首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 218 毫秒
1.
Adaptive Image Digital Watermarking with DCT and FCM   总被引:2,自引:0,他引:2  
A novel adaptive digital image watermark algorithm is proposed. Fuzzy c-means clustering (FCM) is used to classify the original image blocks into two classes based on several characteristic parameters of human visual system (HVS). One is suited for embedding a digital watermark, the other is not. So the appropriate blocks in an image are selected to embed the watermark. The wetermark is embedded in the middle-frequency part of the host image in conjunction with HVS and discrete cosine transform (DCT). The maximal watermark strength is fixed according to the frequency masking. In the same time, for the good performance, the watermark is modulated into a fractal modulation array. The simulation results show that we can remarkably extract the hiding watermark and the algorithm can achieve good robustness with common signal distortion or geometric distortion and the quality of the watermarked image is guaranteed.  相似文献   

2.
The problem of long transactions is a significant problem in spatial database. The checkout mechanism and multi-version mechanism are two kind methods of solving the problem of long transactions. In this paper,we present a Shallow Version Management mechanism to realize multi-version mechanism in spatial database. And we introduced a increment storage and dynamic version views building method to improve efficiency of storing and consulting. We also illuminate how to resolve the problem of long transaction concurrency contrrl in spatial database by using multi-version mechanism. At the end of this paper,we introduce some required means like converge,compress and delete.  相似文献   

3.
Contribution of cloud condensate to surface rainfall process   总被引:1,自引:0,他引:1  
Contribution of cloud condensate to surface rainfall processes is investigated in a life span of tropical convection based on hourly data from a two-dimensional cloud resolving simulation. The model is forced by the large-scale vertical velocity, zonal wind and horizontal advections obtained from tropical ocean global atmosphere coupled ocean-atmosphere response experiment (TOGA COARE). The results show that during the genesis, development, and decay of tropical convection, calculations with water vapor overestimate surface rain rate, and cloud condensate plays an important role in correcting overestimation in surface rain rates. The analysis is carried out in deep convective clouds and anvil clouds during the development of tropical convection. The surface rain rates calculated with water vapor in deep convective clouds and anvil clouds have similar magnitudes, the large surface rain rate appears in deep convective clouds due to the consumption of water hydrometeors whereas the small surface rain rate occurs in anvil clouds because of the gain of ice hydrometeors. Further analysis of the grid data shows that the surface rain rates calculated with water vapor and with cloud condensate are negatively correlated with the correlation coefficient of -0.85, and the surface rain rate calculated with cloud condensate is mainly contributed to the water hydrometeors in the tropical deep convective regime.  相似文献   

4.
A novel audio watermarking scheme using multiscale wavelet modulation   总被引:3,自引:0,他引:3  
A novel audio watermarking scheme to embed robust and inaudible watermarks for the purpose of copyright protection is proposed. The key innovation is to add time-frequency redundancy into watermark signals by multiscale wavelet modulation. In order to maximize the watermarking strength within perceptual constraints, the signals synthesized from different scales are masked using a frequency auditory model, respectively, and then intergrated to form the final watermark signal. The detection structure is built using the redundancy in watermark signals, and the performance is further enhanced by modeling the statistical behaviors of wavelet coefficients as generalized Gaussian distribution. The use of original audio signal is not required in watermark detection. The experimental results show that our approach can achieve not only good transparency but also satisfying robustness to common audio manipulations.  相似文献   

5.
The walking creatures' athletic ability is related to their body' s musculoskeletal system.A kind of musculoskeletal body for quadruped robots is developed,which will be used to assist the leg mechanism to achieve spinning gait in order to improve the robot mobility in unstructured environment.A bionic-flexible-spine model driven by pneumatic artificial muscles(PAMs) is proposed.Because the body has the flexible property,the robot can achieve spinning gait quickly,which is similar to walking creatures by coordinated movement between body bending and legs side-swing.The kinematics of the bending of the musculoskeletal body and side-swing of leg mechanism of quadruped robot for spinning gait are studied.According to the stability analysis of spinning gait,the relationship between body bending angle and leg swing angle can be determined.The PID controller is designed to conduct the bending experiment,and the bending characteristic of the musculoskeletal body is studied.Experimental results show that the biggest bending angle of the musculoskeletal body can reach 30°.  相似文献   

6.
The proposed method inserts a watermark into the spectral components of the data using techniques analogous to spread spectrum communications,hiding a narrow band signal in a wideband channel.The watermark is difficult for an attacker to remove.It is also robust to common signal and geometric distortion such as JPEG compression,cropping and scaling.In addition,the watermark can be extracted accurately without source host image at the receiver.  相似文献   

7.
8.
Parameterization of entrainment-mixing pro- cesses in cumulus clouds is critical to improve cloud parameterization in models, but is still at its infancy. For this purpose, we have lately developed a formulation to represent a microphysical measure defined as homoge- neous mixing degree in terms of a dynamical measure defined as transition scale numbers, and demonstrated the formulation with measurements from stratocumulus clouds. Here, we extend the previous work by examining data from observed cumulus clouds and find positive cor- relations between the homogeneous mixing degree and transition scale numbers. These results are similar to those in the stratocumulus clouds, but proved valid for the first time in observed cumulus clouds. The empiricalrelationships can be used to parameterize entrainment- mixing processes in two-moment microphysical schemes. Further examined are the effects of secondary mixing events on the relationships between homogeneous mixing degree and transition scale numbers with the explicit mixing parcel model. The secondary mixing events are found to be at least partially responsible for the larger scatter in the above positive correlations based on obser- vations than that in the previous results based on numerical simulations without considering secondary mixing events.  相似文献   

9.
A method is presented for determining the optical thickness (τc) and effective particle radius (re) of stratiform cloud layers from transmitted solar radiation measurements. A detailed study shows that the cloud optical thickness and effective particle radius of water clouds can be determined from transmission function measurements at 0.75 and 2.13 μm, provided that the scaled optical thickness τ′0.75>1 and re>5 μm. The wavelengths adopted by our study are similar to the channels of the moderate resolution imaging spectrometer (MODIS). The proposed method is invalid for optically thin clouds since transmission at 2.13 μm is less sensitive to re. The retrieval errors of τ′0.75 and re monotonically decrease with increasing τc. For clouds having τ′0.75≥2, the retrieval errors of τ′0.75 and re are below 10% and 20%, respectively. Transmissions at 0.75 and 1.65 μm can also be used to retrieve τc and re.  相似文献   

10.
One of the key issues for parallel mechanism is the kinematic characteristics, especially the workspace which varies with configuration parameters. A kind of 4UPS-UPU parallel mechanism is designed and its workspace is studied in this paper. First, the mobility of the 4UPS-UPU parallel mechanism is analyzed based on the reciprocal screw theory, and the motion and constraint screw systems of the parallel mechanism are obtained. Then the inverse kinematics is derived by the closed-form kinematics chain. The boundary search method in the polar coordinate system is presented to analyze the constant-orientation workspace of the parallel mechanism. Finally, the influence factors relevant to the workspace, such as the structural parameters and kinematics parameters are analyzed in detail. The relationship between the workspace volume and different parameters are obtained. The conclusions can be used for parameters optimization and path planning of the parallel mechanism.  相似文献   

11.
Distributed denial of service (DDoS) attacks exploit the availability of Web servers, resulting in the severe loss of their connectivity. We present a robust IP packets filtering mechanism which combines the detection and filtering engine together to protect Web Servers from DDoS Attacks. The mechanism can detect DDoS attacks by inspecting inbound packets with an IP address database, and filter out lower priority IP addresses to preserve the connection for valid users by monitoring the queues status. We use the Netfilter's technique, a framework inside the Linux 2.4. X, to implement it on a Web server. Also, we evaluate this mechanism and analyze the influence of some important parameters on system performance. The experimental results show that this mechanism is effective against DDoS attacks.  相似文献   

12.
The current multicast model provides no access control mechanism. Any host can send data directly to a multicast address or join a multicast group to become a member, which brings safety problems to multicast. In this paper, we present a new active multicast group access control mechanism that is founded on trust management. This structure can solve the problem that exists in multicast members' access control and distributing authorization of traditional IP multicast.  相似文献   

13.
A geometrical transformations resistant digital image watermarking based on quantization is described. Taking advantage of the rotation, scale and translation invariants of discrete Fourier transform(DFT), each watermark bit is embedded into each homocentric circles around the zero frequency term in DFT domain by quantizing the magnitude vector of Fourier spectrum. The embedded sequence can he extracted by ““““““““majority principles““““““““ without restoring to the original unmarked image. The experimental results show that the watermark is invisible and robust to any combination of geometrical transformations or common image processing techniques.  相似文献   

14.
The most significant strategic development in information technology over the past years has been "trusted computing" and trusted computers have been produced. In this paper trusted mechanisms adopted by PC is imported into distributed system, such as chain of trust, trusted root and so on. Based on distributed database server system (DDSS), a novel model of trusted distributed database server system (TDDSS) is presented ultimately. In TDDSS role-based access control, two-level of logs and other technologies are adopted to ensure the trustworthiness of the system.  相似文献   

15.
Intellectual Property (IP) reuse methodology has been widely used in Integrate Circuit (IC) design. Meanwhile, the corresponding security problems caused by illegal IP distribution have aroused lots of attentions. Unlike using IP watermark to identify IP's ownership, IP fingerprinting can be used to trace illegal distributor. In this paper, IP buyer's fingerprint is mapped into different derived instances of extracted modules, and then is embedded into IP to identify distributor in case of illegal distribution. Comparing with other fingerprinting method, the proposed method has some good characteristics such as low design effort, small storage demand, high security and few physical overheads.  相似文献   

16.
The security of mobile agent directly decides its usage width in e-commerce. Especially, to protect users' private information is becoming more important now and future. So an anonymous mobile agent security mechanism with the secure authentication infrastructure based on PKI (public key infrastructure) is proposed in the paper. The multi-agent system is programmed by java language and every agent must register itself in CA (certificate authority) before working in the net and express his legit identity which is temptly produced and used only once. The CA ensures the legal of all agents' identity which take part in communicaiton or trade. And every user agent identity only is used once which makes other agents cannot decipher users' private information. The security mechanism of the multi-agent system implements anonymity, integrity, data confidentiality of mobile agent based on the MH(multiple hop) integrity protection regard to PKI limit.  相似文献   

17.
A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP) was proposed. Based on the idea of all-or-nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol provided mechanisms to trace piracy and protect customer's right. In addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided.  相似文献   

18.
Current distributed parallel file systems and database systems can not satisfy the demands of data-intensive applications, such as storage capacity, access performance, reliability, scalability, and so on. Cluster-based storage sys tems have some shortcomings, too. To solve this kind of problems, a novel PC storage cluster solution is proposed, a distributed storage system based on 3-tiered agent architecture is designed, the system reliability model based on the masterslave backup mode is built, and the system availability is analyzed with the Markov model. According to the system availability formula and the values of the system parameters, the novel system can provide higher reliability and availability to satisfy users' requirements,  相似文献   

19.
To build a trusted platform based on Trusted Computing Platform Alliance (TCPA)‘s recommendation, we analyze the integrity mechanism for such a PC platform in this paper. By combinning access control model with information flow model, we put forward a combined process-based lattice model to enforce security. This model creates a trust chain by which we can manage a series of processes from a core root of trust module to some other application modules. In the model,once the trust chain is created and managed correctly,the integrity of the computer‘s hardware and sofware has been mainfained, so does the confidentiality and authenticity. Moreover, a relevant implementation of the model is explained.  相似文献   

20.
A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's certificate makes the dealer have no need to transfer secret information to the participants. The proposed scheme is dynamic. It can effectively check cheaters and does not have secure channel requirements.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号