首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
针对数字图像的版权保护问题,提出一种基于Fibonacci置乱的小波域数字图像盲水印方案。将原图像中的感兴趣区域(ROI)作为水印来源,以此提高水印的隐蔽性。在水印嵌入过程中,将原图像进行分块,对每个块进行Fibonacci置乱和离散小波变换(DWT),选择出低频子带,用于水印嵌入。同时,对水印也执行DWT,选择出低频子带,通过Fibonacci置乱得到置乱矩阵,将水印的置乱矩阵嵌入到主图像的块中。在水印提取过程中,根据嵌入过程中设定的秘钥,通过逆Fibonacci置乱和逆DWT过程提取水印。在多种图像攻击下的仿真结果表明,该水印方案具有较高的安全性、鲁棒性和隐蔽性。  相似文献   

2.
提出了一种基于整数DWT域的盲数字水印新算法.算法利用Arnold变换对水印图像进行置乱,增加水印嵌入的安全性;根据水印自身的特点,局部修改载体图像的深层低频小波系数的余数,从而将水印嵌入到载体图像中.水印的提取不需要原始图像.大量仿真结果证明了该算法嵌入的数字水印既有很好的隐蔽性,又有很理想的鲁棒性.  相似文献   

3.
一种基于小波变换的鲁棒数字图像水印   总被引:1,自引:0,他引:1  
提出了一种基于小波变换的鲁棒数字图像水印算法。该算法首先对水印信息进行置乱以降低空间相关性,然后把原始图像进行三级小波变换。并将水印信息嵌入到原始图像的低频子带中,最后经三级小波反变换得到嵌入水印后的图像。实验结果表明,该算法具有较强的鲁棒性。  相似文献   

4.
提出一种结合随机加密的小波域图像水印算法.利用小波变换对原始载体数字图像进行多分辨率分解;利用由密钥产生的伪随机序列对水印图像进行随机置乱.根据原始图像的相同分辨率、不同方向、相同空间位置的小波细节子带系数的大小关系,将经过随机置乱处理的包含版权信息的二值水印图像嵌入到载体图像.提出一种水印检测算法,不需要使用任何与原始载体图像相关的信息,实现了“盲检”.实验证明,提出的水印方案具有非常好的不可见性;对于大量的攻击具有较好的鲁棒性;使用两道密钥具有很好的安全性.  相似文献   

5.
论文给出了一种新的基于小波变换和图像置乱的水印算法。先将要嵌入到数字产品中的数字水印图象进行置乱,然后用基于小波域的算法将其嵌入到数字产品中。这样可以有效地抵抗裁减攻击,并且对提取的水印图像,可以使用确定噪声点的滤波算法进行改善,试验效果令人满意。  相似文献   

6.
提出一种基于离散平稳小波变换的变换域的数字图像水印嵌入和提取算法。本算法先将数字水印图像进行置乱变换(Arnold变换),然后将置乱后的水印图像嵌入到平稳小波变换后的图像中,最后将提取出的水印图像进行Arnold反置乱变换得到原始水印图像。由于本算法选择了合适的水印嵌入位置,实验结果表明,该算法不但使水印具有很好的不可见性,而且所嵌入的水印对一般的图像处理如噪声、滤波、旋转、压缩等有很强的鲁棒性。  相似文献   

7.
针对小波变换的不足,根据原始图像各子块对水印信息的适应程度不同,提出一种基于Arnold置乱和小波包分解的自适应水印算法。首先,该算法采用Arnold变换对水印图像进行预处理,然后对原始图像进行小波包分解,小波包分解能够提供一种更为精细的分解方法,将频带进行了多层次的划分,最后将水印图像嵌入到小波包分解后的子带中,水印的嵌入强度和嵌入位置均根据原始图像的内容自适应地决定,这样很好地解决了水印鲁棒性和不可见性之间的矛盾。仿真实验结果表明,算法对常见的图像攻击具有较强的鲁棒性和稳健性。  相似文献   

8.
基于小波变换的数字图像自适应盲水印算法及实现   总被引:2,自引:2,他引:0  
针对传统基于人类视觉系统特性的空间域与变换域结合算法的缺陷,提出了一种基于小波变换的数字图像自适应盲水印新算法,通过置乱加密技术提高整个数字水印系统的安全性能,水印嵌入过程中使用了改进的量化水印算法;通过计算相邻特征平均值来自适应调整待量化小波系数的量化间隔,大大提升了水印系统的逼真度;实验结果表明,该算法具有嵌入信息量大,嵌入水印图像透明性好,对常见的噪声、中值滤波、旋转、剪切和JPEG压缩抵抗性强等特点,算法对于常见攻击后提取出的水印仍与原始水印具有0.90以上的相似度,具有很好的鲁棒性。  相似文献   

9.
龚劬  余维  聂小英 《计算机工程》2011,37(6):113-115
提出一种基于邻域与FCM的多小波域盲水印算法。该算法根据人类视觉系统的掩蔽性对多小波域的中频系数进行模糊聚类分 析,自适应地找到适合嵌入水印的纹理边缘子块,并结合子块的局部相关性嵌入二值水印图像。为保证增强水印的安全性和鲁棒性,在嵌入前将水印置乱,嵌入时重复嵌入水印。实验结果表明,该算法对JPEG压缩、剪切、锐化及边缘锐化、椒盐噪声、滤波等常规攻击有较强的鲁棒性。  相似文献   

10.
盲水印由于在检验过程中不需要使用原始的水印图像,因此在具有较高的鲁棒性和不可见性的同时,增加了检验的方便性。该文提出了一种基于混沌映射和二维离散小波变换的盲水印的算法。该算法是首先将二值图像经过混沌映射处理,将置乱之后的二值图像作为水印图像,将作为载体的二维矢量图形,进行二维离散小波变换,之后将水印信息嵌入到待保护的图像中。由于将水印图像进行了混沌映射处理,故提高了抗裁剪和压缩攻击的能力;而对原始载体图像使用了二维离散小波变换,在没有密钥的情况下,是无法恢复原始水印图像的,故提高了水印信息的安全性。  相似文献   

11.
European Community policy and the market   总被引:1,自引:0,他引:1  
Abstract This paper starts with some reflections on the policy considerations and priorities which are shaping European Commission (EC) research programmes. Then it attempts to position the current projects which seek to capitalise on information and communications technologies for learning in relation to these priorities and the apparent realities of the marketplace. It concludes that while there are grounds to be optimistic about the contribution EC programmes can make to the efficiency and standard of education and training, they are still too technology driven.  相似文献   

12.
融合集成方法已经广泛应用在模式识别领域,然而一些基分类器实时性能稳定性较差,导致多分类器融合性能差,针对上述问题本文提出了一种新的基于多分类器的子融合集成分类器系统。该方法考虑在度量层融合层次之上通过对各类基多分类器进行动态选择,票数最多的类别作为融合系统中对特征向量识别的类别,构成一种新的自适应子融合集成分类器方法。实验表明,该方法比传统的分类器以及分类融合方法识别准确率明显更高,具有更好的鲁棒性。  相似文献   

13.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

14.
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given.  相似文献   

15.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

16.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

17.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

18.
Kim  K. H. 《Real-Time Systems》2004,26(1):9-28
Distributed real-time simulation is a young technology field but its practice is under increasing demands. In recent years the author and his collaborators have been establishing a new approach called the distributed time-triggered simulation (DTS) scheme which is conceptually simple and easy to use but widely applicable. The concept was initiated in the course of developing a new-generation object-oriented real-time programming scheme called the time-triggered message-triggered object (TMO) programming scheme. Some fundamental issues inherent in distributed real-time simulation that were learned during recent experimental studies are discussed along with some approaches for resolving the issues. An execution engine developed to support both the TMOs engaged in control computation and the TMOs engaged in DTS is also discussed along with its possible extensions that will enable significantly larger-scale DTSs.  相似文献   

19.
Zusammenfassung Mit zunehmender Größe der Softwaresysteme verschärfen sich die für die Software-Herstellung typischen Probleme: Beherrschen großer Objektmengen, Erhalten der Systemkonsistenz, Kontrolle der ständigen Änderungseinflüsse und Gewährleisten einer langen Lebensdauer. Die Disziplin Konfigurationsmanagement bildet den methodischen Ansatz, diese Probleme besser zu beherrschen. Software-Konfigurationsmanagement faßt die Herstellung von Softwaresystemen als eine Abfolge von kontrollierten Änderungen an gesicherten Zwischen- und Endergebnissen auf. Dargestellt werden die Objekte und Funktionen des Software-Konfigurationsmanagements sowie die hierfür in großen Software-Projekten benötigten Methoden, Instanzen und Hilfsmittel.  相似文献   

20.
基于复小波噪声方差显著修正的SAR图像去噪   总被引:4,自引:1,他引:3  
提出了一种基于复小波域统计建模与噪声方差估计显著性修正相结合的合成孔径雷达(Synthetic Aperture Radar,SAR)图像斑点噪声滤波方法。该方法首先通过对数变换将乘性噪声模型转化为加性噪声模型,然后对变换后的图像进行双树复小波变换(Dualtree Complex Wavelet Transform,DCWT),并对复数小波系数的统计分布进行建模。在此先验分布的基础上,通过运用贝叶斯估计方法从含噪系数中恢复原始系数,达到滤除噪声的目的。实验结果表明该方法在去除噪声的同时保留了图像的细节信息,取得了很好的降噪效果。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号