首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
提出一种对基于扩频信息隐藏图像进行隐写分析的方法.应用马尔科夫链模型,根据图像的相邻像素点之间的相关性,结合阈值判别方法和改进的模式识别方法,判断一幅图像中是否存在隐写信息.在Corel图像库上的实验表明,本方法降低了虚警率,且正检率的性能优于已有方法.  相似文献   

2.
提出一种基于最优权值探测的图像可逆信息隐藏算法。该算法改进了现有的预测方法,利用最优权值探测原理提高预测像素值的精确受,使预测误差差值直方图更加紧凑、峰值更高。实验结果表明,相比其它可逆嵌入算法.该算法在保证图像质量的同时,提高了嵌入容量。算法整体性能高。  相似文献   

3.
文章提出了一种基于功率倒谱和结合两种高阶统计量——偏度和峰度的语音回声隐藏盲检测方法.根据回声隐藏时对载体语音引入回声的特点,通过分析语音的功率倒谱,提取并结合语音功率倒谱的高阶统计量——偏度和峰度.通过对原始语音样本和藏密语音样本功率倒谱偏度-峰度值的学习和训练,提取得到偏度-峰度阈值,可用于回声隐藏的盲检测分析.实验结果表明,该方法能够对四种回声隐藏方法同时生效,且检测率较高.  相似文献   

4.
由于传统直方图方法不能描述图像中相邻像素之间的相关性和颜色在图像内的空间分布特征,文中引入"广义图像"的概念,即把原图像与平滑图像相对应的两个像素组合起来,形成的一个二元组.提出了广义平均直方图的概念,首先将颜色量化方法扩展到广义图像中,把广义图像的颜色量化为143维.然后计算每一维对应的聚类中心和组合数,最后计算每一维对应的频数,得出广义平均直方图.为了提高对多色彩图像的检索效率,把自动参考颜色表方法引入图像匹配中.实验结果表明,基于广义平均直方图的图像检索方法的有效性好、准确性高.  相似文献   

5.
刘胜  华铎 《科技通报》2007,23(4):553-557,591
信息隐藏和检测技术已日趋重要且应用广泛,隐藏分析的目的在于检测媒体中隐藏的信息。本文针对JPEG图像文件的隐藏检测技术应用,介绍了几种典型的隐写术的原理和弱点。通过对相关隐藏算法的研究分析,讨论了基于统计特性的检测隐藏信息的方法,并在结论中给出了相关的实验结果。  相似文献   

6.
Making adversarial samples to fool deep neural network (DNN) is an emerging research direction of privacy protection, since the output of the attacker's DNN can be easily changed by the well-designed tiny perturbation added to the input vector. However, the added perturbation is meaningless. Why not embed some useful information to generate adversarial samples while integrating the functions of copyright and integrity protection of data hiding? This paper solves the problem by modifying only one pixel of the image, that is, data hiding and adversarial sample generation are achieved simultaneously by the only one modified pixel. In CIFAR-10 dataset, 11 additional bits can be embedded into the host images sized 32 × 32, and the successful rate of adversarial attack is close to the state-of-the-art works. This paper proposes a new idea to combine data hiding and adversarial sample generation, and gives a new method for privacy-preserved processing of image big data.  相似文献   

7.
为了解决图像检索中颜色直方图无法描述颜色空间位置信息的问题,提出了一种新的基于色彩量化的凸壳内角直方图特征.针对量化后HSV颜色空间中某一具体量化颜色值对应像素点的空间分布,首先计算包含这些像素点位置信息的凸壳,并对该凸壳的所有内角建立直方图.然后处理所有量化颜色值提取整幅图像的凸壳内角直方图特征.将该方法和一些文献中提出的方法进行的比较实验结果表明:提出的新特征可以有效地描述颜色空间位置信息,在查准率和查全率指标上均优于已有文献中的一些方法.  相似文献   

8.
移动云计算环境下的数字图书馆云服务模式构建研究   总被引:2,自引:0,他引:2  
移动云计算为数字图书馆的构建和环境提供了更深层次的可触摸性,为解决传统的移动图书馆的计算能力弱、存储能力差等问题提供了无限的可能性。文章通过分析移动云计算环境下数字图书馆的云服务模式,提出一种基于应用融合的MaaS服务模型,并从狭义和广义的角度,对其进行了分析。  相似文献   

9.
Content-based image retrieval for medical images is a primary technique for computer-aided diagnosis. While it is a premise for computer-aided diagnosis system to build an efficient medical image database which is paid less attention than that it deserves. In this paper, we provide an efficient approach to develop the archives of large brain CT medical data. Medical images are securely acquired along with relevant diagnosis reports and then cleansed, validated and enhanced. Then some sophisticated image processing algorithms including image normalization and registration are applied to make sure that only corresponding anatomy regions could be compared in image matching. A vector of features is extracted by non-negative tensor factorization and associated with each image, which is essential for the content-based image retrieval. Our experiments prove the efficiency and promising prospect of this database building method for computer-aided diagnosis system. The brain CT image database we built could provide radiologists with a convenient access to retrieve pre-diagnosed, validated and highly relevant examples based on image content and obtain computer-aided diagnosis.  相似文献   

10.
云存储技术迅猛发展的同时也引起诸多安全问题,在云存储环境中,数据被外包给云服务器而处于用户控制之外,如何实施新颖可信的访问控制技术就变得非常关键。作为一类新兴的公钥加密技术,基于属性的加密算法以其灵活性被广泛应用在云存储访问控制方案的设计中。文章提出了一种基于属性加密的云存储访问控制方案,方案可以实现安全的云存储,系统采用基于角色的访问控制技术实现身份验证、对属性的加密/解密以及对非敏感数据的访问。最后通过仿真实验证明该方案是一种可以保证数据完整性和机密性的云存储访问控制。  相似文献   

11.
图书馆智能化专业学科服务平台建设   总被引:1,自引:0,他引:1  
目前高校图书馆提供的学科服务不能完全满足师生需求,学科服务平台建设不完善。图书馆智能化专业学科服务平台建设应以丰富的信息资源为基础,以智能服务用户为本,确立学科资源云汇聚、智能资源浏览检索、用户个人空间管理、联盟移动学科咨询、多角色交流互动这五个持续发展方向为建设目标,在管理后台、资源云计算处理、联盟咨询、个人移动学科服务客户端四个方面开展面向信息构建与读者体验的研究。  相似文献   

12.
云计算的特点是具有强大的计算能力和存储能力。入侵检测技术在网络安全技术中占有重要地位,但目前的入侵检测技术仍存在许多尚未解决的问题,如无法应对分布式大规模数据流攻击等。移动代理技术可给入侵检测系统带来更好的灵活性和可扩展性,结合移动代理的优势,构造了云环境下基于移动代理的入侵检测系统框架。采用NS2软件分别模拟一般网络条件与云环境下基于移动代理框架的DDoS节点攻击的两种场景,实验结果表明,云环境下基于移动代理框架的检测效果更佳。  相似文献   

13.
In this paper I present the architecture of system that can be used for real time exploration and management of large medical volumetric datasets. The new state of the art solution presented in this paper is an example of visual data management system. System prototype evaluation proved that it is possible to use low-powered (and cheap) up-to-date mobile devices with programmable GPUs as the remote interfaces for exploration of large volumetric medical data. The implementation was done with high-level programming language that enables portability between different hardware models. The lack of lossy compression enables to display high quality medical images visualizations without any simplifications and noises in frequency domain. The prototype of system is capable to remotely render and send to a client (for example cell phone or tablet) rendered data with frequency 30 fps with limited resolution during interaction. One second after the interaction is finished client machine receives full resolution image. The evaluation of the system was performed on volumetric computed tomography angiography image with approximate size 5123 voxels.  相似文献   

14.
文中给出了一种基于无损自嵌入的图像修复方法。将JPEG压缩图像减采样,并半色调化为二值图像,使用无损数据隐藏的方法嵌入到原始图像的中低频DCT系数中。在信息提取时,原图像可得到无损地恢复;同时对提取的信息,使用反半色调化的方法可重构一幅低质量图像,当原图像中出现缺损时,可以近似地修复受损部分。  相似文献   

15.
姜宁  顾锋 《科技管理研究》2021,41(1):160-165
基于企业非授权信息使用在手机购物APP情境下对消费者的影响,根据收集的269份消费者问卷,对提出的概念模型与研究假设进行检验。研究结果显示,非授权信息使用会增加消费者感知的信息脆弱性,而信息脆弱性则会促进消费者的转换行为;另外,信息设置有效性和信息政策有效性都可以减弱信息脆弱性与转换行为之间的正向关系。研究不仅促进相关理论研究的发展,同时也为手机购物APP企业如何管理消费者信息与隐私提供策略建议。  相似文献   

16.
Predictive computation now is a more and more popular paradigm for artificial intelligence. In this article, we discuss how to design a privacy preserving computing toolkit for secure predictive computation in smart cities. Predictive computation technology is very important in the management of cloud data in smart cities, which can realize intelligent computing and efficient management of cloud data in the city. Concretely, we propose a homomorphic outsourcing computing toolkit to protect the privacy of multiple users for predictive computation. It can meet the needs of large-scale users to securely outsource their data to cloud servers for storage, management and processing of their own data. This toolkit, using the Paillier encryption system and Lagrangian interpolation law, can implement most commonly basic calculations such as addition, subtraction, multiplication and division etc. It can also implement secure comparison of user data in the encrypted domain. In addition, we discuss how to implement the derivative of polynomial functions using our homomorphic computing encryption tool. We also introduce its application in neural networks. Finally, we demonstrate the security and efficiency of all our protocols through rigorous mathematical analysis and performance analysis. The results show that our toolkit is efficient and secure.  相似文献   

17.
汤妙吉 《现代情报》2014,34(9):87-91
针对农村文献信息资源个性化服务的需求,利用云计算的强大优势,以移动通讯网络为信号传输方式,以高校图书馆文献信息资源为基础,搭建了一种基于云计算的高校与农村文献信息资源共享平台。将面对终端用户的应用服务与文献信息资源的数据处理分开,搭建两台服务器:云计算中心和移动终端服务器,所有的计算都由这2台服务器来完成。在1个农村、1所高校、1间云计算机房组成的实验对象上对这种基于云计算的农村与高校文献信息资源共享模式进行了小范围的验证。  相似文献   

18.
A novel visually imperceptible image hiding scheme based on VQ compression and LSB modification is introduced in this article. Multiple secret images can be simultaneously and imperceptibly hid into another cover image with the same image size by the proposed scheme. In order to reduce the volume of secret images to be hid, a codebook is first generated from the secret images and these images are encoded into binary indices by the vector quantization technique. Then the compressed data of secret images are embedded into the VQ codebook used in the encoding procedure by an adaptive least-significant-bits (LSB) modification technique. For the security purpose, the slightly modified codebook is further encrypted into a meaningless data stream by the DES cryptosystem. Finally, the encrypted codebook is embedded into the cover image using the greedy LSB modification technique. Simulation results show that the proposed scheme provides a good improvement in the visual quality of the extracted secret images and the cover image at the receiver. In addition, the proposed scheme provides better hiding capacity for the cover image than earlier works.  相似文献   

19.
移动互联网上的云计算应用有巨大的商业前景.但是,将云计算技术合并进移动互联网时,产生了一系列的安全问题.挑战之一就是移动互联网上的云计算安全架构问题.在分析了当前云计算的安全风险和安全架构的基础上、并考虑到移动互联网的特征,本文设计了一种移动互联网上的云计算安全架构,它具有多层次,弹性,跨平台和统一用户界面等的优势.  相似文献   

20.
伴随着以无线网络、3G技术等为代表的移动网络技术的飞速发展,基于手机、PDA等移动终端的移动云计算(MobileCloudComputing)逐渐受到研究者的关注。如何将移动云计算运用到远程移动学习中已成为当前教育研究的热点问题。在分析移动云计算优势的基础上,根据移动云计算的特.羔,设计了一个整合高性能计算(HPC)集群架构和校园Moodle的云计算远程移动学习平台。该平台能够充分发挥云计算的优势,降低远程教育成本,为我国远程教育的发展提供强有力的支撑。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号