期刊文献+
共找到320篇文章
< 1 2 16 >
每页显示 20 50 100
A Distributed Secret Sharing Method with QR Code Based on Information Hiding
1
作者 Pengcheng Jiang Yu Xue 《Journal of Cyber Security》 2021年第4期217-225,共9页
QR codes are applied widely on the Internet and mobile devices in recent years.Its open standards and the characteristics of easy to generate lead to anyone can generate their QR code easily.Also,the QR code does not ... QR codes are applied widely on the Internet and mobile devices in recent years.Its open standards and the characteristics of easy to generate lead to anyone can generate their QR code easily.Also,the QR code does not have the ability of hiding information,which leads to everyone can get access to read the content in any QR code,including those hiding some secret content in the bytes of QR code.Therefore,in recent years,information tampering and information leakage cases caused by poor security of two-dimensional code occur frequently,especially in the financial field and multi-party verification scenarios.QR codes are almost impossible to use in these scenarios.Therefore,this paper proposes a distributed information sharing method based on information hiding QR code.This method can make secret code in QR code safer and robust,and the secret shared between receivers can be used for decryption and attacking detection.Therefore,on the one hand,the information hiding method can maximize the capacity of embedded secret information,on the other hand,it can prevent attacks by disguised attackers and recover hidden secret information through reconstruction.This paper illustrates the feasibility of this scheme through the form of theoretical proof. 展开更多
关键词 QR code image encryption information hiding secret sharing
下载PDF
Information hiding scheme for vector maps based on fingerprint certification
2
作者 门朝光 孙建国 曹刘娟 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2009年第6期766-770,共5页
An information hiding scheme for vector maps is presented to identify the source after the vector map is leaked in some key application areas. In this scheme, the fingerprint image of the map owner can be converted in... An information hiding scheme for vector maps is presented to identify the source after the vector map is leaked in some key application areas. In this scheme, the fingerprint image of the map owner can be converted into a character string as the watermark, and then the watermark will be embedded into the coordinate descriptions of the attribute file by the "0-bit value" programming method. This programming algorithm ensures that the accuracy is lossless and the graphics is unchanged for any vector map. Experiments show that the presented hiding scheme has stable robustness, the average similarity rate is 97.2% for fingerprints matching and the false non-match rate is 1.38% in the blocking test. In the opening test, the former reaches 84.46% and the latter reaches 5.56%. 展开更多
关键词 information hiding digital watermarking vector map FINGERPRINT AUTHENTICATION
下载PDF
A Robust Digital Watermarking Algorithm Based on Finite-Set Discrete Radon Transform Tight Frame
3
作者 Jiangui Zhang Huibin Qi 《Journal of Computer and Communications》 2020年第12期123-133,共11页
<div style="text-align:justify;"> Digital watermarking technology plays a powerful role in the effective protection of digital media copyright, image authentication, image sharing, image information tr... <div style="text-align:justify;"> Digital watermarking technology plays a powerful role in the effective protection of digital media copyright, image authentication, image sharing, image information transmission and other fields. Driven by strong demand, digital image watermarking technology has aroused widespread research interest and has gradually developed into one of the most active research directions in information science. In this paper, we present a novel robust digital watermarking algorithm based on discrete radon transform tight frame in finite-set (FDRT). FDRT of the zero mean image is a tight frame, the frame boundary <em><strong>A</strong></em> = <em><strong>B</strong></em> = 1, the dual of the frame is itself. The decomposition and reconstruction of the FDRT tight frame will not cause the phenomenon of image distortion. The embedding of hidden watermark is to add a weak signal to the strong background of the original image. Watermark extraction is to effectively identify the embedded weak signal. The feasibility of the watermarking algorithm is analyzed from two aspects of information hiding and robustness. We select the independent Gaussian random vector as the watermark series, and the peak signal-to-noise ratio (PSNR) as the visual degradation criterion of the watermark image. Basing the FDRT compact stand dual operator, we derived the relationship among the strength parameter, square sum of watermark series, the PSNR. Using Checkmark system, the simulation results show that the algorithm is robust enough to some very important image processing attacks such as lossy compression, MAP, filtering, segmentation, edge enhancement, jitter, quadratic modulation and general geometric attack (scaling, rotation, shearing), etc. </div> 展开更多
关键词 digital watermarking Data Mining Discrete Radon Transform Tight Frame Copyright Protection information hiding Finite-Set
下载PDF
An Anti-Cutting Watermarking Algorithm Based on Matrix Multiplication Secret Sharing Scheme 被引量:2
4
作者 YAOHui-ming ZHANGLi-he SUIAi-fen 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2004年第1期90-95,共6页
A digital watermarking algorithm based on the matrix multiplication secret sharing scheme is proposed. It partitions the field of the image into n shares, and also partitions the watermark into n shares correspondingl... A digital watermarking algorithm based on the matrix multiplication secret sharing scheme is proposed. It partitions the field of the image into n shares, and also partitions the watermark into n shares correspondingly. After the original image is divided, the digital watermark is embedded into the low frequency DCT domain and only needs part shares in the recovering course. Experimental results show that this algorithm has a good effect of hiding, anti-cutting and anti-compressing. 展开更多
关键词 information hiding digital watermarking secret sharing
原文传递
Boosting image watermarking authenticity spreading secrecy from counting-based secret-sharing 被引量:1
5
作者 Adnan Gutub 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第2期440-452,共13页
This study presents enhancing images authentication by securing watermarking hidden data via shares generated from counting-based secret sharing.The trustfulness of shares utilised secret-sharing as an applicable priv... This study presents enhancing images authentication by securing watermarking hidden data via shares generated from counting-based secret sharing.The trustfulness of shares utilised secret-sharing as an applicable privacy creation tool for the authentication of real-life complex platforms.This research adjusts embedding the watermarking data over the images by innovative redistribution of shares to be embedded spread over all the images.The anticipated watermarking technique guaranteed to scatter the share bits implanting at different least significant bits of image pixels as boosting up the trust overall authentication practicality.The paper experimentation performance analysis shows that this improved image watermarking authentication(capacity)is averagely better by 33%–67%than other related exclusive-OR oriented and octagon approaches.Interestingly,these measurement improvements did not degrade the robustness and security of the system,inspiring our research for opening novel track of related future counting-based secret-sharing authentication progresses to come. 展开更多
关键词 counting-based secret-sharing data hiding fair data spreading image watermarking information security secret sharing
下载PDF
Fragile Watermarking Based on Robust Hidden Information 被引量:1
6
作者 张新鹏 王朔中 《Journal of Shanghai University(English Edition)》 CAS 2003年第3期261-264,共4页
Block-wise fragile watermarks can be used to reveal maliciously tampered areas in multimedia products. However a forged content containing a cloned fragile watermark can be constructed by using a series of watermarked... Block-wise fragile watermarks can be used to reveal maliciously tampered areas in multimedia products. However a forged content containing a cloned fragile watermark can be constructed by using a series of watermarked data. To defeat this type of counterfeit attack, a novel fragile watermarking technique is proposed in which different pseudo-random data are selected for different host products, and the generated fragile watermark is dependent upon the selected information. While inserting the fragile watermark, the pseudo-random information is also robustly embedded into the host data. Because of the difference between the selected information, different watermarked data cannot be used to forge illegal contents containing a valid fragile watermark. 展开更多
关键词 digital watermarking information hiding fragile robust.
下载PDF
Digital Watermarking Scheme for Securing Textual Database Using Histogram Shifting Model
7
作者 Khalid A.El Drandaly Walid Khedr +1 位作者 Islam S.Mohamed Ayman Mohamed Mostafa 《Computers, Materials & Continua》 SCIE EI 2022年第6期5253-5270,共18页
Information security is one of the most important methods of protecting the confidentiality and privacy of internet users.The greater the volume of data,the more the need to increase the security methods for protectin... Information security is one of the most important methods of protecting the confidentiality and privacy of internet users.The greater the volume of data,the more the need to increase the security methods for protecting data from intruders.This task can be challenging for researchers in terms of managing enormous data and maintaining their safety and effectiveness.Protection of digital content is a major issue in maintaining the privacy and secrecy of data.Toward this end,digital watermarking is based on the concept of information security through the insertion and detection of an embedded watermark in an efficient manner.Recent methodologies in the research on digital watermarking result in data distortion after embedding the watermark.This scenario can reduce the efficiency of detecting watermarks as well as violate data confidentiality.This study adapts a robust reversible histogram shifting(HS)technique for textual data in relational databases.Furthermore,the study presents a digital watermarking scheme intended for document copyright protection and proof of ownership.The major advantage of the proposed watermarking scheme is that it can protect digital data and preserve data quality.To the best of our knowledge,this research methodology is promising for use in the HS expansion model for watermarking data on nonnumeric databases.In addition,the results showed that despite exposing the database to an insertion attacks at 50%and 75%of the watermark,the proposed algorithm can recovermore than half of the embedded watermark in all addition and alteration attacks cases.As a result,the watermark information can be retained and restored completely. 展开更多
关键词 information security digital watermarking information hiding histogram shifting technique
下载PDF
Wavelet neural network based watermarking technology of 2D vector maps 被引量:4
8
作者 Sun Jianguo Men Chaoguang 《High Technology Letters》 EI CAS 2011年第3期259-262,共4页
A novel lossless information hiding algorithm based on wavelet neural network for digital vector maps is introduced. Wavelet coefficients being manipulated are embedded into a vector map, which could be restored by ad... A novel lossless information hiding algorithm based on wavelet neural network for digital vector maps is introduced. Wavelet coefficients being manipulated are embedded into a vector map, which could be restored by adjusting the weights of neurons in the designed neural network. When extracting the watermark extraction, those coefficients would be extracted by wavelet decomposition. With the trained multilayer feed forward neural network, the watermark would be obtained finally by measuring the weights of neurons. Experimental results show that the average error coding rate is only 6% for the proposed scheme and compared with other classical algorithms on the same tests, it is indicated that the proposed algorithm hashigher robustness, better invisibility and less loss on precision. 展开更多
关键词 information hiding digital watermarking vector map neural network
下载PDF
A QR Data Hiding Method Based on Redundant Region and BCH
9
作者 Ying Zhou Weiwei Luo 《Journal on Big Data》 2021年第3期127-133,共7页
In recent years,QR code has been widely used in the Internet and mobile devices.It is based on open standards and easy to generate a code,which lead to that anyone can generate their own QR code.Because the QR code do... In recent years,QR code has been widely used in the Internet and mobile devices.It is based on open standards and easy to generate a code,which lead to that anyone can generate their own QR code.Because the QR code does not have the ability of information hiding,any device can access the content in QR code.Thus,hiding the secret data in QR code becomes a hot topic.Previously,the information hiding methods based on QR code all use the way of information hiding based on image,mostly using digital watermarking technology,and not using the coding rules of QR code to hide information.Therefore,we propose a distributed information sharing method based on QR code information hiding.On the one hand,we can start from the coding rules of QR code and use the information hiding method to maximize the capacity of secret information embedded in QR code.On the other hand,the distributed information sharing method is used to decentralize.At the same time,experimental results and analysis show that the proposed scheme can prevent the attack of camouflage attacker,and finally recover hidden information by secret reconstruction. 展开更多
关键词 QR code image encryption information hiding secret sharing
下载PDF
基于图像的信息隐藏分析技术综述 被引量:23
10
作者 夏煜 郎荣玲 +2 位作者 戴冠中 黄殿中 钱思进 《计算机工程》 CAS CSCD 北大核心 2003年第7期1-3,共3页
信息隐藏分析技术就是对信息隐藏系统进行攻击的技术。该文简要介绍了信息隐藏技术和信息隐藏分析技术,分析了基于数字图像的信息隐藏分析技术,并对现有的多种信息隐藏分析方法和研究现状进行了深入讨论。
关键词 信息隐藏 数字水印 隐写术 隐写术分析
下载PDF
一种基于矢量共享方案的DCT域上数字水印分存算法 被引量:14
11
作者 姚惠明 周冠玲 +1 位作者 杨义先 钮心忻 《计算机学报》 EI CSCD 北大核心 2004年第7期998-1003,共6页
数字水印分存是将秘密共享的思想用于数字水印 ,将原始水印信息分解成n份分存水印信息 ,获得其中部分分存水印信息就能恢复出原始水印信息 .该文提出一种基于矢量共享方案的DCT域上的数字水印分存算法 .它将矢量共享的思想用于数字水印 ... 数字水印分存是将秘密共享的思想用于数字水印 ,将原始水印信息分解成n份分存水印信息 ,获得其中部分分存水印信息就能恢复出原始水印信息 .该文提出一种基于矢量共享方案的DCT域上的数字水印分存算法 .它将矢量共享的思想用于数字水印 .原始载体图像分块后 ,在DCT变换的低频域上加载分存后的水印数据 .水印信息隐藏前 ,对原始水印和分块水印都进行扰乱处理 ,同时分存也具有加密作用 .算法具有很高的安全性和较好的稳健性 .实验表明 ,算法还具有较好的隐藏效果和很好的抗剪切、抗压缩等功能 . 展开更多
关键词 信息隐藏 数字水印 秘密共享
下载PDF
基于矢量共享方案的数字水印分存算法 被引量:5
12
作者 姚惠明 隋爱芬 +2 位作者 牛少彰 杨义先 钮心忻 《电子与信息学报》 EI CSCD 北大核心 2003年第12期1612-1616,共5页
提出一种基于矢量共享方案的数字水印算法,将矢量共享的思想用于数字水印.算法在对水印信息隐藏前,对原始水印和分块水印都进行扰乱处理,同时分存也具有加密作用,算法具有很高的安全性.实验表明,算法还具有很好的隐藏效果和抗剪切功能.
关键词 数字水印 分存算法 矢量共享 信息隐藏 加密
下载PDF
GIS空间数据水印信息隐藏与加密技术方法研究 被引量:29
13
作者 贾培宏 马劲松 +1 位作者 史照良 徐志中 《武汉大学学报(信息科学版)》 EI CSCD 北大核心 2004年第8期747-751,共5页
提出了在GIS空间数据中隐藏标识数据生产单位版权以及用户使用权属的数字水印 ,并对其进行压缩、加密 ,以此来跟踪、抵制GIS空间数据产品的非法流通、非法复制 ,有效地保护数据生产单位的合法权益。运用本文方法已开发出了相应的应用软... 提出了在GIS空间数据中隐藏标识数据生产单位版权以及用户使用权属的数字水印 ,并对其进行压缩、加密 ,以此来跟踪、抵制GIS空间数据产品的非法流通、非法复制 ,有效地保护数据生产单位的合法权益。运用本文方法已开发出了相应的应用软件 。 展开更多
关键词 GIS空间数据 数字水印 信息隐藏
下载PDF
基于图像的信息隐藏检测算法和实现技术研究综述 被引量:20
14
作者 夏煜 郎荣玲 +1 位作者 曹卫兵 戴冠中 《计算机研究与发展》 EI CSCD 北大核心 2004年第4期728-736,共9页
基于图像的信息隐藏及分析技术是信息安全领域的一个重要方面 信息隐藏技术包括了隐写术和数字水印 信息隐藏检测技术是信息隐藏技术的攻击技术 通过基于图像的信息隐藏检测技术 ,可以判断图像中是否存在信息的隐藏和嵌入 基于图像... 基于图像的信息隐藏及分析技术是信息安全领域的一个重要方面 信息隐藏技术包括了隐写术和数字水印 信息隐藏检测技术是信息隐藏技术的攻击技术 通过基于图像的信息隐藏检测技术 ,可以判断图像中是否存在信息的隐藏和嵌入 基于图像的信息隐藏检测技术包括了数字图像特征分析、检测算法和实现技术 提出了基于图像的信息隐藏检测技术的知识体系 重点阐述了多种基于图像的信息隐藏检测算法 ,并进行了理论分析和实验测试 分析了现有的几种基于图像的信息隐藏的实现技术 。 展开更多
关键词 信息隐藏检测 隐写术 数字水印 隐写术分析
下载PDF
数字水印技术及进展 被引量:27
15
作者 张勇 赵东宁 李德毅 《解放军理工大学学报(自然科学版)》 EI 2003年第3期1-5,共5页
阐述了数字水印技术产生的必然性 ,分析了数字水印技术的研究现状 ,并简要叙述了云数字水印技术 ,探讨了数字水印技术的特点及其各种攻击方式 ,举例说明了目前数字水印在商业上的应用。数字水印技术的研究对数字内容的版权保护有重大实... 阐述了数字水印技术产生的必然性 ,分析了数字水印技术的研究现状 ,并简要叙述了云数字水印技术 ,探讨了数字水印技术的特点及其各种攻击方式 ,举例说明了目前数字水印在商业上的应用。数字水印技术的研究对数字内容的版权保护有重大实用价值和实践意义。 展开更多
关键词 数字水印 信息隐藏 版权保护 云数字水印
下载PDF
数字水印技术研究进展 被引量:161
16
作者 易开祥 石教英 孙鑫 《中国图象图形学报(A辑)》 CSCD 北大核心 2001年第2期111-117,共7页
随着因特网的日益普及 ,多媒体信息交流达到了前所未有的深度和广度 ,但作品侵权也随之更加容易 ,篡改也更加方便 ,因此 ,如何保护作品版权已受到人们的高度重视 ,而如今信息隐藏技术 ,特别是数字水印技术作为版权保护的重要手段 ,已得... 随着因特网的日益普及 ,多媒体信息交流达到了前所未有的深度和广度 ,但作品侵权也随之更加容易 ,篡改也更加方便 ,因此 ,如何保护作品版权已受到人们的高度重视 ,而如今信息隐藏技术 ,特别是数字水印技术作为版权保护的重要手段 ,已得到广泛的研究和应用 .为了使人们对该技术有一个较全面的了解 ,因而对数字水印技术的研究与进展情况进行了较系统的论述 ,即首先对信息隐藏技术进行了介绍 ,并对该技术进行了分类 ,然后重点分析了数字水印技术的模型、典型算法及其攻击方法 。 展开更多
关键词 信息隐藏 数字水印 版权保护 水印攻击分析
下载PDF
视频水印技术综述 被引量:23
17
作者 张江 赵黎 杨士强 《计算机应用》 CSCD 北大核心 2005年第4期850-852,共3页
介绍了视频水印技术的原理和主要应用领域,分析了视频水印技术的特点和面临的挑 战,阐述了视频水印的模型及算法分类,探讨了视频水印的发展趋势。
关键词 数字水印 视频水印 信息隐藏 版权保护
下载PDF
基于小波变换的数字水印隐藏与检测算法 被引量:129
18
作者 钮心忻 杨义先 《计算机学报》 EI CSCD 北大核心 2000年第1期21-27,共7页
主要研究了在数字语音信号中加入数字水印的方法 ,提出了一种基于小波变换的数字水印隐藏与检测算法 ,用这种算法隐藏水印具有很强的隐蔽性 ,对原始语音的影响基本上察觉不出来 .叠加了水印的语音在经过多种强干扰及各种信号处理的变换... 主要研究了在数字语音信号中加入数字水印的方法 ,提出了一种基于小波变换的数字水印隐藏与检测算法 ,用这种算法隐藏水印具有很强的隐蔽性 ,对原始语音的影响基本上察觉不出来 .叠加了水印的语音在经过多种强干扰及各种信号处理的变换之后 ,使用本算法仍能正确检测出水印的存在 ,如它可以抵抗强噪声干扰、去噪算法对信号进行去噪处理、语音信号的有损压缩以及信号的重新采样等 . 展开更多
关键词 数字水印 小波变换 信息隐藏 信息检测 语音信号
下载PDF
信息隐藏理论与关键技术研究 被引量:14
19
作者 钮心忻 杨义先 吴志军 《电信科学》 北大核心 2004年第12期28-30,共3页
本项目主要研究了信息隐藏的基本模型,在数字图像、音频、视频、文本中的信息隐藏和数字水印算法,以及信息隐藏检测的基本方法。
关键词 信息隐藏 数字水印算法 数字图像 视频 音频 基本模型 文本
下载PDF
一种基于动直线的多幅图像分存方法 被引量:16
20
作者 闫伟齐 丁玮 齐东旭 《软件学报》 EI CSCD 北大核心 2000年第9期1176-1180,共5页
Shamir给出了一种基于拉格朗日插值的密码学分存方案 ,该文将其思想引入到图像信息安全处理当中 ,提出了用动直线进行多幅图像分存的方法 ,并阐述了这一算法的数学基础 .此外 ,在进行图像分存时考虑了更多的原始图像 ,采用高次有理曲线... Shamir给出了一种基于拉格朗日插值的密码学分存方案 ,该文将其思想引入到图像信息安全处理当中 ,提出了用动直线进行多幅图像分存的方法 ,并阐述了这一算法的数学基础 .此外 ,在进行图像分存时考虑了更多的原始图像 ,采用高次有理曲线进行图像分存计算 ,并分析比较了基于拉格朗日插值的分存算法和基于动直线的分存算法在多幅图像分存上的异同 ,指出了基于拉格朗日插值的图像分存算法在实际应用中存在的问题 .最后 ,给出了采用动直线进行图像分存的实验结果 . 展开更多
关键词 信息隐藏 图像分存 信息安全 密码学
下载PDF
上一页 1 2 16 下一页 到第
使用帮助 返回顶部