Furthermore, we briefly introduce some kinds of existed steganalysis methods and digital watermark attack methods.
此外,我们还简单介绍了几种信息隐藏分析方法和水印攻击方法。
In the design of watermark encoder, through the combination of side information and watermark, our system also obtained the robustness against copy attack.
在水印编码的设计上,通过将载体的个性信息与水印融合,使整个系统对拷贝攻击也具有鲁棒性。
Test results show that embedding around video quality has not changed significantly, in the absence of attack detection of the watermark and the original watermark than no obvious changes.
试验结果表明,水印嵌入前后,视频质量没有显明的变化,在无攻击时检测到的水印信息和原水印信息比拟也没有显明的变化。
The experiment result shows that the synchronization method can synchronize the detector with the watermark perfectly and that the watermark is robust to affine transformation attack.
实验表明,使用该方法能较好地恢复图像,有效地同步水印检测器与水印信号,从而使水印对仿射变换攻击具有鲁棒性。
The experimental results and attack analysis show that the watermark algorithm is robust against some image processing operations, such as JPEG lossy compression , rotation, cropping and noise adding.
实验结果表明该水印算法具有良好的抗JPEG压缩、旋转、裁剪和加噪等常见攻击的能力。
Otherwise, the embedded mode of traditional watermark doesn't been adopted, which avoids the model attack problems under the traditional watermark.
另外,水印的嵌入不使用传统的水印嵌入模式,避免了传统水印嵌入模式下的模型攻击问题。
The limit that space domain only be applied in LSB under gray image of digital watermark was changed. Then, experiment showed that the method have a better adaptability to normal attack.
在灰度图像中的数字水印中,空间域方法只能用在LSB(最低有效位)的局限性,同时,实验表明对常规攻击具有较好的识别能力。
Watermark could be damage in attack, so how to improve ability of watermarking Anti-attack is one of the most important questions.
数字水印都存在被攻击而可能导致破坏的风险,因此如何提高水印抗攻击的能力是亟待解决的问题。
Dynamic graph watermark (DGW) is one of the best dynamic software watermarks. The idea of DGW is encoding the watermark into topology graph in order to be immune to semantics preserving attack.
动态图软件水印技术是目前最好的动态软件水印技术之一,核心思想是将水印信息编码成拓扑图结构,从而使对拓扑图进行变换的保持语义攻击难以实现。
To improve the security against the counterfeiting attack, this paper proposes a secure dual watermark scheme for image tamper detection and recovery.
为提高可恢复双水印算法抵抗伪造攻击的能力,提出一种用于图像篡改检测和恢复的安全双水印算法。
In order to improve performance of resistance to the geometrical attack while keep invisible, a zero-watermark algorithm for digital image based on Fourier-Millin transforming is proposed.
为了提高抗几何攻击性能,同时保证不可见性,提出了一种结合傅立叶-梅林变换和零水印概念的图像水印算法。
The experimental results have shown that the proposed watermark is invisible to human eyes and very robust to joint photographic experts group compression attack, crop attack and so on.
实验结果表明该算法具有良好的不可视性和抗联合图像专家组压缩、剪切、滤波等攻击的能力。
Therefore, problems of the multi-watermark method applied to increase the anti-attack robustness of the watermarking are discussed in this paper.
单个的数字水印算法或方案难以应付多种攻击方法的攻击,为此,文章对应用多水印方法提高水印抗攻击鲁棒性问题进行探讨。
The strength of the embedded watermark is image-adaptive according to the wavelets quantization noise, and combined with the error-correct code, it improved the characteristic to anti-attack.
根据小波域量化噪声自适应地确定嵌入强度,并结合纠错编码,提高了抗攻击能力。
The strength of the embedded watermark is image-adaptive according to the wavelets quantization noise, and combined with the error-correct code, it improved the characteristic to anti-attack.
根据小波域量化噪声自适应地确定嵌入强度,并结合纠错编码,提高了抗攻击能力。
应用推荐