Description: Based on the vulnerability of the watermark embedding algorithm, including watermark embedding, watermark attacks and so on
To Search:
File list (Check if you may need any files):
attack.m
lena.jpg
leyi.m
watermark.m
watermark2.m
嵌入水印后的图象.bmp
嵌入水印后的图象_副本.bmp
攻击后水印图象.bmp
电子印章.bmp