Welcome![Sign In][Sign Up]
Location:
Search - watermarking authentication

Search list

[Wavelet用于JPEG2000图像认证的半脆弱性数字水印算法

Description: 用于JPEG2000图像认证的半脆弱性数字水印算法,一种新的算法-JPEG2000 image authentication for the semi-fragile watermarking algorithm, a new algorithm
Platform: | Size: 820224 | Author: | Hits:

[Graph programD542F922

Description: 彩色图像的篡改检测及自恢复算法赵春晖,孙建军,朱海峰(哈尔滨工程大学信息与通信工程学院,黑龙江哈尔滨150001)摘要:数字水印是图像认证的有效手段之一.利用小波变换提出一种计算简单的彩色图像水印算法,将一个图像的主要内容嵌入该图像自身之中,用均值量化的方法在亮度信号中嵌入水印,实现篡改检测和定位篡改区域;用多余的色度空间嵌入亮度信号和色度信号,用于恢复被篡改的图像内容.该算法可以获取较高的峰值信噪比,具有很好的鲁棒性.实验结果表明,该算法对删除、替换等恶意图像篡改具有良好的检测、定位和自修复能力.-color image tamper detection and self-recovery algorithm Zhao Chunhui, Sun Jianjun, Zhu Haifeng (Harbin Engineering University, Information and Communication Engineering Institute, Harbin, Heilongjiang 150001) Abstract : digital watermark image authentication is one of the effective means. Using wavelet transform A simple calculation of the color image watermarking algorithm, an image of the main elements embedded in the image itself, and use of quantitative methods mean the luminance signal embedded watermark, achieve tamper detection and localization tampering with the region; use of surplus space embedded color luminance signals and chrominance signals, for the restoration of tampering with the image content. The algorithm can generate a higher signal-to-noise ratio of the peak value, h
Platform: | Size: 237568 | Author: ghostsx | Hits:

[OtherDigital_Fragile_Watermarking_Scheme_For_Authentica

Description: Digital Fragile Watermarking Scheme For Authentication Of JPEG Images 对于鉴别JPEG图象的数字易损水印方案-Digital Fragile Watermarking Scheme For Authentication Of JPEG Images for the Identification of the number of JPEG image fragile watermarking program
Platform: | Size: 557056 | Author: Aier | Hits:

[Otherreversible-data-embedding-using-a-difference-expan

Description: 利用difference expansion水印隐藏! 方法是利用Haar整数变换,或是S变换在LSB里隐藏水印信息 -Watermark using difference expansion to hide! Method is to use integer Haar transform, or the S transform in the LSB in the hidden watermark information
Platform: | Size: 1276928 | Author: ereast | Hits:

[Special Effectscor_embed_mod

Description: research on authentication watermarking technology. Here a watermarking scheme for color image authentication is proposed, which operates in the wavelet domain. -research on authentication watermarking technology. Here a watermarking scheme for color image authentication is proposed, which operates in the wavelet domain.
Platform: | Size: 1024 | Author: xiaxianming | Hits:

[Documentshash

Description: 这是一篇基于Hash函数敏感性的医学图像精确认证.本文提出了一种基于提升格式的整数小波变换和Hash函数敏感性相结合的易碎水印方法-This is a Hash Function Based on the sensitivity of the medical image accurate authentication. In this paper, a lifting scheme based on integer wavelet transform and Hash function that combines the sensitivity of fragile watermarking method
Platform: | Size: 616448 | Author: hj | Hits:

[Graph programSemi_fragilewatermarking

Description: 内容认证半脆弱水印算法的研究与实现,本程序实现图像的半脆弱水印,是基于DCT的算法,特别适合研究半脆弱水印的同志-Content authentication semi-fragile watermarking algorithm for Research and Implementation of, the procedures for the realization of the semi-fragile watermarking images is based on the DCT algorithm, especially appropriate to study the semi-fragile watermarking comrades
Platform: | Size: 303104 | Author: byleimin | Hits:

[Special EffectsAudioWatermarkingforContentAuthentication

Description: 该水印算法具有以下特点:1)结合音频自身的特性,不仅能够自适应划分音频数据段,而且能够智能调节水印嵌入强度,增强了数字音频水印的鲁棒性;2)能够同时进行数字音频的版权保护与内容认证,并可大致确定篡改发生区域,仿真实验表明,文中算法不仅具有较好的不可感知性,而且对常规处理具有较好的鲁棒性,同时能够对替换等而已篡改做出报警并确定被篡改位置。-The watermarking algorithm has the following characteristics: 1) combined with the audio of its own characteristics, not only adaptive division of the audio data segment, but also can adjust watermark embedding intelligent strength, enhanced digital audio watermark robustness 2) can at the same time digital audio copyright protection and content authentication, and can generally determine the tampering occurred in the region, simulation experiments show that the algorithm not only has better not be perceived, but also on conventional treatment has good robustness, at the same time be able to tamper with it to make replacement alarm and to determine the location has been tampered with.
Platform: | Size: 2048 | Author: byleimin | Hits:

[matlabADDAwatermarking

Description: 用MATLAB实现了该算法,并对所实现方法进行了验证,在步骤(3)中则给出了求出滤波器类型及参数的方案,并进行验证,在步骤(4)中通过MATLAB的AWGN函数等相关知识实现了AWGN信道的仿真。 本文首先介绍数字水印和音频水印的相关概念和发展概况,接着介绍了完成仿真工作所需的基础知识,之后提出DA/AD变换的仿真实现,-Using MATLAB realization of the algorithm, and the realization method of authentication, in step (3) in the given filter type and parameters to derive the program and verify, in step (4) through MATLAB-AWGN function and other relevant knowledge to achieve the AWGN channel simulation. This paper first introduces the digital watermarking and audio watermarking-related concepts and developments, and then introduced a complete simulation of the basic knowledge required, after the DA/AD conversion of the simulation,
Platform: | Size: 3072 | Author: byleimin | Hits:

[Industry researchRecognition.of.human.Iris.Patterns

Description: This a thesis paper on iris recognition. it will be very helpful in guyz who are doin projects on biometric authentication- This is a thesis paper on iris recognition. it will be very helpful in guyz who are doin projects on biometric authentication
Platform: | Size: 1758208 | Author: Shaheer | Hits:

[Wavelet119128624MATLAB2660-3160

Description: 水印技术 充分了解数字水印技术在版权保护,尤其是在多媒体数据版权保护等方面的重要作用和前景, 通过几种基于小波变换的数字水印和其他经典的数字水印方案的研究比较,验证小波域的水印的透明性鲁棒性等特点。 要求利用工具进行仿真试验。-Watermarking technology to fully understand the digital watermarking technology in copyright protection, especially in the multimedia data such as copyright protection of the essential aspects of the role and prospects of several wavelet-based digital watermarking and other classic study of digital watermarking program comparison, wavelet domain authentication transparency of watermark robustness characteristics. Require the use of simulation tools.
Platform: | Size: 188416 | Author: 尚朝晖 | Hits:

[WaveletWaterMark8

Description: 数字水印处理,嵌入、提取、认证,可以在图形,视频和文本中添加数字水印,增强文档的保密,防止泄密-Digital watermarking processing, embedding, extraction, authentication, can be in graphics, video and digital watermarking to add text to enhance the confidentiality of documents to prevent leak
Platform: | Size: 69632 | Author: elton | Hits:

[Crack Hackd2

Description: 利用HASH(采用sha-1算法)算法原理,设计数字签名的水印算法,完成嵌入、(提取)验证,-Use HASH (using sha-1 algorithm) algorithm, design of watermarking algorithms digital signature to complete the embedding, (extract) authentication,
Platform: | Size: 34816 | Author: 尉玉林 | Hits:

[Windows Developbiometric

Description: This matlab code is for paper "Biometric Image Integrity Authentication Based on SVD and Fragile Watermarking"
Platform: | Size: 1024 | Author: Sathvika | Hits:

[Special EffectsSemi_FragileAuthenticationWatermark

Description: 基于DCT压缩前后不变量,编写的抗JPEG压缩的数字图像认证水印算法,具有良好的抵抗压缩、剪切、篡改等性能的水印仿真程序-Around the DCT-based compression is not variable, the preparation of the anti-JPEG compression algorithm for digital image authentication watermark with good resistance to compression, shear, distort the watermark, such as performance simulation program
Platform: | Size: 1740800 | Author: 刘德华 | Hits:

[matlabdwprotected

Description: Matlab source code for DCT-based watermarking for grayscale images. DCT-based watermark recovering without resorting to the uncorrupted original image. Digital watermarking has been proposed as a viable solution to the need of copyright protection and authentication of multimedia data in a networked environment, since it makes possible to identify the author, owner, distributor or authorized consumer of a document. A new watermarking technique to add a code to digital images is presented: the method operates in the frequency domain embedding a pseudo-random sequence of real numbers in a selected set of DCT coefficients. Watermark casting is performed by exploiting the masking characteristics of the Human Visual System, to ensure watermark invisibility. The embedded sequence is extracted without resorting to the original image, so that the proposed technique represents a major improvement to methods relying on the comparison between the watermarked and original images.
Platform: | Size: 98304 | Author: omar | Hits:

[Documentswatermark-based-image-authentication

Description: 一篇关于图像认证的博士论文,对弱水印的图像认证进行了系统的阐述,并做了有益的创新。-A doctoral thesis on the image authentication, watermarking for image authentication weak conducted a systematic exposition, and has done a useful innovation.
Platform: | Size: 21810176 | Author: robert | Hits:

[matlabPAPER1

Description: This paper gives a comprehensive survey on 3D mesh watermarking, which is considered an effective solution to the above two emerging problems. Our survey covers an introduction to the relevant state of the art, Many researchers, from both the academic and the industrial sectors, have become aware of their intellectual property protection and authentication problems arising with their increasing use. In this paper we spacialy discus the advantages and disadvantages of the transformed domain methods and the spatial domain methods.
Platform: | Size: 232448 | Author: shishir | Hits:

[Program docA-reversible-watermarking-authentication-scheme-f

Description: A reversible watermarking authentication scheme for wirele-A reversible watermarking authentication scheme for wireless
Platform: | Size: 432128 | Author: book123 | Hits:

[Special EffectsDigital-Watermarking

Description: 基于视觉密码的彩色图像水印。认证信息由标记的密码、水印和密码生成。-Visual cryptography based color image watermarking. Authentication information generated by the tag code, watermark and password.
Platform: | Size: 5120 | Author: 田叶 | Hits:
« 12 3 »

CodeBus www.codebus.net