Welcome![Sign In][Sign Up]
Location:
Search - WATERMARKING using DISCRETE WAVELET TRANSFORM

Search list

[Software Engineeringwatermark_2

Description: 提出了一种离散小波变换域实现图像水印的方法。这种算法充分利用小波变换的特点,把原始图像及水印图像塔式分解,在多分辨率分解后的相同的频段来嵌入水印信息。该方法也利用了人眼视觉特性,算法简单而有效。实验证明,该算法较好地解决了水印不可见性与鲁棒性之间的矛盾,对常见的水印攻击都有较强的鲁棒性。-presents a discrete wavelet transform domain image watermarking method. This algorithm using wavelet transform characteristics, the original image and the watermark image tower decomposition, Multiresolution decomposition in the same frequency band to the embedded watermark. The method has also been used HVS, the algorithm is simple and effective. Experiments show that the algorithm can solve the watermark is visible with the robust nature of, common to have more attacks watermark robustness.
Platform: | Size: 151372 | Author: yy | Hits:

[Software Engineeringwatermark_2

Description: 提出了一种离散小波变换域实现图像水印的方法。这种算法充分利用小波变换的特点,把原始图像及水印图像塔式分解,在多分辨率分解后的相同的频段来嵌入水印信息。该方法也利用了人眼视觉特性,算法简单而有效。实验证明,该算法较好地解决了水印不可见性与鲁棒性之间的矛盾,对常见的水印攻击都有较强的鲁棒性。-presents a discrete wavelet transform domain image watermarking method. This algorithm using wavelet transform characteristics, the original image and the watermark image tower decomposition, Multiresolution decomposition in the same frequency band to the embedded watermark. The method has also been used HVS, the algorithm is simple and effective. Experiments show that the algorithm can solve the watermark is visible with the robust nature of, common to have more attacks watermark robustness.
Platform: | Size: 151552 | Author: yy | Hits:

[Crack Hackan_intellegent_audio_water_marking_based_on_dwt-s

Description: All three, Discrete Wavelet Transform (DWT) - Singular Value Decomposition (SVD) and Adaptive Tabu Search (ATS) have been used as mathematical tools for embedding data into an audio signal. In this paper, we present a new robust audio watermarking scheme based on DWT-SVD and ATS. After applying the DWT to the cover audio signal, we map the DWT coefficients, and apply the SVD, we search for the optimal intensity of audio watermarking by using the ATS. Experimental results show that the watermarking method performs well in both security and robustness to many digital signals processing, such as filtering, cropping, mp3 and random noise.
Platform: | Size: 267264 | Author: Rishi | Hits:

[Special EffectsSVM_GA

Description: 提出一种基于支持向量机( SVM)和遗传算法(GA)的离散余弦变换(DCT)域盲数字图像水印方法. 该方法能自适应于图像的局部特征. 依据图像块的局部特性,利用SVM对图像块分类,自适应地确定水印嵌入强度, GA用来优化水印嵌入位置. 实验结果表明该方法有较好的不可见性和较强对抗攻击的鲁棒性.-Based on support vector machine (SVM) and genetic algorithm (GA), discrete cosine transform (DCT) domain blind digital image watermarking method. The method adaptive to local image features. Based on the local characteristics of image block using the SVM the image block classification, adaptive to determine the embedding strength, GA to optimize the watermark embedding location. The experimental results show that the method has good invisibility and robustness of the strong against the attacks.
Platform: | Size: 449536 | Author: 郭事业 | Hits:

[matlabMatlab3

Description: Implementing Watermarking using discrete 2-D wavelet transform.
Platform: | Size: 1024 | Author: Forums Navigator | Hits:

[Waveletwater-matlab

Description: 基于离散小波变换的数字水印技术(利用matlab编写)-Digital watermarking technique based on discrete wavelet transform (using Matlab prepared)
Platform: | Size: 166912 | Author: zhang | Hits:

[Special Effectswatermarking-image-aimage

Description: 在Matlab环境下实现图片的水印嵌入,利用离散小波变换,较好的实现了应有的功能,并且通过计算PSNR值很好的验证了水印算法的不可见性和鲁棒性。-Watermark image is realized in Matlab environment, using the discrete wavelet transform, achieve a better functions, and are in good agreement with the watermark imperceptibility and robustness by calculating the value of PSNR.
Platform: | Size: 622592 | Author: 石海凤 | Hits:

[Special Effectswavelet-transformation

Description: 变换域加密图像数字水印算法研究 本文主要对图像数字水印算法进行了研究,主要利用离散小波变换实现数字水印的嵌 入和提取,这是因为小波变换可以将信号或图像进行多分辨率分解,具有放大、缩小和 平移的数学显微镜功能,利用小波分解的特性可以将水印信息嵌入到载体图像的不同区 域,更好地抵抗各种信号处理操作。-Transform domain encrypted image digital watermarking algorithm of this paper, the image watermarking algorithm using discrete wavelet transform digital watermark embedding and extraction This is because the wavelet transform signal or image multi-resolution decomposition, with zoom out and panning mathematical microscope function, using the characteristics of wavelet decomposition can watermark information is embedded into different regions of the image carrier, a better resistance to a variety of signal processing operation.
Platform: | Size: 6745088 | Author: | Hits:

[Otheranothermodule

Description: watermarking module using discrete wavelet transform
Platform: | Size: 514048 | Author: SHAIFALI BHATNAGAR | Hits:

[ComboBoxrobstance

Description: In this paper we propose a watermarking system that uses the biorthogonal discrete wavelet transform, DWT and the message is encoded before embedding. The proposed watermarking method is very simple, implying four steps: turbo coding of the watermark message, embedding the turbo coded watermark into the host image using a perceptual mask, extraction of the turbo coded watermark from the watermarked, possibly corrupted image, and turbo decoding of the watermark. The goal of this paper is the association of the DWT and duobinary turbo codes. Some simulation examples prove the performance of the proposed watermarking method- In this paper we propose a watermarking system that uses the biorthogonal discrete wavelet transform, DWT and the message is encoded before embedding. The proposed watermarking method is very simple, implying four steps: turbo coding of the watermark message, embedding the turbo coded watermark into the host image using a perceptual mask, extraction of the turbo coded watermark from the watermarked, possibly corrupted image, and turbo decoding of the watermark. The goal of this paper is the association of the DWT and duobinary turbo codes. Some simulation examples prove the performance of the proposed watermarking method
Platform: | Size: 314368 | Author: atefe | Hits:

[matlabcode-Digital-Watermarking-Using-Discrete-Wavelet-

Description: Digital Watermarking Using Discrete Wavelet Transform (DWT) & Singular Value Decomposition (SVD) & Checking its Robustness in the presence of JPEG Image Compression
Platform: | Size: 4096 | Author: manjuatha vg | Hits:

[matlabdwtlevel2

Description: Robust image watermarking using two level discrete wavelet transform using constant scaling factor. At the same time you can use any optimization algorithm instead of constant scaling factor.
Platform: | Size: 1024 | Author: mdogru50 | Hits:

[ApplicationsWatermarking-of-Videos-using-DWT

Description: this a good code for the watermarking over a video using Discrete Wavelet Transform.-this is a good code for the watermarking over a video using Discrete Wavelet Transform.
Platform: | Size: 1644544 | Author: vikky | Hits:

[ApplicationsWatermarking-of-Color-Images-using-DWT

Description: This the code for color image invisible image watermarking using Discrete wavelet transform.-This is the code for color image invisible image watermarking using Discrete wavelet transform.
Platform: | Size: 314368 | Author: vikky | Hits:

[OtherMAIN_APRL_5

Description: audio watermarking scheme using discrete wavelet transform
Platform: | Size: 2048 | Author: vaish11 | Hits:

[OtherImplementing Watermarking

Description: simple example to Implementing Watermarking using discrete 2-D wavelet transform.
Platform: | Size: 52224 | Author: ali1076 | Hits:

[Special EffectsMATLAB数字水印[dwt+dct多攻击+GUI界面]

Description: 本课题为基于MATLAB的小波变换dwt和离散余弦dct的多方法对比数字水印系统。带GUI交互界面。有一个主界面GUI,可以调用dwt方法的子界面和dct方法的子界面。流程包括,读取宿主图像和水印图像,嵌入,多种方法的攻击(剪切,加噪,旋转等),提取,最后利用psnr峰值信噪比进行评价不同攻击下,鲁棒性的好坏。(This topic is based on MATLAB wavelet transform DWT and discrete cosine DCT multi method comparison digital watermarking system. With GUI interface. There is a main interface GUI, which can call the sub interface of DWT method and DCT method. The process includes: reading host image and watermark image, embedding, attack of various methods (cutting, adding noise, rotation, etc.), extracting, and finally evaluating the robustness of different attacks by using PSNR peak signal-to-noise ratio.)
Platform: | Size: 32044032 | Author: www.wobishe.com | Hits:

CodeBus www.codebus.net