共查询到20条相似文献,搜索用时 62 毫秒
1.
2.
提出一种基于DWT(Discrete Wavelet Transformation)与DCT(Discrete Cosine Transformation)相结合的彩色图像自适应灰度级数字水印算法。算法首先将载体图像转入YIQ空间,取Y分量经2级DWT变换后的低频子带进一步作8×8分块DCT变换,根据各子块的AC能量自适应地确定水印嵌入强度。将作为水印的灰度图像在置乱后作4×4分块DCT变换,根据获取的各子块嵌入强度实现了灰度水印的自适应嵌入。实验结果表明算法对于常见的图像处理具有较强的鲁棒性。 相似文献
3.
4.
目前基于离散余弦变换的图像数字水印技术水印大多都不能盲提取.提出一种基于量化的鲁棒性数字水印技术.首先,对水印信息进行纠错编码提高水印的鲁棒性,并通过Arnold置乱对水印信息进行加密;然后将原始载体图像经过8×8分块DCT变换后,根据预处理后的水印数据量选定水印嵌入位置;最后对DCT系数进行量化同时完成水印信息的嵌入.本算法实现了水印的盲提取.实验表明,文中水印方法实现简单,具有较好的稳健性和不可见性,能有效抵抗噪声、JPEG有损压缩、滤波等恶意攻击. 相似文献
5.
提出了一种新的基于HSV颜色空间的彩色图像数字水印算法.该算法采用彩色图像作为水印嵌入到原始彩色图像中.算法根据HSV颜色空间的特点,首先将RGB格式的彩色水印图像转换到HSV颜色空间内,然后分别将水印图像的H、S、V三层进行分块DCT变换,对每一个子块保留左上角的系数,将其它的系数替换为0,得到嵌入矩阵,使得嵌入的有效信息大为减少.再将原始彩色图像转换到HSV域内,对原始图像的H、S和V平面进行分块DCT变换后,将变换后的H、S、V层水印信息分别嵌入到原始图像的H、S和V层变换后的中频和低频系数中,最后通过DCT逆变换和颜色空间转换,将嵌入水印的图像转换成RGB的图像,得到嵌入水印的图像,完成水印的嵌入过程.水印图像小于载体图像,利用冗余嵌入提高了水印的鲁棒性. 相似文献
6.
7.
基于纹理复杂度因子的自适应图像水印算法 总被引:1,自引:0,他引:1
对于一个有效的水印算法,要折中考虑到不可见性和鲁棒性这两个互相矛盾的因素。这实质上是一个如何确定水印的嵌入能量问题。现有算法一般都依赖实验来确定。本文提出了一个基于纹理复杂度因子的自适应图像水印算法。该算法首先将原始图像分割为互不覆盖的子块,对各个子块进行DCT变换(离散余弦变换)。然后计算纹理复杂度因子,逐块确定拉伸因子α。最后水印信号以不同的能量嵌入到各个子块的三个DCT低频交流系数中。 (1)水印嵌入。①原始图像分块DCT:首先将原始图像f(x,y)分割为互不覆盖的8 相似文献
8.
鲁棒性及掩蔽性是衡量数字水印算法性能的重要指标。为了用较低算法复杂度使数字水印具有较好的鲁棒性与掩蔽性,提出了一种基于整数DCT变换的新的鲁棒水印算法。该算法利用DCT变换的整数特点,首先对频域嵌入系数进行定量分析,找出适合嵌入的系数与嵌入阈值的大小关系,接着提取每个图像块的DC系数组成一幅新图,选择新图中具有复杂纹理的图像块再次进行整数DCT变换,最后将水印信号嵌入到这些图像块域的系数中。仿真实验结果表明,新算法既保证了水印的掩蔽性,又同时具有很好的鲁棒性,对JPEG压缩、噪声、滤波等攻击都具有很好的免疫能力,即使是在马赛克攻击下也能提取出水印图像。 相似文献
9.
提出了一种DCT域的数字图像盲水印算法,该算法将图像进行8*8分块后对各块图像进行DCT变换。之后将水印信息嵌入到选取的中频系数之间的关系中;提取水印时不需要原始图像,实现了盲检测;而且水印嵌入位置可由密码控制,增强了算法的保密性和灵活性;不可感知性和鲁棒性可调。仿真实验结果表明该算法在保证水印不可感知性的情况下,对一些常见的恶意攻击具有良好的鲁棒性。 相似文献
10.
11.
张涛 《计算机测量与控制》2015,23(1):86-89
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值. 相似文献
12.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times. 相似文献
13.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice. 相似文献
14.
Recent years have seen rapid advances in various grid-related technologies, middleware, and applications. The GCC conference has become one of the largest scientific events worldwide in grid and cooperative computing. The 6th international conference on grid and cooperative computing (GCC2007) Sponsored by China Computer Federation (CCF),Institute of Computing Technology, Chinese Academy of Sciences (ICT) and Xinjiang University ,and in Cooperation with IEEE Computer Soceity ,is to be held from August 16 to 18, 2007 in Urumchi, Xinjiang, China. 相似文献
15.
Distributed real-time simulation is a young technology field but its practice is under increasing demands. In recent years the author and his collaborators have been establishing a new approach called the distributed time-triggered simulation (DTS) scheme which is conceptually simple and easy to use but widely applicable. The concept was initiated in the course of developing a new-generation object-oriented real-time programming scheme called the time-triggered message-triggered object (TMO) programming scheme. Some fundamental issues inherent in distributed real-time simulation that were learned during recent experimental studies are discussed along with some approaches for resolving the issues. An execution engine developed to support both the TMOs engaged in control computation and the TMOs engaged in DTS is also discussed along with its possible extensions that will enable significantly larger-scale DTSs. 相似文献
16.
Zusammenfassung Mit zunehmender Größe der Softwaresysteme verschärfen sich die für die Software-Herstellung typischen Probleme: Beherrschen großer Objektmengen, Erhalten der Systemkonsistenz, Kontrolle der ständigen Änderungseinflüsse und Gewährleisten einer langen Lebensdauer. Die Disziplin Konfigurationsmanagement bildet den methodischen Ansatz, diese Probleme besser zu beherrschen. Software-Konfigurationsmanagement faßt die Herstellung von Softwaresystemen als eine Abfolge von kontrollierten Änderungen an gesicherten Zwischen- und Endergebnissen auf. Dargestellt werden die Objekte und Funktionen des Software-Konfigurationsmanagements sowie die hierfür in großen Software-Projekten benötigten Methoden, Instanzen und Hilfsmittel. 相似文献
17.
《浙江大学学报:C卷英文版》2014,(11)
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and 相似文献
18.
Zhao-hui WU 《浙江大学学报:C卷英文版》2014,(10)
正Brain-machine interfaces(BMIs)aim at building a direct communication pathway between the brain and an external device,and represent an area of research where significant progress has been made during the past decade.Based on BMIs,mind information can be read out by neural signals to control 相似文献
19.
《浙江大学学报:C卷英文版》2014,(10)
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate 相似文献