搜索资源列表
-
0下载:
本代码基于dwt的音频水印技术,在音频中加入高斯随机水印,达到防伪的效果。-The code is based on dwt audio watermarking technology in audio watermarking by adding Gaussian random to achieve security results.
-
-
0下载:
本文提出了基于二维混沌映射的数字图像水印算法,混沌具有随机性、似噪声及对初始条件的极端敏感性等特点。将经过二维混沌映射置乱后的数字水印信号嵌入图像小波域的低频系数,实现了数字水印的隐蔽性、保密性和稳固性;利用二维混沌映射Arnold变换对水印信号进行置乱,不仅增强了水印信号保密性,同时有效提高了视觉上抵抗图像剪切攻击的能力。-In this paper, two-dimensional chaotic map based on digital image watermarking algorit
-
-
0下载:
本文首先系统分析了 snort 规则的组成,详细的介绍了各个部分的含义,这对于开发出新的入侵检测系统,建立自己的攻击规则库有很大的帮助。针对系统所需的适应性和自治性,在详细剖析 snort 规则同时,着重研究基于 CVE 入侵检测系统的规则库的实现,底层嗅探器的实现和嗅探过程等问题。在规则特征选项的模式匹配问题上进行重点说明,给出了一种改进的检测方法,即结合使用协议分析进行模式匹配,从试验数据上大大提高了效率,减少了误报率。同时,本系统所基于的 CVE 知识库,跟踪国际上 CVE 的最新发展动态
-
-
0下载:
watermarking is the art of hiding data to provide authenticity and security.
-
-
1下载:
All three, Discrete Wavelet Transform (DWT) - Singular
Value Decomposition (SVD) and Adaptive Tabu Search
(ATS) have been used as mathematical tools for embedding
data into an audio signal. In this paper, we present a new
robust audio waterma
-
-
0下载:
摘 要: 提出了一种基于医学图像中感兴趣区域(ROI)的盲检测水印算法, 将包含重要病理信息的灰度图像作为数字水印, 经置乱后在混沌序列的控制下嵌入到宿主小波域非感兴趣区域中。实验结果表明, 该算法在保护医学 ROI 的同时提高了水印抗 JPEG 压缩的鲁棒性, 并对篡改、 几何剪切、 滤波等均具有良好的鲁棒性和透明性, 而且混沌序列增强了系统的安全性。-Abstract: This paper presents a region of interest based on medical ima
-
-
0下载:
基于数字水印的商业票据防伪的新方法,商艳红,唐山师范-Commercial paper based on digital watermarking security features of the new method, commercial red, Tangshan Teachers
-
-
0下载:
基于空域水印算法的票据防伪研究,湖南大学工程硕士论文,王伟-Watermarking algorithm based on airspace security of the Notes, Hunan University, master' s thesis project, Wang Wei
-
-
0下载:
基于小波变换的扩频图象数字水印,将水印嵌入到小波中。以保证信息的安全-Spread spectrum based on wavelet transform image watermarking, the watermark is embedded into the wavelet. To ensure information security
-
-
0下载:
在保密数据传递等应用中,有时采用将一句话或一段文字或一段音乐隐藏在另一段音乐中,然后利用专门的算法来提取所传的信息-Data transfer in applications such as security, sometimes using the word or a text or a piece of music hidden in another section of music, and then use a special algorithm to extract the infor
-
-
0下载:
robust image watermarking is a new technique to increase the security and capacity of watermarked data both at the same time-robust image watermarking is a new technique to increase the security and capacity of watermarked data both at the same time.
-
-
0下载:
基于虚拟光学信息隐藏理论提出了一种三维空间数字水印算法1 该数字水印算法能成为
一种多媒体数据产权保护的有效方案1 对算法的测试结果表明,该算法对于噪音叠加、剪切、旋转、
有损压缩等常见的图像处理操作具有较高的鲁棒性1 由于引入了虚拟光学信息隐藏思想,将虚拟
光路的几何结构参数作为密钥,设计出了多重“锁”和多重“密钥”1 随机模板编码技术的引入,更进
一步提高了数字水印系统的密钥空间. 仿真实验结果表明该算法具有很好的安全性1- A new approach to digital
-
-
0下载:
基于hash算法与信息安全,数字水印的嵌入和数字水印的攻击方法-Based on hash algorithm and information security, digital watermarking embedding and the attack methods of digital watermarking
-
-
0下载:
数字水印的傅里叶算法,大学本科论文,图像处理,信息安全等。-Fourier transform algorithm of the digital watermark, undergraduate thesis, image processing, information security.
-
-
0下载:
Speaker identification security improvement by means of speech watermarking 语音别识SCI文献-Speaker identification security improvement by means of speech watermarking
-
-
0下载:
随着现代信息技术的高速发展,人们对信息技术的要求越来越高。对我们所需要的信息的安全性、保密性、版权所有性更加的关注。基于此,数字水印技术就应用而生。数字水印技术就是把一些隐藏的信息嵌 。入到数字信息的载体中,数字水印技术把这些信息从一种形式转换为另一种形式,就类似于把信号从时域转换为频域后再去处理问题。数字水印可分为盲水印和非盲水印, 非盲水印系统在检测或提取水印信息时,需要原始图像而且还会影响到人们的视觉感应;盲水印系统在检测或提取水印过程中,既不需要原始载体图像,也不需要嵌入的水印,因此盲水
-
-
0下载:
One of the threats to watermarking security is unauthorized removal. In this paper, we present a framework based on extended TPM to solve this problem. As to the spread spectrum (SS) watermarking schemes we believe that it has the capability of read-
-
-
0下载:
One of the threats to watermarking security is unauthorized removal. In this paper, we present a framework based on extended TPM to solve this problem. As to the spread spectrum (SS) watermarking schemes we believe that it has the capability of read-
-
-
0下载:
采用数字水印技术实现在公开信息中加入秘密的隐私信息,从而实现隐私信息的隐藏保护。-The use of digital watermarking Technology to join the secret private information in public information in order to achieve the protection of privacy of information hiding.
-
-
0下载:
数字水印方法的安全性是基于假定嵌入和检测的算法是秘密的。它们是不方便公众审查和广泛使用。因此,需要一种可以打开的、同时安全的水印算法。类似于密码分析的十二种模型用来对数字水印的安全性进行评价。它们
用于评估拼凑水印算法和它们的弱点。-The security of digital watermarking methods is based on
the assumption that their embedding and detection algorithms are kept
-