全文获取类型
收费全文 | 2249篇 |
免费 | 377篇 |
国内免费 | 336篇 |
专业分类
电工技术 | 43篇 |
综合类 | 324篇 |
化学工业 | 1篇 |
金属工艺 | 1篇 |
机械仪表 | 23篇 |
建筑科学 | 1篇 |
矿业工程 | 11篇 |
能源动力 | 1篇 |
轻工业 | 12篇 |
武器工业 | 7篇 |
无线电 | 693篇 |
一般工业技术 | 129篇 |
冶金工业 | 1篇 |
自动化技术 | 1715篇 |
出版年
2024年 | 1篇 |
2023年 | 12篇 |
2022年 | 27篇 |
2021年 | 27篇 |
2020年 | 31篇 |
2019年 | 28篇 |
2018年 | 31篇 |
2017年 | 48篇 |
2016年 | 54篇 |
2015年 | 84篇 |
2014年 | 116篇 |
2013年 | 141篇 |
2012年 | 184篇 |
2011年 | 240篇 |
2010年 | 214篇 |
2009年 | 234篇 |
2008年 | 283篇 |
2007年 | 307篇 |
2006年 | 220篇 |
2005年 | 238篇 |
2004年 | 171篇 |
2003年 | 127篇 |
2002年 | 69篇 |
2001年 | 52篇 |
2000年 | 20篇 |
1999年 | 2篇 |
1998年 | 1篇 |
排序方式: 共有2962条查询结果,搜索用时 15 毫秒
1.
2.
In this paper, we propose a new angle quantization index modulation (AQIM) method, called the difference AQIM (DAQIM) method. The proposed method aims to improve the watermarking performance against gain attacks. Unlike the original AQIM method (Ourique et al., Angle QIM: a novel watermark embedding scheme robust against amplitude scaling distortions, in: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 2, 2005, pp. 797–800), the DAQIM method quantizes the difference of the two angles instead of the angles themselves. The main advantage of the DAQIM method is to disperse the interference to the watermark signal from one angle to more angles. Thus, the watermark has a higher ability to resist attacks. We perform a theoretical analysis of the document-to-watermark ratio (DWR) based on our proposed method. We show that our proposed method can obtain a lower embedding distortion compared to the AQIM and the gradient direction watermarking (GDWM) (Nezhadarya et al., IEEE Trans. Inf. Forensics Secur., 6(4), 2011, 1200–1213), methods under the same robustness and payload conditions. The experimental results demonstrate that our proposed method outperforms common existing methods in terms of the robustness against various attacks such as the JPEG quantization noise, additive white Gaussian noise (AWGN), cropping effect and mean filtering. 相似文献
3.
4.
基于代价策略的H.264/AVC半脆弱水印算法 总被引:2,自引:0,他引:2
In order to solve some existing problems on detecting malicious tampering by video watermarking based on H.264/AVC video compression standard,a semi-fragile video watermarking algorithm for H.264/AVC based on cost strategy was proposed.To further improve the robustness of the feature codes in semi-fragile video watermarking algorithm,a new generation algorithm for feature codes by eliminating the correlation of them was proposed.In order to meet the requirement that the semi-fragile watermarks should be uniformly embedded into the video frames to locate the tampered region accurately,a minimal cost function was introduced to select a DCT coefficient in the 4 × 4 block residual to embed watermark which had minimal impact on the video quality and bit rates.Experimental results show that the proposed algorithm can significantly reduce impact on video quality and bit rate because of embedding the watermarking by adopting the minimum cost function and it is sensitive to malicious manipulations.The retrieved feature code and watermarking can detect and locate malicious manipulations. 相似文献
5.
为进一步提高水印算法的安全性和抗攻击能力,结合超混沌和Slant变换的优点,提出一种基于超混沌和Slant变换的鲁棒水印算法。首先,在隐藏水印之前采用超混沌系统对水印图像进行加密,提高了待隐藏图像的安全性;其次,将原始载体图像划分成大小为8×8的不重叠分块并对各个分块分别进行Slant变换;最后,将加密后的水印图像隐藏到Slant变换后的直流系数和中频系数中。大量的仿真结果表明,本文算法具有较好的隐蔽性,对JPEG压缩、噪声、滤波、缩放、对比度调整等攻击具有较好的抗攻击能力。与相似算法相比,本文算法具有更好的鲁棒性能。 相似文献
6.
A variable-dimensional vector modulation (VDVM) scheme is introduced to maximize the efficiency of the norm-space DWT-based blind audio watermarking technique. This flexible scheme allows the watermarking algorithm to reach a balance between robustness and capacity, while the imperceptivity is always ensured. The imperfection of applying quantization index modulation in the open-loop case has been rectified. The effectiveness of the proposed scheme is proven using the perceptual evaluation of audio quality (PEAQ) and bit error rates of recovered watermarks under various signal processing attacks. Experimental results show that the proposed VDVM scheme is comparable to other recently developed methods in robustness and imperceptivity even at a capacity as high as 301.46 bps. Such a capacity can be further doubled by halving the dimension of the involved DWT vector, while the robustness is still maintained at a satisfactory level. 相似文献
7.
Yingliang HeGaobo Yang Ningbo Zhu 《AEUE-International Journal of Electronics and Communications》2012,66(4):305-312
A real-time dual watermarking algorithm of H.264/AVC compressed video is proposed for Video-on-Demand (VOD) service. The copyright information and user information are modulated by CDMA spreading strategies as watermark. At the encoder side, copyright information is embedded into the first non-zero coefficient of Intra 4 × 4 coded blocks in the luminance components of I frames. An effective error compensation mechanism is simultaneously introduced into the embedding process, which strictly restricts the distortion caused by quantization and watermark embedding within a step size of quantization. At the server side, a XOR based mapping rule is utilized for watermark embedding because the number of non-zero coefficients after quantization is quite less in P frames. Every two bits of the private user information is mapped to three non-zero coefficients of P frames. Experimental results on test sequences demonstrate that the proposed approach has just slight influence on bit rate and PSNR with real-time performance for VOD services, and achieves the dual purposes of copyright protection and pirate tracking. 相似文献
8.
In this paper, a robust blind watermarking technique, based on block-based DCT coefficient modification is proposed. The difference between two DCT coefficients of the adjacent blocks at the same position is calculated. Depending upon the watermark bit to be embedded; this difference is brought in a particular predefined range which is achieved by modifying one of the two DCT coefficients. The amount of modification to a DCT coefficient of a block depends upon the scaling variable, DC coefficient and median of certain zig-zag ordered AC coefficients of that block. The robustness of the proposed scheme has been examined for various singular and hybrid attacks. Comparison results reveal that the proposed technique has a higher degree of robustness against various singular and hybrid attacks. Further a watermark of good quality is extracted even after various simultaneous attacks on the system. 相似文献
9.
The need for a robust reversible watermarking method has recently attracted more attention. This paper presents a novel robust reversible watermarking scheme based on using the Slantlet transform matrix to transform small blocks of the original image and hiding the watermark bits by modifying the mean values of the carrier subbands. The problem of overflow/underflow has been avoided by using histogram modification process. Extensive experimental tests based on 100 general images and 100 medical images demonstrate the efficiency of the proposed scheme. The proposed scheme has robustness against different kinds of attacks and the results prove that it is completely reversible with improved capacity, robustness, and invisibility in comparison with the previous methods. 相似文献
10.
数字水印技术广泛应用于多媒体产品的版权保护。本文提出并实现了一种位图水印的嵌入和检测的思想。这种方法采用DCT算法,对图像进行分块处理,同时充分考虑人类视觉特性降低计算量,从图像实验结果可以看出其嵌入与检测的效果比较良好,同时水印的隐蔽性很好,直观性很强,而且可以很好的抵抗剪切、压缩、平滑等图像处理操作。 相似文献