首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11篇
  免费   0篇
  国内免费   3篇
教育   5篇
科学研究   5篇
综合类   4篇
  2019年   1篇
  2012年   2篇
  2010年   5篇
  2007年   2篇
  2006年   2篇
  2002年   1篇
  2000年   1篇
排序方式: 共有14条查询结果,搜索用时 15 毫秒
1.
We present a lossless Deoxyribonucleic Acid (DNA) sequence hiding method that can be used for ensuring authenticity of DNA sequence in the context of Mobile Cloud based healthcare systems. Hiding data within DNA sequence results in permanent information loss in DNA sequence. Therefore, providing DNA sequence authenticity using data hiding is challenging. Moreover, existing works on DNA data hiding require a reference DNA sequence data to retrieve hidden data. Hence, current methods are not blind approaches and inappropriate for ensuring authenticity of DNA sequence in the Mobile Cloud. The proposed method hides authentication data within DNA sequence, extracts authentication data, and reconstructs the DNA sequence without any loss of information. From there, our proposed approach guarantees DNA sequence authenticity and integrity in Mobile Cloud based healthcare systems. We present a security analysis of our method to show that the method is secured. We conduct several experiments to demonstrate the performance of our proposed method.  相似文献   
2.
以图像和文本为掩护的隐蔽通信及其对抗技术   总被引:1,自引:0,他引:1  
1IntroductionSince the early1990s,information hiding has be-come a hot topic attracting much attention from re-searchers in various fields including signal processing,cryptography and computer science,developers andsuppliers of multi media contents,and professionalsand other personnel who are concerned with informa-tion security[1].Two major areas are of the most inter-ests:digital watermarking and steganography.The purpose of digital watermarkingis to protect in-tellectual property rights of …  相似文献   
3.
基于特征函数和质量因子的JPEG图像隐写分析   总被引:1,自引:0,他引:1  
提出了一种新的JPEG通用隐写分析方法.通过分析JPEG图像DCT域和小波域的量化噪声模型和隐写模型,发现了量化噪声和嵌入噪声对图像的作用原理,并用直方图特征函数来区分2种噪声对图像的影响. 基于JPEG质量因子对图像进行分类,为每个图像分类单独训练支持向量机分类器.实验显示,本文方法相比已有的一些常用JPEG通用隐写分析方法具有更好的检测性能.  相似文献   
4.
提出了一种新的JPEG通用隐写分析方法.通过分析JPEG图像DCT域和小波域的量化噪声模型和隐写模型,发现了量化噪声和嵌入噪声对图像的作用原理,并用直方图特征函数来区分2种噪声对图像的影响. 基于JPEG质量因子对图像进行分类,为每个图像分类单独训练支持向量机分类器.实验显示,本文方法相比已有的一些常用JPEG通用隐写分析方法具有更好的检测性能.  相似文献   
5.
刘胜  华铎 《科技通报》2007,23(4):553-557,591
信息隐藏和检测技术已日趋重要且应用广泛,隐藏分析的目的在于检测媒体中隐藏的信息。本文针对JPEG图像文件的隐藏检测技术应用,介绍了几种典型的隐写术的原理和弱点。通过对相关隐藏算法的研究分析,讨论了基于统计特性的检测隐藏信息的方法,并在结论中给出了相关的实验结果。  相似文献   
6.
为了获取较大隐写容量和较好不可感知性,结合人眼视觉感知特性,提出一种视觉感知指导数据嵌入的大容量视频隐写算法.该算法综合了多参数空间对比灵敏度函数、基于DCT(discrete cosine transform)块分类的纹理掩蔽效应及运动注意机制,以确定各DCT系数的失真掩蔽测度,进而控制隐写容量.实验结果表明,该隐写算法具有较大隐写容量,同时较好地保持了含密视频的不可感知性.  相似文献   
7.
基于视觉感知模型的大容量视频隐写算法   总被引:2,自引:0,他引:2  
为了获取较大隐写容量和较好不可感知性,结合人眼视觉感知特性,提出一种视觉感知指导数据嵌入的大容量视频隐写算法.该算法综合了多参数空间对比灵敏度函数、基于DCT(discrete cosine transform)块分类的纹理掩蔽效应及运动注意机制,以确定各DCT系数的失真掩蔽测度,进而控制隐写容量.实验结果表明,该隐写算法具有较大隐写容量,同时较好地保持了含密视频的不可感知性.  相似文献   
8.
利用边缘像素负载信息的二值图像密写   总被引:4,自引:0,他引:4  
We present a novel scheme for embedding secret data into a binary image without introducing noticeable artifacts. Unlike some block-based methods, the proposed scheme encodes the secret bits directly into boundary pixels by checking each pixel of the cover image in a pseudo-random order for embedding eligibility. A set of rules ensures correct identification of data-carrying pixels in blind extraction. The proposed scheme does not generate isolated dots, and can incorporate various coding methods such as matrix encoding to further improve the embedding performance. It is shown that up to one fourth of the boundary pixels may be used to carry secret data. Experimental results indicate that the method can achieve good visual quality with fairly large data capacity.  相似文献   
9.
针对空间域隐写,分析了小波特征函数统计矩、高阶统计特征和差值像素邻接矩阵3组重要隐写特征间的互补性,利用基于互信息准则和增强特征选择的方法进行特征融合.分析和实验表明,3组特征间存在互补性,融合后能够得到更好的正确率.  相似文献   
10.
l IntroductionThe phenomenal growth in e-commerce aPPlications through the internet in the past few years has ledtO a genuine need, as well as a sense of uopncy' forboth small office and home office (SOHO) andcorporate users tO Protect their data bosactlons throughthe internet These data ~tlons may Includesensitive document transfer, digital slgnabe authentication, digital watennarklng for copyright protection,and digital data storage and llnkage Therefore digitalsteganography receives a g…  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号