关键词 SECURITY Fingerprinting imageS DIGITAL WATERMARKING COPYRIGHT protection
下载PDF
A Zero-Watermark Scheme Based on Quaternion Generalized Fourier Descriptor for Multiple Images
18
作者 Baowei Wang Weishen Wang +1 位作者 Peng Zhao Naixue Xiong 《Computers, Materials & Continua》 SCIE EI 2022年第5期2633-2652,共20页
Most of the existing zero-watermark schemes for medical images are only appropriate for a single grayscale image.When they protect a large number of medical images,repeating operations will cause a significant amount ... Most of the existing zero-watermark schemes for medical images are only appropriate for a single grayscale image.When they protect a large number of medical images,repeating operations will cause a significant amount of time and storage costs.Hence,this paper proposes an efficient zero-watermark scheme for multiple color medical images based on quaternion generalized Fourier descriptor(QGFD).Firstly,QGFD is utilized to compute the feature invariants of each color image,then the representative features of each image are selected,stacked,and reshaped to generate a feature matrix,which is then binarized to get a binary feature image.Copyright information can be converted into the copyright image by using QR code technology,which contains more information.Finally,the zero-watermark image is constructed by executing the XOR operation on the copyright image and the feature image scrambled by the Cat map.In the experiment,different parameters are selected to determine the maximum number of images that the proposed scheme can protect simultaneously while achieving good robustness.The experimental results demonstrate that the proposed scheme can effectively resist common attacks,geometric attacks and joint attacks,and effectively improve the operation efficiency of the algorithm,thus effectively decreasing the time and storage cost of copyright protection for lots of medical images. 展开更多
关键词 Copyright protection color medical image zero-watermark QGFD
下载PDF
High-Imperceptibility Data Hiding Scheme for JPEG Images Based on Direction Modification
19
作者 Li Liu Jing Li +2 位作者 Yingchun Wu Chin-Chen Chang Anhong Wang 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期1415-1431,共17页
Data hiding(DH)is an important technology for securely transmitting secret data in networks,and has increasing become a research hotspot throughout the world.However,for Joint photographic experts group(JPEG)images,it... Data hiding(DH)is an important technology for securely transmitting secret data in networks,and has increasing become a research hotspot throughout the world.However,for Joint photographic experts group(JPEG)images,it is difficult to balance the contradiction among embedded capacity,visual quality and the file size increment in existing data hiding schemes.Thus,to deal with this problem,a high-imperceptibility data hiding for JPEG images is proposed based on direction modification.First,this proposed scheme sorts all of the quantized discrete cosine transform(DCT)block in ascending order according to the number of non-consecutive-zero alternating current(AC)coefficients.Then it selects non-consecutive-zero AC coefficients with absolute values less than or equal to 1 at the same frequency position in two adjacent blocks for pairing.Finally,the 2-bit secret data can be embedded into a coefficient-pair by using the filled reference matrix and the designed direction modification rules.The experiment was conducted on 5 standard test images and 1000 images of BOSSbase dataset,respectively.The experimental results showed that the visual quality of the proposed scheme was improved by 1∼4 dB compared with the comparison schemes,and the file size increment was reduced at most to 15%of the comparison schemes. 展开更多
关键词 Data hiding JPEG images coefficient-pair direction modification file size increment
下载PDF
Light-Weight Selective Image Encryption for Privacy Preservation
20
作者 Yi-Hui Chen Eric Jui-Lin Lu Chu-Fan Wang 《Journal of Electronic Science and Technology》 CAS CSCD 2020年第3期234-240,共7页
To protect personal privacy and confidential preservation,access control is used to authorize legal users for safe browsing the authorized contents on photos.The access control generates an authorization rule accordin... To protect personal privacy and confidential preservation,access control is used to authorize legal users for safe browsing the authorized contents on photos.The access control generates an authorization rule according to each permission assignment.However,the general access control is inappropriate to apply in some social services(e.g.,photos posted on Flickr and Instagram,personal image management in mobile phone) because of the increasing popularity of digital images being stored and managed.With low maintenance loads,this paper integrates the data hiding technique to propose an access control mechanism for privacy preservation.The proposed scheme changes the partial regions of a given image as random pads (called selective image encryption) and only allows the authorized people to remedy the random pads back to meaningful ones which are with similar visual qualities of original ones. 展开更多
关键词 Fine-grained access control model image access control noise pads privacy protection
下载PDF
上一页 1 2 71 下一页 到第
使用帮助 返回顶部