全文获取类型
收费全文 | 201篇 |
免费 | 4篇 |
国内免费 | 14篇 |
专业分类
综合类 | 13篇 |
化学工业 | 1篇 |
金属工艺 | 1篇 |
机械仪表 | 2篇 |
建筑科学 | 4篇 |
武器工业 | 1篇 |
无线电 | 40篇 |
一般工业技术 | 7篇 |
自动化技术 | 150篇 |
出版年
2023年 | 1篇 |
2022年 | 3篇 |
2021年 | 1篇 |
2019年 | 1篇 |
2018年 | 1篇 |
2017年 | 4篇 |
2016年 | 5篇 |
2015年 | 3篇 |
2014年 | 7篇 |
2013年 | 5篇 |
2012年 | 8篇 |
2011年 | 13篇 |
2010年 | 8篇 |
2009年 | 11篇 |
2008年 | 12篇 |
2007年 | 17篇 |
2006年 | 24篇 |
2005年 | 23篇 |
2004年 | 19篇 |
2003年 | 18篇 |
2002年 | 19篇 |
2001年 | 10篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1996年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
排序方式: 共有219条查询结果,搜索用时 15 毫秒
11.
一种基于奇异值分解的稳健数字水印算法 总被引:10,自引:0,他引:10
提出了一种基于奇异值分解的数字水印算法,它对常见的失真是稳健的。由服从标准正态分布的随机数组成的水印被嵌入到图像分解后的奇异值中。实验结果表明本算法具有很好的稳健性。在经过了一般的信号处理操作和JPEG压缩以后,嵌入的水印能够被可靠地提取和检测。特别地,本算法对转置、行(列)镜像、直角旋转、行(列)整数倍放大和有填充平移等几何失真具有不变性。 相似文献
12.
一种小波域内的鲁棒脆弱图像水印技术 总被引:1,自引:0,他引:1
目前的水印算法有鲁棒水印和脆弱水印两类,分别可以用于图像的版权保护和篡改检测,但很少有算法能够结合两者,同时实现这两种功能。为了解决这一问题,该文提出一种鲁棒-脆弱水印算法:首先在小波变换图像的逼近子带中,利用系数间的关系构造特征水印;然后根据小波零树思想,结合主分量分析,采用抖动调制方法嵌人到重要小波树的第一主分量中;水印检测时,将提取的特征水印与嵌入水印进行比较,不仅可以确定图像的版权,还可以证明内容的完整性。实验结果表明,此算法能够抵抗滤波、压缩、叠加噪声等处理,同时还可以很好的定位图像的篡改,是一种很有效的水印算法。 相似文献
13.
A robust software watermarking for copyright protection 总被引:1,自引:1,他引:0
This paper advocates protecting software copyright through hiding watermarks in various data structures used by the code, e.g., B+-trees, R-trees, linked lists, etc. Prior proposals hide the watermarks in dummy data structures, e.g., linked lists and graphs that are created, solely for this reason, during the execution of the hosting software. This makes them vulnerable to subtractive attacks, because the attacker can remove the dummy data structures without altering the functionality or the semantic of the software program. We argue that hiding watermarks in one or more data structures that are used by the program would make the watermark more robust because disturbing the watermark would affect the semantic and the functionality of the underlying software. The challenge is that the insertion of the watermark should have a minimal effect on the operations and performance of the data structure.This paper proposes a novel method for watermarking R-tree data structure and its variants. The proposed watermarking technique does not change the values of the stored data objects. It takes advantage of the redundancy in the order of entries inside the R-tree nodes. Entries are arranged relative to a “secret” initial order, known only to the software owner, using a technique based on a numbering system that uses variable radix with factorial base. The addition of the watermark in the R-tree data structure does not affect the performance nor does it increase the size of the R-tree. The paper provides a detailed security analysis and performance evaluation to show that the embedded watermarks are robust and can withstand various types of attacks. 相似文献
14.
15.
16.
A robust multi bit and high quality audio watermarking technique in time domain is proposed in this paper. Watermarking is a technique used to label digital media by hiding copyright or other information into the underlying data. The watermark must be imperceptible and undetectable by the user and should be robust to various types of distortion. To enhance the robustness and taper-resistance of the embedded watermark, in this paper a multi bit technique is employed. Instead of embedding one bit into an audio frame, multiple bits can be embedded into each audio sub-frame. For attackers, since they do not know the parameters, this significantly reduces the possibility of unauthorized bit detection and removal of watermark. In real-time watermarking applications, robustness is not the only factor that plays an important role. The other factor that plays a very an important role is computational complexity. In general, audio file is transmitted in compressed form. Real-time watermark embedding must take into account this compressed form, because first decompressing the data, adding a watermark and then recompressing the data is computationally too demanding. In this paper, we propose robust and low complexity audio watermarking algorithm. To evaluate the performance of the proposed audio watermarking algorithm, subjective and objective quality tests including bit error rate (BER) and signal-to-noise ratio (SNR) were conducted. Compared to traditional one bit embedding algorithm, the proposed algorithm gives highly recovery rate after attack by commonly used audio data manipulations, such as low pass filtering, requantization, resampling, and MP3 compression. 相似文献
17.
In this paper, we propose an ownership identification method based on discrete cosine transformation (DCT). The copyright owner can select a gray-level or colorful image to be an ownership statement, which is used as a claim to the ownership of his/her work. Unlike traditional watermarking schemes, the ownership statement is not embedded into the image to be protected. Instead, our method will construct an ownership share for the author according to the feature of the original image and the ownership statement. The feature map of the original image is composed of DC coefficients of different DCT blocks. When piracy happens, the author can show his ownership share to reveal the ownership statement to prove his/her copyright. Note that the size of the ownership statement is not restricted to being smaller than that of the host image. In addition, multiple ownership statements can be registered for a single image without destroying each other. The experimental results will show the robustness of our scheme against several common attacks. Finally, we will give some discussions and comparisons with other researchers’ study. 相似文献
18.
19.
彩色数字水印技术研究 总被引:2,自引:1,他引:2
本文对彩色水印技术进行了详细地研究,提出了一种双彩色数字水印方案,实验结果表明,该算法性能良好,对于一般的图像处理和JPEG压缩具有较好的鲁棒性。 相似文献
20.