At last, Watermarking attack based on visual model has been discussed, and some feasible solutions have been brought forward.
最后讨论了基于视觉模型的水印攻击,并探讨了相应的解决方案。
The latest research on watermarking attack indicates that the robust evaluation used by image watermarking systems is incomplete as yet.
最新的数字水印攻击研究表明,至今为止图像水印系统所使用的鲁棒性评价是不完善的。
The image watermarking algorithm design and the attack way are opposite to and promotional of each other.
图像水印的算法设计和攻击技术是互相促进的对立面。
A robust digital audio watermarking algorithm is presented, which can resist desynchronization attack effectively. We embed synchronization code by modifying the mean value of several samples.
改进了一种可抵抗去同步攻击的数字音频盲水印算法,该算法通过修改多个采样值的统计均值嵌入同步码,解决了空域嵌入同步码的不稳定性问题。
It would be one of the unremitting research works to seek watermarking methods for halftoned images that could resist as many attack algorithms as possible.
寻找对尽可能多的攻击算法有免疫性的半色调图像的数字水印方法将持续成为研究的主要方向之一。
It is pointed out that a loophole still exists in a watermarking scheme capable of resisting sensitivity attack.
指出一种可抵抗敏感性攻击的水印方案仍然存在安全漏洞。
It's difficult to detect blindly the image rotation Angle in blind watermarking under geometry attack.
抗几何攻击的盲检测数字水印的难点是图像旋转角度的盲检测。
A new secure watermarking protocol which is based on digital signature is proposed through discussing about the attack over watermarking and the security leak of DHWM protocol.
论文在论述数字水印应用面临的攻击和DHWM协议存在安全隐患的基础上,提出了一种新的基于数字签名的安全数字水印协议。
With the development of digital watermarking, more and more attacks on it appeared, interpretation attack(IBM attack) is the most dangerous attack of them.
同时,对于数字水印的攻击也在不断出现,其中以解释攻击(IBM攻击)最为危险。
Experimental results show that the proposed watermarking scheme is robust against synchronization attack and general signal processing.
实验结果表明,该算法可有效抵抗常规信号攻击,尤其对去同步攻击有较好的鲁棒性。
Watermark could be damage in attack, so how to improve ability of watermarking Anti-attack is one of the most important questions.
数字水印都存在被攻击而可能导致破坏的风险,因此如何提高水印抗攻击的能力是亟待解决的问题。
The experimental results show that the watermarking algorithm has strong hiding and robustness for anti-attack.
实验结果表明,该水印算法具有很强的隐藏性和抗攻击的鲁棒性。
To overcome finite word length effects and improve its resistance to the attack of crypt analysis, a chaotic map as a private key is added to the existing chaotic watermarking systems.
该方法在现有的混沌数字水印系统基础上,增加一个混沌映射作为私有密钥来克服有限字长效应和提高算法的抗破译性。
Multiple claims of the rightful ownership for a digital product, also called the IBM attack, are the threshold for the watermarking usage in the copyright protection.
数字水印版权维护中的多所有权声名题目,也鸣ibm攻击,是数字水印版权维护的瓶颈。
To overcome well-connected attack in fragile watermarking, a novel fragile watermarking method based on chaotic system and image content was proposed.
针对脆弱水印方案的“伪认证攻击”问题,提出了基于混沌和图像内容的脆弱水印方案。
An effective against geometric attack robustness of digital watermarking algorithm based on improved SIFT (Scale Invariant Feature Transform) is presented.
通过改进的SIFT(尺度不变特征变换)算法提出了一种可有效抵抗几何攻击的鲁棒数字水印算法。
We organize the paper as below: The first chapter introduces the concept, definition, application and some attack method of watermarking.
本文的内容主要安排如下:第一章系统地论述了数字水印的历史、概念、应用、原理,以及攻击方法和性能评估等。
Therefore, problems of the multi-watermark method applied to increase the anti-attack robustness of the watermarking are discussed in this paper.
单个的数字水印算法或方案难以应付多种攻击方法的攻击,为此,文章对应用多水印方法提高水印抗攻击鲁棒性问题进行探讨。
Numerical simulations have demonstrated that this watermarking scheme has better performances of security and anti-attack.
数值实验表明该水印算法具有良好的抗攻击性和安全性。
Numerical simulations have demonstrated that this watermarking scheme has better performances of security and anti-attack.
数值实验表明该水印算法具有良好的抗攻击性和安全性。
应用推荐