ei检索查询 A Stratified Image-Hiding Method Based on Chaos 谢谢
来源:学生作业帮 编辑:神马作文网作业帮 分类:综合作业 时间:2024/11/10 14:33:12
ei检索查询 A Stratified Image-Hiding Method Based on Chaos 谢谢
Digital image watermarking robust to geometric attacks based on Wavelet domain
EI检索号:谢谢
Digital image watermarking robust to geometric attacks based on Wavelet domain
EI检索号:谢谢
Accession number:20105213534307
Title:Digital image watermarking robust to geometric attacks based on Wavelet domain
Authors:Ma,Na1 ; Zhang,Qiang1 ; Li,Ying1
Author affiliation:1 Key Laboratory of Advanced Design and Intelligent Computing,Dalian university,Ministry of Education,Province Dalian,116622,China
Corresponding author:Ma,N.
Source title:Proceedings 2010 IEEE 5th International Conference on Bio-Inspired Computing:Theories and Applications,BIC-TA 2010
Abbreviated source title:Proc.IEEE Int.Conf.Bio-Inspired Comput.:Theor.Appl.,BIC-TA
Monograph title:Proceedings 2010 IEEE 5th International Conference on Bio-Inspired Computing:Theories and Applications,BIC-TA 2010
Issue date:2010
Publication year:2010
Pages:787-792
Article number:5645225
Language:English
ISBN-13:9781424464388
Document type:Conference article (CA)
Conference name:2010 IEEE 5th International Conference on Bio-Inspired Computing:Theories and Applications,BIC-TA 2010
Conference date:September 23,2010 - September 26,2010
Conference location:Changsha,China
Conference code:83128
Sponsor:IEEE Beijing Section; Hunan University; Liverpool Hope University; Peking University; National Natural Science Foundation of China
Publisher:IEEE Computer Society,445 Hoes Lane - P.O.Box 1331,Piscataway,NJ 08855-1331,United States
Abstract:This paper presents a new wavelet domain watermarking method,the carrier image using wavelet decomposition.After the Walsh transform low frequency wavelet coefficients,calculated by block adaptive embedding strength,modify the wavelet coefficients of each block,and then do singular value decomposition (SVD),repeat on embedded watermark in the singular value.Fractional part of the anti-transformed image is saved,correction of the watermarked image can be accurately extracted watermark.The experimental results demonstrate that the proposed algorithm can effectively resist cutting,scaling,translation and other geometric attacks,attacks in general are also robust.© 2010 IEEE.
Number of references:13
Main heading:Wavelet decomposition
Controlled terms:Algorithms - Computation theory - Digital watermarking - Singular value decomposition - Walsh transforms - Watermarking
Uncontrolled terms:Adaptive embedding - Chaos - Digital image watermarking - Embedded watermarks - Fractional parts - Geometric attacks - Low frequency - Singular values - Walsh function - Watermarked images - Wavelet coefficients - Wavelet domain - Wavelet domain watermarking
Classification code:723.2 Data Processing and Image Processing - 811.1.1 Papermaking Processes - 921 Mathematics - 921.3 Mathematical Transformations
DOI:10.1109/BICTA.2010.5645225
Database:Compendex
Compilation and indexing terms,© 2011 Elsevier Inc.
Title:Digital image watermarking robust to geometric attacks based on Wavelet domain
Authors:Ma,Na1 ; Zhang,Qiang1 ; Li,Ying1
Author affiliation:1 Key Laboratory of Advanced Design and Intelligent Computing,Dalian university,Ministry of Education,Province Dalian,116622,China
Corresponding author:Ma,N.
Source title:Proceedings 2010 IEEE 5th International Conference on Bio-Inspired Computing:Theories and Applications,BIC-TA 2010
Abbreviated source title:Proc.IEEE Int.Conf.Bio-Inspired Comput.:Theor.Appl.,BIC-TA
Monograph title:Proceedings 2010 IEEE 5th International Conference on Bio-Inspired Computing:Theories and Applications,BIC-TA 2010
Issue date:2010
Publication year:2010
Pages:787-792
Article number:5645225
Language:English
ISBN-13:9781424464388
Document type:Conference article (CA)
Conference name:2010 IEEE 5th International Conference on Bio-Inspired Computing:Theories and Applications,BIC-TA 2010
Conference date:September 23,2010 - September 26,2010
Conference location:Changsha,China
Conference code:83128
Sponsor:IEEE Beijing Section; Hunan University; Liverpool Hope University; Peking University; National Natural Science Foundation of China
Publisher:IEEE Computer Society,445 Hoes Lane - P.O.Box 1331,Piscataway,NJ 08855-1331,United States
Abstract:This paper presents a new wavelet domain watermarking method,the carrier image using wavelet decomposition.After the Walsh transform low frequency wavelet coefficients,calculated by block adaptive embedding strength,modify the wavelet coefficients of each block,and then do singular value decomposition (SVD),repeat on embedded watermark in the singular value.Fractional part of the anti-transformed image is saved,correction of the watermarked image can be accurately extracted watermark.The experimental results demonstrate that the proposed algorithm can effectively resist cutting,scaling,translation and other geometric attacks,attacks in general are also robust.© 2010 IEEE.
Number of references:13
Main heading:Wavelet decomposition
Controlled terms:Algorithms - Computation theory - Digital watermarking - Singular value decomposition - Walsh transforms - Watermarking
Uncontrolled terms:Adaptive embedding - Chaos - Digital image watermarking - Embedded watermarks - Fractional parts - Geometric attacks - Low frequency - Singular values - Walsh function - Watermarked images - Wavelet coefficients - Wavelet domain - Wavelet domain watermarking
Classification code:723.2 Data Processing and Image Processing - 811.1.1 Papermaking Processes - 921 Mathematics - 921.3 Mathematical Transformations
DOI:10.1109/BICTA.2010.5645225
Database:Compendex
Compilation and indexing terms,© 2011 Elsevier Inc.
EI论文检索号查询求助 A Method Based on Curvelet Transform for Color I
EI检索查询烦请好心人帮我查下 Researeh on genetic algorithm based on Pyram
EI检索号查询,文章名称:The Study of the Far Field Test System Based on
请帮忙查询EI检索号,谢谢!
A Temperature Measurement System Based on PT100,这篇文章是不是被EI检索
EI检索号查询 题目Bionic bladder based depth control for bionic unde
Design of PLC-based control system for GIS,需要查询EI检索号,
EI 检索查询?请帮我查询下这个文章是否为EI检索:A multi-objective decision support
帮助查ei检索 Algorithm for Finding k-Nearest Neighbors Based on S
急求此篇文章的EI检索号,《Real-Time Forensics Model Based on Fuzzy Theor
帮忙查询文章是否被EI检索
帮忙查询下是否被EI检索,