Watermarking is a widely used solution to the problems of authentication and copyright protection of digital media especially for images,videos,and audio data.Chaos is one of the emerging techniques adopted in image w...Watermarking is a widely used solution to the problems of authentication and copyright protection of digital media especially for images,videos,and audio data.Chaos is one of the emerging techniques adopted in image watermarking schemes due to its intrinsic cryptographic properties.This paper proposes a new chaotic hybrid watermarking method combining Discrete Wavelet Transform(DWT),Z-transform(ZT)and Bidiagonal Singular Value Decomposition(BSVD).The original image is decomposed into 3-level DWT,and then,ZT is applied on the HH3 and HL3 sub-bands.The watermark image is encrypted using Arnold Cat Map.BSVD for the watermark and transformed original image were computed,and the watermark was embedded by modifying singular values of the host image with the singular values of the watermark image.Robustness of the proposed scheme was examined using standard test images and assessed against common signal processing and geometric attacks.Experiments indicated that the proposed method is transparent and highly robust.展开更多
Traditional watermark embedding schemes inevitably modify the data in a host audio signal and lead to the degradation of the host signal.In this paper,a novel audio zero-watermarking algorithm based on discrete wavele...Traditional watermark embedding schemes inevitably modify the data in a host audio signal and lead to the degradation of the host signal.In this paper,a novel audio zero-watermarking algorithm based on discrete wavelet transform(DWT),discrete cosine transform(DCT),and singular value decomposition(SVD) is presented.The watermark is registered by performing SVD on the coefficients generated through DWT and DCT to avoid data modification and host signal degradation.Simulation results show that the proposed zero-watermarking algorithm is strongly robust to common signal processing methods such as requantization,MP3 compression,resampling,addition of white Gaussian noise,and low-pass filtering.展开更多
A new digital watermarking algorithm based on the contourlet transform is proposed to improve the robustness and anti-attack performances of digital watermarking. The algorithm uses the Arnold scrambling technique and...A new digital watermarking algorithm based on the contourlet transform is proposed to improve the robustness and anti-attack performances of digital watermarking. The algorithm uses the Arnold scrambling technique and the singular value decomposition (SVD) scheme. The Arnold scrambling technique is used to preprocess the watermark, and the SVD scheme is used to find the best suitable hiding points. After the contourlet transform of the carrier image, intermediate frequency sub-bands are decomposed to obtain the singularity values. Then the watermark bits scrambled in the Arnold rules are dispersedly embedded into the selected SVD points. Finally, the inverse contourlet transform is applied to obtain the carrier image with the watermark. In the extraction part, the watermark can be extracted by the semi-blind watermark extracting algorithm. Simulation results show that the proposed algorithm has better hiding and robustness performances than the traditional contourlet watermarking algorithm and the contourlet watermarking algorithm with SVD. Meanwhile, it has good robustness performances when the embedded watermark is attacked by Gaussian noise, salt- and-pepper noise, multiplicative noise, image scaling and image cutting attacks, etc. while security is ensured.展开更多
The singular value decomposition is derived when the Radon transform is restricted to functions which are square integrable on the unit ball in R-n with respect to the weight W-lambda(x). It fulfilles mainly by means ...The singular value decomposition is derived when the Radon transform is restricted to functions which are square integrable on the unit ball in R-n with respect to the weight W-lambda(x). It fulfilles mainly by means of the projection-slice theorem. The range of the Radon transform is spanned by products of Gegenbauer polynomials and spherical harmonics. The inverse transform of the those basis functions are given. This immediately leads to an inversion formula by series expansion and range characterizations.展开更多
A time-series similarity measurement method based on wavelet and matrix transform was proposed,and its anti-noise ability,sensitivity and accuracy were discussed. The time-series sequences were compressed into wavelet...A time-series similarity measurement method based on wavelet and matrix transform was proposed,and its anti-noise ability,sensitivity and accuracy were discussed. The time-series sequences were compressed into wavelet subspace,and sample feature vector and orthogonal basics of sample time-series sequences were obtained by K-L transform. Then the inner product transform was carried out to project analyzed time-series sequence into orthogonal basics to gain analyzed feature vectors. The similarity was calculated between sample feature vector and analyzed feature vector by the Euclid distance. Taking fault wave of power electronic devices for example,the experimental results show that the proposed method has low dimension of feature vector,the anti-noise ability of proposed method is 30 times as large as that of plain wavelet method,the sensitivity of proposed method is 1/3 as large as that of plain wavelet method,and the accuracy of proposed method is higher than that of the wavelet singular value decomposition method. The proposed method can be applied in similarity matching and indexing for lager time series databases.展开更多
To solve the homogeneous transformation equation of the form AX=XB in hand-eye calibration, where X represents an unknown transformation from the camera to the robot hand, and A and B denote the known movement transfo...To solve the homogeneous transformation equation of the form AX=XB in hand-eye calibration, where X represents an unknown transformation from the camera to the robot hand, and A and B denote the known movement transformations associated with the robot hand and the camera, respectively, this paper introduces a new linear decomposition algorithm which consists of singular value decomposition followed by the estimation of the optimal rotation matrix and the least squares equation to solve the rotation matrix of X. Without the requirements of traditional methods that A and B be rigid transformations with the same rotation angle, it enables the extension to non-rigid transformations for A and B. The details of our method are given, together with a short discussion of experimental results, showing that more precision and robustness can be achieved.展开更多
Securing medical data while transmission on the network is required because it is sensitive and life-dependent data.Many methods are used for protection,such as Steganography,Digital Signature,Cryptography,and Waterma...Securing medical data while transmission on the network is required because it is sensitive and life-dependent data.Many methods are used for protection,such as Steganography,Digital Signature,Cryptography,and Watermarking.This paper introduces a novel robust algorithm that combines discrete wavelet transform(DWT),discrete cosine transform(DCT),and singular value decomposition(SVD)digital image-watermarking algorithms.The host image is decomposed using a two-dimensional DWT(2D-DWT)to approximate low-frequency sub-bands in the embedding process.Then the sub-band low-high(LH)is decomposed using 2D-DWT to four new sub-bands.The resulting sub-band low-high(LH1)is decomposed using 2D-DWT to four new sub-bands.Two frequency bands,high-high(HH_(2))and high-low(HL_(2)),are transformed by DCT,and then the SVD is applied to the DCT coefficients.The strongest modified singular values(SVs)vary very little for most attacks,which is an important property of SVD watermarking.The two watermark images are encrypted using two layers of encryption,circular and chaotic encryption techniques,to increase security.The first encrypted watermark is embedded in the S component of the DCT components of the HL_(2)coefficients.The second encrypted watermark is embedded in the S component of the DCT components of the HH2 coefficients.The suggested technique has been tested against various attacks and proven to provide excellent stability and imperceptibility results.展开更多
针对水电机组振动信号故障特征提取难,提出一种融合小波变换(Wavelet Transform,WT)和奇异值分解(Singular Value Decomposition,SVD)相结合的故障特征提取方法。首先,通过小波阈值降噪消除强噪声对模型特征提取的干扰,再利用小波变换...针对水电机组振动信号故障特征提取难,提出一种融合小波变换(Wavelet Transform,WT)和奇异值分解(Singular Value Decomposition,SVD)相结合的故障特征提取方法。首先,通过小波阈值降噪消除强噪声对模型特征提取的干扰,再利用小波变换将降噪信号分解成不同频率的模态子序列,应用SVD理论提起子序列的SVD值作为特征,最终将特征输入RF模型中实现水电机组故障的快速识别与诊断。通过在公开数据集和真实机组案例中应用,验证了对水电机组故障诊断的高效性。展开更多
电力用户负荷种类的多样化造成变压器电压波动超出允许范围,严重影响电力系统的供电质量,因此提出基于奇异值分解的配电变压器有载自动调压方法。基于奇异值分解技术提取配电变压器分接头间的电压信号,使用比例积分微分(Proportion Inte...电力用户负荷种类的多样化造成变压器电压波动超出允许范围,严重影响电力系统的供电质量,因此提出基于奇异值分解的配电变压器有载自动调压方法。基于奇异值分解技术提取配电变压器分接头间的电压信号,使用比例积分微分(Proportion Integral Differential,PID)控制算法根据分接头间电压和额定电压范围之间的偏差输出控制信号,控制触发分接开关的导通与关断,实现配电变压器的有载自动调压。实验结果表明,设计方法可以通过控制分接开关位置维持电压的平稳,且不会对负载产生不利影响。展开更多
文摘Watermarking is a widely used solution to the problems of authentication and copyright protection of digital media especially for images,videos,and audio data.Chaos is one of the emerging techniques adopted in image watermarking schemes due to its intrinsic cryptographic properties.This paper proposes a new chaotic hybrid watermarking method combining Discrete Wavelet Transform(DWT),Z-transform(ZT)and Bidiagonal Singular Value Decomposition(BSVD).The original image is decomposed into 3-level DWT,and then,ZT is applied on the HH3 and HL3 sub-bands.The watermark image is encrypted using Arnold Cat Map.BSVD for the watermark and transformed original image were computed,and the watermark was embedded by modifying singular values of the host image with the singular values of the watermark image.Robustness of the proposed scheme was examined using standard test images and assessed against common signal processing and geometric attacks.Experiments indicated that the proposed method is transparent and highly robust.
基金supported by the Open Foundation of Jiangsu Engineering Center of Network Monitoring(Nanjing University of Information Science&Technology)(Grant No.KJR1509)the PAPD fundthe CICAEET fund
文摘Traditional watermark embedding schemes inevitably modify the data in a host audio signal and lead to the degradation of the host signal.In this paper,a novel audio zero-watermarking algorithm based on discrete wavelet transform(DWT),discrete cosine transform(DCT),and singular value decomposition(SVD) is presented.The watermark is registered by performing SVD on the coefficients generated through DWT and DCT to avoid data modification and host signal degradation.Simulation results show that the proposed zero-watermarking algorithm is strongly robust to common signal processing methods such as requantization,MP3 compression,resampling,addition of white Gaussian noise,and low-pass filtering.
基金The National Natural Science Foundation of China( No. 69092008)
文摘A new digital watermarking algorithm based on the contourlet transform is proposed to improve the robustness and anti-attack performances of digital watermarking. The algorithm uses the Arnold scrambling technique and the singular value decomposition (SVD) scheme. The Arnold scrambling technique is used to preprocess the watermark, and the SVD scheme is used to find the best suitable hiding points. After the contourlet transform of the carrier image, intermediate frequency sub-bands are decomposed to obtain the singularity values. Then the watermark bits scrambled in the Arnold rules are dispersedly embedded into the selected SVD points. Finally, the inverse contourlet transform is applied to obtain the carrier image with the watermark. In the extraction part, the watermark can be extracted by the semi-blind watermark extracting algorithm. Simulation results show that the proposed algorithm has better hiding and robustness performances than the traditional contourlet watermarking algorithm and the contourlet watermarking algorithm with SVD. Meanwhile, it has good robustness performances when the embedded watermark is attacked by Gaussian noise, salt- and-pepper noise, multiplicative noise, image scaling and image cutting attacks, etc. while security is ensured.
文摘The singular value decomposition is derived when the Radon transform is restricted to functions which are square integrable on the unit ball in R-n with respect to the weight W-lambda(x). It fulfilles mainly by means of the projection-slice theorem. The range of the Radon transform is spanned by products of Gegenbauer polynomials and spherical harmonics. The inverse transform of the those basis functions are given. This immediately leads to an inversion formula by series expansion and range characterizations.
基金Projects(60634020, 60904077, 60874069) supported by the National Natural Science Foundation of ChinaProject(JC200903180555A) supported by the Foundation Project of Shenzhen City Science and Technology Plan of China
文摘A time-series similarity measurement method based on wavelet and matrix transform was proposed,and its anti-noise ability,sensitivity and accuracy were discussed. The time-series sequences were compressed into wavelet subspace,and sample feature vector and orthogonal basics of sample time-series sequences were obtained by K-L transform. Then the inner product transform was carried out to project analyzed time-series sequence into orthogonal basics to gain analyzed feature vectors. The similarity was calculated between sample feature vector and analyzed feature vector by the Euclid distance. Taking fault wave of power electronic devices for example,the experimental results show that the proposed method has low dimension of feature vector,the anti-noise ability of proposed method is 30 times as large as that of plain wavelet method,the sensitivity of proposed method is 1/3 as large as that of plain wavelet method,and the accuracy of proposed method is higher than that of the wavelet singular value decomposition method. The proposed method can be applied in similarity matching and indexing for lager time series databases.
基金Project (No. 60703002) supported by the National Natural Science Foundation of China
文摘To solve the homogeneous transformation equation of the form AX=XB in hand-eye calibration, where X represents an unknown transformation from the camera to the robot hand, and A and B denote the known movement transformations associated with the robot hand and the camera, respectively, this paper introduces a new linear decomposition algorithm which consists of singular value decomposition followed by the estimation of the optimal rotation matrix and the least squares equation to solve the rotation matrix of X. Without the requirements of traditional methods that A and B be rigid transformations with the same rotation angle, it enables the extension to non-rigid transformations for A and B. The details of our method are given, together with a short discussion of experimental results, showing that more precision and robustness can be achieved.
基金This work was supported by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R308)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘Securing medical data while transmission on the network is required because it is sensitive and life-dependent data.Many methods are used for protection,such as Steganography,Digital Signature,Cryptography,and Watermarking.This paper introduces a novel robust algorithm that combines discrete wavelet transform(DWT),discrete cosine transform(DCT),and singular value decomposition(SVD)digital image-watermarking algorithms.The host image is decomposed using a two-dimensional DWT(2D-DWT)to approximate low-frequency sub-bands in the embedding process.Then the sub-band low-high(LH)is decomposed using 2D-DWT to four new sub-bands.The resulting sub-band low-high(LH1)is decomposed using 2D-DWT to four new sub-bands.Two frequency bands,high-high(HH_(2))and high-low(HL_(2)),are transformed by DCT,and then the SVD is applied to the DCT coefficients.The strongest modified singular values(SVs)vary very little for most attacks,which is an important property of SVD watermarking.The two watermark images are encrypted using two layers of encryption,circular and chaotic encryption techniques,to increase security.The first encrypted watermark is embedded in the S component of the DCT components of the HL_(2)coefficients.The second encrypted watermark is embedded in the S component of the DCT components of the HH2 coefficients.The suggested technique has been tested against various attacks and proven to provide excellent stability and imperceptibility results.
文摘针对水电机组振动信号故障特征提取难,提出一种融合小波变换(Wavelet Transform,WT)和奇异值分解(Singular Value Decomposition,SVD)相结合的故障特征提取方法。首先,通过小波阈值降噪消除强噪声对模型特征提取的干扰,再利用小波变换将降噪信号分解成不同频率的模态子序列,应用SVD理论提起子序列的SVD值作为特征,最终将特征输入RF模型中实现水电机组故障的快速识别与诊断。通过在公开数据集和真实机组案例中应用,验证了对水电机组故障诊断的高效性。
文摘电力用户负荷种类的多样化造成变压器电压波动超出允许范围,严重影响电力系统的供电质量,因此提出基于奇异值分解的配电变压器有载自动调压方法。基于奇异值分解技术提取配电变压器分接头间的电压信号,使用比例积分微分(Proportion Integral Differential,PID)控制算法根据分接头间电压和额定电压范围之间的偏差输出控制信号,控制触发分接开关的导通与关断,实现配电变压器的有载自动调压。实验结果表明,设计方法可以通过控制分接开关位置维持电压的平稳,且不会对负载产生不利影响。