搜索资源列表
xxx1111
- 利用matlab实现数字水印源码。提供了各种攻击的实现。-using Matlab digital watermarking source. Provide a variety of attacks realized.
dwtprocedure
- 整个数字水印的程序。包括峰值信躁比的计算,各种攻击后的水印提取等等。-entire digital watermarking process. Including peak impatient than the letter, after the attacks watermark extraction, and so on.
Digitalwatermark
- 水印嵌入及多种攻击源码,源码当中有整个源码的详细说明-watermark embedding and various attacks source, which is the entire source of detailed source
dwt_recover
- we embed watermarks in the original circles. In this way, the synchronization issue for watermark embedding and detecting can be best solved. Simulation results show that this method can resist variety of Geometry Attack, such as rotation, scaling, s
watermark1.基于MATLAB环境的音频水印白噪声攻击试验源程序
- 基于MATLAB环境的音频水印白噪声攻击试验源程序,MATLAB-based environment audio watermarking attacks white noise test source
water marking
- 实现抗各种攻击的matlab数字水印,尤其是几何攻击,包括剪切、旋转。有嵌入,提取,攻击,检测过程。-realized a new watermarking algorithm which can resist all kinds of attacks.
watermark
- 基于MATLAB环境的图像水印攻击试验源程序-MATLAB-based image watermarking attacks environment test source
3
- 图像处理常用攻击源码,直方图均匀化,图像锐化,锐化处理 -Common source of image processing attacks, histogram homogenization, image sharpening, sharpening
DCT
- 基于DCT域的鲁棒水印,能抗击一定程度的压缩,剪切等攻击-Based on the DCT domain robust watermarking, can fight against a certain degree of compression, shear, such as attacks
DCT-water-print
- 实现了添加水印及攻击水印的一些方法。攻击水印方法包括抖动攻击、滤波攻击、旋转攻击等-Add watermark and implementation of a number of methods to attack the watermark. Watermarking attack methods include jitter attacks, filtering attacks, spin attack
Checkmark
- Checkmark 是数字水印中应用的攻击测试软件,是每个在做数字水印的人的必须使用的工具,这个文章告诉你怎么使用checkmark-Checkmark is the application of digital watermarking attacks testing software, are each at digital watermarking to do the people have to use a tool, this article tell you how to use c
MATLABPICTUREPROCESSING
- 本程序用于数字水印,可以输入一副图像,嵌入水印信息,然后防止各种各样的攻击,最后可以提取水印信息,恢复原图像-This procedure for digital watermarks, can enter a pair of images, embedded watermark information, and then to prevent the various attacks, the watermark information can be extracted Finally, res
picutureattack
- 本程序主要是实现数字图像处理的一些算法,有源程序,包括水印的嵌入,提取和防止一些攻击,对初学者有一定的帮助-This procedure is mainly to achieve a number of digital image processing algorithms, there is source code, including the watermark embedding, extraction and to prevent some attacks, for beginners
miyao
- 本文提出了基于二维混沌映射的数字图像水印算法,混沌具有随机性、似噪声及对初始条件的极端敏感性等特点。将经过二维混沌映射置乱后的数字水印信号嵌入图像小波域的低频系数,实现了数字水印的隐蔽性、保密性和稳固性;利用二维混沌映射Arnold变换对水印信号进行置乱,不仅增强了水印信号保密性,同时有效提高了视觉上抵抗图像剪切攻击的能力。-In this paper, two-dimensional chaotic map based on digital image watermarking algorit
stirmark
- 数字水印攻击测试经典软件。攻击方式有旋转,裁切,缩放,添加椒盐噪声等-Classic Software Testing for Digital Watermarking. Attacks are rotating, cropping, zoom, add salt and pepper noise
SVM_GA
- 提出一种基于支持向量机( SVM)和遗传算法(GA)的离散余弦变换(DCT)域盲数字图像水印方法. 该方法能自适应于图像的局部特征. 依据图像块的局部特性,利用SVM对图像块分类,自适应地确定水印嵌入强度, GA用来优化水印嵌入位置. 实验结果表明该方法有较好的不可见性和较强对抗攻击的鲁棒性.-Based on support vector machine (SVM) and genetic algorithm (GA), discrete cosine transform (DCT) doma
cpu_design_main
- main categories Robust and Fragile Watermarking Techniques. The former is mainly used for copy right protection and fingerprinting applications, in which the goal of watermark is to sustain under all kinds of attacks that intend to remove the
ALU
- main categories Robust and Fragile Watermarking Techniques. The former is mainly used for copy right protection and fingerprinting applications, in which the goal of watermark is to sustain under all kinds of attacks that intend to remove the
DCT
- 基于离散余弦变换的数字水印,包括水印的嵌入和提取以及常间的各种水印攻击-Discrete cosine transform based on digital watermarking, including the watermark embedding and extraction, as well as between the various watermark attacks often
A.Blind.MPEG-2.Video.Watermarking.Robust.to.Regula
- Abstract—Based on the observation that low-frequency DCT coefficients of an image are less affected by geometric processing, we propose a new blind MPEG-2 video watermarking algorithm robust to camcorder recording. Both the embedding and extr
