首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
增强鲁棒性的音频水印算法   总被引:1,自引:1,他引:0  
提出了一种基于离散小波变换的数字音频水印盲检算法.算法选择在小波系数中嵌入水印,将同步化位元码引入到音频水印的研究中,针对切割或插入额外音频段的攻击有较好的抵抗能力,并且通过重复地将水印嵌入到音频信号中,增强了鲁棒性,提取水印时不需要原始音频信号.实验结果表明,该方法具有良好的鲁棒性和不可听见性.  相似文献   

2.
基于音频内容与维特比解码的音频数字水印算法   总被引:2,自引:0,他引:2  
利用音频自身特征作为水印的同步信号有利于提高音频水印的鲁棒性。提出了一种基于音频内容分析的算法,算法先经过音频内容分析得到一组特征点,在特征点后面的音频中嵌入水印。水印检测时,同样先分析待测音频得到特征点,利用特征点后面的音频提取出有意义的水印。为了提高水印的检测速度,提出采用维特比(Vitebi)解码技术判决水印。实验结果表明,算法对加噪、低通滤波等具有一定的鲁棒性。  相似文献   

3.
基于离散小波变换的盲水印研究与仿真   总被引:1,自引:1,他引:0  
研究优化水印安全性问题.由于水印图像应具备版权信息和密钥条件,针对目前音频水印算法中水印容易被提取,且检测水印时均需要原始水印图像,导致水印安全性,鲁棒性无法保证.提出了基于离散小波变换的混沌加密的音频数字水印盲算法.将混沌原理引入音频水印中,改善了水印的安全性,同时根据信号的能量对水印进行了量化嵌入,改善了水印的鲁棒性.首先利用密钥对二值水印图像进行随机置乱;然后将经过随机置乱处理的含有版权信息的二值水印图像嵌入到原始音频信号中.在水印检测过程中利用已知的密钥对水印进行重构.仿真证明,在不知道密钥的情况下,无法得出水印图像,为设计提供了依据.  相似文献   

4.
针对传统基于经验模式分解(EMD)的音频水印算法鲁棒性不强的问题,提出一种基于固有模态函数(IMF)极值的盲音频水印算法.首先对音频信号进行分帧,每个音频帧经过EMD后得到IMF; 接着利用均匀量化的方法将水印信息和同步码嵌入到最后一个IMF的极值中.所提算法的数据嵌入率是46.9~50.3 b/s,且携水印音频保持了原始音频的感知质量.对携水印音频进行加噪、MP3压缩、重新采样、滤波、剪切和重采样攻击后,提取出的水印信息变化不大,算法鲁棒性较好.与时间域和小波域算法相比,提出的算法在保证高数据嵌入率的同时,可以抵抗32 kb/s的MP3压缩攻击.  相似文献   

5.
提出了一种基于小波变换的自适应音频水印算法,把一幅二值图像作为水印信息自适应地嵌入音频信号中.仿真实验表明嵌入的水印具有良好的鲁棒性和透明性.  相似文献   

6.
自然语言与图像、音频信号的性质截然不同,图像水印等的鲁棒性分析方法不适用于自然语言水印,但是直到目前还没有专门针对自然语言水印鲁棒性的研究和评估工作.文中针对自然语言的特点,提出适合自然语言水印的敌手模型.然后将现有的自然语言水印分类,并总结各类的一般算法模型.利用文本提出的敌手模型分析自然语言水印编码算法的鲁棒性,并通过实验验证鲁棒性的理论模型.本项工作为对比、评估自然语言水印算法的鲁棒性提供了理论依据.  相似文献   

7.
提出了一种基于人工神经网络的数字音频水印算法.利用人工神经网络学习和自适应的特征,将音频信号的重要特征作为人工神经网络的输入,通过人工神经网络的学习,建立音频信号与水印信息的对应关系,达到在不修改音频信号情况下把水印"嵌入"到原始音频信号中.实验结果表明该算法具有很强的鲁棒性和抵抗常用信号处理方法处理的能力,并且在提取水印时不需要原始音频信号.  相似文献   

8.
为了提高应用于版权保护的音频数字水印算法的鲁棒性,提出了一种基于音频混合域随机共振的数字水印算法.在嵌入端,将水印序列嵌入在音频栽体的混合域系数中.在检测端,待检测音频的混合域系数在预处理后,作为随机共振系统的输入,通过调节随机共振信号处理器的参数和本文提出的去刺参数以产生随机共振从而实现水印的检测.仿真结果表明,该算法能够在保证水印信息不可感知的前提下抵抗StirmarkForAudio软件的多种攻击,相比常见算法显示出更强的鲁棒性.  相似文献   

9.
一种易损性音频数字水印技术   总被引:3,自引:0,他引:3  
利用变换域嵌入水印是音频水印的主流技术,一般的嵌入方法是通过调整所选变换系数实现。谱弯折方法实现整段频谱的非线性位移,可将水印嵌入整个频谱。该文在Choi犤1犦的谱弯折音频数字水印算法基础上,研究了算法的鲁棒性,通过大量实验验证,认为谱弯折算法对信号处理类攻击相当脆弱,不具备鲁棒性,是一种易损性音频水印。  相似文献   

10.
为了解决现有音频水印算法透明性与鲁棒性之间的矛盾,提出了一种基于DCT系数符号的音频零水印算法。算法按水印尺寸对时域音频数据做等长分帧,求取每帧数据的绝对值平均值,依次按时序做离散余弦变换( DCT)。算法选取数值最大的DCT系数,利用水印属性与最大DCT系数符号做异或运算,得到水印密钥,实现了零水印的嵌入。实验结果表明该算法可以很好地抵抗各类常规的信号处理破坏,水印鲁棒性较强。  相似文献   

11.
《计算机科学》2007,34(4):148-148
Recent years have seen rapid advances in various grid-related technologies, middleware, and applications. The GCC conference has become one of the largest scientific events worldwide in grid and cooperative computing. The 6th international conference on grid and cooperative computing (GCC2007) Sponsored by China Computer Federation (CCF),Institute of Computing Technology, Chinese Academy of Sciences (ICT) and Xinjiang University ,and in Cooperation with IEEE Computer Soceity ,is to be held from August 16 to 18, 2007 in Urumchi, Xinjiang, China.  相似文献   

12.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

13.
本文分析了法律数据库的结构和特点,介绍了采用面向对象设计方法和超文本数据库技术开发和实现法律信息库系统将作为重要网络资源之一为不同用户进行法律咨询服务。  相似文献   

14.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

15.
16.
17.
正SCIENCE CHINA Information Sciences(Sci China Inf Sci),cosponsored by the Chinese Academy of Sciences and the National Natural Science Foundation of China,and published by Science China Press,is committed to publishing highquality,original results of both basic and applied research in all areas of information sciences,including computer science and technology;systems science,control science and engineering(published in Issues with odd numbers);information and communication engineering;electronic science and technology(published in Issues with even numbers).Sci China Inf Sci is published monthly in both print and electronic forms.It is indexed by Academic OneFile,Astrophysics Data System(ADS),CSA,Cabells,Current Contents/Engineering,Computing and Technology,DBLP,Digital Mathematics Registry,Earthquake Engineering Abstracts,Engineering Index,Engineered Materials Abstracts,Gale,Google,INSPEC,Journal Citation Reports/Science Edition,Mathematical Reviews,OCLC,ProQuest,SCOPUS,Science Citation Index Expanded,Summon by Serial Solutions,VINITI,Zentralblatt MATH.  相似文献   

18.
正Erratum to:J Zhejiang Univ-Sci C(ComputElectron)2014 15(7):551-563doi:10.1631/jzus.C1300320The original version of this article unfortunately contained mistakes.Algorithm 6 should be as follows:Algorithm 6 FGKFCM-F clustering Input:(1)X={x_1,x_2,…,x_N},,x_iR~d,i=1,2,…,N,the dataset;(2)C,1C≤N,the number of clusters;(3)ε0,the stopping criterion;  相似文献   

19.
20.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号