Welcome![Sign In][Sign Up]
Location:
Search - Contourlet image watermarking

Search list

[Special EffectsRSAttack

Description: RS攻击M程序,用于检测图像是否经过LSB密写-RS attack M procedures for detecting whether the image after LSB steganalysis
Platform: | Size: 1024 | Author: jack | Hits:

[File Formatimageenhancementusingcontourlettransform

Description:
Platform: | Size: 493568 | Author: | Hits:

[JSP/JavaSA_TSP

Description: matlabf非常好基于Contourlet变换的水印算法.与小波变换不同的是Contourlet变换采用类似于线段(contoursegment的基得到一种多分辨、局部化、方向性的图像表示。水印信号通过基于内容的乘性方案加载到Contourlet 变换系数-matlabf very good Contourlet Transform-based watermarking algorithm. and wavelet transform is different Contourlet transform similar segment (contoursegment the base to be a multiresolution, local and express direction of the image. watermark signal by the adoption of content-based programs loaded into Contourlet transform coefficients
Platform: | Size: 477184 | Author: ddsdsds | Hits:

[OtherSHUZIPIPEI

Description: 提出了基于Contourlet变换的数字图像水印算法。与小波变换不同的是,Contourlet变换采用类似于线段 (contour segment)的基得到一种多分辨、局部化、方向性的图像表示。水印信号通过基于内容的乘性方案加载 到 Contourlet 变换系数。在采用零均值广义高斯分布拟合 Contourlet 变换系数的基础上,提出采用极大似然估计 实现水印的盲检测。依据 Neyman-Pearson 准则,在给定虚警率的情况下对判决准则进行了优化。实验结果表明 在保证水印隐蔽性的前提下,水印对常见的信号处理手段以及几何变换具有很好的稳健性-Contourlet transform is proposed based on digital image watermarking algorithm. The difference is that with the wavelet transform, Contourlet transformation similar to that of line (contour segment) of the base by a multi-resolution, localization, directional image representation. Watermark-based content of the program is loaded into Contourlet by transform coefficients. The introduction of zero-mean generalized Gaussian distribution fitting Contourlet transform coefficient based on maximum likelihood estimation proposed by the blind watermark detection. Based on Neyman-Pearson criterion, the false alarm rate in a given case to the sentencing guidelines were optimized. The results show that the watermark hidden in the guarantee under the premise of the watermark signal processing means of the common geometric transformations and is robust
Platform: | Size: 134144 | Author: betty | Hits:

[CA authwatermarking

Description: CT based encryption 1. Open contourlet 5 and run aaa.m for image decomposition and for denoising 2. Open tsss and A_hidetext.m and set break point at line 109 and run 3. After selecting image ind text press F5 4. Now run H_finalextraction.m to get extracted text.-CT based encryption 1. Open contourlet 5 and run aaa.m for image decomposition and for denoising 2. Open tsss and A_hidetext.m and set break point at line 109 and run 3. After selecting image ind text press F5 4. Now run H_finalextraction.m to get extracted text.
Platform: | Size: 727040 | Author: seshu babu v | Hits:

[Special EffectsMedical-Information

Description: 这是国外最新的医学图像的数字水印,contourlet变换,不错的学校资料,本人在学习中-This is the latest foreign medical image digital watermarking, contourlet transform, a good school information I learn ...
Platform: | Size: 601088 | Author: linzi | Hits:

[WaveletDownloads

Description: 关于半脆弱水印的几篇文章,其中包括小波变换的应用以及contourlet变换的应用等,涉及领域为半脆弱数字图像水印已经篡改检测。-Semi-fragile watermarking of several articles, including the application of wavelet transform and Contourlet transform application areas for semi-fragile digital image watermarking has tamper detection.
Platform: | Size: 8113152 | Author: fdvc | Hits:

CodeBus www.codebus.net