Welcome![Sign In][Sign Up]
Location:
Search - tamper detection

Search list

[Graph programD542F922

Description: 彩色图像的篡改检测及自恢复算法赵春晖,孙建军,朱海峰(哈尔滨工程大学信息与通信工程学院,黑龙江哈尔滨150001)摘要:数字水印是图像认证的有效手段之一.利用小波变换提出一种计算简单的彩色图像水印算法,将一个图像的主要内容嵌入该图像自身之中,用均值量化的方法在亮度信号中嵌入水印,实现篡改检测和定位篡改区域;用多余的色度空间嵌入亮度信号和色度信号,用于恢复被篡改的图像内容.该算法可以获取较高的峰值信噪比,具有很好的鲁棒性.实验结果表明,该算法对删除、替换等恶意图像篡改具有良好的检测、定位和自修复能力.-color image tamper detection and self-recovery algorithm Zhao Chunhui, Sun Jianjun, Zhu Haifeng (Harbin Engineering University, Information and Communication Engineering Institute, Harbin, Heilongjiang 150001) Abstract : digital watermark image authentication is one of the effective means. Using wavelet transform A simple calculation of the color image watermarking algorithm, an image of the main elements embedded in the image itself, and use of quantitative methods mean the luminance signal embedded watermark, achieve tamper detection and localization tampering with the region; use of surplus space embedded color luminance signals and chrominance signals, for the restoration of tampering with the image content. The algorithm can generate a higher signal-to-noise ratio of the peak value, h
Platform: | Size: 238214 | Author: ghostsx | Hits:

[OtherBKP

Description: This example shows how to write/read data to/from Backup data registers and demonstrates the Tamper detection feature. The associated software performs the following: Configures the Tamper pin to be active on low level and enable Tamper interrupt. Then all Backup data registers are programmed after that we check if the written data are correct. If yes a led connected to PC.06 is turned on, otherwise a led connected to PC.07 is turned on. Once a low level is applied on PC.13 pin (ANTI_TAMP) the Backup data registers are reset and the Tamper interrupt is generated. In the corresponding ISR we check if the Backup data registers are cleared, if yes a led connected to PC.08 is turned on otherwise a led connected to PC.09 is turned on. In this example the system is clocked by the HSE(8MHz).
Platform: | Size: 281536 | Author: kz02bcxg | Hits:

[Graph programD542F922

Description: 彩色图像的篡改检测及自恢复算法赵春晖,孙建军,朱海峰(哈尔滨工程大学信息与通信工程学院,黑龙江哈尔滨150001)摘要:数字水印是图像认证的有效手段之一.利用小波变换提出一种计算简单的彩色图像水印算法,将一个图像的主要内容嵌入该图像自身之中,用均值量化的方法在亮度信号中嵌入水印,实现篡改检测和定位篡改区域;用多余的色度空间嵌入亮度信号和色度信号,用于恢复被篡改的图像内容.该算法可以获取较高的峰值信噪比,具有很好的鲁棒性.实验结果表明,该算法对删除、替换等恶意图像篡改具有良好的检测、定位和自修复能力.-color image tamper detection and self-recovery algorithm Zhao Chunhui, Sun Jianjun, Zhu Haifeng (Harbin Engineering University, Information and Communication Engineering Institute, Harbin, Heilongjiang 150001) Abstract : digital watermark image authentication is one of the effective means. Using wavelet transform A simple calculation of the color image watermarking algorithm, an image of the main elements embedded in the image itself, and use of quantitative methods mean the luminance signal embedded watermark, achieve tamper detection and localization tampering with the region; use of surplus space embedded color luminance signals and chrominance signals, for the restoration of tampering with the image content. The algorithm can generate a higher signal-to-noise ratio of the peak value, h
Platform: | Size: 237568 | Author: ghostsx | Hits:

[OtherBKP

Description: This example shows how to write/read data to/from Backup data registers and demonstrates the Tamper detection feature. The associated software performs the following: Configures the Tamper pin to be active on low level and enable Tamper interrupt. Then all Backup data registers are programmed after that we check if the written data are correct. If yes a led connected to PC.06 is turned on, otherwise a led connected to PC.07 is turned on. Once a low level is applied on PC.13 pin (ANTI_TAMP) the Backup data registers are reset and the Tamper interrupt is generated. In the corresponding ISR we check if the Backup data registers are cleared, if yes a led connected to PC.08 is turned on otherwise a led connected to PC.09 is turned on. In this example the system is clocked by the HSE(8MHz).
Platform: | Size: 281600 | Author: kz02bcxg | Hits:

[Special EffectsComparativeEvaluationofDigitalFragileImage

Description: 脆弱性数字水印能为多媒体内容完整性认证和篡改检测提供有效的解决方案。该文对用于图像认证的脆弱性数字水印技术的研究 现状、一般原理、基本特征、典型算法进行了综述-The vulnerability of digital watermark for the integrity of multimedia content authentication and tamper detection to provide an effective solution. The image authentication for the vulnerability of digital watermarking technology, research, general principles, basic features, typical algorithms are reviewed
Platform: | Size: 1678336 | Author: 张旭 | Hits:

[Software EngineeringAVR465

Description: AVR465 - Single-Phase Energy Meter with Tamper Detection-AVR465- Single-Phase Energy Meter with Tamper Detection
Platform: | Size: 275456 | Author: Irfan | Hits:

[Industry researchsift1

Description: 针对现有的图像复制遮盖篡改检测算法需要某些先验信息、对后处理操作失效且计算量大等问题, 借鉴图像匹配技术中的SIFT(scale invariant feature transform)特征匹配算法,首次提出将其用于检测复制 遮盖的篡改操作。 -Cover the existing image copy for tamper detection algorithm needs some prior information on the calculation of post-processing and the failure of large issues, draw the image matching technology in the SIFT (scale invariant feature transform) features matching algorithm, first proposed The cover copy for the detection of the tampering operation.
Platform: | Size: 466944 | Author: LIDAN | Hits:

[SCMBKPmain

Description: This example shows how to write/read data to/from Backup data registers and demonstrates the Tamper detection feature.
Platform: | Size: 3072 | Author: 紫兰菲 | Hits:

[Special Effectsff

Description: 图像篡改检测,用来对图像原始的数据进行分析检测来判断是否有人对此图像做过处理-Image tamper detection
Platform: | Size: 8192 | Author: | Hits:

[Speech/Voice recognition/combinecode

Description: 语音篡改检测的相关源码。通过EM算法进行检测-The relevant source voice tamper detection
Platform: | Size: 4372480 | Author: chenhao | Hits:

[OtherDigital-Image-Forensics-report

Description: tamper detection-pdf
Platform: | Size: 288768 | Author: ckg | Hits:

[Software Engineeringtezhengjuleiziqianru

Description: 提出一种新的基于图像特征聚类的自嵌入水印算法( CCSW) ,用于图像内容的认证和恢复.-In this paper,we present a novel self-embedded watermarking algorithm based on characteristic clustering ( CCSW) for image tamper detection and recovery.
Platform: | Size: 1967104 | Author: lili | Hits:

[Mathimatics-Numerical algorithmsxy7z.ZIP

Description: 针对语音变换的语音篡改检测For the voice of transform voice tamper detection-For the voice of transform voice tamper detection
Platform: | Size: 366592 | Author: | Hits:

[Special EffectsDouble-JPEG-compression

Description: 基于双JPEG压缩统计特性的图像篡改检测方法-Image tamper detection method based on the statistical characteristics of double JPEG compression
Platform: | Size: 102400 | Author: 卿轲 | Hits:

[ARM-PowerPC-ColdFire-MIPSSTM32_Tamper

Description: The Tamper project is a simple program for the STM32F103RBT6 using Keil MCBSTM32 Evaluation Board and demonstrating the use of the Tamper detection.-The Tamper project is a simple program for the STM32F103RBT6 using Keil MCBSTM32 Evaluation Board and demonstrating the use of the Tamper detection.
Platform: | Size: 36864 | Author: mustafa | Hits:

[Graph programthe-JPEG-image-tamper-detection-code

Description: 基于JPEG的图像篡改检测代码 平台matlab -Platform based on the JPEG image tamper detection code matlab
Platform: | Size: 3072 | Author: 我不改名 | Hits:

[WaveletDownloads

Description: 关于半脆弱水印的几篇文章,其中包括小波变换的应用以及contourlet变换的应用等,涉及领域为半脆弱数字图像水印已经篡改检测。-Semi-fragile watermarking of several articles, including the application of wavelet transform and Contourlet transform application areas for semi-fragile digital image watermarking has tamper detection.
Platform: | Size: 8113152 | Author: fdvc | Hits:

[Special EffectsSIFTPVC

Description: 图像篡改检测的SIFT的vc实现,对篡改图像的区域定位并连线,确保图像的真实性。-Image tamper detection SIFT vc achieve, locate and connect the tampered area of ​ ​ the image, to ensure the authenticity of the image.
Platform: | Size: 8632320 | Author: 黄强 | Hits:

[Software Engineeringtamper-detection

Description: implementation this paper in matlab Dual watermark for image tamper detection and recovery http://www.sciencedirect.com/science/article/pii/S003132030800174X
Platform: | Size: 174080 | Author: bbh | Hits:

[2D GraphicCopy-Move-Forgery-Detection

Description: 可以实现图像篡改检测,附带有几张图片,检测效果一般(Image tamper detection can be achieved, with pictures, the detection effect is general)
Platform: | Size: 286720 | Author: 蓝莲花 | Hits:
« 12 »

CodeBus www.codebus.net