首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
为了增强水印的安全性,提出了一种水印的签名生成、嵌入和认证方案,并结合奇异值分解和离散小波变换技术的数字水印算法,并验证了该方案的可行性。实验证明,在抵抗常见图像处理攻击方面表现出较好的鲁棒性和不可见性。  相似文献   

2.
为了实现数字多媒体产品的版权保护,提出一种基于图像局部特征区域的鲁棒水印方案。图像局部特征区域是利用Harris算子检测到的特征点构造得到的固定尺寸的纹理区域,具有很好的视觉掩蔽特性,同时图像特征点经过几何攻击后仍然可以保持,保证了水印隐藏位置检测的正确性。算法在每个局部特征区域利用奇异值分解操作得到的分量矩阵的特点实现水印信息的隐藏。实验结果表明,本算法能够在保证水印不可见性地同时,很好地抵抗如JPEG压缩、旋转等攻击。  相似文献   

3.
提出一种同时具有版权保护和内容认证双重功能的JPEG图像水印算法,其中版权保护通过嵌入固定信息,内容认证通过嵌入内容特征码来实现,算法中特征码具有“半脆弱”特性.水印嵌入算法借鉴DEW的算法原理,并结合特征生成的需要,提出了一种改进方法.在DCT域中选择低频部分用来生成特征码,高频部分用来嵌入水印,最后给出的实验结果证明了算法的有效性.  相似文献   

4.
对现有量子签名方案进行安全分析有助于评估量子签名的安全性、发现潜在漏洞和修复漏洞,因此,本文构造了一类有效的合谋攻击,并指出了一类量子同态签名方案在该合谋攻击下是不安全的.在此攻击中,发送者只需通过合谋巧妙地改变所签的消息即可实现抵赖,并从纠缠交换和签名验证两个方面分析了此类合谋攻击奏效的主要原因.该签名方案验证纠缠交换后的签名的状态并不能够验证单个消息的源,从而使得该签名方案不安全.  相似文献   

5.
基于特征点的自适应三维网格数字水印算法   总被引:1,自引:1,他引:0  
针对目前三维模型水印算法在将水印嵌入三维模型后,均会使三维模型产生局部失真问题,文章提出一种自适应三维网格水印算法。通过特征点提取算法将模型的特征点提取出来,按其模长进行分组,将每组顶点的模长序列进行一维DCT变换到频域,在频域信号上加入水印,使嵌入的水印具有不可见性。实验结果表明,该算法对仿射攻击、网格简化、加噪声和剪切攻击以及它们的联合攻击具有较好的鲁棒性,同时有效地控制了由于嵌入水印对几何模型造成的局部失真现象。  相似文献   

6.
采用一维小波对原始图像进行逐行变换,从而获取小波系数,然后再采用压缩传感算法对小波系数进行观测,获取观测矩阵,并将观测矩阵作为水印信息,同时将水印信息进行hash运行生成消息认证码;在嵌入水印阶段,首先将载体彩色图像从RGB空间转换到HSV空间,选取S分量进行DCT变换,从而获取S分量中的低频信息作为水印嵌入位置,然后将水印图像基于SVD算法嵌入到载体彩色图像的DCT变换域中;在认证阶段,提取水印图像,并通过hash运算生成消息认证码,与原消息认证码进行对比,如发生篡改,将提取后的水印图像采用压缩感知算法重构原始图像,与篡改后的载体图像进行对比,从而实现图像认证和篡改定位.实验结果表明该算法遭受到JPEG压缩、噪声和篡改攻击时体现出较好的鲁棒性,对篡改攻击能准确检测和确定篡改的位置,符合半脆弱水印认证的要求.  相似文献   

7.
半脆弱水印可区分恶意攻击和正常数据处理,具有更广泛的适用性,但目前已提出的算法大多只能容忍少数类型的网格正常处理。文中提出了一种基于内容认证的半脆弱水印算法,网格分割后水印隐藏在各分块的DCT变换域系数中,网格被非法篡改时,通过匹配提取出的水印序列与原始水印序列可定位出篡改位置。实验结果表明,算法嵌入的半脆弱水印可容忍多种类型的网格正常数据处理,如网格RST相似变换和低强度的顶点坐标值量化处理,同时对恶意攻击表现敏感,可较准确的定位出篡改位置,并能以直观的可视化形式做出标记。  相似文献   

8.
提出一种利用SIFT关键点实现对RST攻击校正的半盲水印方案,方案使用改进的HVS模型在小波域中嵌入乘性扩频水印,利用参考原始载体的关键特征点信息和RANSAC算法对图像进行攻击校正,RANSAC算法的使用提高了关键点的匹配精度并降低了计算复杂度,采用最优检测算法提高了水印检测的鲁棒性,实验结果表明:基于SIFT特征的抗RST攻击水印方案能够较好地抵抗RST攻击和一般的信号处理攻击。  相似文献   

9.
多变量公钥密码体制能抵御量子计算机的攻击,被认为是后量子时代的一种安全的密码体制备选方案.提出了一种基于多变量公钥密码体制的群签名设计模型,同时在分析该方案时,提出了一种合谋攻击方案,可以有若干合谋攻击者对群签名体制进行伪造签名攻击.随后,给出了一种新的矩阵乘法定义,以及素矩阵等概念,并提出了一种可以抵抗合谋攻击的基于多变量公钥密码体制的群签名设计模型.分析结果表明:该方案不仅能够从根本上抵抗合谋攻击和伪造签名攻击,而且在保证匿名性的前提下,能够真正实现签名成员身份的可追查性,同时通过构造安全的密钥生成协议保证群签名私钥的不可知性,因此具有更高的安全性.  相似文献   

10.
 半脆弱水印可区分恶意攻击和正常数据处理,具有更广泛的适用性,但目前已提出的算法大多只能容忍少数类型的网格正常处理。文中提出了一种基于内容认证的半脆弱水印算法,网格分割后水印隐藏在各分块的DCT变换域系数中,网格被非法篡改时,通过匹配提取出的水印序列与原始水印序列可定位出篡改位置。实验结果表明,算法嵌入的半脆弱水印可容忍多种类型的网格正常数据处理,如网格RST相似变换和低强度的顶点坐标值量化处理,同时对恶意攻击表现敏感,可较准确的定位出篡改位置,并能以直观的可视化形式做出标记。  相似文献   

11.
Language markedness is a common phenomenon in languages, and is reflected from hearing, vision and sense, i.e. the variation in the three aspects such as phonology, morphology and semantics. This paper focuses on the interpretation of markedness in language use following the three perspectives, i.e. pragmatic interpretation, psychological interpretation and cognitive interpretation, with an aim to define the function of markedness.  相似文献   

12.
何延凌 《科技信息》2008,(4):258-258
Language is a means of verbal communication. People use language to communicate with each other. In the society, no two speakers are exactly alike in the way of speaking. Some differences are due to age, gender, statue and personality. Above all, gender is one of the obvious reasons. The writer of this paper tries to describe the features of women's language from these perspectives: pronunciation, intonation, diction, subjects, grammar and discourse. From the discussion of the features of women's language, more attention should be paid to language use in social context. What's more, the linguistic phenomena in a speaking community can be understood more thoroughly.  相似文献   

13.
理论推导与室内实验相结合,建立了低渗透非均质砂岩油藏启动压力梯度确定方法。首先借助油藏流场与电场相似的原理,推导了非均质砂岩油藏启动压力梯度计算公式。其次基于稳定流实验方法,建立了非均质砂岩油藏启动压力梯度测试方法。结果表明:低渗透非均质砂岩油藏的启动压力梯度确定遵循两个等效原则。平面非均质油藏的启动压力梯度等于各级渗透率段的启动压力梯度关于长度的加权平均;纵向非均质油藏的启动压力梯度等于各渗透率层的启动压力梯度关于渗透率与渗流面积乘积的加权平均。研究成果可用于有效指导低渗透非均质砂岩油藏的合理井距确定,促进该类油藏的高效开发。  相似文献   

14.
As an American modern novelist who were famous in the literary world, Hemingway was not a person who always followed the trend but a sharp observer. At the same time, he was a tragedy maestro, he paid great attention on existence, fate and end-result. The dramatis personae's tragedy of his works was an extreme limit by all means tragedy on the meaning of fearless challenge that failed. The beauty of tragedy was not produced on the destruction of life, but now this kind of value was in the impact activity. They performed for the reader about the tragedy on challenging for the limit and the death.  相似文献   

15.
正The periodicity of the elements and the non-reactivity of the inner-shell electrons are two related principles of chemistry,rooted in the atomic shell structure.Within compounds,Group I elements,for example,invariably assume the+1 oxidation state,and their chemical properties differ completely from those of the p-block elements.These general rules govern our understanding of chemical structures and reactions.Using first principles calcula-  相似文献   

16.
We have developed an adiabatic connection to formulate the ground-state exchange-correlation energy in terms of pairing matrix linear fluctuations.This formulation of the exchange-correlation energy opens a new channel for density functional approximations based on the many-body perturbation theory.We illustrate the potential of such approaches with an approximation based on the particle-particle Random Phase Approximation(pp-RPA).This re-  相似文献   

17.
正The electronic and nuclear(structural/vibrational)response of 1D-3D nanoscale systems to electric fields gives rise to a host of optical,mechanical,spectral,etc.properties that are of high theoretical and applied interest.Due to the computational difficulty of treating such large systems it is convenient to model them as infinite and periodic(at least,in first approximation).The fundamental theoretical/computational problem in doing so is that  相似文献   

18.
For molecular systems,the quantum-mechanical treatment of their responses to static electromagnetic fields usually employs a scalar-potential treatment of the electric field and a vector-potential treatment of the magnetic field.Although the potential for each field separately is associated with the choice of an(unphysical)origin,the precise choice of the origin for the electrostatic field has little consequences for the results.This is different for the  相似文献   

19.
Franck-Condon factors bridge the gap between theoretical modeling and experimental observations for molecular electronic spectroscopy and electron transfer.Under the displaced harmonic oscillator approximation,multidimensional Franck-Condon factors are decomposed into a product of many one-dimensional(1D)Franck-Condon(FC)factors,and each 1D-FC factor is associated with one Huang-Rhys factor that determines the leading contribution of  相似文献   

20.
<正>"The Journal of Shanghai Normal University:Mathematics"is published by Shanghai Normal University as regular issues of The Journal of Shanghai Normal University each year from 2014 in English.The editors-in-chief of the issues are professors Yuhao Cong and Maoan Han.The Journal of Shanghai Normal University was started in 1958 with  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号