期刊文献+
共找到18篇文章
< 1 >
每页显示 20 50 100
相关技术在票面动态检伪中的应用
1
作者 仇润鹤 于子捷 +2 位作者 周化仁 孙培良 王君 《中国矿业大学学报》 EI CAS CSCD 北大核心 1997年第4期86-90,共5页
通过对相关技术的理论分析,给出了在票面动态检伪中的互相关函数计算方法。
关键词 相关技术 票面 动态检伪 检伪 假币
下载PDF
模式识别技术在人民币检伪中的应用研究 被引量:2
2
作者 索双富 许汝真 +1 位作者 孟国营 杨杰 《机械设计与制造》 北大核心 2015年第11期192-196,200,共6页
纸币的防伪与检伪水平关系着国家的金融安全,研究模式识别技术在人民币检伪中的应用,是为了探究如何不断提高人民币真伪判定的准确率,从而为相关的设备开发奠定基础。首先对模式识别技术做了简要总结。从人民币宽度检测和磁性信号检测... 纸币的防伪与检伪水平关系着国家的金融安全,研究模式识别技术在人民币检伪中的应用,是为了探究如何不断提高人民币真伪判定的准确率,从而为相关的设备开发奠定基础。首先对模式识别技术做了简要总结。从人民币宽度检测和磁性信号检测两个方面,对模式识别技术在人民币检伪中的具体应用进行讨论。针对货币检测过程中的信号变化,以宽度检测和磁性信号的检测为实例,对信号的采集、信号的处理、真伪的判断开展了研究。相关研究结果可以应用在线性CCD信号的处理和分析之中。为货币的真伪检测方法与判定策略提供了参考实例。 展开更多
关键词 模式识别 人民币检伪 宽度 磁性信号 识别方法
下载PDF
基于AT89C51单片机的硬币高速检伪机 被引量:8
3
作者 王春芳 林金表 +2 位作者 郑子武 李忠辉 蔡振雄 《机电工程技术》 2006年第4期29-31,共3页
采用电涡流检测方法检测真假硬币,用AT89C51单片机开发出检测速度快、准确率高、价格适当的硬币高速检伪机,从而替代国外同类产品。目前该机已批量生产,具有较好的市场前景。
关键词 电涡流 AT89C51单片机 硬币高速检伪
下载PDF
智能红外测厚技术在纸币检伪中的应用 被引量:5
4
作者 韩江 吴建霖 +1 位作者 祖晅 李良初 《机械工程与自动化》 2010年第1期178-179,共2页
根据人民币不同防伪部位的红外光穿透特性不同的规律,分析并试验得出照射纸币的红外光的最佳入射光强,并设计了信号处理电路。将红外光透过纸币的光通量转化为模拟电信号,再通过ADC转换成单片机可识别的数字电信号,使用单片机将数字信... 根据人民币不同防伪部位的红外光穿透特性不同的规律,分析并试验得出照射纸币的红外光的最佳入射光强,并设计了信号处理电路。将红外光透过纸币的光通量转化为模拟电信号,再通过ADC转换成单片机可识别的数字电信号,使用单片机将数字信号记录,并与标准波形特征对比,实现纸币的红外光智能检伪。 展开更多
关键词 红外光 纸币检伪 单片机
下载PDF
实现磁性检伪的智能磁通门磁力辨别仪的设计与分析
5
作者 仇润鹤 周化仁 于子捷 《电子测量技术》 北大核心 1995年第1期8-12,31,共6页
本文简单地叙述了磁通门探头的工作原理,对智能磁通门磁力辨别仪的系统设计作了较详细的分析和讨论,同时对磁性检伪和相关辨识进行了定性介绍。
关键词 磁通门探头 弱磁 磁性检伪
下载PDF
基于电磁检测技术的硬币检伪装置 被引量:4
6
作者 吕冰 叶婷婷 赵剑锋 《仪表技术与传感器》 CSCD 北大核心 2010年第12期80-82,85,共4页
针对硬币的检伪问题,根据电磁检测理论,分析了不同材质硬币的电磁特性,提出了一种基于特定励磁频率的硬币检伪检测方法。研制了专用的电磁传感器,设计了基于微处理器的智能检测装置。该装置具有电磁激励、信号提取、硬币分检、语音报警... 针对硬币的检伪问题,根据电磁检测理论,分析了不同材质硬币的电磁特性,提出了一种基于特定励磁频率的硬币检伪检测方法。研制了专用的电磁传感器,设计了基于微处理器的智能检测装置。该装置具有电磁激励、信号提取、硬币分检、语音报警、学习及记忆等功能的。实验结果表明该智能检测装置能快速、有效地识别人民币硬币真伪,并获得了国家专利。 展开更多
关键词 硬币检伪 电磁 89C51
下载PDF
9NJ—14型鲜奶掺伪速检器
7
作者 王凤清 田金仲 《畜牧机械》 1990年第3期26-27,共2页
关键词 9ZJ-14 鲜奶
下载PDF
基于80C196KC的磁性检测的实现
8
作者 李萍萍 周贵祥 《机械设计与制造》 北大核心 2006年第5期147-149,共3页
介绍了票面检伪中磁迹检验的基本原理,设计了相关的检测电路,提出并详细介绍了采用80C196KC单片机实现的对票面磁性特征信息的采集、处理等硬件和软件实现。
关键词 检伪 单片机 80C196KC
下载PDF
基于单片机的智能投币箱设计与实现
9
作者 刘娟 胡徐胜 夏兴国 《天津理工大学学报》 2020年第6期13-16,共4页
为了自动辨别硬币的真伪,并提高硬币的清点速度,设计了一种基于单片机的智能投币箱.设计主要包括硬币真伪检测和包装两部分.检测系统采用电涡流方式实现硬币检伪,完成检测系统设计和控制系统设计.实验表明,该设计控制效果较好.
关键词 投币箱 硬币检伪 硬币包卷 电涡流式传感器
下载PDF
Revised quantum direct communication scheme with mutual authentication 被引量:2
10
作者 刘文杰 陈汉武 +1 位作者 许娟 刘志昊 《Journal of Southeast University(English Edition)》 EI CAS 2010年第4期532-536,共5页
Based on mutual authentication and dense coding,a novel revised efficient quantum direct communication scheme is proposed.It is composed of two phases:the quantum state distribution process and the direct communicati... Based on mutual authentication and dense coding,a novel revised efficient quantum direct communication scheme is proposed.It is composed of two phases:the quantum state distribution process and the direct communication process.The purpose of the former is to authenticate Trent and users to each other,and let the two legitimate users(Alice and Bob)safely share the Bell states.While the latter aims to make direct communication to transmit a secret message between Alice and Bob.In order to prevent from Eve's eavesdropping as well as to authenticate each other simultaneously,a decoy photon checking technique is applied.Compared with other analogous protocols,the quantum state distribution process is more simple and feasible and the proposed scheme is more efficient;i.e.,the total efficiency is almost 100%.Security analysis shows that the proposed scheme is secure against the eavesdropping attacks,the impersonation attacks,and some special Trent's attacks,including the attacks by using different initial states. 展开更多
关键词 quantum direct communication mutual authentica-tion decoy-photon checking impersonation attack special Trent's attack
下载PDF
卧式二口纸币清分机的研制与开发
11
作者 徐勇 邱林 《中国新技术新产品》 2015年第5期13-14,共2页
现有二口纸币清分机,通常设计成立式。为了解决立式二口纸币清分机在发生卡钞时便于处理,又不得不将其设计成可开合的多体结构,致使其体积大、结构复杂、可靠性差。为此研制开发了卧式二口纸币清分机。它具有结构简单、适合于清点流通... 现有二口纸币清分机,通常设计成立式。为了解决立式二口纸币清分机在发生卡钞时便于处理,又不得不将其设计成可开合的多体结构,致使其体积大、结构复杂、可靠性差。为此研制开发了卧式二口纸币清分机。它具有结构简单、适合于清点流通量大的各类纸币的优点。配以C8051F120为核心的软硬件来实现高速条件下对纸币的检伪和清分。 展开更多
关键词 清分机 CIS图像传感器 厚度传感器 检伪 清分
下载PDF
完善网上制度势在必行
12
《互联网世界》 1998年第6期18-19,共2页
关键词 INTERNET 网上制度 电子透视检伪
下载PDF
Ocean-bottom cable data multiple suppression based on equipoise pseudo-multichannel matching filter 被引量:3
13
作者 王东凯 刘怀山 +1 位作者 童思友 朱伟强 《Applied Geophysics》 SCIE CSCD 2015年第2期179-186,274,共9页
The effect of strong reflection interfaces, such as free surface, seabed, is strong; thus, the coupling of multiples and waves reduces the quality of ocean-bottom cable seismic data. Using the different polarity respo... The effect of strong reflection interfaces, such as free surface, seabed, is strong; thus, the coupling of multiples and waves reduces the quality of ocean-bottom cable seismic data. Using the different polarity response of hydrophones and geophones to downgoing wave fields, dual-sensor summation can eliminate receiver-side multiples, enhance primaries, and improve the resolution of seismic data. We present a dual-sensor summation method based on the equipoise pseudo-multichannel adaptive matching filter. Compared with traditional methods, the proposed method is totally data driven and does not depend on the reflection coefficient; moreover, good results are obtained using synthetic and real data. 展开更多
关键词 receiver-side multiple source-side multiple dual-sensor summation equipoise pseudo-multichannel matching
下载PDF
Image Copy-Move Forgery Detection Using SURF in Opponent Color Space 被引量:4
14
作者 巩家昌 郭继昌 《Transactions of Tianjin University》 EI CAS 2016年第2期151-157,共7页
Most existing methods for image copy-move forgery detection(CMFD)operate on grayscale images. Although the keypoint-based methods have the advantages of strong robustness and low computational cost,they cannot identif... Most existing methods for image copy-move forgery detection(CMFD)operate on grayscale images. Although the keypoint-based methods have the advantages of strong robustness and low computational cost,they cannot identify the flat duplicated regions without reliable extracted features. In this paper, we propose a new CMFD method by using speeded-up robust feature(SURF)in the opponent color space. Our method starts by converting the inspected image from RGB to the opponent color space. The color gradient per pixel is calculated and taken as the work space for SURF to extract the keypoints. The matched keypoints are clustered and their geometric transformations are estimated. Finally, the false matches are removed. Experimental results show that the proposed technique can effectively expose the duplicated regions with various transformations, even when the duplication regions are flat. 展开更多
关键词 copy-move forgery flat region color descriptor OwSURF
下载PDF
Passive detection of copy-paste forgery between JPEG images 被引量:5
15
作者 李香花 赵于前 +2 位作者 廖苗 F.Y.Shih Y.Q.Shi 《Journal of Central South University》 SCIE EI CAS 2012年第10期2839-2851,共13页
A blind digital image forensic method for detecting copy-paste forgery between JPEG images was proposed.Two copy-paste tampering scenarios were introduced at first:the tampered image was saved in an uncompressed forma... A blind digital image forensic method for detecting copy-paste forgery between JPEG images was proposed.Two copy-paste tampering scenarios were introduced at first:the tampered image was saved in an uncompressed format or in a JPEG compressed format.Then the proposed detection method was analyzed and simulated for all the cases of the two tampering scenarios.The tampered region is detected by computing the averaged sum of absolute difference(ASAD) images between the examined image and a resaved JPEG compressed image at different quality factors.The experimental results show the advantages of the proposed method:capability of detecting small and/or multiple tampered regions,simple computation,and hence fast speed in processing. 展开更多
关键词 image forensic JPEG compression copy-paste tbrgery passive detection tampered image compressed image
下载PDF
JOINT EARLY DETECTION AND EARLY STOPPING SCHEME FOR COMPLEXITY REDUCTION OF TURBO DECODING
16
作者 Ma Zheng Fan Pingzhi Wai Ho Mow 《Journal of Electronics(China)》 2007年第3期316-320,共5页
In this paper,a Joint Early Detection and Early Stopping (JEDES) approach for effectively reducing the complexity of turbo decoding with negligible performance loss is proposed. It combines the effectiveness of both e... In this paper,a Joint Early Detection and Early Stopping (JEDES) approach for effectively reducing the complexity of turbo decoding with negligible performance loss is proposed. It combines the effectiveness of both early detection and early stopping techniques. Our simulation results demon-strated that the proposed JEDES scheme based on cyclic redundancy check and trellis splicing can achieve a complexity saving of 15% to 20% at practical bit error rates over the idealized GENIE stopping scheme,which is widely accepted as the theoretically best possible early stopping scheme. 展开更多
关键词 Stopping criterion Turbo codes Early detection THRESHOLD Trellis splicing
下载PDF
Improving Image Copy-Move Forgery Detection with Particle Swarm Optimization Techniques 被引量:7
17
作者 SHI Wenchang ZHAO Fei +1 位作者 QIN Bo LIANG Bin 《China Communications》 SCIE CSCD 2016年第1期139-149,共11页
Copy-Move Forgery(CMF) is one of the simple and effective operations to create forged digital images.Recently,techniques based on Scale Invariant Features Transform(SIFT) are widely used to detect CMF.Various approach... Copy-Move Forgery(CMF) is one of the simple and effective operations to create forged digital images.Recently,techniques based on Scale Invariant Features Transform(SIFT) are widely used to detect CMF.Various approaches under the SIFT-based framework are the most acceptable ways to CMF detection due to their robust performance.However,for some CMF images,these approaches cannot produce satisfactory detection results.For instance,the number of the matched keypoints may be too less to prove an image to be a CMF image or to generate an accurate result.Sometimes these approaches may even produce error results.According to our observations,one of the reasons is that detection results produced by the SIFT-based framework depend highly on parameters whose values are often determined with experiences.These values are only applicable to a few images,which limits their application.To solve the problem,a novel approach named as CMF Detection with Particle Swarm Optimization(CMFDPSO) is proposed in this paper.CMFD-PSO integrates the Particle Swarm Optimization(PSO) algorithm into the SIFT-based framework.It utilizes the PSO algorithm to generate customized parameter values for images,which are used for CMF detection under the SIFT-based framework.Experimental results show that CMFD-PSO has good performance. 展开更多
关键词 copy-move forgery detection SIFT region duplication digital image forensics
下载PDF
Blur Invariant Image Forgery Detection Method Using Local Phase Quantization
18
作者 Beste Ustubioglu Elif Baykal +1 位作者 Gul Muzaffer Guzin Ulutas 《Journal of Energy and Power Engineering》 2016年第6期358-363,共6页
With the rapid development of powerful image, editing software makes the forgery of the digital image easy. Researchers proposed methods to cope with image authentication in recent years. We proposed a passive image a... With the rapid development of powerful image, editing software makes the forgery of the digital image easy. Researchers proposed methods to cope with image authentication in recent years. We proposed a passive image authentication technique to determine the copy move forgery that copied a part of an image and pasted it on the other region in the same image. First, the method divides the image into overlapping blocks. It uses LPQ (local phase quantization) to label each block. The column average value of labeled blocks constitutes the feature vector for the block. Similarity among the feature vectors gives a clue about the forgery. Local phase quantization has not been used to detect copy move forgery in the literature before. Experimental results show that, the method has higher accuracy ratios and lower false negative values under blurring operation at high levels compared to other methods. Our method can also detect multiple copy move forgery. 展开更多
关键词 Copy move forgery LPQ blur invariant.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部