全文获取类型
收费全文 | 2245篇 |
免费 | 375篇 |
国内免费 | 343篇 |
专业分类
电工技术 | 43篇 |
综合类 | 324篇 |
化学工业 | 1篇 |
金属工艺 | 1篇 |
机械仪表 | 23篇 |
建筑科学 | 1篇 |
矿业工程 | 11篇 |
能源动力 | 1篇 |
轻工业 | 12篇 |
武器工业 | 7篇 |
无线电 | 693篇 |
一般工业技术 | 129篇 |
冶金工业 | 1篇 |
自动化技术 | 1716篇 |
出版年
2024年 | 2篇 |
2023年 | 12篇 |
2022年 | 27篇 |
2021年 | 27篇 |
2020年 | 31篇 |
2019年 | 28篇 |
2018年 | 31篇 |
2017年 | 48篇 |
2016年 | 54篇 |
2015年 | 84篇 |
2014年 | 116篇 |
2013年 | 141篇 |
2012年 | 184篇 |
2011年 | 240篇 |
2010年 | 214篇 |
2009年 | 234篇 |
2008年 | 283篇 |
2007年 | 307篇 |
2006年 | 220篇 |
2005年 | 238篇 |
2004年 | 171篇 |
2003年 | 127篇 |
2002年 | 69篇 |
2001年 | 52篇 |
2000年 | 20篇 |
1999年 | 2篇 |
1998年 | 1篇 |
排序方式: 共有2963条查询结果,搜索用时 31 毫秒
11.
《中国科学:信息科学(英文版)》2012,(11):2570-2581
As one of the famous block-based image coding schemes,block truncation coding(BTC) has been also applied in digital watermarking.Previous BTC-based watermarking or hiding schemes usually embed secret data by modifying the BTC encoding stage or BTC-compressed data,obtaining the watermarked image with poorer quality than the BTC-compressed version.This paper presents a new oblivious image watermarking scheme by exploiting BTC bitmaps.Unlike the traditional schemes,our approach does not really perform the BTC compression on images during the embedding process but utilizes the parity of the number of horizontal edge transitions in each BTC bitmap to guide the watermark embedding and extraction processes.The embedding process starts by partitioning the original cover image into non-overlapping 4×4 blocks and performing BTC on each block to obtain its BTC bitmap.One watermark bit is embedded in each block by modifying at most three pixel values in the block to make sure that the parity of the number of horizontal edge transitions in the bitmap of the modified block is equal to the embedded watermark bit.In the extraction stage,the suspicious image is first partitioned into non-overlapping 4×4 blocks and BTC is performed on each block to obtain its bitmap.Then,by checking the parity of the number of horizontal edge transitions in the bitmap,we can extract one watermark bit in each block.Experimental results demonstrate that the proposed watermarking scheme is fragile to various image processing operations while keeping the transparency very well. 相似文献
12.
《浙江大学学报:C卷英文版》2012,(8):573-584
We propose a robust digital watermarking algorithm for copyright protection.A stable feature is obtained by utilizing QR factorization and discrete cosine transform(DCT) techniques,and a meaningful watermark image is embedded into an image by modifying the stable feature with a quantization index modulation(QIM) method.The combination of QR factorization,DCT,and QIM techniques guarantees the robustness of the algorithm.Furthermore,an embedding location selection method is exploited to select blocks with small modifications as the embedding locations.This can minimize the embedding distortion and greatly improve the imperceptibility of our scheme.Several standard images were tested and the experimental results were compared with those of other published schemes.The results demonstrate that our proposed scheme can achieve not only better imperceptibility,but also stronger robustness against common signal processing operations and lossy compressions,such as filtering,noise addition,scaling,sharpening,rotation,cropping,and JPEG/JPEG2000 compression. 相似文献
13.
We propose a new multipurpose audio watermarking scheme in which two complementary watermarks are used.For audio copyright protection,the watermark data with copyright information or signature are first encrypted by Arnold transformation.Then the watermark data are inserted in the low frequency largest significant discrete cosine transform(DCT) coefficients to obtain robustness performance.For audio authentication,a chaotic signal is inserted in the high frequency insignificant DCT coefficients to detect tampered regions.Furthermore,the synchronization code is embedded in the audio statistical characteristics to resist desynchronization attacks.Experimental results show that our proposed method can not only obtain satisfactory detection and tampered location,but also achieve imperceptibility and robustness to common signal processing attacks,such as cropping,shifting,and time scale modification(TSM).Comparison results show that our method outperforms some existing methods. 相似文献
14.
15.
16.
对多媒体产品进行数字水印处理是解决这类产品的版权保护的有效途径。从数字水印的概念、原理和基本特性出发,探讨了如何构造版权水印信息、嵌入用户指定的授权信息、版权水印鉴定等问题。 相似文献
17.
研究了视频流的水印嵌入和提取,为视频流提供版权保护。针对现阶段越来越多的视频流盗版现状,为了保护版权方的利益,提出了一种将版权方信息作为数字水印嵌入到视频流中的方法。通过该方法,在视频流中嵌入了不易破坏的版权方的信息,该信息可作为流媒体的追溯标记和证据。经实验证明:改进方案与其他数字水印方案相比,具有很强的鲁棒性,可抵抗视频的重复编码,抵抗分辨率缩放,抵抗一定程度的内容修改,支持水印的盲提取。 相似文献
18.
一种基于小波变换的非均匀量化索引调制水印算法 总被引:3,自引:0,他引:3
为了提高数字水印的稳健性与不可见性,将图像小波变换与量化索引调制算法相结合,提出了一种基于小波变换的非均匀量化索引调制数字水印算法。该算法对原始图像进行离散小波变换,将中频小波系数分成3×3的系数子块作为水印载体,对子块的系数均值采用非均匀量化索引调制,实现二值水印的嵌入。根据人类视觉特性,不同的系数子块采用不同的量化间隔并自适应于子块内相邻系数的差值。实验结果表明,该算法透明性好,安全性高,对高斯白噪声、剪切、滤波以及JPEG压缩等常见攻击具有较强的稳健性。 相似文献
19.
以小波的相关理论为基础,先把水印图像预置乱处理,对宿主图像直接进行小波包分解,之后将水印的低频部分和中高频部分分别采用Hilbert曲线扫描和位置自调节法嵌入到宿主图像中,嵌入强度可根据图像的内容自适应调节。通过实验观察,新算法在抗压缩和抗剪切性能有所提升,同时隐蔽性和抗噪能力也得到了较大改观,结果充分说明该算法是一种性能较为优良的图像版权保护算法。 相似文献
20.
研究了文本数字水印在追溯涉密纸质文档中的重要意义,介绍了常见的文本数字水印技术,分析了Brassil经典行移编码文本数字水印技术,在算法的标记策略中引入检验编码,文本行分割划段和引入基调行三个方面进行改进,改进后算法具有更大水印信息容量,更强的鲁棒性和可控的计算量. 相似文献