Description: 利用DCT域进行扩频水印的嵌入,含实验图像,和各种经典的攻击方式。可选择嵌入强度和攻击强度。利用Matlab编写-DCT domain using spread-spectrum watermark embedding, with the experimental images, and various classical attacks. The option embedded in the strength and intensity of attacks. Prepared using Matlab Platform: |
Size: 115712 |
Author:张湛 |
Hits:
Description: 利用patchwork方法,嵌入0-1水印。可设置像素修改值、选择各种经典的攻击方式和控制攻击强弱。返回提取的水印信息和峰值信噪比。利用Matlab编写。-The use of patchwork approach, embedding the watermark 0-1. Modify pixel values can be set to choose a variety of classic attacks and control the strength of the attack. Back to extract the watermark information and peak signal to noise ratio. Prepared using Matlab. Platform: |
Size: 108544 |
Author:张湛 |
Hits:
Description: 给视频中的每一帧都嵌入水印,实现视频水印的嵌入。根据视频的不同,需要自己调节嵌入强度。-To the video in each frame are embedded watermark, the watermark embedded video. According to the different video, the need for self-embedding strength. Platform: |
Size: 18432 |
Author:hemeijuan |
Hits:
Description: 一种水印嵌入强度的方法,可根据图像特点自适应的选择水印嵌入强度-A watermark embedding strength of the method, in accordance with the choice of image features of adaptive watermark embedding strength Platform: |
Size: 162816 |
Author:韩宁 |
Hits:
Description: 该水印算法具有以下特点:1)结合音频自身的特性,不仅能够自适应划分音频数据段,而且能够智能调节水印嵌入强度,增强了数字音频水印的鲁棒性;2)能够同时进行数字音频的版权保护与内容认证,并可大致确定篡改发生区域,仿真实验表明,文中算法不仅具有较好的不可感知性,而且对常规处理具有较好的鲁棒性,同时能够对替换等而已篡改做出报警并确定被篡改位置。-The watermarking algorithm has the following characteristics: 1) combined with the audio of its own characteristics, not only adaptive division of the audio data segment, but also can adjust watermark embedding intelligent strength, enhanced digital audio watermark robustness 2) can at the same time digital audio copyright protection and content authentication, and can generally determine the tampering occurred in the region, simulation experiments show that the algorithm not only has better not be perceived, but also on conventional treatment has good robustness, at the same time be able to tamper with it to make replacement alarm and to determine the location has been tampered with. Platform: |
Size: 2048 |
Author:byleimin |
Hits:
Description: 提出一种基于支持向量机( SVM)和遗传算法(GA)的离散余弦变换(DCT)域盲数字图像水印方法. 该方法能自适应于图像的局部特征. 依据图像块的局部特性,利用SVM对图像块分类,自适应地确定水印嵌入强度, GA用来优化水印嵌入位置. 实验结果表明该方法有较好的不可见性和较强对抗攻击的鲁棒性.-Based on support vector machine (SVM) and genetic algorithm (GA), discrete cosine transform (DCT) domain blind digital image watermarking method. The method adaptive to local image features. Based on the local characteristics of image block using the SVM the image block classification, adaptive to determine the embedding strength, GA to optimize the watermark embedding location. The experimental results show that the method has good invisibility and robustness of the strong against the attacks. Platform: |
Size: 449536 |
Author:郭事业 |
Hits:
Description: 针对打印扫描对图像影响的特点, 选取在图像的DCT 域上嵌入水印信息。对DCT 变换后的系数按
照他们的位置进行了特殊的分类, 通过分类后每一类中正负号的数量来表达水印信息, 增强了算法的鲁棒性。
然后对水印的嵌入位置、鲁棒性和嵌入强度进行了研究-Impact on the image for print scanning feature, select the image on a DCT domain watermark embedding. The DCT transform coefficients according to their location for a special classification, through classification in each category after the number sign to express the watermark information, to enhance the robustness of the algorithm. Then the location of the watermark embedding, robustness and embedding strength studied Platform: |
Size: 52224 |
Author:韩天明 |
Hits:
Description: 在图像的DCT系数上嵌入信息,图像为常见的512*512大小的灰度图(实验所用图像为LENA.BMP)。嵌入的信息为一二进制Logo图(实验所用logo图为tj-logo.bmp),该图大小为32*32,共1024个Bit。
1. 在LENA图中嵌入水印,输出嵌入后的水印图像。
2. 对水印图像解码,输出解码后得到的logo图,并统计错误率。
3. 使用不同的嵌入强度进行嵌入,观察其对作品直觉效果和解码效果的影响,绘制相应的曲线。
4. 使用加入噪声、改变对比度、JPEG压缩等攻击方法对水印作品进行攻击,查看解码的效果。
-Information embedded in the DCT coefficients of the image, the image of the common 512* 512 size gray-scale (experimental image LENA.BMP). Information embedded in a binary Logo Figure (used in the experiment logo picture shows the tj-logo.bmp), the plot size 32* 32, 1024 Bit.
LENA Figure embedded watermark, the watermark image output embedded.
(2) logo watermark image decoding, the output decoded Figure statistical error rate.
(3) using a different embedding strength for embedding, observe the works intuitive effects and decoding results, and draw the corresponding curve.
(4) by adding the noise, change the contrast, JPEG compression attack methods to attack, to see the effect of decoding the watermark works. Platform: |
Size: 986112 |
Author:lsc |
Hits:
Description: 利用DCT方法,嵌入水印。可设置像素修改值、选择各种经典的攻击方式和控制攻击强弱。返回提取的水印信息和峰值信噪比。利用Matlab编写。-The use of DCT approach, embedding the watermark. Modify pixel values can be set to choose a variety of classic attacks and control the strength of the attack. Back to extract the watermark information and peak signal to noise ratio. Prepared using Matlab. Platform: |
Size: 11264 |
Author:杨竹 |
Hits:
Description: In this paper, a new scaling-based image-adaptive
watermarking system has been presented, which exploits human
visual model for adapting the watermark data to local properties
of the host image. Its improved robustness is due to embedding
in the low-frequency wavelet coefficients and optimal control of
its strength factor HVS point of view. Maximum-likelihood
(ML) decoder is used aided by the channel side information. The
performance of the proposed scheme is analytically calculated
and verified by simulation. Experimental results confirm the
imperceptibility of the proposed method and its higher robustness
against attacks compared to alternative watermarking methods in
the literature-In this paper, a new scaling-based image-adaptive
watermarking system has been presented, which exploits human
visual model for adapting the watermark data to local properties
of the host image. Its improved robustness is due to embedding
in the low-frequency wavelet coefficients and optimal control of
its strength factor HVS point of view. Maximum-likelihood
(ML) decoder is used aided by the channel side information. The
performance of the proposed scheme is analytically calculated
and verified by simulation. Experimental results confirm the
imperceptibility of the proposed method and its higher robustness
against attacks compared to alternative watermarking methods in
the literature Platform: |
Size: 3074048 |
Author:atefe |
Hits: