首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   149篇
  免费   9篇
  国内免费   5篇
机械仪表   2篇
无线电   48篇
一般工业技术   6篇
自动化技术   107篇
  2022年   2篇
  2021年   4篇
  2020年   4篇
  2019年   5篇
  2018年   1篇
  2017年   1篇
  2016年   4篇
  2015年   4篇
  2014年   13篇
  2013年   9篇
  2012年   10篇
  2011年   15篇
  2010年   15篇
  2009年   18篇
  2008年   7篇
  2007年   15篇
  2006年   10篇
  2005年   9篇
  2004年   5篇
  2003年   9篇
  2002年   1篇
  2001年   1篇
  1999年   1篇
排序方式: 共有163条查询结果,搜索用时 125 毫秒
1.
In this paper, the feature representation of an image by CNN is used to hide the secret image into the cover image. The style of the cover image hides the content of the secret image and produce a stego image using Neural Style Transfer (NST) algorithm, which resembles the cover image and also contains the semantic content of secret image. The main technical contributions are to hide the content of the secret image in the in-between hidden layered style features of the cover image, which is the first of its kind in the present state-of-art-technique. Also, to recover the secret image from the stego image, destylization is done with the help of conditional generative adversarial networks (GANs) using Residual in Residual Dense Blocks (RRDBs). Further, stego images from different layer combinations of content and style features are obtained and evaluated. Evaluation is based on the visual similarity and quality loss between the cover-stego pair and the secret-reconstructed secret pair of images. From the experiments, it has been observed that the proposed algorithm has 43.95 dB Peak Signal-to-Noise Ratio (PSNR)), .995 Structural Similarity Index (SSIM), and .993 Visual Information Fidelity (VIF) for the ImageNet dataset. The proposed algorithm is found to be more robust against StegExpose than the traditional methods.  相似文献   
2.
Currently, few general methods have been suggested to quantitate the imperceptibility among var- ious hiding algorithms. Especially, it is a challenge to quantitate the imperceptibility of the hiding-vector, which is consisted of orthogonal hiding algorithms in the multi- dimensional hiding space. In this paper, a novel model of general imperceptibility quantitation was proposed. Ac- cording to this model, a quantitation method based on the relative entropy was designed. It is proved under this quantitation method that there exists the global maximal imperceptibility for any specified hiding-vector capacity. An optimization algorithm was proposed to approach this maximum by adjusting the allocation of secret message into each components of the hiding-vector. Experiments with VoIP and bitmap multi-dimensional hiding space validated the effectiveness of the designed quantitation method and the proposed optimization algorithm.  相似文献   
3.
Most of the real-world signals we encounter in real-life applications have low information content. In other words, these signals can be well approximated by sparse signals in a proper basis. Compressive sensing framework uses this fact and attempts to represent signals by using far fewer measurements as compared to conventional acquisition systems. While the CS acquisition is linear, the reconstruction of the signal from its sparse samples is nonlinear and complex. The sparse nature of the signal allows enough room for some additional data sequence to be inserted and exactly recovered along with the reconstructed signal. In this study, we propose to linearly embed and hide data in compressively sensed signals and nonlinearly reconstruct both of them using a deflationary approach. We investigate the embedding capacity as a function of signal sparsity and signal compression, as well as the noise sensitivity of the proposed algorithm.  相似文献   
4.
本文突破了传统LSB隐写分析算法只针对图片整体特征提取、监测手段不够精细的缺陷,提出了针对每一像素点的针对性判断。算法主要利用图像函数估计、噪声判断、像素值估计等方法,通过预测每一像素是否被改动,来判断整张图片的嵌入情况,从而实现小嵌入率隐写分析与嵌入点大致估计的目标。算法的检测率较以往算法有明显提高,对低嵌入率(1%以内)的LSB嵌入检测效果尤为有效。同时对高嵌入率的嵌入,算法保证了99.9%以上的准确率。  相似文献   
5.
This paper presents an active steganalysis technique for echo hiding (EH). This approach can differentiate stego audios (with hidden message) from nature ones (without hidden message), and then extract sequential EH messages in stego audios without prior knowledge about the EH technique. The procedure of this algorithm can be simplified as follows: (i) Sliding Windowed Cepstrum (SWC) is obtained by employing a Sliding Window (SW) to move over the audio signal sample by sample. (ii) The echo detector is designed based on statistical analysis of the Cepstrum Peak Location Aggregation Degree (CPLAD). (iii) For stego signals, both echo delay and the range of segment length are estimated by exploring the changing rule of the SWC. (iv) The accurate estimation of segment length and synchronism position is acquired by the grid search algorithm. (v) Finally, the binary secret message can be extracted using the estimated parameters in the previous steps. The proposed method has been implemented and tested to extract the message which is embedded into audio clips by using EH techniques with different kernels. The experimental results show that the accuracy of extraction is no less than 90% when attenuation is greater than 0.45.  相似文献   
6.
一种基于湿纸编码和图匹配理论的直方图保持隐写算法   总被引:1,自引:1,他引:0  
该文结合隐写码、湿纸码和图匹配理论提出一种具有高嵌入效率的且可保持载体图像一阶直方图的双层嵌入隐写算法.首先构造出一条新的四进制的隐写信道,然后在该信道的LSB(Least Significant Bit)层和次LSB层分别使用二元隐写码和湿纸码嵌入秘密消息,这样即可确定出需要修改的元素,接着构造出一个图,最后使用图论...  相似文献   
7.
针对自适应空域隐写术设计的关键问题,该文结合Canny边缘检测和校验格编码(STC)提出一种不需要同步边信息的自适应空域隐写方法.首先,根据秘密消息长度、载体图像等因素确定Canny边缘检测算法中的参数取值,进而根据相应的参数取值使用Canny边缘检测算法来选择载体图像的边缘区域.然后,分别定义边缘区域像素和非边缘区域像素的嵌入失真;最后,在载体像素的多个最低有效位平面(LSB)使用STC嵌入秘密消息.实验结果表明:该隐写方法在4种嵌入率情况下抵抗常见通用隐写分析的性能优于3种已有的隐写方法,且在较小嵌入率情况下与空域通用小波相对失真方法(S-UNIWARD)相当.  相似文献   
8.
A novel data hiding scheme based on modulus function   总被引:1,自引:0,他引:1  
Four criteria are generally used to evaluate the performance of data hiding scheme: the embedding capacity, the visual quality of the stego-image, the security, and the complexity of the data-embedding algorithm. However, data hiding schemes seldom take all these factors into consideration. This paper proposes a novel data hiding scheme that uses a simple modulus function to address all the performance criteria listed above. According to the input secret keys, the encoder and decoder use the same set-generation functions Hr() and Hc() to first generate two sets Kr and Kc. A variant Cartesian product is then created using Kr and Kc. Each cover pixel then forms a pixel group with its neighboring pixels by exploiting an efficient modulus function; the secret data are then embedded or extracted via a mapping process between the variant of the Cartesian product and each pixel group. The proposed scheme offers several advantages, namely (1) the embedding capacity can be scaled, (2) a good visual quality of the stego-image can be achieved, (3) the computational cost of embedding or extracting the secret data is low and requires little memory space, (4) secret keys are used to protect the secret data and (5) the problem of overflow or underflow does not occur, regardless of the nature of the cover pixels.We tested the performance of the proposed scheme by comparing it with Mielikainen’s and Zhang and Wang’s schemes for gray-scale images. The experimental results showed that our proposed scheme outperforms Mielikainen’s in three respects, namely scalable embedding capacity, embedding rate, and level of security. Our data hiding scheme also achieved a higher embedding capacity than Zhang and Wang’s. The proposed scheme can easily be applied to both gray-scale and color images. Analyses of its performance showed that our proposed scheme outperforms Tsai and Wang’s in terms of its time complexity and memory space requirement.  相似文献   
9.
In this paper, we proposed a novel adjustable data hiding method. Our proposed method, which is based on exploiting modification direction (EMD) method, is called the “multi-group exploiting modification direction” method. In the multi-group method, we combine several pixel-groups to embed secret data according to the constructed switch map to simply avoid the conversion redundancy of the EMD method and the spatial redundancy of the section-wise strategy, as well as to efficiently increase the probability of achieving larger embedding capacity. According to the experimental results and mathematical justification, we verified that the multi-group method can achieve higher embedding payload and better visual quality of the image than the EMD method and section-wise strategy for simulated and real secret data.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号