首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2篇
  免费   0篇
教育   2篇
  2006年   2篇
排序方式: 共有2条查询结果,搜索用时 15 毫秒
1
1.
A new asymmetric watermarking scheme is proposed in this letter. In the proposed scheme, a secret real fractional DCT-I transform and a primitive watermark are employed to generate an asymmetric watermark. The secret watermark for embedding is derived from the primitive watermark, and is embedded in the large fractional DCT-I transformation coefficients of a cover signal. The asymmetric detection procedure is performed using a correlation test. Simulation results showed that the asymmetric detection is reliable, and that the scheme can provide minimum security.  相似文献   
2.
INTRODUCTIONDue to the ease of transmitting digital data and copying without loss of quality, the unauthorized distribution of digital multimedia contents has be-come easy and popular. Digital watermarking is the most promising technique to protect the copyright of digital multimedia contents (Cox et al., 2001). Most of the proposed watermarking schemes are symmetric, in which keys for watermark detecting are identical to those for watermark embedding. Therefore, symmet-ric watermarking s…  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号