期刊文献+
共找到348篇文章
< 1 2 18 >
每页显示 20 50 100
Robust zero-watermarking algorithm based on discrete wavelet transform and daisy descriptors for encrypted medical image
1
作者 Yiyi Yuan Jingbing Li +3 位作者 Jing Liu Uzair Aslam Bhatti Zilong Liu Yen-wei Chen 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第1期40-53,共14页
In the intricate network environment,the secure transmission of medical images faces challenges such as information leakage and malicious tampering,significantly impacting the accuracy of disease diagnoses by medical ... In the intricate network environment,the secure transmission of medical images faces challenges such as information leakage and malicious tampering,significantly impacting the accuracy of disease diagnoses by medical professionals.To address this problem,the authors propose a robust feature watermarking algorithm for encrypted medical images based on multi-stage discrete wavelet transform(DWT),Daisy descriptor,and discrete cosine transform(DCT).The algorithm initially encrypts the original medical image through DWT-DCT and Logistic mapping.Subsequently,a 3-stage DWT transformation is applied to the encrypted medical image,with the centre point of the LL3 sub-band within its low-frequency component serving as the sampling point.The Daisy descriptor matrix for this point is then computed.Finally,a DCT transformation is performed on the Daisy descriptor matrix,and the low-frequency portion is processed using the perceptual hashing algorithm to generate a 32-bit binary feature vector for the medical image.This scheme utilises cryptographic knowledge and zero-watermarking technique to embed watermarks without modifying medical images and can extract the watermark from test images without the original image,which meets the basic re-quirements of medical image watermarking.The embedding and extraction of water-marks are accomplished in a mere 0.160 and 0.411s,respectively,with minimal computational overhead.Simulation results demonstrate the robustness of the algorithm against both conventional attacks and geometric attacks,with a notable performance in resisting rotation attacks. 展开更多
关键词 daisy descriptor DCT DWT encryption domain medical image zero-watermarkING
下载PDF
A Smart English Text Zero-Watermarking Approach Based on Third-Level Order and Word Mechanism of Markov Model 被引量:9
2
作者 Fahd N.Al-Wesabi 《Computers, Materials & Continua》 SCIE EI 2020年第11期1137-1156,共20页
Text information is principally dependent on the natural languages.Therefore,improving security and reliability of text information exchanged via internet network has become the most difficult challenge that researche... Text information is principally dependent on the natural languages.Therefore,improving security and reliability of text information exchanged via internet network has become the most difficult challenge that researchers encounter.Content authentication and tampering detection of digital contents have become a major concern in the area of communication and information exchange via the Internet.In this paper,an intelligent text Zero-Watermarking approach SETZWMWMM(Smart English Text Zero-Watermarking Approach Based on Mid-Level Order and Word Mechanism of Markov Model)has been proposed for the content authentication and tampering detection of English text contents.The SETZWMWMM approach embeds and detects the watermark logically without altering the original English text document.Based on Hidden Markov Model(HMM),Third level order of word mechanism is used to analyze the interrelationship between contexts of given English texts.The extracted features are used as a watermark information and integrated with digital zero-watermarking techniques.To detect eventual tampering,SETZWMWMM has been implemented and validated with attacked English text.Experiments were performed on four datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results show that our method is more sensitive and efficient for all kinds of tampering attacks with high level accuracy of tampering detection than compared methods. 展开更多
关键词 Content authentication hidden Markov model zero-watermarkING NLP tampering detection.
下载PDF
An Audio Zero-Watermark Scheme Based on Energy Comparing 被引量:7
3
作者 YANG Yu LEI Min +3 位作者 CHENG Mingzhi LIU Bohuai LIN Guoyuan XIAO Da 《China Communications》 SCIE CSCD 2014年第7期110-116,共7页
Zero-watermark technique,embedding watermark without modifying carriers,has been broadly applied for copyright protection of images.However,there is little research on audio zerowatermark.This paper proposes an audio ... Zero-watermark technique,embedding watermark without modifying carriers,has been broadly applied for copyright protection of images.However,there is little research on audio zerowatermark.This paper proposes an audio zero-watermark scheme based on energy relationship between adjacent audio sections.Taking use of discrete wavelet transformation(DWT),it gets power approximations,or energies,of audio segments.Then,it extracts the audio profile,i.e.the zero-watermark,according to the relative size of energies of consecutive fragments.The experimental results demonstrate that the proposed scheme is robust against general malicious attacks including noise addition,resampling,low-pass filtering,etc.,and this approach effectively solves the contradiction between inaudibility and robustness. 展开更多
关键词 zero-watermark audio water-marking scheme energy comparing
下载PDF
A Robust Zero-Watermarking Based on SIFT-DCT for Medical Images in the Encrypted Domain 被引量:5
4
作者 Jialing Liu Jingbing Li +4 位作者 Yenwei Chen Xiangxi Zou Jieren Cheng Yanlin Liu Uzair Aslam Bhatti 《Computers, Materials & Continua》 SCIE EI 2019年第7期363-378,共16页
Remote medical diagnosis can be realized by using the Internet,but when transmitting medical images of patients through the Internet,personal information of patients may be leaked.Aim at the security of medical inform... Remote medical diagnosis can be realized by using the Internet,but when transmitting medical images of patients through the Internet,personal information of patients may be leaked.Aim at the security of medical information system and the protection of medical images,a novel robust zero-watermarking based on SIFT-DCT(Scale Invariant Feature Transform-Discrete Cosine Transform)for medical images in the encrypted domain is proposed.Firstly,the original medical image is encrypted in transform domain based on Logistic chaotic sequence to enhance the concealment of original medical images.Then,the SIFT-DCT is used to extract the feature sequences of encrypted medical images.Next,zero-watermarking technology is used to ensure that the region of interest of medical images are not changed.Finally,the robust of the algorithm is evaluated by the correlation coefficient between the original watermark and the attacked watermark.A series of attack experiments are carried out on this method,and the results show that the algorithm is not only secure,but also robust to both traditional and geometric attacks,especially in clipping attacks. 展开更多
关键词 ROBUSTNESS CT Image zero-watermarkING SIFT-DCT encrypted domain
下载PDF
Audio Zero-Watermark Scheme Based on Discrete Cosine Transform-Discrete Wavelet TransformSingular Value Decomposition 被引量:7
5
作者 Min Lei Yu Yang +2 位作者 XiaoMing Liu MingZhi Cheng Rui Wang 《China Communications》 SCIE CSCD 2016年第7期117-121,共5页
Traditional watermark embedding schemes inevitably modify the data in a host audio signal and lead to the degradation of the host signal.In this paper,a novel audio zero-watermarking algorithm based on discrete wavele... Traditional watermark embedding schemes inevitably modify the data in a host audio signal and lead to the degradation of the host signal.In this paper,a novel audio zero-watermarking algorithm based on discrete wavelet transform(DWT),discrete cosine transform(DCT),and singular value decomposition(SVD) is presented.The watermark is registered by performing SVD on the coefficients generated through DWT and DCT to avoid data modification and host signal degradation.Simulation results show that the proposed zero-watermarking algorithm is strongly robust to common signal processing methods such as requantization,MP3 compression,resampling,addition of white Gaussian noise,and low-pass filtering. 展开更多
关键词 zero-watermark discrete wavelet transform discrete cosine transform singular value decomposition
下载PDF
A Novel Robust Zero-Watermarking Algorithm for Audio Based on Sparse Representation 被引量:1
6
作者 Longting Xu Daiyu Huang +4 位作者 Xing Guo Wei Rao Yunyun Ji Ruoyi Li Xiaochen Lu 《China Communications》 SCIE CSCD 2021年第8期237-248,共12页
Behind the prevalence of multimedia technology,digital copyright disputes are becoming increasingly serious.The digital watermarking prevention technique against the copyright infringement needs to be improved urgentl... Behind the prevalence of multimedia technology,digital copyright disputes are becoming increasingly serious.The digital watermarking prevention technique against the copyright infringement needs to be improved urgently.Among the proposed technologies,zero-watermarking has been favored recently.In order to improve the robustness of the zero-watermarking,a novel robust audio zerowatermarking method based on sparse representation is proposed.The proposed scheme is mainly based on the K-singular value decomposition(K-SVD)algorithm to construct an optimal over complete dictionary from the background audio signal.After that,the orthogonal matching pursuit(OMP)algorithm is used to calculate the sparse coefficient of the segmented test audio and generate the corresponding sparse coefficient matrix.Then,the mean value of absolute sparse coefficients in the sparse matrix of segmented speech is calculated and selected,and then comparing the mean absolute coefficient of segmented speech with the average value of the selected coefficients to realize the embedding of zero-watermarking.Experimental results show that the proposed audio zerowatermarking algorithm based on sparse representation performs effectively in resisting various common attacks.Compared with the baseline works,the proposed method has better robustness. 展开更多
关键词 zero-watermarkING K-singular value decomposition dictionary learning sparse representtion
下载PDF
Novel Zero-Watermarking Scheme Based on DWT-DCT 被引量:3
7
作者 Yu Yang Min Lei +2 位作者 Xiaoming Liu Zhiguo Qu Cheng Wang 《China Communications》 SCIE CSCD 2016年第7期122-126,共5页
Essential characteristics for watermark registration and detection without data modification can be used in anaudio zero-watermarking scheme.In this paper,a novel audio zero-watermarking scheme based on discrete wavel... Essential characteristics for watermark registration and detection without data modification can be used in anaudio zero-watermarking scheme.In this paper,a novel audio zero-watermarking scheme based on discrete wavelet transform(DWT) and discrete cosine transform(DCT) is presented.Thewatermark is registered by comparing the mean absolute values of the adjacent frame coefficients after DWT and DCT.Simulation results show that the proposed scheme is stronglyrobusttocommon attacks such as AWGN,downsampling,low-pass filtering,requantization,and MP3 compression.A performance analysis of the proposed scheme shows that all bit error rates after attacks are zero. 展开更多
关键词 zero-watermark discrete wavelets transform discrete cosine transform
下载PDF
Research on Copyright Protection Method of Material Genome Engineering Data Based on Zero-Watermarking 被引量:2
8
作者 Lulu Cui Yabin Xu 《Journal on Big Data》 2020年第2期53-62,共10页
In order to effectively solve the problem of copyright protection of materials genome engineering data,this paper proposes a method for copyright protection of materials genome engineering data based on zero-watermark... In order to effectively solve the problem of copyright protection of materials genome engineering data,this paper proposes a method for copyright protection of materials genome engineering data based on zero-watermarking technology.First,the important attribute values are selected from the materials genome engineering database;then,use the method of remainder to group the selected attribute values and extract eigenvalues;then,the eigenvalues sequence is obtained by the majority election method;finally,XOR the sequence with the actual copyright information to obtain the watermarking information and store it in the third-party authentication center.When a copyright dispute requires copyright authentication for the database to be detected.First,the zero-watermarking construction algorithm is used to obtain an eigenvalues sequence;then,this sequence is XORed with the watermarking information stored in the third-party authentication center to obtain copyright information to-be-detected.Finally,the ownership is determined by calculating the similarity between copyright information to-be-detected and copyright information that has practical significance.The experimental result shows that the zero-watermarking method proposed in this paper can effectively resist various common attacks,and can well achieve the copyright protection of material genome engineering database. 展开更多
关键词 Material genome engineering copyright protection zero-watermarkING majority voting
下载PDF
Application of Zero-Watermarking for Medical Image in Intelligent Sensor Network Security
9
作者 Shixin Tu Yuanyuan Jia +1 位作者 Jinglong Du Baoru Han 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第7期293-321,共29页
The field of healthcare is considered to be the most promising application of intelligent sensor networks.However,the security and privacy protection ofmedical images collected by intelligent sensor networks is a hot ... The field of healthcare is considered to be the most promising application of intelligent sensor networks.However,the security and privacy protection ofmedical images collected by intelligent sensor networks is a hot problem that has attracted more and more attention.Fortunately,digital watermarking provides an effective method to solve this problem.In order to improve the robustness of the medical image watermarking scheme,in this paper,we propose a novel zero-watermarking algorithm with the integer wavelet transform(IWT),Schur decomposition and image block energy.Specifically,we first use IWT to extract low-frequency information and divide them into non-overlapping blocks,then we decompose the sub-blocks by Schur decomposition.After that,the feature matrix is constructed according to the relationship between the image block energy and the whole image energy.At the same time,we encrypt watermarking with the logistic chaotic position scrambling.Finally,the zero-watermarking is obtained by XOR operation with the encrypted watermarking.Three indexes of peak signal-to-noise ratio,normalization coefficient(NC)and the bit error rate(BER)are used to evaluate the robustness of the algorithm.According to the experimental results,most of the NC values are around 0.9 under various attacks,while the BER values are very close to 0.These experimental results show that the proposed algorithm is more robust than the existing zero-watermarking methods,which indicates it is more suitable for medical image privacy and security protection. 展开更多
关键词 Intelligent sensor network medical image zero-watermarkING integer wavelet transform schur decomposition
下载PDF
ROBUST ZERO-WATERMARK ALGORITHMS BASED ON NUMERICAL RELATIONSHIP BETWEEN ADJACENT BLOCKS
10
作者 Zhang Yifeng Jia Chengwei +2 位作者 Wang Xuechen Wang Kai Pei Wenjiang 《Journal of Electronics(China)》 2012年第5期392-399,共8页
In this paper, three robust zero-watermark algorithms named Direct Current coefficient RElationship (DC-RE), CUmulant combined Singular Value Decomposition (CU-SVD), and CUmulant combined Singular Value Decomposition ... In this paper, three robust zero-watermark algorithms named Direct Current coefficient RElationship (DC-RE), CUmulant combined Singular Value Decomposition (CU-SVD), and CUmulant combined Singular Value Decomposition RElationship (CU-SVD-RE) are proposed. The algorithm DC-RE gets the feature vector from the relationship of DC coefficients between adjacent blocks, CU-SVD gets the feature vector from the singular value of third-order cumulants, while CU-SVD-RE combines the essence of the first two algorithms. Specially, CU-SVD-RE gets the feature vector from the relationship between singular values of third-order cumulants. Being a cross-over studying field of watermarking and cryptography, the zero-watermark algorithms are robust without modifying the carrier. Numerical simulation obviously shows that, under geometric attacks, the performance of CU-SVD-RE and DC-RE algorithm are better and all three proposed algorithms are robust to various attacks, such as median filter, salt and pepper noise, and Gaussian low-pass filter attacks. 展开更多
关键词 zero-watermark Singular value Third-order cumulants Feature vector
下载PDF
A Zero-Watermark Scheme Based on Quaternion Generalized Fourier Descriptor for Multiple Images
11
作者 Baowei Wang Weishen Wang +1 位作者 Peng Zhao Naixue Xiong 《Computers, Materials & Continua》 SCIE EI 2022年第5期2633-2652,共20页
Most of the existing zero-watermark schemes for medical images are only appropriate for a single grayscale image.When they protect a large number of medical images,repeating operations will cause a significant amount ... Most of the existing zero-watermark schemes for medical images are only appropriate for a single grayscale image.When they protect a large number of medical images,repeating operations will cause a significant amount of time and storage costs.Hence,this paper proposes an efficient zero-watermark scheme for multiple color medical images based on quaternion generalized Fourier descriptor(QGFD).Firstly,QGFD is utilized to compute the feature invariants of each color image,then the representative features of each image are selected,stacked,and reshaped to generate a feature matrix,which is then binarized to get a binary feature image.Copyright information can be converted into the copyright image by using QR code technology,which contains more information.Finally,the zero-watermark image is constructed by executing the XOR operation on the copyright image and the feature image scrambled by the Cat map.In the experiment,different parameters are selected to determine the maximum number of images that the proposed scheme can protect simultaneously while achieving good robustness.The experimental results demonstrate that the proposed scheme can effectively resist common attacks,geometric attacks and joint attacks,and effectively improve the operation efficiency of the algorithm,thus effectively decreasing the time and storage cost of copyright protection for lots of medical images. 展开更多
关键词 Copyright protection color medical image zero-watermark QGFD
下载PDF
A Novel Zero-Watermark Copyright Authentication Scheme Based on Lifting Wavelet and Harris Corner Detection 被引量:1
12
作者 FAN Li GAO Tiegang YANG Qunting 《Wuhan University Journal of Natural Sciences》 CAS 2010年第5期408-414,共7页
In this paper,a novel zero-watermark copyright authentication scheme based on Internet public certification system is proposed.This approach utilizes Haar integer wavelet transform based on a lifting scheme and adapti... In this paper,a novel zero-watermark copyright authentication scheme based on Internet public certification system is proposed.This approach utilizes Haar integer wavelet transform based on a lifting scheme and adaptive Harris corner detection to extract image features,which will be used to produce a binary feature map,and the map is very crucial to the generation of watermark registered later.By properly choosing the parameters of aforementioned techniques such as the threshold T and the radius of local feature region R,the feature map is so much more stable and distinguishing that it can be used to construct robust watermark.Simulations demonstrate that the proposed scheme is resistant to many kinds of signal processing and malicious attacks such as Gaussian blurring,additive noising,JPEG lossy compression,cropping,scaling and slight rotation operation.Compared with a relative scheme such as that of Chang's,the scheme in this paper is more practicable and reliable and can be applied to the area of copyright protection. 展开更多
关键词 zero-watermark copyright authentication Harris corner detection integer wavelet transform ROBUSTNESS
原文传递
基于四元数分数阶广义拉盖尔图像矩的空间域零水印算法
13
作者 王晶 贾晓强 《渭南师范学院学报》 2025年第2期87-94,共8页
现有的基于空间域零水印算法缺乏图像内容信息丢失检测的能力,特别是当图像遭受大面积裁切、随机涂抹或图像行列移除等攻击,水印提取算法就会失效。为了提高零水印算法抵抗图像遭受大面积裁切攻击的鲁棒性,提出一种基于四元数分数阶广... 现有的基于空间域零水印算法缺乏图像内容信息丢失检测的能力,特别是当图像遭受大面积裁切、随机涂抹或图像行列移除等攻击,水印提取算法就会失效。为了提高零水印算法抵抗图像遭受大面积裁切攻击的鲁棒性,提出一种基于四元数分数阶广义拉盖尔图像矩的空间域零水印算法。首先介绍分数阶广义拉盖尔多项式,其次构建四元数分数阶广义拉盖尔矩及不变量,最后设计彩色图像零水印算法。实验结果证明,所提出的零水印算法对常见的几何变换攻击具有一定的鲁棒性,同时对于滤波、有损压缩,特别是对图像大尺度剪切攻击具有较好的检测能力。 展开更多
关键词 四元数 拉盖尔多项式 零水印 鲁棒性
下载PDF
基于以太坊的服装设计版权方案
14
作者 陈永强 周江臣 何凯 《计算机技术与发展》 2024年第8期209-214,共6页
现有的中心化服装设计版权体系中,低质量抄袭作品层出不穷,而作品的审核周期长且完成度不是非常高的阶段性成果又无法得到认可,使得创作者维权时往往缺乏这一时间段的时间证明。此外,作品的版权确权并不简洁,不利于版权的使用,数据本身... 现有的中心化服装设计版权体系中,低质量抄袭作品层出不穷,而作品的审核周期长且完成度不是非常高的阶段性成果又无法得到认可,使得创作者维权时往往缺乏这一时间段的时间证明。此外,作品的版权确权并不简洁,不利于版权的使用,数据本身也有遭受攻击的风险。为解决上述问题,提出了一个基于区块链、零水印和星际文件系统(IPFS)的服装设计版权方案。区块链的不可篡改特性保证了数据安全,使得其与传统版权保护流程能够有效结合。同时将区块链取代以往零水印中的可信知识产权保护(IPR)中央权威机构,消除了第三方带来的隐患。智能合约结合时间戳功能可以准确提供各步骤的线上记录,让创作者能更好提供作品从草稿到成品的时间线证明,以便在版权纠纷中维护自身权益。而感知哈希也能剔除掉抄袭作品,从抄袭作品的登记源头来控制低级抄袭作品的出现,保证创作者的著作权。实验表明,整体功能完善、安全性高,其中零水印方案具备可行性和有效性,作品登记和查询消耗的以太坊资源Gas成本低。 展开更多
关键词 以太坊 零水印 服装设计 智能合约 星际文件系统
下载PDF
基于双混沌映射的遥感图像零水印算法 被引量:4
15
作者 杨兵兵 闫浩文 +4 位作者 张黎明 徐欣钰 王小龙 严清博 侯昭阳 《地理与地理信息科学》 CSCD 北大核心 2024年第3期21-28,共8页
现有遥感图像零水印算法多为特定类型的遥感图像设计,普适性较差,且对水印组合攻击的鲁棒性不强。该文提出一种基于双混沌映射的遥感图像零水印算法。①对遥感图像进行非下采样剪切波变换,选取低频图像进行离散余弦变换;②对变换后的图... 现有遥感图像零水印算法多为特定类型的遥感图像设计,普适性较差,且对水印组合攻击的鲁棒性不强。该文提出一种基于双混沌映射的遥感图像零水印算法。①对遥感图像进行非下采样剪切波变换,选取低频图像进行离散余弦变换;②对变换后的图像进行分块,并对各子块进行Schur分解,通过比较每个子块上三角矩阵中第一个元素值和均值的大小构建特征矩阵;③利用一维Logistic映射置乱遥感图像,与特征矩阵进行异或运算得到一个二值序列;①结合2D-LALM-Tent映射和Arnold置乱水印图像,对前述二值序列和置乱后水印的二值序列进行异或运算得到零水印。实验表明,该算法对不同类型遥感图像的适用性较好,且对水印组合攻击的鲁棒性较强,无精度损失,可用于多种类型遥感图像的版权保护,为遥感图像的共享提供安全保障。 展开更多
关键词 双混沌映射 2D-LALM TENT映射 遥感图像 零水印算法
下载PDF
基于ResNet50模型的矢量地图零水印算法
16
作者 张永利 卢浩 《地理与地理信息科学》 CSCD 北大核心 2024年第6期1-5,共5页
针对传统矢量地图零水印算法存在的抗几何攻击和要素增删攻击能力不足等问题,该文提出一种基于ResNet50模型的矢量地图零水印算法,在不改变矢量地图数据的情况下保护地图版权。该算法通过采用道格拉斯—普克算法提取矢量地图的复杂特征... 针对传统矢量地图零水印算法存在的抗几何攻击和要素增删攻击能力不足等问题,该文提出一种基于ResNet50模型的矢量地图零水印算法,在不改变矢量地图数据的情况下保护地图版权。该算法通过采用道格拉斯—普克算法提取矢量地图的复杂特征信息,将坐标集合映射为适合ResNet50模型处理的序列,通过ResNet50模型自动提取矢量地图数据中的特征,以实现零水印的构建。选择西安市餐饮、村庄、乡镇村道矢量地图数据集作为实验数据进行算法验证,结果表明,该算法在抗几何攻击和要素增删攻击方面均表现出色,在无损版权保护方面具有广阔的应用前景。 展开更多
关键词 矢量地图 零水印 ResNet50 版权保护 地理信息安全
下载PDF
基于NMF和Hu不变矩的遥感影像零水印算法
17
作者 库莉 耿晴 詹伟 《地理与地理信息科学》 CSCD 北大核心 2024年第6期6-10,15,共6页
为满足遥感影像数据在遭受大幅裁剪(强裁剪)后仍能有效保护版权的需求,该文提出一种基于非负矩阵分解(Nonnegative Matrix Factorization,NMF)和Hu不变矩的零水印算法。首先将原始影像数据分解为系数矩阵和基矩阵,然后计算整体Hu矩不变... 为满足遥感影像数据在遭受大幅裁剪(强裁剪)后仍能有效保护版权的需求,该文提出一种基于非负矩阵分解(Nonnegative Matrix Factorization,NMF)和Hu不变矩的零水印算法。首先将原始影像数据分解为系数矩阵和基矩阵,然后计算整体Hu矩不变量均值和分块不变量均值,将两者得到的特征值二值化后与版权信息进行异或操作以生成零水印。其中,系数矩阵及零水印需存入第三方机构,为版权验证奠定基础。在检测版权信息时,利用NMF可复原特性,从待检测数据中反算出原始数据,并提取零水印以进行版权信息比对。实验结果表明,该算法具有版权保护的唯一性和鲁棒性,尤其在抗强裁剪方面表现突出,显示出在遥感影像数据版权保护领域的应用价值。 展开更多
关键词 遥感影像 零水印 非负矩阵分解 HU矩
下载PDF
运用特征不变量的高精地图零水印算法
18
作者 张明旺 张黎明 谭涛 《地理与地理信息科学》 CSCD 北大核心 2024年第6期11-15,共5页
高精地图作为车辆导航和自动驾驶的核心组成部分,具有精度高、包含敏感信息、成本高等特点,其安全和保密至关重要。数字水印作为信息安全领域的重要工具,可以为高精地图数据提供认证和保护,但目前缺少针对高精地图的水印算法。该文根据... 高精地图作为车辆导航和自动驾驶的核心组成部分,具有精度高、包含敏感信息、成本高等特点,其安全和保密至关重要。数字水印作为信息安全领域的重要工具,可以为高精地图数据提供认证和保护,但目前缺少针对高精地图的水印算法。该文根据高精地图的特性,提出一种高精地图零水印算法:根据高精地图用于表示车道信息的参数三次曲线数量确定水印索引;利用两个车道信息节点中参数三次曲线数量的奇偶性是否相同确定水印信息;结合水印索引依照投票原则构建特征矩阵,与加密后的水印图像进行异或运算生成零水印。实验结果表明,该算法在受到较高程度的几何攻击、增删攻击后仍能提取到较完整的水印信息,具有良好的鲁棒性。 展开更多
关键词 高精地图 特征不变量 零水印 版权保护 Open DRIVE
下载PDF
基于组合变换域的彩色图像大容量零水印算法
19
作者 韩绍程 刘欢 《北京航空航天大学学报》 EI CAS CSCD 北大核心 2024年第7期2093-2103,共11页
针对现有大多数彩色图像零水印方案中水印嵌入容量小且抗几何攻击鲁棒性能不佳等问题,提出一种基于组合变换域和位平面分解的大容量鲁棒零水印算法。对彩色载体图像的R、G、B通道分别进行快速有限剪切波变换(FFST),并对变换后的各低频... 针对现有大多数彩色图像零水印方案中水印嵌入容量小且抗几何攻击鲁棒性能不佳等问题,提出一种基于组合变换域和位平面分解的大容量鲁棒零水印算法。对彩色载体图像的R、G、B通道分别进行快速有限剪切波变换(FFST),并对变换后的各低频子带进行非重叠分块置乱,将置乱后的各子带的分块离散余弦变换(DCT)系数用于构造四元数离散余弦变换(QDCT)系数矩阵;在每个QDCT系数矩阵中选取两个低频系数,利用其各个实部和虚部的符号极性构造8个二值鲁棒特征矩阵;将经过正交拉丁方置乱加密后的灰度水印图像按位分解,把位分解后的8个二值位平面分别与以上二值鲁棒特征矩阵进行异或并重组得到灰度级认证零水印。此外,在水印检测前,采用ORB算法对待认证图像进行几何校正。实验结果表明,所提算法水印嵌入容量和安全性高,且对于常规非几何攻击和几何攻击均具有较强的鲁棒性。 展开更多
关键词 零水印 彩色图像 灰度级水印 组合变换域 位平面分解
下载PDF
结合空域不变量的变换域零水印二次检测方案 被引量:13
20
作者 季称利 杨晓元 +2 位作者 张崇 韩益亮 魏立线 《计算机工程》 CAS CSCD 北大核心 2004年第14期105-107,115,共4页
利用变换域水印技术对诸如压缩、滤波等信号处理具有较好鲁棒性的优点,结合空域中对几何变换具有抵抗力的常量来构造与检测零水印。实验证明,方案对剪切、数模转换处理、滤波、噪声、JPEG压缩、旋转等图像处理具有较强的鲁棒性。
关键词 数字图像 零水印 二次检测 重同步 comer中心角
下载PDF
上一页 1 2 18 下一页 到第
使用帮助 返回顶部