Description: StirMark可以从多方面测试水印算法的鲁棒性,用于测试的攻击手段包括线性滤波、非线性滤波、剪切/拼接攻击、同步性等。-StirMark from numerous tests robust watermark algorithm, used in testing the means of attack, including linear filter, non-linear filtering, shear/splicing attacks, such as synchronization. Platform: |
Size: 1007616 |
Author:杨琴 |
Hits:
Description: 信息隐藏检测与攻击技术研究!02年我的毕业设计,看看网上到处有人找,忍痛奉献。水印攻击代码,请勿用于非法用途!ABOUTUS(本软件可以检测一切基于空域隐藏的信息和一部分基于频域隐藏的信息,可以攻击目前绝大部分数字水印,特别独特的IBM攻击技术可以攻击目前所有的数字水印。)-information hiding and attack detection technology! 02, I graduated from the design, look at the Internet is full of people looking for and reluctantly dedication. Watermark attack code, do not for illegal purposes! ABOUTUS (The software can detect hidden airspace based on all the information and part is based on frequency domain hidden information, we can attack the majority of the current digital watermarking, unique special attack IBM technology can attack all current digital watermarking.) Platform: |
Size: 1735680 |
Author:杨智丹 |
Hits:
Description: 数字水印技术是当前比较流行的防盗版技术,本程序包括水印的嵌入,一般攻击,水印提取,水印的检测-digital watermarking technology is currently more popular anti-piracy technology, the process includes the embedded watermark, the general attack Extraction watermark, watermark detection Platform: |
Size: 563200 |
Author:魏凯 |
Hits:
Description: 这写程序是对加水印之后图像的攻击,包括加噪声,各种滤波,剪切,压缩攻击和旋转等。-This writing process is a plus watermark image after the attacks, including the increase in noise, various filtering, shear, compression and rotation attacks. Platform: |
Size: 129024 |
Author:晁文婷 |
Hits:
Description: 利用patchwork方法,嵌入0-1水印。可设置像素修改值、选择各种经典的攻击方式和控制攻击强弱。返回提取的水印信息和峰值信噪比。利用Matlab编写。-The use of patchwork approach, embedding the watermark 0-1. Modify pixel values can be set to choose a variety of classic attacks and control the strength of the attack. Back to extract the watermark information and peak signal to noise ratio. Prepared using Matlab. Platform: |
Size: 108544 |
Author:张湛 |
Hits:
Description: 利用STDM方法嵌入水印信息,可设置量化步长,选择各种经典的攻击方式,控制攻击强弱,返回误码率和峰值信噪比-Stdm method using embedded watermark information, to set the quantization step size, choose a variety of classic attacks, controlling the strength of the attack and returned to the bit error rate and peak signal to noise ratio Platform: |
Size: 56320 |
Author:张湛 |
Hits:
Description: 由高斯正态分布序列产生 ,经(7,4)汉明编码,得到水印信号。能抵抗压缩 滤波等攻击-Sequence generated by the Gaussian normal distribution, with (7,4) Hamming code, the watermark signal. Resistant to compression filtering attack Platform: |
Size: 9216 |
Author:zhangyiyi |
Hits:
Description: 基于离散余弦变换的水印代码,可嵌入水印信息,提取水印信息以及抗攻击测试-Discrete cosine transform-based watermark code, can be embedded watermark information, extracting the watermark information, as well as anti-attack test Platform: |
Size: 2048 |
Author:chenyangji |
Hits:
Description: 本文设计了一种简单的实用数字水印系统。详细论述了二值数字水印的嵌入与提取算法以及具体实现,并对其抗攻击能力作了一定程度的分析。最后利用MATLAB工具实现了一个简单的基于空域变换与BP神经网络的实用数字水印系统。-In this paper, design a simple and practical digital watermarking system. Discussed in detail binary digital watermark embedding and extraction algorithms as well as the concrete realization, and its anti-attack capability of the analysis to a certain extent. Finally the use of MATLAB tools for the realization of a simple space-based transform and BP neural networks of practical digital watermarking system. Platform: |
Size: 1164288 |
Author:亓先军 |
Hits:
Description: we embed watermarks in the original circles. In this way, the synchronization issue for watermark embedding and detecting can be best solved. Simulation results show that this method can resist variety of Geometry Attack, such as rotation, scaling, shearing and other common signal attacks. -we embed watermarks in the original circles. In this way, the synchronization issue for watermark embedding and detecting can be best solved. Simulation results show that this method can resist variety of Geometry Attack, such as rotation, scaling, shearing and other common signal attacks . Platform: |
Size: 1024 |
Author:xiaxianming |
Hits:
Description: 一套由matlab编程的基于小波的水印应用图片例子-A set of matlab programming applications based on wavelet image watermark example Platform: |
Size: 10240 |
Author:chenxeifong |
Hits:
Description: DCT域数字水印源代码.水印嵌入,水印检测,攻击实验以测试鲁棒性,重要参数计算。希望对做数字水印的XDJM有所帮助。--DCT-domain digital watermarking source code. Watermark embedding, watermark detection, attack experiment to test the robustness, an important parameter calculation. Want to do digital watermarking XDJM help.-- Platform: |
Size: 1024 |
Author:摩罗逊 |
Hits:
Description: 基于matlab做的数字水印,文件包括源代码及原图像和加入水印后的图像,经过测试,能有效抗攻击-Matlab-based digital watermarking so that the document includes the source code and the original image and adding a watermark image, tested and effective anti-attack Platform: |
Size: 759808 |
Author:张伟 |
Hits:
Description: 各种数字水印的嵌入和提取 检测和攻击 包括lsb 和dct等算法-A variety of digital watermark embedding and extraction, including detection and attack, such as algorithm lsb and dct Platform: |
Size: 87040 |
Author:林兴 |
Hits:
Description: 本算法结合小波变换和SVD奇异值变换,实现了水印的嵌入和提取,载体图像的鲁棒性和水印的不可见性,提取出的水印图像的和原水印图像基本一致,抗攻击性强。-The algorithm combines wavelet transform and SVD singular value transformation, achieved watermark embedding and extraction, vector image watermark robustness and invisibility, the extracted watermark image and the original watermark image are basically the same, anti-attack and strong. Platform: |
Size: 1024 |
Author:liuyuan |
Hits:
Description: Owing to the broad application value of audio
watermarking in remote transmission and mobile
extraction, it is very important to study watermarking
approaches against A/D and D/A conversion. Based
on wavelet decomposition and cepstrum technology,
an audio watermarking algorithm is proposed where
the low-frequency wavelet coefficients are chosen for
cepstrum transforming. Then, the obtained cepstrum
data shows stable for watermark hiding by the
methods of edging data cutting and statistical mean
modification. The synchronization is not required in
the algorithm. Experimental results show that the
proposed algorithm can resist on the attack of A/D
and D/A successfully with features of large capacity
and zero bit error. It will be helpful for the mobile
audio in secure broadcast and management in the Platform: |
Size: 346112 |
Author:vinay |
Hits:
Description: 本文提出一种在原始视频DCT(离散余弦变换)与SVD(奇异值分解)域自适应嵌入水印的算法。算法首先将视频流分割成一个个场景,场景中的视频图像被变换到DCT-SVD域中,水印量化嵌入在最大奇异上,实现了水印盲检测。同时实验证明该算法在满足透明性要求下也满足一定的鲁棒性要求,能够抵抗低通滤波、中值滤波、椒盐噪声、高斯噪声、H.264压缩攻击以及统计攻击和帧剪切等攻击。-This paper presents an original video in the DCT (Discrete Cosine Transform) and SVD (singular value decomposition) algorithm for adaptive watermark embedding. Firstly, a video stream is divided into scenes, scenes of the video image is converted to the DCT-SVD domain, the watermark embedded in the largest singular quantification, the realization of the watermark signal. Furthermore, the experiments show that the algorithm meet the transparency requirements are met under certain robustness requirements, can resist the low-pass filtering, median filtering, salt and pepper noise, Gaussian noise, H.264 compression attacks and attacks and frame shear statistics attack. Platform: |
Size: 63488 |
Author:久久 |
Hits: