Location:
Search - Matlab attack
Search list
Description: 数字水印技术是当前比较流行的防盗版技术,本程序包括水印的嵌入,一般攻击,水印提取,水印的检测-digital watermarking technology is currently more popular anti-piracy technology, the process includes the embedded watermark, the general attack Extraction watermark, watermark detection
Platform: |
Size: 563820 |
Author: 魏凯 |
Hits:
Description: 一个数字水印评测软件,包含多种评测数字水印算法的指标和攻击方法。-a digital watermark Evaluation software includes a variety of digital watermarking algorithm for evaluation of indicators and ways to attack.
Platform: |
Size: 3664896 |
Author: 张华 |
Hits:
Description: 数字水印算法实现(matlab程序包),包含有DCT水印嵌入算法,DWT水印嵌入算法,以及水印攻击和性能测试程序。参考价值极大-digital watermarking algorithm (Matlab package), including a watermark embedded DCT algorithm, DWT algorithm embedded watermark, watermark and attack and performance testing procedures. Great value
Platform: |
Size: 1996800 |
Author: 杨柯 |
Hits:
Description: 数字水印技术是当前比较流行的防盗版技术,本程序包括水印的嵌入,一般攻击,水印提取,水印的检测-digital watermarking technology is currently more popular anti-piracy technology, the process includes the embedded watermark, the general attack Extraction watermark, watermark detection
Platform: |
Size: 563200 |
Author: 魏凯 |
Hits:
Description: 实现图像的对数极坐标变换,具有旋转不变性,可用于数字水印的抗几何攻击-achieving the right number of images Polar transform, with a rotating invariance, the digital watermark can be used against geometric attack
Platform: |
Size: 3072 |
Author: |
Hits:
Description: 全套的DCT域数字水印源代码(本人毕业设计成果)内容包括:水印嵌入,水印检测,攻击实验以测试鲁棒性,重要参数计算。希望对做数字水印的XDJM有所帮助。-complete DCT digital watermarking source code (I graduated design results) include : watermark embedding, Watermark detection, attack experiment to test the robustness, an important parameter calculation. Want to do digital watermarking Wilson help.
Platform: |
Size: 520192 |
Author: 魏凯 |
Hits:
Description: RS攻击M程序,用于检测图像是否经过LSB密写-RS attack M procedures for detecting whether the image after LSB steganalysis
Platform: |
Size: 1024 |
Author: jack |
Hits:
Description:
Platform: |
Size: 9216 |
Author: 石晶翔 |
Hits:
Description: 数字水印程序,包括多分辨嵌入水印、提取水印程序,盲水印嵌入、提取程序,以及滤波攻击和JPEG攻击程序,PSNR和相似度计算公式(MATLAB)-digital watermarking procedures, including multiresolution embedded watermark, watermark extraction procedure, blind watermark embedding and extraction procedures, Filtering and attack and attack JPEG procedures, PSNR and the similarity calculation formula (MATLAB)
Platform: |
Size: 3072 |
Author: 成兴 |
Hits:
Description: 在图像中加入水印,在提取水印时,需要知道原始的水印数据,并做了提取和攻击测试-Add watermark in image in the watermark extraction, the need to know the original watermark data and make the extraction and attack test
Platform: |
Size: 2048 |
Author: 王少飞 |
Hits:
Description: 提出了一种基于小波域的图像数字水印算法·该算法将相互正交的两种水印(鲁棒水印和参考
水印)同时添加到经过DWT后的载体图像小波系数中,然后用小波反变换得到添加了水印的图像·用提取出
的参考水印来估计图像所受到的攻击,由于提取出的鲁棒水印所受的攻击与参考水印受到的攻击一样,因此
可以估计出原始的鲁棒水印·通过对嵌入水印的图像进行加入噪声、滤波、压缩以及裁剪等大量图像处理等试
验,均能正确检测出水印,表明该算法具有很好的感知效果和鲁棒性
-A wavelet-based image digital watermarking algorithm that the algorithm will be mutually orthogonal two watermarks (watermark robust watermarking and reference) at the same time added to the carrier after image after DWT wavelet coefficients, and then using wavelet transform has been Add a watermark image to use to extract a reference to estimate the watermark image by the attacks, as a result of the robust watermark extracted suffered attacks and the reference watermark by the same attack, it can be estimated through the original Robust Watermarking of the embedded watermark image by adding noise, filtering, compression and cutting, such as a large number of image processing such as testing, can correctly detect the watermark, show that the algorithm has good performance and robustness of perception
Platform: |
Size: 190464 |
Author: 李倩 |
Hits:
Description: 这写程序是对加水印之后图像的攻击,包括加噪声,各种滤波,剪切,压缩攻击和旋转等。-This writing process is a plus watermark image after the attacks, including the increase in noise, various filtering, shear, compression and rotation attacks.
Platform: |
Size: 129024 |
Author: 晁文婷 |
Hits:
Description: 一套由matlab编程的基于小波的水印应用图片例子-A set of matlab programming applications based on wavelet image watermark example
Platform: |
Size: 10240 |
Author: chenxeifong |
Hits:
Description: 基于matlab做的数字水印,文件包括源代码及原图像和加入水印后的图像,经过测试,能有效抗攻击-Matlab-based digital watermarking so that the document includes the source code and the original image and adding a watermark image, tested and effective anti-attack
Platform: |
Size: 759808 |
Author: 张伟 |
Hits:
Description: 实现水印嵌入,提取水印和对图像进行jpeg攻击-The realization of watermark embedding, watermark extraction and image jpeg attack
Platform: |
Size: 1024 |
Author: jjj |
Hits:
Description: stirmark是一款数字水印攻击测试软件,很实用的软件!-checkmark is a digital watermarking attack testing software, very useful software!
Platform: |
Size: 6780928 |
Author: lee |
Hits:
Description: 效果非常好的数字水印的源代码,实现了基于小波变换的奇异值分解算法,选取载体图像的LH子带作为载体,并进行攻击测试算法性能-The effect of a very good source of digital watermarking, wavelet transform based on the realization of the singular value decomposition algorithm, select the carrier of the LH sub-band image as a carrier and test algorithm to attack
Platform: |
Size: 2048 |
Author: xiaobao89 |
Hits:
Description: 基于回声隐藏的信息隐藏算法,是一种音频信号的水印技术,包括隐藏信息的嵌入和提取,以及对于噪声,MP3压缩,滤波,重采样和延迟攻击的模拟。-Based on echo hiding information hiding algorithm, is an audio signal watermarking techniques, including embedding and extracting hidden information, as well as for noise, MP3 compression, filtering, resampling and delay attack simulation.
Platform: |
Size: 529408 |
Author: 张小小 |
Hits:
Description: 随机蓄意攻击对比 攻击效果对比的图形 最后还有半数致死量(random attack and on purpesrandom attack and on purpesrandom attack and on purpes)
Platform: |
Size: 8192 |
Author: 了不起的sb |
Hits:
Description: 本课题为基于MATLAB的小波变换dwt和离散余弦dct的多方法对比数字水印系统。带GUI交互界面。有一个主界面GUI,可以调用dwt方法的子界面和dct方法的子界面。流程包括,读取宿主图像和水印图像,嵌入,多种方法的攻击(剪切,加噪,旋转等),提取,最后利用psnr峰值信噪比进行评价不同攻击下,鲁棒性的好坏。(This topic is based on MATLAB wavelet transform DWT and discrete cosine DCT multi method comparison digital watermarking system. With GUI interface. There is a main interface GUI, which can call the sub interface of DWT method and DCT method. The process includes: reading host image and watermark image, embedding, attack of various methods (cutting, adding noise, rotation, etc.), extracting, and finally evaluating the robustness of different attacks by using PSNR peak signal-to-noise ratio.)
Platform: |
Size: 32044032 |
Author: www.wobishe.com |
Hits: