Experimental results show that the proposed scheme is robust for some image processing operations such as lossy JPEG compression, low pass filtering, median filtering and cropping.
实验结果表明水印是不可察觉的,经过JPEG有损压缩、低通与中值滤波、剪切等图像处理操作后仍是鲁棒的。
After cropping out the unnecessary elements, one's memory connotes their own story for the first time and turn into an image.
剪切不必要的元素后,一个人的记忆便首次成为他们自己的故事,并变成图像。
The experimental results and attack analysis show that the watermark algorithm is robust against some image processing operations, such as JPEG lossy compression , rotation, cropping and noise adding.
实验结果表明该水印算法具有良好的抗JPEG压缩、旋转、裁剪和加噪等常见攻击的能力。
Experimental results show the watermark is invisible and robust to common image processing operations such as JPEG compression, cropping, resizing, median value filtering and noise perturbation.
实验证明,水印具有不可见性,对通常的图像处理,如JPEG压缩、剪切、缩放、中值滤波等以及噪声干扰都具有很强的鲁棒性。
Each image has a constrained width, but not a constrained height, this is to show the full image without any cropping.
每张图片都有约束宽度,但不是约束高度,这是为了显示完整图片而不进行任何裁剪。
The experiments show that the algorithm is an effective and secure one that is robust to the common image processing such as noising, cropping, scaling and compressing.
实验表明本算法对于通常图像处理具有较强鲁棒性,是一种有效的盲水印技术。
Experimental results prove that the method is invisible and robust enough against some image degradation processes such as resizing, cropping, JPEG or JPEG2000 compression.
实验结果表明,该算法不仅具有较好的透明性,而且对缩放、剪切、JPEG或JPEG2000压缩等图像退化处理或攻击均具有较强的鲁棒性。
We test the algorithm performance in the cases of single watermark, double watermarks and multi watermarks when different distortions such as JPEG compression, image resizing and cropping are applied.
该文就单水印,双水印以及多水印情形进行了仿真并进行JPEG压缩、图像缩放、剪切等失真测试。
In the experimental phase, image with watermark has been attacked in several ways, such as cropping, scaling, noise, JPEG compression and tampering.
在实验阶段,对嵌有水印的图像进行了剪切、缩放、噪声干扰、JPEG压缩和篡改等攻击实验。
Experimental results and attack analysis show that the method is robust against normal image processing such as JPEG loss compression, filtering, additive noise, and cropping attacks.
实验结论和攻击测试表明,该算法对JPEG有损压缩、滤波、附加噪声、剪切等各种图像处理的攻击有较强的鲁棒性。
The experimental results show that this method are robust against JPEG compression image processing and attack such as noise, filtering, cropping etc.
实验结果表明:提出的算法有较强的抵抗JPEG压缩攻击能力,并且对噪声、滤波、剪切等图像处理操作也取得了良好的鲁棒性。
After cropping eye area from binary face image, we use image-size normalization geometrical conditions to detect eyes.
截取二值人眼区域之后,利用图像尺寸归一化几何约束条件定位人眼。
The experimental results show that the new algorithm not only has a good imperceptibility, but also has good performance on resisting the noise and image-cropping.
实验结果表明,该算法不仅具有较好的不可见性,而且有较强的抗噪声和抗裁剪性能。
It's important to note that digital zoom works by cropping out the central portion of the image that you are taking and blowing it up3digitally.
重要的是要注意:数字变焦的运作是通过剪裁出你正在拍摄的影像的中间部位,并进行数字放大。
It's important to note that digital zoom works by cropping out the central portion of the image that you are taking and blowing it up3digitally.
重要的是要注意:数字变焦的运作是通过剪裁出你正在拍摄的影像的中间部位,并进行数字放大。
应用推荐