您当前所在位置: 首页 > 学者
在线提示

恭喜!关注成功

在线提示

确认取消关注该学者?

邀请同行关闭

只需输入对方姓名和电子邮箱,就可以邀请你的同行加入中国科技论文在线。

真实姓名:

电子邮件:

尊敬的

我诚挚的邀请你加入中国科技论文在线,点击

链接,进入网站进行注册。

添加个性化留言

已为您找到该学者14条结果 成果回收站

上传时间

2005年05月11日

【期刊论文】基于多分辨率分解的数字水印处理技术

牛夏牧, 陆哲明, 孙圣和

(电子学报. 2000. Vol.28, No. 8. pp: 1-4. (EI)),-0001,():

-1年11月30日

摘要

本文提出一种基于多分辨率分解的可视数字水印技术。利用图像的多分辨率分解技术,相同分辨率层次的灰度级数字水印嵌入到对应的相同分辨率层次的原始静态图像之中,使水印对原始图像具有自适应性。由于水印的嵌入过程是基于原始图像的不同分辨率层次之间的关系,所以水印的提取不需要原始图像。实验结果表明本文提出的数字水印技术,经一些图像处理操作和有损压缩后仍是健壮的。

版权保护, 数字水印, 数字小波变换

上传时间

2005年05月11日

【期刊论文】A Novel Biometric Key Scheme

牛夏牧, Qiong Li*, Xiamu Niu, Shenghe Sun

(Chinese Journal of Electronics. 2005,Accepted, to be published (SCI & EI)),-0001,():

-1年11月30日

摘要

Password protected cryptosystem is commonly adopted nowadays. The main shortcoming of such cryptosystem is the lack of the connection between the user and password. The special biometric protected cryptosystem adopting biometric key scheme, which binds the biometric template and cryptographic key monolithically, can be a good solution to the problem. The biometric key scheme is devised in such a way that the cryptographic key cannot be retrieved without a successful biometric authentication. A novel biometric key scheme based on modular secret sharing is proposed in this paper. The feasibility and high security have been proved by theoretical analysis and experiments. In the experiment of combining iris recognition with the scheme, the probability for illegitimate user to retrieve the cryptographic key is zero; the probability for legal user fail to retrieve the cryptographic key is 0.0571. The optimal biometric key is 2645 times more difficult for an attacker to retrieve the cryptographic key comparing to the legitimate user.

Cryptography,, Biometrics,, Secret Sharing,, Biometric Key Scheme,, Security

  • 122浏览

  • 0点赞

  • 0收藏

  • 0分享

  • 1509下载

  • 0

  • 引用

上传时间

2005年05月11日

【期刊论文】一种旋转、尺度变换和平移鲁棒水印算法

牛夏牧, 俞龙江*, 孙圣和

(电子学报. 2003. Vol. 31. pp: 2071-2073.(EI)),-0001,():

-1年11月30日

摘要

几何攻击是目前困扰数字水印领域发展的问题,现有的抗几何攻击的水印技术存在诸多缺陷和不足。本文提出一种基于时域的抗几何攻击水印技术,利用边框这一简单的图形通过对其检测和提取,完成对几何失真参数的检测。考虑到实际应用中存在噪声的影响,用中值滤波和锐化增加了几何参数估计的鲁棒性。利用检测获得的几何失真参数对图像进行校正,使图像基本恢复原图从而无失真地提取水印。同时本文探讨了诸多文献尚未提及的几何失真恢复问题,提出一种模板匹配的方法恢复图像。仿真实验证明,该方法在含水印图像受到几何攻击后,仍可无失真地提取水印。

旋转,, 尺度变换,, 剪切,, 几何校正,, 数字水印

上传时间

2005年05月11日

【期刊论文】Gray-Level Digital Watermarking of Still Images

牛夏牧, NIU Xiamu, LU Zheming and SUN Shenghe

(Chinese Journal of Electronics. 2000. Vol. 9, No.3. pp: 253-256. (SCI & EI)),-0001,():

-1年11月30日

摘要

A method of embedding a gray-level digital watermark into an image is proposed in this paper. By stack filter's threshold decomposition technique, a gray-level digital watermark is decomposed into a series of binary digital images for implementing multiple watermarking. Experimental results show that the proposed techniques are successfully tolerant to reasonable image processing operations and the lossy compression techniques such as Joint Photographic Experts Group (JPEG) compression techniques.

Digital watermarking,, Discrete cosine transform,, JPEG compression technique,, Digital image processing,, Copyright protection

上传时间

2005年05月11日

【期刊论文】ROBUST VIDEO WATERMARKING BASED ON DISCRETE FRACTIONAL FOURIER TRANSFORM

牛夏牧, Xia-mu Niu, Sheng-he Sun

(Chinese Journal of Electronics, 2001, Vol. 10, No.4, pp: 28-34 (SCI & EI)),-0001,():

-1年11月30日

摘要

A video watermarking technique based on discrete fractional Fourier transform (DFRFT) is proposed. Each frame of original video is first decomposed into two-dimensional (2-D) multiresolution representations by 2-D discrete wavelet transforms (DWT) along the spatial axis. Then the wavelet coefficient frames in each group of pictures (GOP, each is 16 frames) are transformed into DFRFT coefficient frames by one-dimensional (1-D) DFRFT along the temporal axis. The watermark is embedded into each DFRFT coefficient frame in the GOP, and the angular parameter of the DFRFT can be changed to adapt itself to the original video. Experimental results show that the proposed technique is robust enough against the attacks of frame dropping, averaging and lossy compression.

Video watermarking,, Discrete fractional Fourier transform,, Discrete wavelet transform,, Multimedia security

合作学者

  • 牛夏牧 邀请

    哈尔滨工业大学,黑龙江

    尚未开通主页