Welcome![Sign In][Sign Up]
Location:
Search - frequency domain watermarking

Search list

[GDI-Bitmapyzd

Description: 信息隐藏检测与攻击技术研究!02年我的毕业设计,看看网上到处有人找,忍痛奉献。水印攻击代码,请勿用于非法用途!ABOUTUS(本软件可以检测一切基于空域隐藏的信息和一部分基于频域隐藏的信息,可以攻击目前绝大部分数字水印,特别独特的IBM攻击技术可以攻击目前所有的数字水印。)-information hiding and attack detection technology! 02, I graduated from the design, look at the Internet is full of people looking for and reluctantly dedication. Watermark attack code, do not for illegal purposes! ABOUTUS (The software can detect hidden airspace based on all the information and part is based on frequency domain hidden information, we can attack the majority of the current digital watermarking, unique special attack IBM technology can attack all current digital watermarking.)
Platform: | Size: 1735477 | Author: 杨智丹 | Hits:

[GDI-Bitmapyzd

Description: 信息隐藏检测与攻击技术研究!02年我的毕业设计,看看网上到处有人找,忍痛奉献。水印攻击代码,请勿用于非法用途!ABOUTUS(本软件可以检测一切基于空域隐藏的信息和一部分基于频域隐藏的信息,可以攻击目前绝大部分数字水印,特别独特的IBM攻击技术可以攻击目前所有的数字水印。)-information hiding and attack detection technology! 02, I graduated from the design, look at the Internet is full of people looking for and reluctantly dedication. Watermark attack code, do not for illegal purposes! ABOUTUS (The software can detect hidden airspace based on all the information and part is based on frequency domain hidden information, we can attack the majority of the current digital watermarking, unique special attack IBM technology can attack all current digital watermarking.)
Platform: | Size: 1735680 | Author: 杨智丹 | Hits:

[matlabadapted

Description: 在频域的一种自适应水印算法,包括嵌入与检测过程。-in the frequency domain, an adaptive algorithm, including embedded with the testing process.
Platform: | Size: 1024 | Author: 袭乐宣 | Hits:

[Software Engineeringwatermark_2

Description: 提出了一种离散小波变换域实现图像水印的方法。这种算法充分利用小波变换的特点,把原始图像及水印图像塔式分解,在多分辨率分解后的相同的频段来嵌入水印信息。该方法也利用了人眼视觉特性,算法简单而有效。实验证明,该算法较好地解决了水印不可见性与鲁棒性之间的矛盾,对常见的水印攻击都有较强的鲁棒性。-presents a discrete wavelet transform domain image watermarking method. This algorithm using wavelet transform characteristics, the original image and the watermark image tower decomposition, Multiresolution decomposition in the same frequency band to the embedded watermark. The method has also been used HVS, the algorithm is simple and effective. Experiments show that the algorithm can solve the watermark is visible with the robust nature of, common to have more attacks watermark robustness.
Platform: | Size: 151552 | Author: yy | Hits:

[Graph programdct

Description: 一种置换DCT域中频系数的盲水印算法,希望对大家有好处,谢谢^.^-Substitution of a DCT frequency coefficient domain blind watermarking algorithm, in the hope that everyone will benefit, thank you ^. ^
Platform: | Size: 165888 | Author: 东东 | Hits:

[matlabdigitalwatermarking

Description: 基于MATLAB的数字水印的图像实现,采用DWT的频域方法嵌入水印信号-MATLAB-based digital watermarking of images to achieve, using DWT frequency domain methods embed the watermark signal
Platform: | Size: 262144 | Author: 王娜 | Hits:

[Graph programDCT_watermark

Description: dct域的图像数字水印,将水印图像信息隐藏在DCT系数的中频部分。-DCT domain image watermarking, the watermark image information hidden in the intermediate frequency part of DCT coefficients.
Platform: | Size: 205824 | Author: zyy | Hits:

[Special EffectsMPGextract

Description: 一个mpg压缩的水印提取程序,考虑到了几种压缩格式,并基于此提出DCT频率域上的水印提取.对学习视频水印的人有help-Mpg compressed a watermark extraction procedure, taking into account several types of compression formats, and based on this proposed DCT frequency domain watermark extraction. For learning video watermarking help people
Platform: | Size: 1024 | Author: zzy | Hits:

[Waveletmm

Description: 关于频率域的数字图像水印的文字,有小波变换,傅里叶变换-On the frequency domain of digital image watermarking text, there are wavelet transform, Fourier transform
Platform: | Size: 567296 | Author: 张士培 | Hits:

[Software EngineeringAudioWatermarking

Description: 基于听觉频率掩蔽效应的音频数字水印算法和一种基于人耳掩蔽效应的DCT域音频水印-Auditory masking effect on the frequency of the audio digital watermarking algorithm based on the human ear and a masking effect of the DCT-domain audio watermarking
Platform: | Size: 923648 | Author: lizhenzhen | Hits:

[Special Effectspic393

Description: 频域法加入数字水印的原理是首先将原始信号(语音一维信号、图像二维信号)变换到频域,常用的变换一般有DWT、DCT、DFT、WP和分形。然后,对加入了水印信息的信号进行频域反变换(IDWT、IDCT、DFT、WP),得到含有水印信息的信号。-Frequency-domain digital watermarking method by adding the principle is that first of all, the original signal (voice signal of one-dimensional, two-dimensional image signal) to frequency domain transformation, commonly used in general transform DWT, DCT, DFT, WP and fractal. Then, adding the watermark information signal to the frequency domain inverse transform (IDWT, IDCT, DFT, WP), received signal containing the watermark information.
Platform: | Size: 2048 | Author: laura | Hits:

[Special Effectsmiyao

Description: 本文提出了基于二维混沌映射的数字图像水印算法,混沌具有随机性、似噪声及对初始条件的极端敏感性等特点。将经过二维混沌映射置乱后的数字水印信号嵌入图像小波域的低频系数,实现了数字水印的隐蔽性、保密性和稳固性;利用二维混沌映射Arnold变换对水印信号进行置乱,不仅增强了水印信号保密性,同时有效提高了视觉上抵抗图像剪切攻击的能力。-In this paper, two-dimensional chaotic map based on digital image watermarking algorithm, Chaos with random noise and the likelihood of extreme sensitivity to initial conditions and so on. Two-dimensional chaotic map will be scrambling after the digital watermark embedded image signal of the low-frequency coefficients in wavelet domain, the realization of a digital watermark hidden, security and stability the use of two-dimensional chaotic map on Arnold transform scrambling watermark signal, not only enhances the confidentiality of the watermark signal at the same time improve the visual image shear resistance attacks.
Platform: | Size: 668672 | Author: lafeng | Hits:

[matlabdwprotected

Description: Matlab source code for DCT-based watermarking for grayscale images. DCT-based watermark recovering without resorting to the uncorrupted original image. Digital watermarking has been proposed as a viable solution to the need of copyright protection and authentication of multimedia data in a networked environment, since it makes possible to identify the author, owner, distributor or authorized consumer of a document. A new watermarking technique to add a code to digital images is presented: the method operates in the frequency domain embedding a pseudo-random sequence of real numbers in a selected set of DCT coefficients. Watermark casting is performed by exploiting the masking characteristics of the Human Visual System, to ensure watermark invisibility. The embedded sequence is extracted without resorting to the original image, so that the proposed technique represents a major improvement to methods relying on the comparison between the watermarked and original images.
Platform: | Size: 98304 | Author: omar | Hits:

[Special Effectswatermark_logistic

Description: 基于混沌加密的频率域自适应数字水印技术,混沌序列一是加密,二是实现盲检测-Based on Chaotic Encryption frequency domain adaptive digital watermarking technology, one chaotic sequence encryption is to make the blind detection
Platform: | Size: 2048 | Author: 宁国强 | Hits:

[Special Effectswatermark_hundun

Description: 基于混沌加密的频率域自适应数字水印技术,混沌序列一是加密,二是实现盲检测-Based on Chaotic Encryption frequency domain adaptive digital watermarking technology, one chaotic sequence encryption is to make the blind detection
Platform: | Size: 2048 | Author: 宁国强 | Hits:

[Waveletwatermark

Description: 变换域的数字图像水印技术及图像质量评价研究-Study of digital image watermarking in frequency domain and image quality evaluation
Platform: | Size: 2668544 | Author: 穆晓慧 | Hits:

[Special EffectsA-DCT-watermarking-algorithm

Description: 提出了一种在数字图像上实现的盲水印算法, 嵌入的水印是64 􀀂 64 􀀂 8 bit 灰度图。该算 法用宿主图像的8 􀀂 8 分块的DCT 域低频对应系数, 进行量化取余的方法嵌入水印。-Proposes a new digital image watermarking algorithm implemented on the embedded watermark is 64 􀀂 64 􀀂 8 bit grayscale. In the algorithm, the host image 8 􀀂 8 block of DCT coefficients corresponding to low frequency domain, to take over the method to quantify the embedded watermark.
Platform: | Size: 280576 | Author: 彩虹 | Hits:

[WaveletBlind-Watermarking-

Description: 随着现代信息技术的高速发展,人们对信息技术的要求越来越高。对我们所需要的信息的安全性、保密性、版权所有性更加的关注。基于此,数字水印技术就应用而生。数字水印技术就是把一些隐藏的信息嵌 。入到数字信息的载体中,数字水印技术把这些信息从一种形式转换为另一种形式,就类似于把信号从时域转换为频域后再去处理问题。数字水印可分为盲水印和非盲水印, 非盲水印系统在检测或提取水印信息时,需要原始图像而且还会影响到人们的视觉感应;盲水印系统在检测或提取水印过程中,既不需要原始载体图像,也不需要嵌入的水印,因此盲水印系统有着更加广泛的应用。-With the rapid development of modern information technology, the information technology of the increasingly high demand. Security, privacy, copyright on the information we need attention all the more. Based on this, the digital watermarking technology is applied. Digital watermarking technique is to some hidden information block. The carrier into the digital information, the digital watermarking technology the information is converted from one form to another, similar to the signal from the time domain into the frequency domain and then to deal with the problem. Digital watermarking can be divided into blind watermarking and non-blind watermark, non-blind watermarking system in testing or when extracting the watermark information, need the original image but also affect the visual perception of people blind watermarking system in detecting or watermark extraction process, does not need the original carrier image, also do not need to embed the watermark, the watermark the system has a
Platform: | Size: 63488 | Author: jingjing | Hits:

[Special EffectsDWT-Digital-Watermarking-source-code

Description: 首先将载体图像经过离散小波变换,然后将待嵌入水印嵌入到经小波变换后的载体图像的低频域中,因为载体图像的低频域在进过一些攻击后表现稳定。-Firstly, the carrier image after discrete wavelet transform, and then be embedded watermark is embedded into the low frequency domain carrier image after wavelet transform of the carrier image, because of the low frequency domain performance stability in scored some attack.
Platform: | Size: 281600 | Author: 王枫少 | Hits:

[Report papersProtecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach

Description: Similar to other digital assets, deep neural network (DNN) models could suffer from piracy threat initiated by insider and/or outsider adversaries due to their inherent commercial value. DNN watermarking is a promising technique to mitigate this threat to intellectual property. This work focuses on black- box DNN watermarking, with which an owner can only verify his ownership by issuing special trigger queries to a remote suspicious model. However, informed attackers, who are aware of the watermark and somehow obtain the triggers, could forge fake triggers to claim their ownerships since the poor robustness of triggers and the lack of correlation between the model and the owner identity. This consideration calls for new watermarking methods that can achieve better trade-off for addressing the discrepancy. In this paper, we exploit frequency domain image watermarking to generate triggers and build our DNN watermarking algorithm accordingly. Since watermarking in the frequency domain is high concealment and robust to signal processing operation, the proposed algorithm is superior to existing schemes in resisting fraudulent claim attack. Besides, ex- tensive experimental results on 3 datasets and 8 neural networks demonstrate that the proposed DNN watermarking algorithm achieves similar performance on functionality metrics and better performance on security metrics when compared with existing algorithms.
Platform: | Size: 374457 | Author: bamzi334 | Hits:
« 12 3 »

CodeBus www.codebus.net