首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
数字水印是一种应用于数字多媒体产品的版权的技术,基于离散余弦变换数字水印是一种鲁棒性较好的方法,在该方法中有一个非常关键的尺度系数,直接决定了水印不可见性的质量.对该系数的取值及其对水印的影响进行研究:首先把需要嵌入水印的图像进行离散余弦变换,然后选择变换后的低频系数作为水印的嵌入位置并将二值化的水印图像放入,最后通过改变尺度系数得到不同的水印图像.对该嵌入不同尺度系数的水印图像进行比较,得出尺度系数的取值范围.实验结果表明,基于离散余弦变换的数字水印嵌入方法在尺度系数小于0.0001时,其水印具有更好的不可见性,从而具有更实际的版权保护意义.  相似文献   

2.
提出了一种基于小波变换的图像自适应数字水印算法.首先对水印图像作置乱处理,然后对原始图像和置乱后的水印图像进行小波分解,并根据马尔可夫随机场对图像视觉效果建模,在该模型下求取每个低频系数的允许失真值,利用允许失真值调整水印嵌入位置和强度,从而达到自适应地嵌入水印的目的.最后,将所得的水印图像的低频系数嵌入选定的原始图像.  相似文献   

3.
可无损恢复的小波域可见数字水印算法   总被引:1,自引:0,他引:1  
文章研究了可无损恢复的小波域可见数字水印算法,该算法是为了适应将可见水印作为标签或版权标识,并且接收端的授权用户可将水印完全去除的应用环境。该算法基于亮度对比模型,并结合用户密钥将水印图像特征自适应嵌入到宿主图像的高频和低频系数中。实验结果表明,该算法嵌入的水印具有较强的鲁棒性,授权用户可无损恢复出原始图像,反之,非授权用户则不能在保证图像质量的前提下完全去除水印。  相似文献   

4.
小波域互补鲁棒水印算法研究   总被引:1,自引:1,他引:0  
为提高用于版权保护的数字水印的鲁棒性,基于图像小波信号分析方法,分析了各种处理攻击对图像小波系数影响的不均衡特性,并根据该特性提出嵌入位置和嵌入方法互补的新颖水印算法.同时基于人眼视觉系统,对嵌入系数进行筛选以保证水印的透明性.实验证明该方法可抵抗各种图像处理攻击,具有较好的鲁棒性.  相似文献   

5.
数字水印是信息隐藏和版权保护的有效手段。针对一般数字水印算法的视觉性和鲁棒性无法兼顾的问题,对JPEG 2000的图像格式提出了一种自适应的盲水印算法。算法使用m+n位的线性反馈移位寄存器对水印图像进行移位置乱,然后利用JPEG 2000图像的特点,对原始图像进行小波变换处理后选择低频子带进行水印的嵌入,在量化处理的同时完成了水印的嵌入,提高了水印嵌入的速度。根据LSFR的性质,算法对水印进行有效地检测和移位复原,实现了水印的盲提取。实验表明,该算法具有良好的视觉性和抵抗攻击的鲁棒性。  相似文献   

6.
多类水印的同时嵌入   总被引:18,自引:0,他引:18  
研究了多类数字水印同时嵌入的问题,提出了一种同时嵌入两类水印的图像数字水印算法。此算法基于整形小波变换,两类水印的提取都不需要知道原始图像。还提出了水印的“可信比特”提取的方法,加强了水印的鲁棒性。算法对JPEG压缩、小波压缩、噪声、中值滤波和裁剪有较好的抵抗能力,同时,易损水印除了能鉴别图像是否被篡改外,还能报告图像在空间域和频率域的失真情况。  相似文献   

7.
提出一种基于Arnold置乱和小波变换的自适应二值图像水印新算法.首先将二值水印图像进行Arnold置乱,接着将其嵌入载体图像经过小波分解后的低频系数中.嵌入时根据SOBEL算子计算出的图像块边缘点密度,将对应的小波块进行分类.然后根据人眼视觉掩蔽特性,设置不同小波块对应的低频系数的调整因子.实验结果表明,该方法嵌入的数字水印不但具有较好的不可见性,而且对图像处理有较好的鲁棒性.  相似文献   

8.
王晓霞  陈永强  王俊龙 《科技信息》2010,(19):I0047-I0047,I0171
为了满足数字水印的安全性、隐蔽性、鲁棒性等特性,本文提出了小波域图像水印技术。有意义图像通过二维混沌加密算法生成水印,使其具有更好的安全性。水印嵌入过程中,利用遗传算法,选择和修改小波系数,将水印嵌入到宿主图像。实验结果显示,有较好的隐蔽性和鲁棒性效果。  相似文献   

9.
目的针对传统数字水印技术的有限性,实现一种新的数字水印算法。方法新算法以小波变换为基础,对原始图像和水印图像进行小波变换,将水印信息嵌入到中频系数中。结果实现了二维彩色图像将为水印信息嵌入到二维图像数据中。结论实验证明,新算法在对彩色图像进行水印处理方面达到较好的效果,具有较好的健壮性。  相似文献   

10.
;基于整数小波变换和SPIHT搜索小波零树理论,提出一种整数小波零嵌入的多类数字水印算法:将用于版权保护的鲁棒水印进行零嵌入,再将用于数据完整性认证的脆弱水印分别嵌入到小波域不同方向的细节子代中.通过对含水印图像的攻击实验表明,该算法兼具鲁棒性和脆弱敏感性,且篡改定位较精确,水印检测时不需要原始图像的参与,是一种有效的数字图像水印方案.  相似文献   

11.
The discovery of the prolific Ordovician Red River reservoirs in 1995 in southeastern Saskatchewan was the catalyst for extensive exploration activity which resulted in the discovery of more than 15 new Red River pools. The best yields of Red River production to date have been from dolomite reservoirs. Understanding the processes of dolomitization is, therefore, crucial for the prediction of the connectivity, spatial distribution and heterogeneity of dolomite reservoirs.The Red River reservoirs in the Midale area consist of 3~4 thin dolomitized zones, with a total thickness of about 20 m, which occur at the top of the Yeoman Formation. Two types of replacement dolomite were recognized in the Red River reservoir: dolomitized burrow infills and dolomitized host matrix. The spatial distribution of dolomite suggests that burrowing organisms played an important role in facilitating the fluid flow in the backfilled sediments. This resulted in penecontemporaneous dolomitization of burrow infills by normal seawater. The dolomite in the host matrix is interpreted as having occurred at shallow burial by evaporitic seawater during precipitation of Lake Almar anhydrite that immediately overlies the Yeoman Formation. However, the low δ18O values of dolomited burrow infills (-5.9‰~ -7.8‰, PDB) and matrix dolomites (-6.6‰~ -8.1‰, avg. -7.4‰ PDB) compared to the estimated values for the late Ordovician marine dolomite could be attributed to modification and alteration of dolomite at higher temperatures during deeper burial, which could also be responsible for its 87Sr/86Sr ratios (0.7084~0.7088) that are higher than suggested for the late Ordovician seawaters (0.7078~0.7080). The trace amounts of saddle dolomite cement in the Red River carbonates are probably related to "cannibalization" of earlier replacement dolomite during the chemical compaction.  相似文献   

12.
AcomputergeneratorforrandomlylayeredstructuresYUJia shun1,2,HEZhen hua2(1.TheInstituteofGeologicalandNuclearSciences,NewZealand;2.StateKeyLaboratoryofOilandGasReservoirGeologyandExploitation,ChengduUniversityofTechnology,China)Abstract:Analgorithmisintrod…  相似文献   

13.
本文叙述了对海南岛及其毗邻大陆边缘白垩纪到第四纪地层岩石进行古地磁研究的全部工作过程。通过分析岩石中剩余磁矢量的磁偏角及磁倾角的变化,提出海南岛白垩纪以来经历的构造演化模式如下:早期伴随顺时针旋转而向南迁移,后期伴随逆时针转动并向北运移。联系该地区及邻区的地质、地球物理资料,对海南岛上述的构造地体运动提出以下认识:北部湾内早期有一拉张作用,主要是该作用使湾内地壳显著伸长减薄,形成北部湾盆地。从而导致了海南岛的早期构造运动,而海南岛后期的构造运动则主要是受南海海底扩张的影响。海南地体运动规律的阐明对于了解北部湾油气盆地的形成演化有重要的理论和实际意义。  相似文献   

14.
Various applications relevant to the exciton dynamics,such as the organic solar cell,the large-area organic light-emitting diodes and the thermoelectricity,are operating under temperature gradient.The potential abnormal behavior of the exicton dynamics driven by the temperature difference may affect the efficiency and performance of the corresponding devices.In the above situations,the exciton dynamics under temperature difference is mixed with  相似文献   

15.
The elongation method,originally proposed by Imamura was further developed for many years in our group.As a method towards O(N)with high efficiency and high accuracy for any dimensional systems.This treatment designed for one-dimensional(ID)polymers is now available for three-dimensional(3D)systems,but geometry optimization is now possible only for 1D-systems.As an approach toward post-Hartree-Fock,it was also extended to  相似文献   

16.
17.
The explosive growth of the Internet and database applications has driven database to be more scalable and available, and able to support on-line scaling without interrupting service. To support more client's queries without downtime and degrading the response time, more nodes have to be scaled up while the database is running. This paper presents the overview of scalable and available database that satisfies the above characteristics. And we propose a novel on-line scaling method. Our method improves the existing on-line scaling method for fast response time and higher throughputs. Our proposed method reduces unnecessary network use, i.e. , we decrease the number of data copy by reusing the backup data. Also, our on-line scaling operation can be processed parallel by selecting adequate nodes as new node. Our performance study shows that our method results in significant reduction in data copy time.  相似文献   

18.
R-Tree is a good structure for spatial searching. But in this indexing structure,either the sequence of nodes in the same level or sequence of traveling these nodes when queries are made is random. Since the possibility that the object appears in different MBR which have the same parents node is different, if we make the subnode who has the most possibility be traveled first, the time cost will be decreased in most of the cases. In some case, the possibility of a point belong to a rectangle will shows direct proportion with the size of the rectangle. But this conclusion is based on an assumption that the objects are symmetrically distributing in the area and this assumption is not always coming into existence. Now we found a more direct parameter to scale the possibility and made a little change on the structure of R-tree, to increase the possibility of founding the satisfying answer in the front sub trees. We names this structure probability based arranged R-tree (PBAR-tree).  相似文献   

19.
The geographic information service is enabled by the advancements in general Web service technology and the focused efforts of the OGC in defining XML-based Web GIS service. Based on these models, this paper addresses the issue of services chaining,the process of combining or pipelining results from several interoperable GIS Web Services to create a customized solution. This paper presents a mediated chaining architecture in which a specific service takes responsibility for performing the process that describes a service chain. We designed the Spatial Information Process Language (SIPL) for dynamic modeling and describing the service chain, also a prototype of the Spatial Information Process Execution Engine (SIPEE) is implemented for executing processes written in SIPL. Discussion of measures to improve the functionality and performance of such system will be included.  相似文献   

20.
Advances in wireless technologies and positioning technologies and spread of wireless devices, an interest in LBS (Location Based Service) is arising. To provide location based service, tracking data should have been stored in moving object database management system (called MODBMS) with proper policies and managed efficiently. So the methods which acquire the location information at regular time intervals then, store and manage have been studied. In this paper, we suggest tracking data management techniques using topology that is corresponding to the moving path of moving object. In our techniques, we update the MODBMS when moving object arrived at a street intersection or a curved road which is represented as the node in topology and predict the location at past and future with attribute of topology and linear function. In this technique, location data that are corresponding to the node in topology are stored, thus reduce the number of update and amount of data. Also in case predicting the location,because topology are used as well as existing location information, accuracy for prediction is increased than applying linear function or spline function.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号