您要查找的是不是:
- The watermarking algorithm adopts the DCT and encryption technologies to the embedded watermark image. 该算法首先对水印图像进行离散余弦变换,再对变换后的水印图像进行加密,然后将加密后的水印图像嵌入到DCT变换后的原始图像中。
- Experiment results showed that this watermarking image has better performance of invisibility and anti-attack of noise. 实验结果表明,该水印具有良好的不可见性和抗噪声攻击能力。
- A wavelet visible watermarking algorithm is proposed based on noise masking, then the improvement is made based on texture feature of watermark image. 摘要根据图像的噪声掩蔽性设计了一种小波域可见水印算法,并根据水印图像的纹理特征对算法作了进一步改进。
- First, adaptive wavelet transformation is acted on original image, and then mixed scrambling algorithm is adapted to treat with the watermarking image. 首先利用改进的自适应小波变换对原始图像进行处理,然后采用混合置乱算法对水印图像进行处理。
- The selection of the coefficients is based on the RLE of the binary watermark image and the key K2. 检测时,根据游程码值和小波系数变化幅度两个原则检测水印信息。
- A wavelet visible watermarking algorithm is proposed based on noise masking,then the improvement is made based on texture feature of watermark image. 根据图像的噪声掩蔽性设计了一种小波域可见水印算法,并根据水印图像的纹理特征对算法作了进一步改进。
- Utilize Y component of YUV color space to embed the watermark, calculated HVS. embed the encrypting watermark image transformed by the JPEG encodes to significant coefficient. 利用彩色图像的YUV色彩空间的Y分量嵌入水印。
- As the Zernike magnitude moments of a normalized image are RST invariant,the watermark image is embedded into the local area of the original image after reconstruction. 几何攻击能极大地破坏水印检测的同步性,微小的几何攻击就可能使得水印检测失败。
- First, the binary watermarking image was converted into a one-dimension sequence, which was then modulated with the m-sequence, before the audio signal was finally divided into segments and DCT was performed. 首先将二值水印图像经过降维操作转化为一维序列,再将一维序列与m序列做扩频调制,最后对音频信号进行分段离散余弦变换,把经过调制的水印信号经过量化处理过程嵌入到离散余弦变换后的系数中;
- It used Arnold transformation to encrypt the watermark image,then inserted the watermark image into the important coefficients from different orientations of the wavelet transformation. 利用Arnold置换方法对水印图像进行保密处理,再根据提出的数字水印算法,将水印图像嵌入到小波变换的不同方位的重要系数当中。
- The original binary watermark image was firstly encrypted pro rata through Human visual system (HVS) principle and embedded into the DWT low frequency sub-band of green components. 原始二值水印图像按比例进行分解,结合HVS原理,将分解的水印图像嵌入到绿色分量的低频和中低频三级小波变换系数中。
- So that the corrupted watermarked image can be corrected and the watermark can be detected correctly. (3)利用几何矩对水印图像经过的几何变换进行参数估计并校正,有效抵抗了几何攻击的问题。
- In the scheme, the embedded watermarking images are gray images which are scrambled, thereby increasing embedded information capacity and guaranting the safety of data. 算法中采用经过置乱变换的灰度图作为水印,不仅增加了嵌入的信息量,而且提高了水印的安全性。
- Then with the general fragile watermarking method,the tampered area of the watermarked image could be reflected in the ... 理论分析和仿真实验表明:该算法能有效地抵抗“伪认证攻击”,具有更好的安全性能。
- Meanwhile, any possible attacks on the watermarked image can be detected easily because of the embedded fragile watermark. 此外,由于在图像中嵌入了脆弱水印,对其可能受到的攻击可方便地进行检测。
- Sharpening the watermarked image with Laplacian before detecting could make the watermarking scheme more robust to attacks and get better detecting result. 为了进一步提高该水印算法的鲁棒性和改善检测结果,在水印检测前使用拉普拉斯算子对图像进行锐化处理,使得所嵌入水印能抗击更多攻击种类,并使检测结果更清晰。
- The tampered area of the watermarked image could be reflected in the watermarking difference map and the tampered intensity could be reflected in singular... 实验仿真结果表明该算法不仅提高了精确定位型水印算法的安全性,而且还可以估计出被篡改区域的篡改强度。
- The watermark is embedded in the significant coefficient in the low frequency was found to be robust, but the watermarked image is easily visible distortion. 将浮水印藏在影像频率域中的低频带的重要系数,经研究可使浮水印较具强韧性来抵抗外部影像处理攻击,但也因此牺牲影像的品质。
- To avoid a blocky effect, statistical models were utilized to self-adaptively adjust the quantization parameter. which improved the imperceptibleness and security of watermarking images. 为避免产生决状效应,使用统计学模型来自适应调整量化参数,改善了水印图像的不可感知性和安全性。
- The heroine is the spitting image of the author. 书中女主人翁是作者的真实写照。