Description: This algorithm is based on robust watermark embedding method, through the watermark image noise treatment, can maintain stability, and can locate the image of the tampering position
To Search:
File list (Check if you may need any files):
attack.m
watermark.m
watermark2.m
watermarked.bmp
watermarked1.bmp
图片.jpg
水印图片数字5.bmp
电子印章.bmp
电子印章1.bmp
篡改水印图片山西.bmp