首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
基于离散小波变换的盲水印研究与仿真   总被引:1,自引:1,他引:0  
研究优化水印安全性问题.由于水印图像应具备版权信息和密钥条件,针对目前音频水印算法中水印容易被提取,且检测水印时均需要原始水印图像,导致水印安全性,鲁棒性无法保证.提出了基于离散小波变换的混沌加密的音频数字水印盲算法.将混沌原理引入音频水印中,改善了水印的安全性,同时根据信号的能量对水印进行了量化嵌入,改善了水印的鲁棒性.首先利用密钥对二值水印图像进行随机置乱;然后将经过随机置乱处理的含有版权信息的二值水印图像嵌入到原始音频信号中.在水印检测过程中利用已知的密钥对水印进行重构.仿真证明,在不知道密钥的情况下,无法得出水印图像,为设计提供了依据.  相似文献   

2.
采用混沌加密和重复码的复倒谱音频水印算法   总被引:2,自引:0,他引:2       下载免费PDF全文
针对数字音频产品版权保护问题,设计了一种基于混沌加密和重复码调制的复倒谱变换数字音频水印算法。算法把音频信号划分为包含相同采样点的若干帧,对每一帧实施复倒谱变换,将一幅包含版权信息的二值图像作为水印,利用混沌序列对其加密,再利用重复码进行纠错后嵌入到原始音频的复倒谱系数中,水印提取时不需要原始音频信号。实现了水印的盲检测。仿真实验证明,算法具有较强的鲁棒性和不可感知性。能经受添加噪声、低通滤波、重采样、重新量化、音频格式转换等常见信号的处理及攻击。  相似文献   

3.
一种基于小波域的盲检测音频水印算法   总被引:1,自引:1,他引:1  
该文提出了一种基于离散小波变换的数字音频水印盲检算法。本算法选择在小波系数的偶数点嵌入水印,将混沌理论引入到音频水印系统的研究中,利用混沌序列将一幅有意义的二值图像加密后嵌入到原始音频的DWT域中,提取时不需要原始音频信号。仿真实验证明了算法的鲁棒性和不可感知性。  相似文献   

4.
将含有版权信息的二值图像作为水印,利用混沌密码对其进行加密,对原始图像进行一定阶次的分数傅里叶变换。通过密钥和水印图像之间的对应关系,将水印信息嵌入到原始图像的中频系数中,分数傅里叶逆变换得到嵌入了水印的图像。仿真实验结果表明,实现的水印具有不可见性,而且对于常见的噪声、裁剪、JPEG压缩具有较好的健壮性。  相似文献   

5.
提出了一种基于Blakley密钥共享方案的音频水印分存算法。算法将密钥分存的思想引入到音频水印算法中,将水印分存到音频数据的不同段中,检测时只需提取出部分水印信息就可以恢复出原始水印。算法同时采用了Bark码来解决剪切攻击带来的同步问题,并利用逼近信号统计特征和纠错码技术来提高算法的鲁棒性。实验证明,算法具有较强的抗剪切攻击能力。  相似文献   

6.
将含有版权信息的二值图像作为水印,利用混沌密码对其进行加密,对原始图像进行一定阶次的分数傅里叶变换.通过密钥和水印图像之间的对应关系,将水印信息嵌入到原始图像的中频系数中,分数傅里叶逆变换得到嵌入了水印的图像.仿真实验结果表明,实现的水印具有不可见性,而且对于常见的噪声、裁剪、JPEG压缩具有较好的健壮性.  相似文献   

7.
赵梅  姜梅  甘信丹 《微机发展》2011,(2):189-192,197
提出一种基于混沌映射和分数阶傅里叶变换的数字水印算法。采用有版权信息的二值图像作为水印,利用混沌映射在密钥的控制下对水印进行加密置乱。利用由密钥生成的混沌序列对数字图像进行分数傅里叶变换,并将已经混沌置乱的水印信息嵌入到原始图像的中频幅度谱系数对应的相位谱系数中,最后进行分数傅里叶逆变换可以得到嵌入水印的图像。通过仿真实验可以证明该算法简便易行,且具有良好的不可见性,对图像的剪切、压缩、添加噪声和旋转一系列的图像攻击操作具有良好的鲁棒性。  相似文献   

8.
音频信息隐藏技术已成为近年来的研究热点之一,将混沌理论引入到音频水印系统的研究中,设计了一种将一段音频作为水印,利用混沌序列选择部分原始音频信号作为载体,将混沌加密后的音频水印嵌入到载体的小波系数中的音频信息隐藏方法。实验表明,水印具有很强的安全性和鲁棒性。  相似文献   

9.
提出一种基于混沌映射和分数阶傅里叶变换的数字水印算法.采用有版权信息的二值图像作为水印,利用混沌映射在密钥的控制下对水印进行加密置乱.利用由密钥生成的混沌序列对数字图像进行分数傅里叶变换,并将已经混沌置乱的水印信息嵌入到原始图像的中频幅度谱系数对应的相位谱系数中,最后进行分数傅里叶逆变换可以得到嵌入水印的图像.通过仿真实验可以证明该算法简便易行,且具有良好的不可见性,对图像的剪切、压缩、添加噪声和旋转一系列的图像攻击操作具有良好的鲁棒性.  相似文献   

10.
本文提出一种在小波域嵌入混沌序列作为版权标识水印,然后对音频信号进行哈希运算生成脆弱水印信息,再将其嵌入到时域里作为篡改提示水印的音频双水印算法。实验表明,双水印系统中的版权标识水印对滤波、有损压缩等常见的水印攻击方式具有较强的鲁棒性;脆弱水印对常见的音频信号处理具有较高的敏感性,双水印系统既能够对音频作品的版权进行保护,双可以对音频作品的完整性进行认证。  相似文献   

11.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

12.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

13.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

14.
Kim  K. H. 《Real-Time Systems》2004,26(1):9-28
Distributed real-time simulation is a young technology field but its practice is under increasing demands. In recent years the author and his collaborators have been establishing a new approach called the distributed time-triggered simulation (DTS) scheme which is conceptually simple and easy to use but widely applicable. The concept was initiated in the course of developing a new-generation object-oriented real-time programming scheme called the time-triggered message-triggered object (TMO) programming scheme. Some fundamental issues inherent in distributed real-time simulation that were learned during recent experimental studies are discussed along with some approaches for resolving the issues. An execution engine developed to support both the TMOs engaged in control computation and the TMOs engaged in DTS is also discussed along with its possible extensions that will enable significantly larger-scale DTSs.  相似文献   

15.
Zusammenfassung Mit zunehmender Größe der Softwaresysteme verschärfen sich die für die Software-Herstellung typischen Probleme: Beherrschen großer Objektmengen, Erhalten der Systemkonsistenz, Kontrolle der ständigen Änderungseinflüsse und Gewährleisten einer langen Lebensdauer. Die Disziplin Konfigurationsmanagement bildet den methodischen Ansatz, diese Probleme besser zu beherrschen. Software-Konfigurationsmanagement faßt die Herstellung von Softwaresystemen als eine Abfolge von kontrollierten Änderungen an gesicherten Zwischen- und Endergebnissen auf. Dargestellt werden die Objekte und Funktionen des Software-Konfigurationsmanagements sowie die hierfür in großen Software-Projekten benötigten Methoden, Instanzen und Hilfsmittel.  相似文献   

16.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and  相似文献   

17.
正Brain-machine interfaces(BMIs)aim at building a direct communication pathway between the brain and an external device,and represent an area of research where significant progress has been made during the past decade.Based on BMIs,mind information can be read out by neural signals to control  相似文献   

18.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

19.
20.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号