Introduction - If you have any usage issues, please Google them yourself
procedures introduced by the algorithm, the information can be hidden to attack technology, in particular watermarking technology.
Packet : 67506280attackofwatermarking.zip filelist
水印攻击方法/
水印攻击方法/myattack.asv
水印攻击方法/myattack.m
水印攻击方法/mycompress.m
水印攻击方法/mycrop.m
水印攻击方法/myhighpass.m
水印攻击方法/mylowpass.m
水印攻击方法/mynoise.m
水印攻击方法/myresize.m
水印攻击方法/myrotate.m
水印攻击方法/mywiener.m