自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+
  • 博客(0)
  • 资源 (8)
  • 收藏
  • 关注

空空如也

2015-Review-State of the Art in Research on Microgrids - A Review.pdf

一篇关于微电网的综述,覆盖面比较广。值得一读。

2021-04-07

注册电气工程师基础考试手册

注册电气工程师基础考试手册,基础考试时查找基本公式用,和正式考试稍有不同

2013-07-07

【电子书】Digital Watermarking and Steganography(第二版)

编者 Ingemar J. Cox Matthew L. Miller Jeffrey A. Bloom Jessica Fridrich Ton Kalker 目录 Contents Preface to the First Edition xv Preface to the Second Edition xix Example Watermarking Systems xxi CHAPTER 1 Introduction 1 1.1 Information Hiding, Steganography, and Watermarking 4 1.2 History of Watermarking 6 1.3 History of Steganography 9 1.4 Importance of Digital Watermarking 11 1.5 Importance of Steganography 12 CHAPTER 2 Applications and Properties 15 2.1 Applications of Watermarking 16 2.1.1 Broadcast Monitoring 16 2.1.2 Owner Identification 19 2.1.3 Proof of Ownership 21 2.1.4 Transaction Tracking 23 2.1.5 Content Authentication 25 2.1.6 Copy Control . 27 2.1.7 Device Control 31 2.1.8 Legacy Enhancement 32 2.2 Applications of Steganography 34 2.2.1 Steganography for Dissidents 34 2.2.2 Steganography for Criminals 35 2.3 Properties of Watermarking Systems 36 2.3.1 Embedding Effectiveness 37 2.3.2 Fidelity 37 2.3.3 Data Payload 38 2.3.4 Blind or Informed Detection 39 2.3.5 False Positive Rate 39 2.3.6 Robustness 40 2.3.7 Security 41 2.3.8 Cipher and Watermark Keys 43 2.3.9 Modification and Multiple Watermarks 45 2.3.10 Cost 46 2.4 Evaluating Watermarking Systems 46 2.4.1 The Notion of “Best” 47 2.4.2 Benchmarking 47 2.4.3 Scope of Testing 48 2.5 Properties of Steganographic and Steganalysis Systems 49 2.5.1 Embedding Effectiveness 49 2.5.2 Fidelity 50 2.5.3 Steganographic Capacity, Embedding Capacity, Embedding Efficiency, and Data Payload 50 2.5.4 Blind or Informed Extraction 51 2.5.5 Blind or Targeted Steganalysis 51 2.5.6 Statistical Undetectability 52 2.5.7 False Alarm Rate 53 2.5.8 Robustness 53 2.5.9 Security 54 2.5.10 Stego Key 54 2.6 Evaluating and Testing Steganographic Systems 55 2.7 Summary 56 CHAPTER 3 Models of Watermarking 61 3.1 Notation 62 3.2 Communications 63 3.2.1 Components of Communications Systems 63 3.2.2 Classes of Transmission Channels 64 3.2.3 Secure Transmission 65 3.3 Communication-Based Models of Watermarking 67 3.3.1 Basic Model 67 3.3.2 Watermarking as Communications with Side Information at the Transmitter 75 3.3.3 Watermarking as Multiplexed Communications 78 3.4 Geometric Models of Watermarking 80 3.4.1 Distributions and Regions in Media Space 81 3.4.2 Marking Spaces 87 3.5 Modeling Watermark Detection by Correlation 95 3.5.1 Linear Correlation 96 3.5.2 Normalized Correlation 97 3.5.3 Correlation Coefficient 100 3.6 Summary 102 CHAPTER 4 Basic Message Coding 105 4.1 Mapping Messages into Message Vectors 106 4.1.1 Direct Message Coding 106 4.1.2 Multisymbol Message Coding 110 4.2 Error Correction Coding 117 4.2.1 The Problem with Simple Multisymbol Messages 117 4.2.2 The Idea of Error Correction Codes 118 4.2.3 Example: Trellis Codes and Viterbi Decoding 119 4.3 Detecting Multisymbol Watermarks 124 4.3.1 Detection by Looking for Valid Messages 125 4.3.2 Detection by Detecting Individual Symbols 126 4.3.3 Detection by Comparing against Quantized Vectors 128 4.4 Summary 134 CHAPTER 5 Watermarking with Side Information 137 5.1 Informed Embedding 139 5.1.1 Embedding as an Optimization Problem 140 5.1.2 Optimizing with Respect to a Detection Statistic 141 5.1.3 Optimizing with Respect to an Estimate of Robustness 147 5.2 Watermarking Using Side Information 153 5.2.1 Formal Definition of the Problem 153 5.2.2 Signal and Channel Models 155 5.2.3 Optimal Watermarking for a Single Cover Work 156 5.2.4 Optimal Coding for Multiple Cover Works 157 5.2.5 A Geometrical Interpretation of White Gaussian Signals 158 5.2.6 Understanding Shannon’s Theorem 159 5.2.7 Correlated Gaussian Signals 161 5.3 Dirty-Paper Codes 164 5.3.1 Watermarking of Gaussian Signals: First Approach 164 5.3.2 Costa’s Insight: Writing on Dirty Paper 170 5.3.3 Scalar Watermarking 175 5.3.4 Lattice Codes 179 5.4 Summary 181 CHAPTER 6 Practical Dirty-Paper Codes 183 6.1 Practical Considerations for Dirty-Paper Codes 183 6.1.1 Efficient Encoding Algorithms 184 6.1.2 Efficient Decoding Algorithms 185 6.1.3 Tradeoff between Robustness and Encoding Cost 186 6.2 Broad Approaches to Dirty-Paper Code Design 188 6.2.1 Direct Binning 188 6.2.2 Quantization Index Modulation 188 6.2.3 Dither Modulation 189 6.3 Implementing DM with a Simple Lattice Code 189 6.4 Typical Tricks in Implementing Lattice Codes 194 6.4.1 Choice of Lattice 194 6.4.2 Distortion Compensation 194 6.4.3 Spreading Functions 195 6.4.4 Dither 195 .... 内容太多,不写了,大家自己看吧

2008-12-05

MATLAB信号与系统

在MATLAB中处理信号与系统的相关问题的函数及说明。比较简单的入门级资料

2008-12-04

控制理论基础运算的MATLAB实现

控制理论基础运算的MATLAB实现(矩阵与微分运算) 薛定宇《控制系统计算机辅助设计》的部分内容

2008-12-03

simulink基本模块介绍

simulink基本模块介绍,不包括专业工具模块。适合初学者查阅

2008-11-05

matlabGUI资料

MATLAB GUI介绍,上传了这么久,都没人要看看吗?

2008-03-26

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除