排序方式: 共有89条查询结果,搜索用时 156 毫秒
1.
提出了一种安全的、不可见的、通用的易碎文档数字水印方法.嵌入到文档图像中的水印完全依赖于文档内容及字符间距等格式,可有效检验文档的完整性和可信性.根据文档中字符的Unicode编码值及各个字符在文档中对应的位置,构造一个矩阵D,计算D经过一系列变换后的特征值,可以生成水印序列.若文档被篡改,则根据该文档提取出的水印也将发生改变.同时,通过将文档图像分块,可预测可能发生篡改的位置. 相似文献
2.
McNaughton Caitlyn H.; Moon Jisook; Strawderman Myla S.; Maclean Kenneth N.; Evans Jeffrey; Strupp Barbara J. 《Canadian Metallurgical Quarterly》2008,122(2):293
This study assessed social behavior in a mouse model of Fragile X syndrome (FXS), the Fmr1 tm1Cgr or Fmr1 "knockout" (KO) mouse. Both the KO and wild-type (WT) mice preferred to be near a novel conspecific than to be alone. However, during the initial interaction with a novel conspecific, (1) a greater proportion of the KO mice exhibited high levels of grooming; and (2) the average duration of nose contact with the stimulus mouse was significantly shorter for the KO mice, both indicative of increased arousal and/or anxiety. Both groups exhibited a robust novelty preference when the novel animal was a "preferred" mouse. However, when the novel mouse was a "nonpreferred" animal, both groups showed a diminished novelty preference but this effect was more pronounced for the WT mice. This blunted negative reaction of the KO mice to a nonpreferred animal may indicate that they were less proficient than controls in distinguishing between positive and negative social interactions. These findings provide support for the use of this animal model to study the autistic features of FXS and autism spectrum disorders. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
3.
Volker Helm 《Architectural Design》2014,84(3):100-107
Enabling the robotic fabrication of building elements directly on a construction site, in-situ fabrication is a radical and novel approach to the application of digital fabrication in architecture. Volker Helm of ETH Zurich describes how an on-site unit, developed with Fabio Gramazio and Matthias Kohler in the Architecture and Digital Fabrication department at the university, offers the first-ever generic robot with applications in a wide range of processes, providing the means of investigating the requirements and capacities involved in non-standardised fabrication. 相似文献
4.
基于可分逆模糊化的脆弱水印 总被引:1,自引:0,他引:1
提出了一种时域上的水隐藏与检测算法--基于可分逆模糊化的脆弱水印算法。其原理是将水印隐藏到图像的一行/列中,再通过高斯模糊化将水印信息进一步隐藏到其相邻的行/列中。在水印检测过程中,通过可分逆模糊化算法检测并估计出嵌入水印。实验结果表明,这种算法隐藏水印具有隐蔽性和脆弱性,同时能够对攻击方位进行准确定位,是一种很有前途的脆弱水印算法。 相似文献
5.
This article reviews the current bibliographic knowledge on early neurobehavioral development and milestones in Fragile X syndrome (FraX), with emphasis on males affected by the condition. Three broad areas of early development were examined: (1) gross and fine motor, (2) speech and language, and (3) social. The result of the current review indicates very limited information on the developmental milestones in all three areas. The scarce literature on motor development shows that in FraX there is an early developmental delay. Research on speech and language demonstrates pervasive deficits in conversational skills and severe developmental delay, with increasing discrepancy between language level and chronological age in young males with FraX. Finally, deficits in social development in FraX include abnormal gaze, approach and avoidance conflict, and high incidence of autistic spectrum disorders. 相似文献
6.
7.
This paper analyzes the numerically instable problem in the current 3D fragile watermarking schemes. Some existing fragile watermarking schemes apply the floating-point arithmetic to embed the watermarks. However, these schemes fail to work properly due to the numerically instable problem, which is common in the floating-point arithmetic. This paper proposes a numerically stable fragile watermarking scheme. The scheme views the mantissa part of the floating-point number as an unsigned integer and operates on it by the bit XOR operator. Since there is no numerical problem in the bit operation, this scheme is numerically stable. The scheme can control the watermark strength through changing the embedding parameters. This paper further discusses selecting appropriate embedding parameters to achieve good performance in terms of the perceptual invisibility and the ability to detect unauthorized attacks on the 3D models. The experimental results show that the proposed public scheme could detect attacks such as adding noise, adding/deleting faces, inserting/removing vertices, etc. The comparisons with the existing fragile schemes show that this scheme is easier to implement and use. 相似文献
8.
9.
易损数学水印算法可用于多媒体内容真实性的保护。为更有效地设计和使用易损水印,首先通过研究其算法应具有的特点及易损水印与鲁棒水印的差别;然后在可信赖的数码相机这个应用背景的基础上,提出了一个简单的易损水印应用框架;最后,讨论了变换域易损图象数学水印算法的误差问题和逆变换后象素值溢出的问题,同时给出了两种解决方法,并利用此方法对一种基于小波变换的易损水印算法做了改进。 相似文献
10.
根据特征编码的思想,首次提出了一种基于文字下划线特征变化的脆弱型文本水印算法.该算法利用字符的内码特征信息生成水印,然后按照特定的顺序插入水印或检测水印.理论分析和实验表明,算法具有良好的不可感知性,能准确地检测各类水印攻击,在大部分情况下能对篡改进行精确定位. 相似文献