steganography 中文意思是什麼

steganography 解釋
信息隱藏法蓋子技術
  1. Sequence book codes, steganography, invisible ink, maybe the watermark

    密碼序列,隱形墨水可能還有水印
  2. Steganography using dual - modulo arithmetic without introducing histogram abnormality

    採用兩次模運算的無直方圖異常安全密寫法
  3. 3. finally, according to the demand of the research project, the steganography programs downloaded from internet are integrated to be a practical system. it has simple and perspicuous interface, easy to operate

    最後我們將已經收集到的隱藏工具予以集成,對每個工具都有詳細的說明,並對不同的dos程序採用統一的輸入界面,形成一個系統的隱藏工具體系,其界面明了簡單,用戶可以很容易操作並掌握。
  4. Theoretical expatiate on general concepts and fundamental principles of information hiding and steganography, also point out possible directions for further research, also analysis the probability of speech as the host carry signal and efficient masking characteristics of psycho - acoustic model, it is shown that : there is an improvement on imperceptibility according to human auditory masking effect

    闡述了信息隱藏技術和隱寫技術的重要概念、基本理論以及廣闊的應用前景。分析了將語音信號作為宿主載體信號的可行性,參考心理聲學模型的特性,得出結論:基於人耳聽覺掩蔽效應的隱寫演算法,在隱蔽性上有很大的提高。
  5. As a new branch of information security, information hiding technology including digital watermarking and steganography aims to protect intellectual property rights of multimedia contents and to send secret messages under the cover of a carrier signal

    信息隱藏是信息安全領域中的一項新興技術,主要有數字水印和數字密寫兩大分支,分別用於多媒體數據的版權保護和隱蔽通信。
  6. Based on the classification of images, this paper gives out four digital image steganography techniques which have good conceal effect, including low - three - bits hiding strategy, odd - even of hypo - low bit hiding strategy, deviation of adjacent - field hiding strategy and self - adaptive deviation of adjacent - field hiding strategy. on digital watermarking aspect, this paper gives two blind watermarking strategies which have good conceal effect and high robustness, they are single - watermarking strategy based on minimal - value exchanging and multi - watermarking strategy which hides the same watermark copy on the different parts of an image

    在對圖像進行了分類的基礎上,本文給出了四個具有較好掩密效果的數字圖像隱寫策略,包括低三位隱藏策略、次低位奇偶策略、鄰域方差策略和自適應鄰域方差策略;在數字水印方面,提出兩個掩密效果好且魯棒性較高的數字圖像盲水印策略,分別為基於最小值交換法的單一水印策略和嵌入同一水印多個副本的多水印策略。
  7. At present time, most of the studies focus on digital watermarking techniques, and few are done on steganography, one of the most important directions in the field of information hiding

    目前大部分的研究工作集中於數字水印技術,而用於秘密通信的掩密術則較少有人涉及。本文對信息隱藏領域的另一個重要方向? ?掩密技術進行了研究,著重討論了其在數字圖像中的應用。
  8. As a result, we present a simple and high capacity binary image steganography

    因此,我們提出了一個簡單並且具有高資料可藏量的黑白影像資訊偽裝術。
  9. High data capacity and cover image quality maintenance after data embedding are the major requirements in digital image steganography

    就數位影像的資訊偽裝術而言,所著重的是資料可藏量以及藏入資料后原始影像品質的維護。
  10. We develop some methods for evaluating the security of lsb steganography using randomness test and two - dimension self - correlation function. 4 ) evaluation of the statistical visibility of information hiding algorithms

    提出了基於二維自相關函數徑向譜和隨機性檢驗(包括順序檢驗、遊程檢驗和一維自相關檢驗)的lsb信息隱藏安全性評估方法。
  11. If possible try to recover portions of the image that have been tampered without accessing the original image. in the past, several techniques and concepts based on data hiding or steganography have been introduced as a means for tamper detection in digital images and for image authentication - fragile watermarks, semi - fragile watermarks, and self - embedding watermarks. the research of this thesis mainly includes self - embedding and semi - fragile watermarks

    目前用於數字圖像完整性驗證及自修復的數字水印方案主要有完全脆弱性水印、半脆弱性水印、自嵌入水印等,本文主要研究自嵌入及半脆弱數字水印,分別從空域及變換域角度詳細分析當前國內外現有的各種演算法,指出其不足之處,並提出了相應的改進演算法,實驗結果表明本文演算法的有效性與實用性。
  12. Abstract a new kind of design and implementation of a steganography algorithm based on least significant bit ( lsb ) was proposed, which used chaos system as key to encrypt the steganography information, then according to the image characteristic, adaptively regulated embedding depth

    摘要提出了一種新的利用混沌信號作為密鑰流對密寫信息進行加密,進而根據載體圖像特性進行分塊,自適應調節嵌入深度的最低比特位( lsb )密寫演算法。
  13. First it analyze the existing information hiding techniques. with the reference to the literature read, it gives a brief statement on the advantage and disadvantage of each hiding technique, from airspace technique to transform - space technique, from dct to dwt, followed by the statement of sameness and difference between the two main branches ? ? steganography and watermarking

    首先對國內外已有的隱藏技術、隱藏策略作了較為詳盡的分析,從空域技術到變換域技術,從dct變換到dwt變換,結合所閱讀到的文獻,對各隱藏策略的特點及優缺點進行了簡要的總結。
  14. In the third part, the essences of steganography and disadvanges of common visual perception evaluation, such as psnr and wpsnr are studied. based on analysis local error that is introduced by embedding information, combining hvs, three objective perception evaluation method for steganography performance are proposed, which are based on human visual systems and local statistic error distribution respectively. in the steganalysis part, a steganography security statistic attack model and methods for some steganography methods are presented

    在信息隱藏的性能評價方面,研究了常用的峰值信噪比,加權峰值信噪比等前人提出的感知性能評價準則,指出針對信息隱藏的性能評價不能單純從視覺特性出發,提出從信息隱藏的數據特性和感知特性出發,結合局部特性來考察失真誤差的變化的思想,並據此提出基於局部區域誤差統計分佈和視覺掩模方法評價信息隱藏性能的方法。
分享友人