Description: LSB算法生成数字水印的例子,具有可执行文件,并且提供程序,同时有水印提取的算法源码,对学习数字水印的朋友比较实用-LSB digital watermarking algorithm example, with an executable file, and to provide procedures, at the same time have the watermark extraction algorithm source, on learning of digital watermarking Friend more practical Platform: |
Size: 135168 |
Author:yang |
Hits:
Description: 基于空域的脆弱水印,可以有效检测出图像发生篡改的区域-Airspace based on fragile watermarking can effectively detect the occurrence of tampering with the image of the region Platform: |
Size: 22528 |
Author:Robin |
Hits:
Description: Briefly with the following code I will try to embed the MSB of the baboon image into the picture of Lena by exploiting the LSB embedding technique. We will try also to add an WGN (white gaussian noise) to the image then after these operations we will write to file the results. The code is heavily commented, so I think that further explanations are not ne-Briefly with the following code I will try to embed the MSB of the baboon image into the picture of Lena by exploiting the LSB embedding technique. We will try also to add an WGN (white gaussian noise) to the image then after these operations we will write to file the results. The code is heavily commented, so I think that further explanations are not needed Platform: |
Size: 1024 |
Author:gege |
Hits:
Description: Briefly with the following code I will try to embed the MSB of the baboon image into the picture of Lena by exploiting the LSB embedding technique. We will try also to add an WGN (white gaussian noise) to the image then after these operations we will write to file the results. The code is heavily commented, so I think that further explanations are not needed.Recover Platform: |
Size: 1024 |
Author:gege |
Hits:
Description: If you re wondering about the number 7 on the equation, the watermark is inserted every 7 pixels. Why not in every pixel? You could, but this way, you can add a second watermark (and a 3rd, and a 4th, etc.) at the same time using the pixels in between (not scripted here yet). And the insertion process is complete. The new image is saved as a bitmap format (.bmp) which saves the data as it is, without any compression whatsoever. Platform: |
Size: 1024 |
Author:gege |
Hits:
Description: 经典LSB算法,对于研究水印算法人们很有启发,希望一同进步,谢谢。-Classic LSB algorithm, it is useful for studying the watermarking algorithm inspired by the hope that with progress, thank you. Platform: |
Size: 195584 |
Author:李晴 |
Hits:
Description: this progam is about lsb programming that you can watermarking your picture with out any effect Platform: |
Size: 644096 |
Author:alireza |
Hits:
Description: GUI for digital watermarking with four methods: LSb, LSB by concatenation, DCT , DWT in matlab Platform: |
Size: 2581504 |
Author:Youssra |
Hits:
Description: a self- embedding block wise fragile watermarking scheme with tamper detection and content recovery capability. The proposed scheme embeds the shuffled extensive ten bit Recovery
data and two bit Authentication data of the image block into the least
significant bits (LSB) of its corresponding mapping block.The integrity
of a test block is decided by comparing 2×2 non overlapping block
of the test block with its corresponding mapping block. Experimental
results show that the suggested scheme outperforms conventional self recovery fragile watermarking algorithms in alteration detection as well
as in tamper recovery of the image. Platform: |
Size: 273408 |
Author:durgesh singh |
Hits:
Description: Nowadays, with the rapid growth in formation technology more and more images and data are available on the internet. So there is a need to provide some kind of authentication to such important data. When the sender transmits the image to the receiver, there may be intruders present in between who may capture the image. After capturing the image the mage the intruder may view the meaningful content in the image. This may not be the problem in some cases. But if we consider security applications like medical and military images then such distortion is unacceptable. To avoid misuse or loss of information several reversible data hiding techniques (RDH) are implemented. This paper gives details on watermarking, LSB, Histogram and RDH using optimum Thresholding with related results.-Nowadays, with the rapid growth in information technology more and more images and data are available on the internet. So there is a need to provide some kind of authentication to such important data. When the sender transmits the image to the receiver, there may be intruders present in between who may capture the image. After capturing the image the mage the intruder may view the meaningful content in the image. This may not be the problem in some cases. But if we consider security applications like medical and military images then such distortion is unacceptable. To avoid misuse or loss of information several reversible data hiding techniques (RDH) are implemented. This paper gives details on watermarking, LSB, Histogram and RDH using optimum Thresholding with related results. Platform: |
Size: 313344 |
Author:Devarapu ChakraRao |
Hits:
Description: this a file about audio watermarking with least significant bits. this program about extraction that watermark. -this is a file about audio watermarking with least significant bits. this program about extraction that watermark. Platform: |
Size: 1024 |
Author:richan |
Hits:
Description: 本课题为基于MATLAB的小波变换dwt和离散余弦dct的多方法对比数字水印系统。带GUI交互界面。有一个主界面GUI,可以调用dwt方法的子界面和dct方法的子界面。流程包括,读取宿主图像和水印图像,嵌入,多种方法的攻击(剪切,加噪,旋转等),提取,最后利用psnr峰值信噪比进行评价不同攻击下,鲁棒性的好坏。(This project is based on MATLAB wavelet transform DWT and discrete cosine DCT multi method contrast digital watermarking system. With GUI interactive interface. There is a main interface GUI, which can call the sub interfaces of DWT method and DCT method. The process includes: reading host image and watermark image, embedding, attacks of various methods (cutting, adding noise, rotation, etc.), extracting. Finally, PSNR peak signal-to-noise ratio is used to evaluate the robustness of different attacks.) Platform: |
Size: 10000384 |
Author:MATLAB道长 |
Hits: