Welcome![Sign In][Sign Up]
Location:
Search - attacks in watermarking

Search list

[Graph program174CA929

Description: 数字水印的攻击方法和对策浅析电子书胡启明(武汉理工大学信息工程学院)摘要:在保护数字图像、视频、音频等数字媒体的知识产权方面,数字水印技术是一种很有前景的方法。由于作为版权标记的数字水印正面临着越来越多的攻击,对数字水印的稳健性要求也越来越高。笔者对4类不同原理的数字水印攻击:简单水印攻击、同步水印攻击 削去水印攻击和IBM水印攻击进行了详细论述,并给出了相应的解决对策。-digital watermarking method of the attacks and countermeasures of e-books Huo (Wuhan Polytechnic University, the Information Engineering Institute) Abstract : the protection of digital images, video, audio and other digital media in regard to intellectual property rights, Digital watermarking technology is a promising approach. Due to copyright labeled as digital watermarking is facing a growing number of attacks, Digital watermarking to the stability requirements have become more sophisticated. The author of four different types of digital watermarking principle of attack : simple watermark attack Synchronous watermark attack defrocked watermark attacks and IBM watermark attacks discussed in detail. and the corresponding solutions.
Platform: | Size: 171299 | Author: ghostsx | Hits:

[BooksFlexible Image Watermarking Scheme in JPEG2000 Com

Description: JPEG2000压缩域的灵活图像水印* 程峰 张鸿宾1) 刘波 (北京工业大学计算机学院,北京,100022)-JPEG2000 flexible image watermarking* Cheng Feng Zhang Hongbin 1) Liu Bo (Beijing Industrial University Computer Institute, Beijing, 100022)
Platform: | Size: 282624 | Author: 景仁 | Hits:

[matlabmatlab-break

Description: 这是关于数字水印的攻击例程!经过调试,可以放心使用!-This is on digital watermarking attacks routines! After debugging, can be assured use!
Platform: | Size: 3072 | Author: 水印 | Hits:

[Graph program174CA929

Description: 数字水印的攻击方法和对策浅析电子书胡启明(武汉理工大学信息工程学院)摘要:在保护数字图像、视频、音频等数字媒体的知识产权方面,数字水印技术是一种很有前景的方法。由于作为版权标记的数字水印正面临着越来越多的攻击,对数字水印的稳健性要求也越来越高。笔者对4类不同原理的数字水印攻击:简单水印攻击、同步水印攻击 削去水印攻击和IBM水印攻击进行了详细论述,并给出了相应的解决对策。-digital watermarking method of the attacks and countermeasures of e-books Huo (Wuhan Polytechnic University, the Information Engineering Institute) Abstract : the protection of digital images, video, audio and other digital media in regard to intellectual property rights, Digital watermarking technology is a promising approach. Due to copyright labeled as digital watermarking is facing a growing number of attacks, Digital watermarking to the stability requirements have become more sophisticated. The author of four different types of digital watermarking principle of attack : simple watermark attack Synchronous watermark attack defrocked watermark attacks and IBM watermark attacks discussed in detail. and the corresponding solutions.
Platform: | Size: 171008 | Author: ghostsx | Hits:

[Special Effectsxxx1111

Description: 利用matlab实现数字水印源码。提供了各种攻击的实现。-using Matlab digital watermarking source. Provide a variety of attacks realized.
Platform: | Size: 2048 | Author: lum | Hits:

[Software Engineeringwatermark_2

Description: 提出了一种离散小波变换域实现图像水印的方法。这种算法充分利用小波变换的特点,把原始图像及水印图像塔式分解,在多分辨率分解后的相同的频段来嵌入水印信息。该方法也利用了人眼视觉特性,算法简单而有效。实验证明,该算法较好地解决了水印不可见性与鲁棒性之间的矛盾,对常见的水印攻击都有较强的鲁棒性。-presents a discrete wavelet transform domain image watermarking method. This algorithm using wavelet transform characteristics, the original image and the watermark image tower decomposition, Multiresolution decomposition in the same frequency band to the embedded watermark. The method has also been used HVS, the algorithm is simple and effective. Experiments show that the algorithm can solve the watermark is visible with the robust nature of, common to have more attacks watermark robustness.
Platform: | Size: 151552 | Author: yy | Hits:

[matlabMATLAB_Watermarking

Description: 探讨MATLAB在 数字水印中的应用,利用MATLAB语言编程实现了一类数字水印算法的嵌入、攻击及提取过程,并给出了程序运行 的结果。 -MATLAB to explore in the digital watermarking application, the use of MATLAB programming language to achieve a class of digital watermarking algorithm for embedding, attacks and extraction process, and gives the results of the program is running.
Platform: | Size: 204800 | Author: zhaolei | Hits:

[Graph Recognizedct1_embed

Description: research on against geometry attacks watermarking technology. A digital Watermarking scheme, which is based on combination of simple and reliable harries detector and image normalization, is proposed. The feather points remain holding after geometry attack. Applying image normalization to these non-overlapped circles which centered at the feature points, after that, we can determine area for watermark embedding. -research on against geometry attacks watermarking technology. A digital Watermarking scheme, which is based on combination of simple and reliable harries detector and image normalization, is proposed. The feather points remain holding after geometry attack. Applying image normalization to these non-overlapped circles which centered at the feature points, after that, we can determine area for watermark embedding.
Platform: | Size: 1024 | Author: xiaxianming | Hits:

[Special Effectsdsafdsa

Description: 出了一种基于近邻插值取样法的自适应奇检测彩色图像水印算法.该算法利用近邻插值取样法,根据载体图像的 大小,自适应调节二值水印图像的尺寸,经ArnoM置乱预处理后,嵌入到彩色载体图像蓝色分量的Dcr高频系数中,检测时不需要 原载体图像.实验表明,该算法具有较强的鲁棒性和良好的不可感知性,可有效低抗剪切、加噪、锐化等常见的图像攻击.-Out of a neighbor-based interpolation of the adaptive sampling method detection singular color image watermarking algorithm. Neighbor interpolation algorithm uses the sampling method, in accordance with the size of vector images, adaptive binary watermark image of size, by scrambling ArnoM after pretreatment embedded into the color vector image of blue high-frequency component coefficient Dcr detected when do not need the original vector image. The experiments show that the algorithm has strong robustness and good can not be perceived, effectively low-shear, noise, sharpening and other common image attacks.
Platform: | Size: 265216 | Author: manyhappy | Hits:

[Waveletxiaobobian

Description: 本代码是一些关于水印处理的一些算法用小波变换来实现,在嵌入水印之后用各种攻击检验算法的鲁棒性-The code is some deal about a number of watermarking algorithm using wavelet transform to achieve, in the embedded watermark after the attacks with a variety of test algorithm robustness
Platform: | Size: 14336 | Author: 刘林冲 | Hits:

[JSP/Javajava

Description: 基于java的图像数字水印,自己感觉得不错的哦。-Java-based digital watermarking of images, their own feeling of oh well.
Platform: | Size: 1024 | Author: 风影 | Hits:

[Special Effectsmiyao

Description: 本文提出了基于二维混沌映射的数字图像水印算法,混沌具有随机性、似噪声及对初始条件的极端敏感性等特点。将经过二维混沌映射置乱后的数字水印信号嵌入图像小波域的低频系数,实现了数字水印的隐蔽性、保密性和稳固性;利用二维混沌映射Arnold变换对水印信号进行置乱,不仅增强了水印信号保密性,同时有效提高了视觉上抵抗图像剪切攻击的能力。-In this paper, two-dimensional chaotic map based on digital image watermarking algorithm, Chaos with random noise and the likelihood of extreme sensitivity to initial conditions and so on. Two-dimensional chaotic map will be scrambling after the digital watermark embedded image signal of the low-frequency coefficients in wavelet domain, the realization of a digital watermark hidden, security and stability the use of two-dimensional chaotic map on Arnold transform scrambling watermark signal, not only enhances the confidentiality of the watermark signal at the same time improve the visual image shear resistance attacks.
Platform: | Size: 668672 | Author: lafeng | Hits:

[Internet-NetworkCVE_intrusion

Description: 本文首先系统分析了 snort 规则的组成,详细的介绍了各个部分的含义,这对于开发出新的入侵检测系统,建立自己的攻击规则库有很大的帮助。针对系统所需的适应性和自治性,在详细剖析 snort 规则同时,着重研究基于 CVE 入侵检测系统的规则库的实现,底层嗅探器的实现和嗅探过程等问题。在规则特征选项的模式匹配问题上进行重点说明,给出了一种改进的检测方法,即结合使用协议分析进行模式匹配,从试验数据上大大提高了效率,减少了误报率。同时,本系统所基于的 CVE 知识库,跟踪国际上 CVE 的最新发展动态,制订了国内统一的 CVE 标准,具有极大丰富的知识库,有效的解决了国内漏洞库不统一的问题.-The author also describes the architecture and functions and the design and the implement of the software. Intrusion detection system (IDS) is very important for network security. At present, the author systematically analyzes the composition and semantics of Snort rules, which may be of great help for creating signature database, then the paper studies the flexibility and self-controllability in the CVE-based Intrusion Detection System, emphasizes not only on analysis of the snort rules, but on the realization of intrusion detecting based on CVE rules and the implement of the sniffer. Especially, this paper covers the intrusion signature matching methods, and analyzes the weakness when only uses pattern matching in intrusion analysis and presents an improved approach that combines protocol analysis and pattern matching, to dectect attacks. At the same time it gives an example to show how to use this approach. The experimental results show that the rules surely reduce the rate of misd
Platform: | Size: 478208 | Author: 陈中 | Hits:

[Othera

Description: 这个水印一般般利用DWT变换和DCT变换嵌入水印,加上了Arnold变换使图片水印的抗MP3压缩攻击有所提高。-The watermark in general as the use of DWT transform and DCT transform embedded watermark, coupled with the Arnold transform to image watermarking against MP3 compression attacks increased.
Platform: | Size: 1024 | Author: 小王 | Hits:

[Otheraudiowatermark

Description: 音频水印算法实现,其中包括水印的嵌入,音频水印常用攻击,以及检测算法的实现。-Audio watermarking algorithms, including the watermark embedding, audio watermarking common attacks, and the detection algorithm.
Platform: | Size: 2048 | Author: 王景 | Hits:

[Special EffectsA.Blind.MPEG-2.Video.Watermarking.Robust.to.Regula

Description: Abstract—Based on the observation that low-frequency DCT coefficients of an image are less affected by geometric processing, we propose a new blind MPEG-2 video watermarking algorithm robust to camcorder recording. Both the embedding and extraction of the watermarks are done in the compressed domain. The mean of the low-frequency DCT coefficients of the video is temporally modulated according to the information bits. To reduce complexity, we embed watermark in the prediction error signals of the B-frames. Experimental results show that the proposed scheme achieves high video quality and robustness to camcorder recording, trans-coding, frame-rate conversion, and geometric attacks on common test videos.
Platform: | Size: 136192 | Author: lie | Hits:

[Special Effectsrobustness

Description: this document shows results of robustness of puncturedconvolutive encoder to stirmark attacks in watermarking
Platform: | Size: 7168 | Author: fat | Hits:

[Industry researchwatermarking-pdf

Description: Abstract—A novel image watermarking algorithm against geometric attacks is proposed to solve watermarking synchronization problems. In watermark embedding, firstly, watermark is embedded into host image by a Single Value Decomposition (SVD) method then, feature-points of watermarked image are extracted using Scale Invariant Feature Transform (SIFT) algorithm.-Abstract—A novel image watermarking algorithm against geometric attacks is proposed to solve watermarking synchronization problems. In watermark embedding, firstly, watermark is embedded into host image by a Single Value Decomposition (SVD) method then, feature-points of watermarked image are extracted using Scale Invariant Feature Transform (SIFT) algorithm.
Platform: | Size: 13861888 | Author: tarun rathi | Hits:

[Special EffectsA-Watermarking-Algorithm(MATLAB)--

Description: 盲水印提取时不需要参考原始载体图像,在信息隐藏、版权保护等方面具有更广泛的应用前景。提出的盲水印算法在分块离散余弦变换(DCT)和离散小波变换(DWT)的基础上,利用关系双方DCT系数和DWT系数在受到攻击时具有相同变化趋势的特点,采用关系嵌入和量化嵌入的自适应选择嵌入策略,较大幅度地提高了盲水印提取的鲁棒性。同时在量化嵌入中采用抖动调制,实现了水印透明性和鲁棒性调节的便捷性。大量仿真实验结果表明该算法对噪声干扰、低通滤波、JPEG压缩、对比度增强等攻击有很好的鲁棒性和透明性。关键词 数字水印盲水印关系嵌入量化嵌入离散余弦变换离散小波变换 按这篇文章的算法,自己编的matlab,没有攻击时水印提取率为1,加水印后图像PSNR有45+,。有攻击后提取率也有0.9+。-Blind watermark extraction can be fulfilled without referring to the original host image. Therefore it hasmuch prospective applications in the fields of information hiding and copyright protection. Based on blocking Discrete Cosine Transform (DCT) and blocking DiscreteWaveletTransform (DWT), the proposed blind watermarking algorithm uses an embedding strategy of adaptively selecting either relationship embedding or quantization embedding. The relationship em- bedding comes from the observation thatboth themagnitudes of coefficients concerned in the relationship usually have thesame change trend when the image is attacked. This strategy remarkably improves the robustness ofwatermark extraction.In addition, dithermodulation is used in quantization embedding, bywhich the tradeoff between transparency and robus-tness ofwatermarking can be easily adjusted. Simulation results show that the algorithm is fairly robust against the attacks such as noise, filtering, compression, and contrast
Platform: | Size: 758784 | Author: CXF | Hits:

[Industry researchHandling-Various-Attacks---Article-(1)

Description: Handling various attacks in watermarking-Handling various attacks in watermarking...
Platform: | Size: 138240 | Author: sonam | Hits:
« 12 3 »

CodeBus www.codebus.net