CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - attack watermarking
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - attack watermarking - List
[
Special Effects
]
Invertibility-attack-against-watermarking-based-on
DL : 0
Invertibility attack against watermarking based on forged algorithm and a countermeasure,是讲数字水印攻击的资料
Update
: 2008-10-13
Size
: 258.39kb
Publisher
:
101
[
Graph program
]
Checkmark
DL : 0
一个数字水印评测软件,包含多种评测数字水印算法的指标和攻击方法。-a digital watermark Evaluation software includes a variety of digital watermarking algorithm for evaluation of indicators and ways to attack.
Update
: 2025-03-15
Size
: 3.5mb
Publisher
:
张华
[
Graph program
]
watermark综述+代码
DL : 0
数字水印算法实现(matlab程序包),包含有DCT水印嵌入算法,DWT水印嵌入算法,以及水印攻击和性能测试程序。参考价值极大-digital watermarking algorithm (Matlab package), including a watermark embedded DCT algorithm, DWT algorithm embedded watermark, watermark and attack and performance testing procedures. Great value
Update
: 2025-03-15
Size
: 1.9mb
Publisher
:
杨柯
[
GDI-Bitmap
]
yzd
DL : 0
信息隐藏检测与攻击技术研究!02年我的毕业设计,看看网上到处有人找,忍痛奉献。水印攻击代码,请勿用于非法用途!ABOUTUS(本软件可以检测一切基于空域隐藏的信息和一部分基于频域隐藏的信息,可以攻击目前绝大部分数字水印,特别独特的IBM攻击技术可以攻击目前所有的数字水印。)-information hiding and attack detection technology! 02, I graduated from the design, look at the Internet is full of people looking for and reluctantly dedication. Watermark attack code, do not for illegal purposes! ABOUTUS (The software can detect hidden airspace based on all the information and part is based on frequency domain hidden information, we can attack the majority of the current digital watermarking, unique special attack IBM technology can attack all current digital watermarking.)
Update
: 2025-03-15
Size
: 1.66mb
Publisher
:
杨智丹
[
Internet-Network
]
attackofwatermarking
DL : 0
通过程序介绍的一些算法,可以对信息隐藏技术实施攻击,特别是水印技术.-procedures introduced by the algorithm, the information can be hidden to attack technology, in particular watermarking technology.
Update
: 2025-03-15
Size
: 3kb
Publisher
:
侯开浩
[
matlab
]
watermark-MATLAB
DL : 0
数字水印技术是当前比较流行的防盗版技术,本程序包括水印的嵌入,一般攻击,水印提取,水印的检测-digital watermarking technology is currently more popular anti-piracy technology, the process includes the embedded watermark, the general attack Extraction watermark, watermark detection
Update
: 2025-03-15
Size
: 550kb
Publisher
:
魏凯
[
matlab
]
DCT_watermark
DL : 0
全套的DCT域数字水印源代码(本人毕业设计成果)内容包括:水印嵌入,水印检测,攻击实验以测试鲁棒性,重要参数计算。希望对做数字水印的XDJM有所帮助。-complete DCT digital watermarking source code (I graduated design results) include : watermark embedding, Watermark detection, attack experiment to test the robustness, an important parameter calculation. Want to do digital watermarking Wilson help.
Update
: 2025-03-15
Size
: 508kb
Publisher
:
魏凯
[
Special Effects
]
RSAttack
DL : 0
RS攻击M程序,用于检测图像是否经过LSB密写-RS attack M procedures for detecting whether the image after LSB steganalysis
Update
: 2025-03-15
Size
: 1kb
Publisher
:
jack
[
Graph program
]
174CA929
DL : 0
数字水印的攻击方法和对策浅析电子书胡启明(武汉理工大学信息工程学院)摘要:在保护数字图像、视频、音频等数字媒体的知识产权方面,数字水印技术是一种很有前景的方法。由于作为版权标记的数字水印正面临着越来越多的攻击,对数字水印的稳健性要求也越来越高。笔者对4类不同原理的数字水印攻击:简单水印攻击、同步水印攻击 削去水印攻击和IBM水印攻击进行了详细论述,并给出了相应的解决对策。-digital watermarking method of the attacks and countermeasures of e-books Huo (Wuhan Polytechnic University, the Information Engineering Institute) Abstract : the protection of digital images, video, audio and other digital media in regard to intellectual property rights, Digital watermarking technology is a promising approach. Due to copyright labeled as digital watermarking is facing a growing number of attacks, Digital watermarking to the stability requirements have become more sophisticated. The author of four different types of digital watermarking principle of attack : simple watermark attack Synchronous watermark attack defrocked watermark attacks and IBM watermark attacks discussed in detail. and the corresponding solutions.
Update
: 2025-03-15
Size
: 167kb
Publisher
:
ghostsx
[
Graph program
]
blindwatermark
DL : 0
数字水印程序,包括多分辨嵌入水印、提取水印程序,盲水印嵌入、提取程序,以及滤波攻击和JPEG攻击程序,PSNR和相似度计算公式(MATLAB)-digital watermarking procedures, including multiresolution embedded watermark, watermark extraction procedure, blind watermark embedding and extraction procedures, Filtering and attack and attack JPEG procedures, PSNR and the similarity calculation formula (MATLAB)
Update
: 2025-03-15
Size
: 3kb
Publisher
:
成兴
[
Documents
]
20070815
DL : 0
提出了一种基于小波域的图像数字水印算法·该算法将相互正交的两种水印(鲁棒水印和参考 水印)同时添加到经过DWT后的载体图像小波系数中,然后用小波反变换得到添加了水印的图像·用提取出 的参考水印来估计图像所受到的攻击,由于提取出的鲁棒水印所受的攻击与参考水印受到的攻击一样,因此 可以估计出原始的鲁棒水印·通过对嵌入水印的图像进行加入噪声、滤波、压缩以及裁剪等大量图像处理等试 验,均能正确检测出水印,表明该算法具有很好的感知效果和鲁棒性 -A wavelet-based image digital watermarking algorithm that the algorithm will be mutually orthogonal two watermarks (watermark robust watermarking and reference) at the same time added to the carrier after image after DWT wavelet coefficients, and then using wavelet transform has been Add a watermark image to use to extract a reference to estimate the watermark image by the attacks, as a result of the robust watermark extracted suffered attacks and the reference watermark by the same attack, it can be estimated through the original Robust Watermarking of the embedded watermark image by adding noise, filtering, compression and cutting, such as a large number of image processing such as testing, can correctly detect the watermark, show that the algorithm has good performance and robustness of perception
Update
: 2025-03-15
Size
: 186kb
Publisher
:
李倩
[
matlab
]
gaosixulie_watermark
DL : 0
由高斯正态分布序列产生 ,经(7,4)汉明编码,得到水印信号。能抵抗压缩 滤波等攻击-Sequence generated by the Gaussian normal distribution, with (7,4) Hamming code, the watermark signal. Resistant to compression filtering attack
Update
: 2025-03-15
Size
: 9kb
Publisher
:
zhangyiyi
[
Software Engineering
]
DCT-based_Image_Digital_Watermarking
DL : 0
基于DCT域的图像数字水印技术: 摘要:数字水印技术作为数字媒体版权保护的有效办法,近年来在国内外引起了人们极大的兴趣。作者采用了DCT离散余弦变换的算法,对图像这种多媒体数字作品进行了数字水印的嵌入和检测研究。并且使用了高效实用的编程工具MATLAB来介绍了一种DCT域的图像数字水印嵌入和提取的实例,并且在最后对嵌入水印的图像进行了攻击实验,验证了该算法的鲁棒性和不可见性。-Based on the DCT domain image watermarking techniques: Abstract: Digital watermarking of digital media technology as an effective means of copyright protection, in recent years both at home and abroad has aroused great interest. The author adopted the DCT discrete cosine transform algorithms, the image of this multi-media digital works for the digital watermark embedding and detection research. And the use of efficient MATLAB programming tools useful to introduce a DCT domain image watermarking embedding and extraction examples, and in the final of the embedded watermark image of the attack experiments verify the robustness of the algorithm and non- Visibility.
Update
: 2025-03-15
Size
: 521kb
Publisher
:
绯村剑心
[
Special Effects
]
work
DL : 0
一种基于DCT变换的数字水印算法的实现过程,水印为伪随机序列,包括嵌入和提取两个过程。其中textmark.m为攻击实验代码。-DCT-based Digital Watermarking Algorithm Transform realize the process, the watermark for the pseudo-random sequence, including both the process of embedding and extraction. Textmark.m experiment in which the attack code.
Update
: 2025-03-15
Size
: 2kb
Publisher
:
陈日进
[
Special Effects
]
048
DL : 0
本文设计了一种简单的实用数字水印系统。详细论述了二值数字水印的嵌入与提取算法以及具体实现,并对其抗攻击能力作了一定程度的分析。最后利用MATLAB工具实现了一个简单的基于空域变换与BP神经网络的实用数字水印系统。-In this paper, design a simple and practical digital watermarking system. Discussed in detail binary digital watermark embedding and extraction algorithms as well as the concrete realization, and its anti-attack capability of the analysis to a certain extent. Finally the use of MATLAB tools for the realization of a simple space-based transform and BP neural networks of practical digital watermarking system.
Update
: 2025-03-15
Size
: 1.11mb
Publisher
:
亓先军
[
Special Effects
]
Invertibility-attack-against-watermarking-based-on
DL : 0
Invertibility attack against watermarking based on forged algorithm and a countermeasure,是讲数字水印攻击的资料-Invertibility attack against watermarking based on forged algorithm and a countermeasure, it is speaking of information digital watermarking attacks
Update
: 2025-03-15
Size
: 258kb
Publisher
:
101
[
Wavelet
]
dft
DL : 0
基于dft的水印代码,水印注入、提取、防攻击测试-DFT-based watermarking code, watermark injection, extraction, anti-attack test
Update
: 2025-03-15
Size
: 348kb
Publisher
:
wjp
[
Graph program
]
dakedwt1
DL : 0
数字水印技术攻击试验,实现噪声、滤波、剪切、压缩、旋转攻击-Digital Watermarking attack test, realize noise, filtering, shear, compression, rotation attack
Update
: 2025-03-15
Size
: 3kb
Publisher
:
王江
[
Documents
]
OnDesignatedlyVerifiedNon-interactive)Watermarking
DL : 0
On Designatedly Veried (Non-interactive)Watermarking Schemes-Although many watermarking schemes consider the case of universal veri¯ ability, it is undesirable in some applications. Designated veri¯ cation is a possible solution for this problem. Watermarking scheme with (non-interactive) designated veri¯ cation through non-invertible schemes was proposed by Lee et al [11] in 2003, to resolve multiple wa- termarking problem. Yoo et al [14] proposed a very similar watermarking scheme. In this paper, we propose a cryptanalytic attack on both of these schemes that allows a dishonest watermarker to send illegal watermarked images and to convince the designated veri¯ er or customer that received watermarked images are valid.We modify the above schemes to overcome the attack. Further, we also propose a new robust watermarking scheme with (non-interactive) designated veri¯ cation through non-invertible wa- termarks. Interestingly, our scheme can be extended for joint copyright protection (security of ownership rights fo
Update
: 2025-03-15
Size
: 142kb
Publisher
:
xiaowang
[
Other
]
LSB
DL : 0
本算法是用matalab编写的,主要阐述了抗攻击性的水印算法-Resistance to attack watermarking algorithm is proposed
Update
: 2025-03-15
Size
: 1kb
Publisher
:
张敏
«
1
2
3
4
5
6
7
8
9
10
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.