Welcome![Sign In][Sign Up]
Location:
Search - tools for watermarking

Search list

[Software EngineeringDCT-based_Image_Digital_Watermarking

Description: 基于DCT域的图像数字水印技术: 摘要:数字水印技术作为数字媒体版权保护的有效办法,近年来在国内外引起了人们极大的兴趣。作者采用了DCT离散余弦变换的算法,对图像这种多媒体数字作品进行了数字水印的嵌入和检测研究。并且使用了高效实用的编程工具MATLAB来介绍了一种DCT域的图像数字水印嵌入和提取的实例,并且在最后对嵌入水印的图像进行了攻击实验,验证了该算法的鲁棒性和不可见性。-Based on the DCT domain image watermarking techniques: Abstract: Digital watermarking of digital media technology as an effective means of copyright protection, in recent years both at home and abroad has aroused great interest. The author adopted the DCT discrete cosine transform algorithms, the image of this multi-media digital works for the digital watermark embedding and detection research. And the use of efficient MATLAB programming tools useful to introduce a DCT domain image watermarking embedding and extraction examples, and in the final of the embedded watermark image of the attack experiments verify the robustness of the algorithm and non- Visibility.
Platform: | Size: 533504 | Author: 绯村剑心 | Hits:

[matlabjlab

Description: JLAB is a set of Matlab functions I have written or co-written over the past fifteen years for the purpose of analyzing data. It consists of four hundred m-files spanning thirty thousand lines of code. JLAB includes functions ranging in complexity from one-line aliases to high-level algorithms for certain specialized tasks. These have been collected together and made publicly available for you to use, modify, and --- subject to certain very reasonable constraints --- to redistribute. Some of the highlights are: a suite of functions for the rapid manipulation of multi-component, potentially multi-dimensional datasets a systematic way of dealing with datasets having components of non-uniform length tools for fine-tuning figures using compact, straightforward statements and specialized functions for spectral and time / frequency analysis, including advanced wavelet algorithms developed by myself and collaborators. -JLAB is a set of Matlab functions I have written or co-written over the past fifteen years for the purpose of analyzing data. It consists of four hundred m-files spanning thirty thousand lines of code. JLAB includes functions ranging in complexity from one-line aliases to high-level algorithms for certain specialized tasks. These have been collected together and made publicly available for you to use, modify, and--- subject to certain very reasonable constraints--- to redistribute. Some of the highlights are: a suite of functions for the rapid manipulation of multi-component, potentially multi-dimensional datasets a systematic way of dealing with datasets having components of non-uniform length tools for fine-tuning figures using compact, straightforward statements and specialized functions for spectral and time/frequency analysis, including advanced wavelet algorithms developed by myself and collaborators.
Platform: | Size: 3008512 | Author: chenxuzhen | Hits:

[Special EffectsWatermarkgongjigongju

Description: 主要是用c语言编写,用于数字水印的攻击,属于检测工具。-C language is mainly used to prepare for the digital watermarking attacks are testing tools.
Platform: | Size: 1971200 | Author: 简慧 | Hits:

[Special Effects048

Description: 本文设计了一种简单的实用数字水印系统。详细论述了二值数字水印的嵌入与提取算法以及具体实现,并对其抗攻击能力作了一定程度的分析。最后利用MATLAB工具实现了一个简单的基于空域变换与BP神经网络的实用数字水印系统。-In this paper, design a simple and practical digital watermarking system. Discussed in detail binary digital watermark embedding and extraction algorithms as well as the concrete realization, and its anti-attack capability of the analysis to a certain extent. Finally the use of MATLAB tools for the realization of a simple space-based transform and BP neural networks of practical digital watermarking system.
Platform: | Size: 1164288 | Author: 亓先军 | Hits:

[Wavelet119128624MATLAB2660-3160

Description: 水印技术 充分了解数字水印技术在版权保护,尤其是在多媒体数据版权保护等方面的重要作用和前景, 通过几种基于小波变换的数字水印和其他经典的数字水印方案的研究比较,验证小波域的水印的透明性鲁棒性等特点。 要求利用工具进行仿真试验。-Watermarking technology to fully understand the digital watermarking technology in copyright protection, especially in the multimedia data such as copyright protection of the essential aspects of the role and prospects of several wavelet-based digital watermarking and other classic study of digital watermarking program comparison, wavelet domain authentication transparency of watermark robustness characteristics. Require the use of simulation tools.
Platform: | Size: 188416 | Author: 尚朝晖 | Hits:

[Waveletxiaobobian

Description: 本代码是一些关于水印处理的一些算法用小波变换来实现,在嵌入水印之后用各种攻击检验算法的鲁棒性-The code is some deal about a number of watermarking algorithm using wavelet transform to achieve, in the embedded watermark after the attacks with a variety of test algorithm robustness
Platform: | Size: 14336 | Author: 刘林冲 | Hits:

[OtherAddison.Wesley.The.Craft.of.System.Security.Dec.20

Description: After reading this book, you will be able to Understand the classic Orange Book approach to security, and its limitations Use operating system security tools and structures--with examples from Windows, Linux, BSD, and Solaris Learn how networking, the Web, and wireless technologies affect security Identify software security defects, from buffer overflows to development process flaws Understand cryptographic primitives and their use in secure systems Use best practice techniques for authenticating people and computer systems in diverse settings Use validation, standards, and testing to enhance confidence in a system s security Discover the security, privacy, and trust issues arising from desktop productivity tools Understand digital rights management, watermarking, information hiding, and policy expression Learn principles of human-computer interaction (HCI) design for improved security Understand the potential of emerging work in hardware-based security and trusted computing After reading this book, you will be able to Understand the classic Orange Book approach to security, and its limitations Use operating system security tools and structures- with examples from Windows, Linux, BSD, and Solaris Learn how networking, the Web, and wireless technologies affect security Identify software security defects, from buffer overflows to development process flaws Understand cryptographic primitives and their use in secure systems Use best practice techniques for authenticating people and computer systems in diverse settings Use validation, standards, and testing to enhance confidence in a system' s security Discover the security, privacy, and trust issues arising from desktop productivity tools Understand digital rights management, watermarking, information hiding, and policy expression Learn principles of human-computer interaction (HCI) design for improved security Understand the potential of emerging work in hardware-based security and trusted computing-After reading this book, you will be able to Understand the classic Orange Book approach to security, and its limitations Use operating system security tools and structures- with examples from Windows, Linux, BSD, and Solaris Learn how networking, the Web, and wireless technologies affect security Identify software security defects, from buffer overflows to development process flaws Understand cryptographic primitives and their use in secure systems Use best practice techniques for authenticating people and computer systems in diverse settings Use validation, standards, and testing to enhance confidence in a system' s security Discover the security, privacy, and trust issues arising from desktop productivity tools Understand digital rights management, watermarking, information hiding, and policy expression Learn principles of human-computer interaction (HCI) design for improved security Understand the potential of emerging work in hardware-based security and trusted computing
Platform: | Size: 5532672 | Author: chen | Hits:

[Crack Hackan_intellegent_audio_water_marking_based_on_dwt-s

Description: All three, Discrete Wavelet Transform (DWT) - Singular Value Decomposition (SVD) and Adaptive Tabu Search (ATS) have been used as mathematical tools for embedding data into an audio signal. In this paper, we present a new robust audio watermarking scheme based on DWT-SVD and ATS. After applying the DWT to the cover audio signal, we map the DWT coefficients, and apply the SVD, we search for the optimal intensity of audio watermarking by using the ATS. Experimental results show that the watermarking method performs well in both security and robustness to many digital signals processing, such as filtering, cropping, mp3 and random noise.
Platform: | Size: 267264 | Author: Rishi | Hits:

[Database system截屏工具

Description: FastStone捕捉功能强大,重量轻,但功能齐全,屏幕捕捉工具和屏幕视频录像机。它允许你轻松地捕捉和注释屏幕上的任何东西,包括窗口、对象、菜单、全屏、矩形/徒手区域,甚至是滚动的窗口/网页。它还允许你记录所有的屏幕活动,包括屏幕上的变化、麦克风的语音、鼠标移动和点击进入高度压缩的视频文件。您可以选择将捕获发送到编辑器、文件、剪贴板、打印机、电子邮件、文字/powerpoint文档或将它们上传到您的网站。编辑工具包括注释(文本、划线、高亮显示)、调整大小、裁剪、锐化、水印、应用边缘效果等等。其他功能还包括全局热键、自动文件名生成、对外部编辑器的支持、颜色选择器、屏幕放大镜和屏幕标尺。(FastStone Capture is a powerful, lightweight, yet full-featured screen capture tool and screen video recorder. It allows you to easily capture and annotate anything on the screen including windows, objects, menus, full screen, rectangular/freehand regions and even scrolling windows/web pages. It also allows you to record all screen activities including onscreen changes, speech from microphone, mouse movements and clicks into highly compressed video files. You can choose to send captures to editor, file, clipboard, printer, email, Word/PowerPoint document or upload them to your website. Editing tools include annotating (texts, arrowed lines, highlights), resizing, cropping, sharpening, watermarking, applying edge effects and many more. Other features include global hotkeys, automatic filename generation, support for external editors, a color picker, a screen magnifier and a screen ruler.)
Platform: | Size: 1049600 | Author: evasister | Hits:

CodeBus www.codebus.net