Welcome![Sign In][Sign Up]
Location:
Search - watermark ATTACK MATLAB

Search list

[Graph programwatermark综述+代码

Description: 数字水印算法实现(matlab程序包),包含有DCT水印嵌入算法,DWT水印嵌入算法,以及水印攻击和性能测试程序。参考价值极大-digital watermarking algorithm (Matlab package), including a watermark embedded DCT algorithm, DWT algorithm embedded watermark, watermark and attack and performance testing procedures. Great value
Platform: | Size: 1996800 | Author: 杨柯 | Hits:

[matlabwatermark-MATLAB

Description: 数字水印技术是当前比较流行的防盗版技术,本程序包括水印的嵌入,一般攻击,水印提取,水印的检测-digital watermarking technology is currently more popular anti-piracy technology, the process includes the embedded watermark, the general attack Extraction watermark, watermark detection
Platform: | Size: 563200 | Author: 魏凯 | Hits:

[Graph programattack_wmk

Description: 在图像中加入水印,在提取水印时,需要知道原始的水印数据,并做了提取和攻击测试-Add watermark in image in the watermark extraction, the need to know the original watermark data and make the extraction and attack test
Platform: | Size: 2048 | Author: 王少飞 | Hits:

[Special Effectsattack

Description: 这写程序是对加水印之后图像的攻击,包括加噪声,各种滤波,剪切,压缩攻击和旋转等。-This writing process is a plus watermark image after the attacks, including the increase in noise, various filtering, shear, compression and rotation attacks.
Platform: | Size: 129024 | Author: 晁文婷 | Hits:

[matlabpatchwork

Description: 利用patchwork方法,嵌入0-1水印。可设置像素修改值、选择各种经典的攻击方式和控制攻击强弱。返回提取的水印信息和峰值信噪比。利用Matlab编写。-The use of patchwork approach, embedding the watermark 0-1. Modify pixel values can be set to choose a variety of classic attacks and control the strength of the attack. Back to extract the watermark information and peak signal to noise ratio. Prepared using Matlab.
Platform: | Size: 108544 | Author: 张湛 | Hits:

[matlabSTDM

Description: 利用STDM方法嵌入水印信息,可设置量化步长,选择各种经典的攻击方式,控制攻击强弱,返回误码率和峰值信噪比-Stdm method using embedded watermark information, to set the quantization step size, choose a variety of classic attacks, controlling the strength of the attack and returned to the bit error rate and peak signal to noise ratio
Platform: | Size: 56320 | Author: 张湛 | Hits:

[Special Effectswork

Description: 一种基于DCT变换的数字水印算法的实现过程,水印为伪随机序列,包括嵌入和提取两个过程。其中textmark.m为攻击实验代码。-DCT-based Digital Watermarking Algorithm Transform realize the process, the watermark for the pseudo-random sequence, including both the process of embedding and extraction. Textmark.m experiment in which the attack code.
Platform: | Size: 2048 | Author: 陈日进 | Hits:

[Special Effects048

Description: 本文设计了一种简单的实用数字水印系统。详细论述了二值数字水印的嵌入与提取算法以及具体实现,并对其抗攻击能力作了一定程度的分析。最后利用MATLAB工具实现了一个简单的基于空域变换与BP神经网络的实用数字水印系统。-In this paper, design a simple and practical digital watermarking system. Discussed in detail binary digital watermark embedding and extraction algorithms as well as the concrete realization, and its anti-attack capability of the analysis to a certain extent. Finally the use of MATLAB tools for the realization of a simple space-based transform and BP neural networks of practical digital watermarking system.
Platform: | Size: 1164288 | Author: 亓先军 | Hits:

[Waveletdft

Description: 基于dft的水印代码,水印注入、提取、防攻击测试-DFT-based watermarking code, watermark injection, extraction, anti-attack test
Platform: | Size: 356352 | Author: wjp | Hits:

[matlabattack

Description: 一套由matlab编程的基于小波的水印应用图片例子-A set of matlab programming applications based on wavelet image watermark example
Platform: | Size: 10240 | Author: chenxeifong | Hits:

[Special Effectsjiyudct

Description: DCT域数字水印源代码.水印嵌入,水印检测,攻击实验以测试鲁棒性,重要参数计算。希望对做数字水印的XDJM有所帮助。--DCT-domain digital watermarking source code. Watermark embedding, watermark detection, attack experiment to test the robustness, an important parameter calculation. Want to do digital watermarking XDJM help.--
Platform: | Size: 1024 | Author: 摩罗逊 | Hits:

[Special Effectsmatlab

Description: 基于matlab做的数字水印,文件包括源代码及原图像和加入水印后的图像,经过测试,能有效抗攻击-Matlab-based digital watermarking so that the document includes the source code and the original image and adding a watermark image, tested and effective anti-attack
Platform: | Size: 759808 | Author: 张伟 | Hits:

[Picture Viewerproj_matlab

Description: 实现水印嵌入,提取水印和对图像进行jpeg攻击-The realization of watermark embedding, watermark extraction and image jpeg attack
Platform: | Size: 1024 | Author: jjj | Hits:

[Special EffectsDCT-water-print

Description: 实现了添加水印及攻击水印的一些方法。攻击水印方法包括抖动攻击、滤波攻击、旋转攻击等-Add watermark and implementation of a number of methods to attack the watermark. Watermarking attack methods include jitter attacks, filtering attacks, spin attack
Platform: | Size: 1372160 | Author: 任双印 | Hits:

[Waveletwatermark

Description: 一个简单的基于小波变换水印算法,抗攻击能力较强-A simple Watermarking Algorithm Based on Wavelet Transform, anti-attack ability
Platform: | Size: 1024 | Author: zhaocheng | Hits:

[Graph programgui

Description: 各种数字水印的嵌入和提取 检测和攻击 包括lsb 和dct等算法-A variety of digital watermark embedding and extraction, including detection and attack, such as algorithm lsb and dct
Platform: | Size: 87040 | Author: 林兴 | Hits:

[WaveletLtoLHtoH_svd

Description: 本算法结合小波变换和SVD奇异值变换,实现了水印的嵌入和提取,载体图像的鲁棒性和水印的不可见性,提取出的水印图像的和原水印图像基本一致,抗攻击性强。-The algorithm combines wavelet transform and SVD singular value transformation, achieved watermark embedding and extraction, vector image watermark robustness and invisibility, the extracted watermark image and the original watermark image are basically the same, anti-attack and strong.
Platform: | Size: 1024 | Author: liuyuan | Hits:

[Software Engineeringvm2

Description: Owing to the broad application value of audio watermarking in remote transmission and mobile extraction, it is very important to study watermarking approaches against A/D and D/A conversion. Based on wavelet decomposition and cepstrum technology, an audio watermarking algorithm is proposed where the low-frequency wavelet coefficients are chosen for cepstrum transforming. Then, the obtained cepstrum data shows stable for watermark hiding by the methods of edging data cutting and statistical mean modification. The synchronization is not required in the algorithm. Experimental results show that the proposed algorithm can resist on the attack of A/D and D/A successfully with features of large capacity and zero bit error. It will be helpful for the mobile audio in secure broadcast and management in the
Platform: | Size: 346112 | Author: vinay | Hits:

[Graph programDCT_SVD

Description: 本文提出一种在原始视频DCT(离散余弦变换)与SVD(奇异值分解)域自适应嵌入水印的算法。算法首先将视频流分割成一个个场景,场景中的视频图像被变换到DCT-SVD域中,水印量化嵌入在最大奇异上,实现了水印盲检测。同时实验证明该算法在满足透明性要求下也满足一定的鲁棒性要求,能够抵抗低通滤波、中值滤波、椒盐噪声、高斯噪声、H.264压缩攻击以及统计攻击和帧剪切等攻击。-This paper presents an original video in the DCT (Discrete Cosine Transform) and SVD (singular value decomposition) algorithm for adaptive watermark embedding. Firstly, a video stream is divided into scenes, scenes of the video image is converted to the DCT-SVD domain, the watermark embedded in the largest singular quantification, the realization of the watermark signal. Furthermore, the experiments show that the algorithm meet the transparency requirements are met under certain robustness requirements, can resist the low-pass filtering, median filtering, salt and pepper noise, Gaussian noise, H.264 compression attacks and attacks and frame shear statistics attack.
Platform: | Size: 63488 | Author: 久久 | Hits:

[Special EffectsMATLAB数字水印[dwt+dct多攻击+GUI界面]

Description: 本课题为基于MATLAB的小波变换dwt和离散余弦dct的多方法对比数字水印系统。带GUI交互界面。有一个主界面GUI,可以调用dwt方法的子界面和dct方法的子界面。流程包括,读取宿主图像和水印图像,嵌入,多种方法的攻击(剪切,加噪,旋转等),提取,最后利用psnr峰值信噪比进行评价不同攻击下,鲁棒性的好坏。(This topic is based on MATLAB wavelet transform DWT and discrete cosine DCT multi method comparison digital watermarking system. With GUI interface. There is a main interface GUI, which can call the sub interface of DWT method and DCT method. The process includes: reading host image and watermark image, embedding, attack of various methods (cutting, adding noise, rotation, etc.), extracting, and finally evaluating the robustness of different attacks by using PSNR peak signal-to-noise ratio.)
Platform: | Size: 32044032 | Author: www.wobishe.com | Hits:
« 12 3 »

CodeBus www.codebus.net