首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 57 毫秒
1.
采用一维小波对原始图像进行逐行变换,从而获取小波系数,然后再采用压缩传感算法对小波系数进行观测,获取观测矩阵,并将观测矩阵作为水印信息,同时将水印信息进行hash运行生成消息认证码;在嵌入水印阶段,首先将载体彩色图像从RGB空间转换到HSV空间,选取S分量进行DCT变换,从而获取S分量中的低频信息作为水印嵌入位置,然后将水印图像基于SVD算法嵌入到载体彩色图像的DCT变换域中;在认证阶段,提取水印图像,并通过hash运算生成消息认证码,与原消息认证码进行对比,如发生篡改,将提取后的水印图像采用压缩感知算法重构原始图像,与篡改后的载体图像进行对比,从而实现图像认证和篡改定位.实验结果表明该算法遭受到JPEG压缩、噪声和篡改攻击时体现出较好的鲁棒性,对篡改攻击能准确检测和确定篡改的位置,符合半脆弱水印认证的要求.  相似文献   

2.
HMAC-SHA1是一种安全的基于加密hash函数和共享密钥的消息认证协议.它可以有效地防止数据在传输过程中被截获和篡改,维护了数据的完整性、可靠性和安全性.HMAC-SHA1消息认证机制的成功在于一个加密的hash函数、一个加密的随机密钥和一个安全的密钥交换机制.本文从HMAC和SHA1算法的概念入手,提出了一个基于SHA1算法的消息认证机制,分析了其原理与认证过程,并对其安全性作了进一步的研究.  相似文献   

3.
基于压缩传感的图像哈希水印算法研究   总被引:3,自引:0,他引:3  
现有基于图像内容的水印算法在鲁棒性和篡改检测方面存在不足,提出了一种基于压缩传感的图像哈希水印算法。该算法利用压缩传感对图像进行随机投影,得到的压缩测量值作为图像内容特征,通过HMAC(Hash-based Message Authentication Code,基于哈希的消息认证码)算法生成图像摘要,并以水印的方式嵌入到原始图像中;认证时,提取图像中的水印,并对认证图像进行压缩传感随机投影,得到原始图像和认证图像的摘要,通过摘要对比,实现图像认证和篡改检测。仿真实验表明,该方法不仅具有较强的鲁棒性和安全性,还具有较好的篡改检测能力。  相似文献   

4.
为了提高JPEG图像认证算法的水印嵌入容量及安全性问题,提出一种新的JPEG图像精确认证方案,通过调整标准量化表进而调整DCT系数,以增加水印的嵌入容量,同时,对DCT系数及位置信息进行值合并运算并得到合并值,将其作为混沌系统的初值经过迭代后产生水印,并将水印嵌入调整后的JPEG系数中,最后通过熵编码形成含水印的JPEG图像,理论分析和实验结果表明:该方案可以有效折中图像质量和嵌入容量之间的矛盾,有较高的安全性,同时可以准确定位图像被篡改的区域。  相似文献   

5.
提出了一种基于小波变换,能有效抵抗图像篡改攻击的数字水印嵌入算法.把经过加密的水印图像嵌入到原始图像的中频以及含有重要信息的区域,经实验证明即使篡改了全部背景的图像,提取出的水印图像仍具有良好的鲁棒性,通过肉眼就可以直观地检测从篡改图像提取出的水印图像的质量.  相似文献   

6.
提出了一种DCT域和DWT域相结合的半脆弱彩色图像数字水印算法.算法充分利用了DWT变换提取图像特征方面的优势和DCT变换与JPEG压缩过程结合紧密的特点,有效地实现了篡改检测和篡改定位,而且检测时不需要原始图像.使用密钥控制生成的混沌序列对水印进行加密处理,保证了系统的安全性.实验结果表明,该算法对于JPEG压缩等常规图像处理具有较强的鲁棒性,对于恶意篡改具有高度的敏感性,并且能够准确定位篡改发生的位置.  相似文献   

7.
可恢复的脆弱数字水印图像认证算法   总被引:4,自引:0,他引:4  
提出一种用于图像内容认证和保护的脆弱数字图像水印算法。本算法新颖之处是在图像中嵌入定位和恢复两种水印,通过两种水印的提取检测,不但可以定位图像中的任何细微篡改,还可恢复被篡改的图像数据;此外,算法采用由密钥控制水印的生成和检测,保证了水印的安全性和保密性;经实验验证,该算法不但可以有效地检测出图像中被篡改数据的位置,而且能较好的恢复被篡改的区域。  相似文献   

8.
针对现有脆弱水印算法大多无法恢复被篡改区域的问题,提出了一种基于脆弱水印的可恢复图像认证方案:将分块的DCT系数量化、编码和加密后作为恢复水印,嵌入到偏移子块的次低位;待恢复水印嵌入后,由哈希算法产生分块的认证水印,并嵌入到自身的最低位,理论分析和实验结果表明:该方案在保证篡改定位精度和系统安全性的同时,可有效地恢复被篡改的区域。  相似文献   

9.
针对目前半脆弱水印算法在篡改定位和篡改恢复性能方面存在的不足,本文提出了一种高精度图像认证的半脆弱双水印算法。该算法利用认证水印对图像进行认证、定位篡改,利用恢复水印重构被篡改图像。实验结果证明,该算法对图像具有很好的篡改定位能力,并能有效地恢复篡改内容。  相似文献   

10.
为了解决当前篡改图像的检测算法主要依靠单一的特征进行描述以及欧几里德距离进行匹配,导致篡改图像的检测率较低的问题,以及在对图像复制粘贴后进行一系列后处理操作的篡改图像检测时,容易出现匹配错误和鲁棒性差的问题,采用一种多距离特征匹配的篡改图像检测算法。首先,对获取到的图像提取尺度不变特征变换(SIFT)特征,在SIFT特征待描述区域的基础上,提取具有权值旋转不变均匀性的局部二值模式(LBP)特征,构成特征描述子;其次,分别计算描述子之间的标准欧几里德距离、相关距离以及汉明距离,通过多距离匹配改进g2nn算法进行特征的初次匹配;最后,通过凝聚型分层特征聚类以及随机一致性(RANSAC)算法去除存在的错误匹配点,完成篡改图像的检测。在MICC-F220图像数据库上进行了测试,实验结果表明,与当前2种主流算法相比,总体准确率分别提高了2.86%和2.11%,对于缩放、旋转以及缩放+旋转的后处理均具有很好的鲁棒性,是一种研究复制粘贴后进行缩放和旋转后处理的篡改图像检测的有效方法。  相似文献   

11.
Language markedness is a common phenomenon in languages, and is reflected from hearing, vision and sense, i.e. the variation in the three aspects such as phonology, morphology and semantics. This paper focuses on the interpretation of markedness in language use following the three perspectives, i.e. pragmatic interpretation, psychological interpretation and cognitive interpretation, with an aim to define the function of markedness.  相似文献   

12.
何延凌 《科技信息》2008,(4):258-258
Language is a means of verbal communication. People use language to communicate with each other. In the society, no two speakers are exactly alike in the way of speaking. Some differences are due to age, gender, statue and personality. Above all, gender is one of the obvious reasons. The writer of this paper tries to describe the features of women's language from these perspectives: pronunciation, intonation, diction, subjects, grammar and discourse. From the discussion of the features of women's language, more attention should be paid to language use in social context. What's more, the linguistic phenomena in a speaking community can be understood more thoroughly.  相似文献   

13.
王慧 《科技信息》2008,(10):240-240
Wuthering Heights, Emily Bronte's only novel, was published in December of 1847 under the pseudonym Ellis Bell. The book did not gain immediate success, but it is now thought one of the finest novels in the English language. Catherine is the key character of this masterpiece, because everybody and everything center on her though she had a short life. We can understand this masterpiece better if we know Catherine well.  相似文献   

14.
The Williston Basin is a significant petroleum province, containing oil production zones that include the Middle Cambrian to Lower Ordovician, Upper Ordovician, Middle Devonian, Upper Devonian and Mississippian and within the Jurassic and Cretaceous. The oils of the Williston Basin exhibit a wide range of geochemical characteristics defined as "oil families", although the geochemical signature of the Cambrian Deadwood Formation and Lower Ordovician Winnipeg reservoired oils does not match any "oil family". Despite their close stratigraphic proximity, it is evident that the oils of the Lower Palaeozoic within the Williston Basin are distinct. This suggests the presence of a new "oil family" within the Williston Basin. Diagnostic geochemical signatures occur in the gasoline range chromatograms, within saturate fraction gas chromatograms and biomarker fingerprints. However, some of the established criteria and cross-plots that are currently used to segregate oils into distinct genetic families within the basin do not always meet with success, particularly when applied to the Lower Palaeozoic oils of the Deadwood and Winnipeg Formation.  相似文献   

15.
理论推导与室内实验相结合,建立了低渗透非均质砂岩油藏启动压力梯度确定方法。首先借助油藏流场与电场相似的原理,推导了非均质砂岩油藏启动压力梯度计算公式。其次基于稳定流实验方法,建立了非均质砂岩油藏启动压力梯度测试方法。结果表明:低渗透非均质砂岩油藏的启动压力梯度确定遵循两个等效原则。平面非均质油藏的启动压力梯度等于各级渗透率段的启动压力梯度关于长度的加权平均;纵向非均质油藏的启动压力梯度等于各渗透率层的启动压力梯度关于渗透率与渗流面积乘积的加权平均。研究成果可用于有效指导低渗透非均质砂岩油藏的合理井距确定,促进该类油藏的高效开发。  相似文献   

16.
As an American modern novelist who were famous in the literary world, Hemingway was not a person who always followed the trend but a sharp observer. At the same time, he was a tragedy maestro, he paid great attention on existence, fate and end-result. The dramatis personae's tragedy of his works was an extreme limit by all means tragedy on the meaning of fearless challenge that failed. The beauty of tragedy was not produced on the destruction of life, but now this kind of value was in the impact activity. They performed for the reader about the tragedy on challenging for the limit and the death.  相似文献   

17.
Location based services is promising due to its novel working style and contents.A software platform is proposed to provide application programs of typical location based services and support new applications developing efficiently. The analysis shows that this scheme is easy implemented, low cost and adapt to all kinds of mobile nework system.  相似文献   

18.
正The periodicity of the elements and the non-reactivity of the inner-shell electrons are two related principles of chemistry,rooted in the atomic shell structure.Within compounds,Group I elements,for example,invariably assume the+1 oxidation state,and their chemical properties differ completely from those of the p-block elements.These general rules govern our understanding of chemical structures and reactions.Using first principles calcula-  相似文献   

19.
We have developed an adiabatic connection to formulate the ground-state exchange-correlation energy in terms of pairing matrix linear fluctuations.This formulation of the exchange-correlation energy opens a new channel for density functional approximations based on the many-body perturbation theory.We illustrate the potential of such approaches with an approximation based on the particle-particle Random Phase Approximation(pp-RPA).This re-  相似文献   

20.
正The electronic and nuclear(structural/vibrational)response of 1D-3D nanoscale systems to electric fields gives rise to a host of optical,mechanical,spectral,etc.properties that are of high theoretical and applied interest.Due to the computational difficulty of treating such large systems it is convenient to model them as infinite and periodic(at least,in first approximation).The fundamental theoretical/computational problem in doing so is that  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号