全文获取类型
收费全文 | 2227篇 |
免费 | 369篇 |
国内免费 | 330篇 |
专业分类
电工技术 | 43篇 |
综合类 | 322篇 |
化学工业 | 1篇 |
金属工艺 | 1篇 |
机械仪表 | 22篇 |
建筑科学 | 1篇 |
矿业工程 | 11篇 |
能源动力 | 1篇 |
轻工业 | 12篇 |
武器工业 | 7篇 |
无线电 | 692篇 |
一般工业技术 | 126篇 |
冶金工业 | 1篇 |
自动化技术 | 1686篇 |
出版年
2024年 | 1篇 |
2023年 | 12篇 |
2022年 | 27篇 |
2021年 | 27篇 |
2020年 | 31篇 |
2019年 | 28篇 |
2018年 | 28篇 |
2017年 | 41篇 |
2016年 | 47篇 |
2015年 | 75篇 |
2014年 | 116篇 |
2013年 | 137篇 |
2012年 | 184篇 |
2011年 | 238篇 |
2010年 | 210篇 |
2009年 | 234篇 |
2008年 | 283篇 |
2007年 | 307篇 |
2006年 | 220篇 |
2005年 | 238篇 |
2004年 | 171篇 |
2003年 | 127篇 |
2002年 | 69篇 |
2001年 | 52篇 |
2000年 | 20篇 |
1999年 | 2篇 |
1998年 | 1篇 |
排序方式: 共有2926条查询结果,搜索用时 30 毫秒
1.
In this paper, we propose a new angle quantization index modulation (AQIM) method, called the difference AQIM (DAQIM) method. The proposed method aims to improve the watermarking performance against gain attacks. Unlike the original AQIM method (Ourique et al., Angle QIM: a novel watermark embedding scheme robust against amplitude scaling distortions, in: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 2, 2005, pp. 797–800), the DAQIM method quantizes the difference of the two angles instead of the angles themselves. The main advantage of the DAQIM method is to disperse the interference to the watermark signal from one angle to more angles. Thus, the watermark has a higher ability to resist attacks. We perform a theoretical analysis of the document-to-watermark ratio (DWR) based on our proposed method. We show that our proposed method can obtain a lower embedding distortion compared to the AQIM and the gradient direction watermarking (GDWM) (Nezhadarya et al., IEEE Trans. Inf. Forensics Secur., 6(4), 2011, 1200–1213), methods under the same robustness and payload conditions. The experimental results demonstrate that our proposed method outperforms common existing methods in terms of the robustness against various attacks such as the JPEG quantization noise, additive white Gaussian noise (AWGN), cropping effect and mean filtering. 相似文献
2.
为进一步提高水印算法的安全性和抗攻击能力,结合超混沌和Slant变换的优点,提出一种基于超混沌和Slant变换的鲁棒水印算法。首先,在隐藏水印之前采用超混沌系统对水印图像进行加密,提高了待隐藏图像的安全性;其次,将原始载体图像划分成大小为8×8的不重叠分块并对各个分块分别进行Slant变换;最后,将加密后的水印图像隐藏到Slant变换后的直流系数和中频系数中。大量的仿真结果表明,本文算法具有较好的隐蔽性,对JPEG压缩、噪声、滤波、缩放、对比度调整等攻击具有较好的抗攻击能力。与相似算法相比,本文算法具有更好的鲁棒性能。 相似文献
3.
4.
本文将一次U系统的正交函数系应用到商业票据防伪中,给出了一种新的数字水印算法.通过算法设计和仿真实验分析,该数字水印算法对票据防伪具有算法简单易实现,能够抵抗票据的涂抹、裁剪、JPEG压缩、加噪等攻击的特点.可适用于商业票据的防伪和认证. 相似文献
5.
6.
唐冬致 《安徽电子信息职业技术学院学报》2005,4(2):71-72,77
本文基于PGEG图像有损压缩技术提出了一种数字图像水印算法实现过程。这种算法不会对图像压缩质量有明显的影响,可以有效对图片信息进行准确性和可靠性验证,达到检测图象真实性目的。 相似文献
7.
Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,however,do not consider the influence of steganalysis attack.This paper proposed the game theory based false negative probability to estimate the impacts of steganalysis attack,as well as unintentional attack.Specifically,game theory was used to model the collision between the embedment and steganalysis attack,and derive the optimal building embedding/attacking strategy.Such optimal playing strategies devote to calculating the attacker destructed watermark,used for calculation of the game theory based false negative probability.The experimental results show that watermark detection reliability measured using our proposed method,in comparison,can better reflect the real scenario in which the embedded watermark undergoes unintentional attack and the attacker using steganalysis attack.This paper provides a foundation for investigating countermeasures of digital watermarking community against steganalysis attack. 相似文献
8.
A variable-dimensional vector modulation (VDVM) scheme is introduced to maximize the efficiency of the norm-space DWT-based blind audio watermarking technique. This flexible scheme allows the watermarking algorithm to reach a balance between robustness and capacity, while the imperceptivity is always ensured. The imperfection of applying quantization index modulation in the open-loop case has been rectified. The effectiveness of the proposed scheme is proven using the perceptual evaluation of audio quality (PEAQ) and bit error rates of recovered watermarks under various signal processing attacks. Experimental results show that the proposed VDVM scheme is comparable to other recently developed methods in robustness and imperceptivity even at a capacity as high as 301.46 bps. Such a capacity can be further doubled by halving the dimension of the involved DWT vector, while the robustness is still maintained at a satisfactory level. 相似文献
9.
In this paper, a robust blind watermarking technique, based on block-based DCT coefficient modification is proposed. The difference between two DCT coefficients of the adjacent blocks at the same position is calculated. Depending upon the watermark bit to be embedded; this difference is brought in a particular predefined range which is achieved by modifying one of the two DCT coefficients. The amount of modification to a DCT coefficient of a block depends upon the scaling variable, DC coefficient and median of certain zig-zag ordered AC coefficients of that block. The robustness of the proposed scheme has been examined for various singular and hybrid attacks. Comparison results reveal that the proposed technique has a higher degree of robustness against various singular and hybrid attacks. Further a watermark of good quality is extracted even after various simultaneous attacks on the system. 相似文献
10.
Reversible contrast mapping (RCM) and its various modified versions are used extensively in reversible watermarking (RW) to embed secret information into the digital contents. RCM based RW accomplishes a simple integer transform applied on pair of pixels and their least significant bits (LSB) are used for data embedding. It is perfectly invertible even if the LSBs of the transformed pixels are lost during data embedding. RCM offers high embedding rate at relatively low visual distortion (embedding distortion). Moreover, low computation cost and ease of hardware realization make it attractive for real-time implementation. To this aim, this paper proposes a field programmable gate array (FPGA) based very large scale integration (VLSI) architecture of RCM-RW algorithm for digital images that can serve the purpose of media authentication in real-time environment. Two architectures, one for block size (8 × 8) and the other one for (32 × 32) block are developed. The proposed architecture allows a 6-stage pipelining technique to speed up the circuit operation. For a cover image of block size (32 × 32), the proposed architecture requires 9881 slices, 9347 slice flip-flops, 11291 number 4-input LUTs, 3 BRAMs and a data rate of 1.0395 Mbps at an operating frequency as high as 98.76 MHz. 相似文献