Welcome![Sign In][Sign Up]
Location:
Search - watermarking security

Search list

[Software EngineeringBMPwater

Description: BMP图像的防伪数字水印技术研究.提出了一种好的防伪技术 -BMP image of the security of digital watermarking technology research. Presents a good anti-counterfeiting technology
Platform: | Size: 65536 | Author: 李霞 | Hits:

[Special Effectsdct1_watermarked

Description: Firstly, research on robust image watermarking. A digital watermarking scheme based on wavelet transform was proposed. It realizes the watermarking extract without the original image using 64×64×8 bit gray image as the watermark signal. In order to enhancing the security of the watermark, we employ an encryption technology based on chaos and bit plan. Simulation results show that our scheme have good invisibility and can survive low-quality JPEG compression, median filtering and so on. In addition, the analysis of the extracted watermark can help us to detect and localize tampers.-Firstly, research on robust image watermarking. A digital watermarking scheme based on wavelet transform was proposed. It realizes the watermarking extract without the original image using 64 × 64 × 8 bit gray image as the watermark signal. In order to enhancing the security of the watermark, we employ an encryption technology based on chaos and bit plan. Simulation results show that our scheme have good invisibility and can survive low-quality JPEG compression, median filtering and so on. In addition, the analysis of the extracted watermark can help us to detect and localize tampers.
Platform: | Size: 102400 | Author: xiaxianming | Hits:

[Industry researchResearch_Report_2005

Description: During the past four years, most of our research activities have been focused on image but also video and 3-D objects processing for security applications (watermarking and biometrics) and communications (talking heads, interfaces), with a special emphasis on facial images. More about our work can be found at http://www.eurecom.fr/~image. Our research activities are conducted with the backing of several industrials, in particular France Telecom Research and STMicroelectronics. For the past few years, we have had a regular scientific collaboration on Fractal Image Coding, Watermarking and Biometrics with the University of California, Santa Barbara (UCSB), in particular with Prof. K. Ros
Platform: | Size: 1171456 | Author: surajs | Hits:

[Documentswatermarking

Description: 数字水印技术目前 正处于一个快速发 展和持续深入的阶 段, 应用领域也在 快速扩展。 刀 市场经济飞速发展的今天, 这 对于企业形象和经济利益存在 严重损害危险的企业和数字产 品侵权的创作者来说, 无疑是 一个良好的解决方案。数字水 印及其应用技术不仅提供了突 破性的信息安全防护方式, 而 且在数字防伪中占据着重要的 地位, 这对维护国家经济秩序 是大有益处的。-Digital watermarking technology is currently in a rapid and sustained development of advanced stage, applications are also rapidly expanding. Knife of the rapid development of the market economy today, which is the economic interests of corporate image and the risk of serious damage to businesses and digital products for the creators of infringement is a good solution. And application of digital watermarking technology provides a breakthrough approach to information security protection, and security in the digital occupy an important position, which is to safeguard national economic order is a great benefit.
Platform: | Size: 1045504 | Author: 青菜 | Hits:

[Special Effectsmiyao

Description: 本文提出了基于二维混沌映射的数字图像水印算法,混沌具有随机性、似噪声及对初始条件的极端敏感性等特点。将经过二维混沌映射置乱后的数字水印信号嵌入图像小波域的低频系数,实现了数字水印的隐蔽性、保密性和稳固性;利用二维混沌映射Arnold变换对水印信号进行置乱,不仅增强了水印信号保密性,同时有效提高了视觉上抵抗图像剪切攻击的能力。-In this paper, two-dimensional chaotic map based on digital image watermarking algorithm, Chaos with random noise and the likelihood of extreme sensitivity to initial conditions and so on. Two-dimensional chaotic map will be scrambling after the digital watermark embedded image signal of the low-frequency coefficients in wavelet domain, the realization of a digital watermark hidden, security and stability the use of two-dimensional chaotic map on Arnold transform scrambling watermark signal, not only enhances the confidentiality of the watermark signal at the same time improve the visual image shear resistance attacks.
Platform: | Size: 668672 | Author: lafeng | Hits:

[DocumentsOnDesignatedlyVerifiedNon-interactive)Watermarking

Description: On Designatedly Veried (Non-interactive)Watermarking Schemes-Although many watermarking schemes consider the case of universal veri¯ ability, it is undesirable in some applications. Designated veri¯ cation is a possible solution for this problem. Watermarking scheme with (non-interactive) designated veri¯ cation through non-invertible schemes was proposed by Lee et al [11] in 2003, to resolve multiple wa- termarking problem. Yoo et al [14] proposed a very similar watermarking scheme. In this paper, we propose a cryptanalytic attack on both of these schemes that allows a dishonest watermarker to send illegal watermarked images and to convince the designated veri¯ er or customer that received watermarked images are valid.We modify the above schemes to overcome the attack. Further, we also propose a new robust watermarking scheme with (non-interactive) designated veri¯ cation through non-invertible wa- termarks. Interestingly, our scheme can be extended for joint copyright protection (security of ownership rights fo
Platform: | Size: 145408 | Author: xiaowang | Hits:

[DocumentsFromWeaktoStrongWatermarking

Description: From Weak to Strong Watermarking-The informal goal of a watermarking scheme is to “mark” a digital object, such as a picture or video, in such a way that it is difficult for an adversary to remove the mark without destroying the content of the object. Although there has been considerable work proposing and breaking watermarking schemes, there has been little attention given to the formal security goals of such a scheme. In this work, we provide a new complexity-theoretic definition of security for watermarking schemes. We describe some shortcomings of previous attempts at defining watermarking security, and show that security under our definition also implies security under previous definitions. We also propose two weaker security conditions that seem to capture the security goals of practice-oriented work on watermarking and show how schemes satisfying these weaker goals can be strengthened to satisfy our definition.
Platform: | Size: 313344 | Author: xiaowang | Hits:

[Internet-NetworkCVE_intrusion

Description: 本文首先系统分析了 snort 规则的组成,详细的介绍了各个部分的含义,这对于开发出新的入侵检测系统,建立自己的攻击规则库有很大的帮助。针对系统所需的适应性和自治性,在详细剖析 snort 规则同时,着重研究基于 CVE 入侵检测系统的规则库的实现,底层嗅探器的实现和嗅探过程等问题。在规则特征选项的模式匹配问题上进行重点说明,给出了一种改进的检测方法,即结合使用协议分析进行模式匹配,从试验数据上大大提高了效率,减少了误报率。同时,本系统所基于的 CVE 知识库,跟踪国际上 CVE 的最新发展动态,制订了国内统一的 CVE 标准,具有极大丰富的知识库,有效的解决了国内漏洞库不统一的问题.-The author also describes the architecture and functions and the design and the implement of the software. Intrusion detection system (IDS) is very important for network security. At present, the author systematically analyzes the composition and semantics of Snort rules, which may be of great help for creating signature database, then the paper studies the flexibility and self-controllability in the CVE-based Intrusion Detection System, emphasizes not only on analysis of the snort rules, but on the realization of intrusion detecting based on CVE rules and the implement of the sniffer. Especially, this paper covers the intrusion signature matching methods, and analyzes the weakness when only uses pattern matching in intrusion analysis and presents an improved approach that combines protocol analysis and pattern matching, to dectect attacks. At the same time it gives an example to show how to use this approach. The experimental results show that the rules surely reduce the rate of misd
Platform: | Size: 478208 | Author: 陈中 | Hits:

[OtherAddison.Wesley.The.Craft.of.System.Security.Dec.20

Description: After reading this book, you will be able to Understand the classic Orange Book approach to security, and its limitations Use operating system security tools and structures--with examples from Windows, Linux, BSD, and Solaris Learn how networking, the Web, and wireless technologies affect security Identify software security defects, from buffer overflows to development process flaws Understand cryptographic primitives and their use in secure systems Use best practice techniques for authenticating people and computer systems in diverse settings Use validation, standards, and testing to enhance confidence in a system s security Discover the security, privacy, and trust issues arising from desktop productivity tools Understand digital rights management, watermarking, information hiding, and policy expression Learn principles of human-computer interaction (HCI) design for improved security Understand the potential of emerging work in hardware-based security and trusted computing After reading this book, you will be able to Understand the classic Orange Book approach to security, and its limitations Use operating system security tools and structures- with examples from Windows, Linux, BSD, and Solaris Learn how networking, the Web, and wireless technologies affect security Identify software security defects, from buffer overflows to development process flaws Understand cryptographic primitives and their use in secure systems Use best practice techniques for authenticating people and computer systems in diverse settings Use validation, standards, and testing to enhance confidence in a system' s security Discover the security, privacy, and trust issues arising from desktop productivity tools Understand digital rights management, watermarking, information hiding, and policy expression Learn principles of human-computer interaction (HCI) design for improved security Understand the potential of emerging work in hardware-based security and trusted computing-After reading this book, you will be able to Understand the classic Orange Book approach to security, and its limitations Use operating system security tools and structures- with examples from Windows, Linux, BSD, and Solaris Learn how networking, the Web, and wireless technologies affect security Identify software security defects, from buffer overflows to development process flaws Understand cryptographic primitives and their use in secure systems Use best practice techniques for authenticating people and computer systems in diverse settings Use validation, standards, and testing to enhance confidence in a system' s security Discover the security, privacy, and trust issues arising from desktop productivity tools Understand digital rights management, watermarking, information hiding, and policy expression Learn principles of human-computer interaction (HCI) design for improved security Understand the potential of emerging work in hardware-based security and trusted computing
Platform: | Size: 5532672 | Author: chen | Hits:

[Special Effectsproj_code01210

Description: watermarking is the art of hiding data to provide authenticity and security.
Platform: | Size: 2048 | Author: zoheb | Hits:

[Crack Hackan_intellegent_audio_water_marking_based_on_dwt-s

Description: All three, Discrete Wavelet Transform (DWT) - Singular Value Decomposition (SVD) and Adaptive Tabu Search (ATS) have been used as mathematical tools for embedding data into an audio signal. In this paper, we present a new robust audio watermarking scheme based on DWT-SVD and ATS. After applying the DWT to the cover audio signal, we map the DWT coefficients, and apply the SVD, we search for the optimal intensity of audio watermarking by using the ATS. Experimental results show that the watermarking method performs well in both security and robustness to many digital signals processing, such as filtering, cropping, mp3 and random noise.
Platform: | Size: 267264 | Author: Rishi | Hits:

[hospital software systemmedicalimagesROI

Description: 摘 要: 提出了一种基于医学图像中感兴趣区域(ROI)的盲检测水印算法, 将包含重要病理信息的灰度图像作为数字水印, 经置乱后在混沌序列的控制下嵌入到宿主小波域非感兴趣区域中。实验结果表明, 该算法在保护医学 ROI 的同时提高了水印抗 JPEG 压缩的鲁棒性, 并对篡改、 几何剪切、 滤波等均具有良好的鲁棒性和透明性, 而且混沌序列增强了系统的安全性。-Abstract: This paper presents a region of interest based on medical images (ROI) of the blind detection watermarking algorithm will contain important pathological information of gray image as digital watermark, after scrambling after the chaotic sequence embedded into the host under the control of wavelet-domain Non-interest area. The experimental results show that the algorithm in the protection of medical ROI while increasing watermark robustness against JPEG compression, and tampering, cropping, filtering Dengjun has good robustness and transparency, but also enhanced the system chaotic sequence security.
Platform: | Size: 418816 | Author: 还都 | Hits:

[Otherzerwater

Description:  随着图像技术的快速发展,当信息内容涉及到政治、军事、商业、法庭举证等重要数据时,其真实性和完整性必 须得以确认。提出一种结合Zernike 矩的半脆弱水印算法,利用图像小波变换低频子带的Zernike 矩幅值的半脆弱特性区 分恶意攻击和偶然攻击,提高了水印的安全性,并能准确地定位出篡改区域。-With the rapid development of the image techniques , If the image contains important data , such as politics , military , commerce and evidence , the authenticity and integrality of the image must be validated. In this paper , a semi2f ragil2 eim watermarking algorithm using Zernike moment s is proposed , it can distinguish malicious modification f rom incidental modification according to semi2f ragile characteristics of zernike moment s of the low f requency subband in the integer wavelet t ransform domain of an image , improving watermark security , and locating the tamper areas well and t ruly.
Platform: | Size: 343040 | Author: ll | Hits:

[OtherSpreadSpectrumWatermarkingSecurity

Description: it is IEEE paper for spread spectrum watermarking security
Platform: | Size: 716800 | Author: meena | Hits:

[Special Effectsfangweiyinshua

Description: 基于数字水印的商业票据防伪的新方法,商艳红,唐山师范-Commercial paper based on digital watermarking security features of the new method, commercial red, Tangshan Teachers
Platform: | Size: 516096 | Author: gm | Hits:

[Special Effectskongyushuiyin

Description: 基于空域水印算法的票据防伪研究,湖南大学工程硕士论文,王伟-Watermarking algorithm based on airspace security of the Notes, Hunan University, master' s thesis project, Wang Wei
Platform: | Size: 2096128 | Author: gm | Hits:

[Special Effectsemdwt

Description: 基于小波变换的扩频图象数字水印,将水印嵌入到小波中。以保证信息的安全-Spread spectrum based on wavelet transform image watermarking, the watermark is embedded into the wavelet. To ensure information security
Platform: | Size: 1024 | Author: lina | Hits:

[matlabSpeech-signal-watermarking-matlab

Description: 在保密数据传递等应用中,有时采用将一句话或一段文字或一段音乐隐藏在另一段音乐中,然后利用专门的算法来提取所传的信息-Data transfer in applications such as security, sometimes using the word or a text or a piece of music hidden in another section of music, and then use a special algorithm to extract the information transmission
Platform: | Size: 290816 | Author: | Hits:

[matlabdwt2

Description: 本代码基于dwt的音频水印技术,在音频中加入高斯随机水印,达到防伪的效果。-The code is based on dwt audio watermarking technology in audio watermarking by adding Gaussian random to achieve security results.
Platform: | Size: 1024 | Author: 宁宇 | Hits:

[Special Effectsrobust-image-watermarking

Description: robust image watermarking is a new technique to increase the security and capacity of watermarked data both at the same time-robust image watermarking is a new technique to increase the security and capacity of watermarked data both at the same time....
Platform: | Size: 951296 | Author: jobin | Hits:
« 12 3 4 »

CodeBus www.codebus.net