搜索资源列表
ComparativeEvaluationofDigitalFragileImage
- 脆弱性数字水印能为多媒体内容完整性认证和篡改检测提供有效的解决方案。该文对用于图像认证的脆弱性数字水印技术的研究 现状、一般原理、基本特征、典型算法进行了综述-The vulnerability of digital watermark for the integrity of multimedia content authentication and tamper detection to provide an effective solution. The image authentic
AudioWatermarkingforContentAuthentication
- 该水印算法具有以下特点:1)结合音频自身的特性,不仅能够自适应划分音频数据段,而且能够智能调节水印嵌入强度,增强了数字音频水印的鲁棒性;2)能够同时进行数字音频的版权保护与内容认证,并可大致确定篡改发生区域,仿真实验表明,文中算法不仅具有较好的不可感知性,而且对常规处理具有较好的鲁棒性,同时能够对替换等而已篡改做出报警并确定被篡改位置。-The watermarking algorithm has the following characteristics: 1) combined with t
WaterMarkEmbedChkTest
- 现在大家提供的源码都是针对BMP图片的防篡改例程,本源码主要是针对JPG图片的嵌入水印和提取水印判断,希望对大家有帮助!-Now we provide the source code is tamper-resistant against BMP images routines, this source is mainly directed against JPG images embedded watermark and the extracted watermark judgments we
ImageForgery
- 一个图像防篡改程序,VC++编写,包括分析灰度相似度和矩分析-An image tamper program, VC++ written, including analysis of similarity and the moment of gray
ff
- 图像篡改检测,用来对图像原始的数据进行分析检测来判断是否有人对此图像做过处理-Image tamper detection
mqzh
- 总结了数字图像盲取证技 术研究基础与发展方向,分别从数字图像取证理论模型、针对篡改手 段的真实性取证、针对隐密方法的完整性取证、基于图像自然属性的 原始性取证和隐密分析取证系统框架五个方面进行了研究 -Summary of digital image forensics technology research and development base, respectively, from the theoretical model of digital image forens
Exposing-digital-video-ghost-shadow
- 有关视频篡改的文章,基于鬼影的,是目前比较热点的研究领域。-stRelated video tamper with the article, based on the ghost of, is at present more hot fields ofudy.
tuxiang-chuli
- 用于图像篡改定位和恢复的分层半脆弱数字水印算法-Hierarchical semi-fragile digital watermarking algorithm for image tamper localization and recovery
kk
- 用于图像篡改定位和恢复的分层半脆弱数字水印算法-For image tamper localization and recovery in hierarchical semi-fragile digital watermarking algorithm
Double-JPEG-compression
- 基于双JPEG压缩统计特性的图像篡改检测方法-Image tamper detection method based on the statistical characteristics of double JPEG compression
sffi
- 利用傅里叶变换的图像篡改盲检测,Matlab实现。-The Fourier transform of the image tamper blind detection, Matlab implementation.
SIFTPVC
- 图像篡改检测的SIFT的vc实现,对篡改图像的区域定位并连线,确保图像的真实性。-Image tamper detection SIFT vc achieve, locate and connect the tampered area of the image, to ensure the authenticity of the image.
CFA
- 基于CFA(颜色滤波阵列)插值检测的图像篡改检测程序-Image tamper detection based on CFA (color filter array) interpolation detecting.
xiugai
- 针对于图像复制粘贴篡改检测,对图像数据进行降维处理,并进行块匹配,比较其图像块欧几里得距离-For copy and paste the image tamper detection, image data dimensionality reduction, and block matching, comparing its image block Euclidean distance
Watering_Authentication
- java基于eclipse开发环境的数字水印认证系统,能完成水印嵌入,水印提出,图像认证,和篡改检测功能-java eclipse development environment based on digital watermarking authentication system, to complete the watermark embedding, watermark proposed image authentication and tamper detection
ddforplatform
- 实现了一种基于双JPEG压缩的篡改图像检测算法,该算法遍历压缩因子对图像再次进行JPEG压缩,通过失真度的大小判定原始图像的质量因子,该算法可定位篡改区域-Realized based on double JPEG compressed image tamper detection algorithm, which traverses the compression factor of the JPEG image compression again, judging by the qualit
SURF_extraction
- 图像SURF特征提取,用于图像拼接和篡改检测,注释比较详细,程序很好理解-SURF feature extraction, image is used for image matching and tamper detection, comments are detailed, the program is easy to understand
shuangchongJEPG
- 由于图像在经过一次 JPEG 压缩和双重 JPEG 压缩之后其 DCT 系数具有一定的相关性,通过对这种相关性进行分析,提出了一种基于 JPEG 图像双重压缩特性的图像篡改检测算法,并用此算法检测图像是否经过篡改和定位篡改区域。 -Since the image after a first JPEG compression JPEG compression and double its DCT coefficients having some relevance, by this corre
lsb-MATLAB
- 本论文包含5个源程序,分别为LSBCut、LSBCollage、DCTCut、DCTCollage和PSNR,其中LSBCut实现了LSB水印算法的剪切篡改的检测、LSBCollage实现了LSB水印算法的拼贴篡改的检测、DCTCut实现了DCT水印算法的剪切篡改的检测、DCTCollage实现了DCT水印算法的拼贴篡改的检测、PSNR功能是计算嵌入水印嵌入的峰值信噪比,以此来说明嵌入水印后图像载体的失真大小。LSBCut、LSBCollage、DCTCut、DCTCollage是独立的程序,每
DCT
- 基于DCT的图像复制粘贴篡改检查算法源代码,仅供参考-DCT-based image copy and paste tamper check algorithm source code, for reference only
