首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   308篇
  免费   140篇
  国内免费   66篇
电工技术   3篇
综合类   30篇
化学工业   2篇
机械仪表   5篇
武器工业   1篇
无线电   116篇
一般工业技术   33篇
自动化技术   324篇
  2024年   5篇
  2023年   15篇
  2022年   22篇
  2021年   21篇
  2020年   14篇
  2019年   8篇
  2018年   17篇
  2017年   13篇
  2016年   19篇
  2015年   24篇
  2014年   28篇
  2013年   45篇
  2012年   44篇
  2011年   39篇
  2010年   27篇
  2009年   43篇
  2008年   35篇
  2007年   32篇
  2006年   20篇
  2005年   17篇
  2004年   10篇
  2003年   8篇
  2002年   4篇
  2001年   2篇
  2000年   1篇
  1996年   1篇
排序方式: 共有514条查询结果,搜索用时 16 毫秒
1.
ABSTRACT

In recent years, information security over the internet has gained enormous immersion due to a technological escalation in communication via digital media. Nowadays, videos are the most common form of media over the internet, and they have gained the attention of video steganography research community for the security of the communication. This paper implemented video steganography using a widely-known transform technique, discrete wavelet transform (DWT) which consists of different orthogonal and biorthogonal filters used for the decomposition of a frame/image. The aim of this paper is to provide a comparative evaluation for orthogonal and biorthogonal DWT filters with different matrices such as MSE, PSNR. The performance of the different filters has been evaluated both quantitatively and qualitatively to investigate the best among them. Also, the best of orthogonal and biorthogonal filters have been further evaluated with other metrics such as SSIM, BER and histogram analysis. Further, the embedding algorithm has been compared with the existing video steganography techniques. The experimental results illustrate that bior 6.8 (biorthogonal filter) outperforms the other orthogonal and biorthogonal filters in terms of visual distortion.  相似文献   
2.
在计算机图形学中,3D形状可有多种表示形式,包括网格、体素、多视角图像、点云、参数曲面和隐式曲面等。3D网格是常见的表示形式之一,其构成3D物体的顶点、边缘和面的集合,通常用于表示数字3D物体的曲面和容积特性。在过去的20年中,基于3D网格载体的虚拟现实、实时仿真和交叉3维设计已经在工业,医疗和娱乐等场景得到广泛应用,以3D网格为载体的水印技术、隐写和隐写分析技术也受到研究者的关注。相比于图像与音视频等载体的隐写,3D网格具备嵌入方式灵活与载体形式多变等其自身的优势。本文回顾了3D网格隐写和隐写分析的发展,并对现有研究工作进行了系统的总结和分类。根据嵌入方式和嵌入位置将隐写算法分成4类:两态调制隐写、最低位隐写、置换隐写和变换域隐写;根据特征提取角度将隐写分析算法分为2类:通用型隐写分析和专用型隐写分析。随后,介绍了每个类别的技术,综合安全性、鲁棒性、容量以及运算效率分析了各类算法的优劣性,总结当前的发展水平,并提供了不同嵌入率下两种数据集上隐写分析算法之间的性能比较。最后讨论了3D隐写和隐写分析现有技术的局限性,并探讨了潜在的研究方向,旨在为后续学者进一步推动3D隐写和隐写分析技术提供指导。  相似文献   
3.
In the digital world, secure data communication has an important role in mass media and Internet technology. With the increase in modern malicious technologies, confidential data are exposed at a greater risk during data communication. For secured communication, recent technologies and the Internet have introduced steganography, a new way to hide data. Steganography is the growing practice of concealing data in multimedia files for secure data transfer. Nowadays, videos are more commonly chosen as cover media than other multimedia files because of the moving sequence of images and audio files. Despite its popularity, video steganography faces a significant challenge, which is a lack of a fast retrieval system of the hidden data. This study proposes a novel video steganography technique in which an enhanced hidden Markov model (EHMM) is employed to improve the speed of retrieving hidden data. EHMM mathematical formulations are used to enhance the speed of embedding and extracting secret data. The data embedding and retrieving operations were performed using the conditional states and the state transition dynamics between the video frames. The proposed EHMM is extensively evaluated using three benchmark functions, and experimental evaluations are conducted to test the speed of data retrieval using differently sized cover-videos. Results indicate that the proposed EHMM yields better results by reducing the data hiding time by 3–50%, improving the data retrieval rate by 22–77% with a minimum computational cost of 20–91%, and improving the security by 4–77% compared with state-of-the-art methods.  相似文献   
4.
In this work, we propose a new adaptive chaotic steganographic method based on the Discrete Cosine Transform (DCT) and a reversible mapping function. The mapping function is used to map the secret bits into their corresponding symbols. This mapping technique has to preserve the same dynamics, properties and distribution of the original DCT coefficients. The novelty of our approach is based on the adaptive selection phase of embedding spots. This selection is established through a blindness condition which is applied over each image of the database. The proposed embedding scheme within the middle DCT coefficients shows lower probability of detection and higher flexibility in extraction. We evaluate the detection of our method using the Ensemble Classifiers and a set of frequency and spatial domain feature extractors such as the Spatial domain Rich Model (SRM) features, Chen et al.'s 486-dimensional both inter- and intra-block Markov-based features and Liu's 216-dimensional adaptive steganography-based features.  相似文献   
5.
6.
During the last decade, audio information hiding has attracted lots of attention due to its ability to provide a covert communication channel. On the other hand, various audio steganalysis schemes have been developed to detect the presence of any secret messages. Basically, audio steganography methods attempt to hide their messages in areas of time or frequency domains where human auditory system (HAS) does not perceive. Considering this fact, we propose a reliable audio steganalysis system based on the reversed Mel-frequency cepstral coefficients (R-MFCC) which aims to provide a model with maximum deviation from HAS model. Genetic algorithm is deployed to optimize dimension of the R-MFCC-based features. This will both speed up feature extraction and reduce the complexity of classification. The final decision is made by a trained support vector machine (SVM) to detect suspicious audio files. The proposed method achieves detection rates of 97.8% and 94.4% in the targeted (Steghide@1.563%) and universal scenarios. These results are respectively 17.3% and 20.8% higher than previous D2-MFCC based method.  相似文献   
7.
Steganography is the science of hiding secret message in an appropriate digital multimedia in such a way that the existence of the embedded message should be invisible to anyone apart from the sender or the intended recipient. This paper presents an irreversible scheme for hiding a secret image in the cover image that is able to improve both the visual quality and the security of the stego-image while still providing a large embedding capacity. This is achieved by a hybrid steganography scheme incorporates Noise Visibility Function (NVF) and an optimal chaotic based encryption scheme. In the embedding process, first to reduce the image distortion and to increase the embedding capacity, the payload of each region of the cover image is determined dynamically according to NVF. NVF analyzes the local image properties to identify the complex areas where more secret bits should be embedded. This ensures to maintain a high visual quality of the stego-image as well as a large embedding capacity. Second, the security of the secret image is brought about by an optimal chaotic based encryption scheme to transform the secret image into an encrypted image. Third, the optimal chaotic based encryption scheme is achieved by using a hybrid optimization of Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) which is allowing us to find an optimal secret key. The optimal secret key is able to encrypt the secret image so as the rate of changes after embedding process be decreased which results in increasing the quality of the stego-image. In the extracting process, the secret image can be extracted from the stego-image losslessly without referring to the original cover image. The experimental results confirm that the proposed scheme not only has the ability to achieve a good trade-off between the payload and the stego-image quality, but also can resist against the statistics and image processing attacks.  相似文献   
8.
PN序列估计与扩频隐藏信息分析   总被引:1,自引:0,他引:1       下载免费PDF全文
在非协作信息侦测情况下,提出了一种直接序列扩频(DS-SS)信号PN序列的估计方法,在此基础上实现了扩频隐藏信息的盲提取.该方法以估计序列和扩频信号的累积相关值为目标函数,建立估计序列长度及其构成的两变量优化模型,通过遗传算法求解,可较好地估计出PN序列.通过获取的PN序列与藏密信号的相关性分析,可实现扩频隐藏信息的盲...  相似文献   
9.
针对隐写分析评估指标体系中存在的知识冗余,提出了一种隐写分析评估指标的属性约简方法.在分析存在知识冗余的指标体系的基础上,采用BCC算法求出各评估指标初始区间及其约简,并用之将仿真实验数据离散化;之后将离散化矩阵作为HORAFA算法的输入,输出即得到最终的属性约简.仿真实验验证了该属性约简方法对冗余评估指标约简的有效性...  相似文献   
10.
Steganography is a technique to hide the secret data into digital media without getting any unexpected notices. The traditional steganographic method, namely least significant bit (LSB) replacement, is a simple but insecure scheme. To overcome the traditional drawbacks, this paper proposes a steganographic scheme, which is called double-layer hiding method. The experimental results confirm that the proposed scheme achieves better hiding capacity with high ability of resisting security analysis.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号