Experimental results show that the watermark is imperceptible and the algorithm is robust to many attacks, such as MP3 compression, noise addition, requantization, low pass filtering and so on.
实验结果表明,水印系统对MP3压缩、噪声干扰、重量化、低通滤波攻击有一定的鲁棒性。
Audio watermarking that modulates DC level shift according to watermark has wonderful low pass and noise resistance performance.
根据水印调整直流电平偏移的音频水印算法具有很好的低通和抗噪性能。
The experimental results demonstrate that the watermark has the considerable perceptual invisibility and robustness, and the operation complexity is comparatively low in this scheme.
相关试验证明,本方案的水印稳健性和不可见性均达到了相当水平,运算复杂度也比较低。
Methods Based on wavelet transform of watermark image and host image, low-frequency ingredient of watermark is embedded in low-frequency part of host image.
方法通过对宿主图像和水印图像的小波变换,该算法把水印图像的低频成分嵌入到原始宿主图像的低频部分。
To insure the system's high robustness is the difficulty of the audio watermark technology, with satisfying the hearing transparency and low computation complexity.
在音频水印技术中,满足听觉透明性和低计算复杂度要求的同时,要保证系统的高鲁棒性是音频水印技术中的难点。
We extract watermarks in the intermediate frequency and low frequency region and compare them, using the extracted watermark which is better.
水印检测时,分别在中频和低频区域提取水印并进行比较,采用效果较好的水印作为检测水印。
In order to solve the problem of integrality authentication for low bit-rate video, a novel video authentication schema based on the fragile watermark is proposed.
为了解决低码率视频完整性认证问题,提出了一种基于脆弱水印的视频认证方案。
The Sent Items folder low watermark value must be smaller than the high watermark value.
“已发送传真”文件夹的低水位线值必须小于高水位线值。
Since the human eye is sensitive to low frequency information, in which the watermark information embedded can be easily detected.
由于人眼对低频信息比较敏感,在其中嵌入水印信息,很容易被人察觉。
When the image (host information) is added a noise, gaussian low-pass filter, shear attacks, the mandible, extract the original watermark image watermark image and the similarity is very satisfactory;
当图像(宿主信息)遭到加噪、高斯低通滤波、剪切等攻击后,其可视度、提取的水印图像与原始水印图像的类似度都是十分令人称心的;
When the image (host information) is added a noise, gaussian low-pass filter, shear attacks, the mandible, extract the original watermark image watermark image and the similarity is very satisfactory;
当图像(宿主信息)遭到加噪、高斯低通滤波、剪切等攻击后,其可视度、提取的水印图像与原始水印图像的类似度都是十分令人称心的;
应用推荐