Welcome![Sign In][Sign Up]
Location:
Search - Chaos watermark

Search list

[Special Effectsdct1_watermarked

Description: Firstly, research on robust image watermarking. A digital watermarking scheme based on wavelet transform was proposed. It realizes the watermarking extract without the original image using 64×64×8 bit gray image as the watermark signal. In order to enhancing the security of the watermark, we employ an encryption technology based on chaos and bit plan. Simulation results show that our scheme have good invisibility and can survive low-quality JPEG compression, median filtering and so on. In addition, the analysis of the extracted watermark can help us to detect and localize tampers.
Platform: | Size: 102725 | Author: xiaxianming | Hits:

[Communicationabcde

Description: 水印技术由于水印提取函数chaosdetect是水印嵌入 函数逆过程,编程思想非常相似,-watermarking technology as watermark extraction function is chaosdetect watermark embedding process inverse function, programming ideas are very similar,
Platform: | Size: 1024 | Author: 唐糖堂 | Hits:

[Graph programLogisticWatermark

Description: 基于混沌的数字水印研究技术 matlab 编程 提取与嵌入-Chaos-based digital watermarking technology research extraction and Matlab programming embedded
Platform: | Size: 1024 | Author: xianzhao | Hits:

[Software Engineeringshasks

Description: 混沌易碎水印的图象可靠性研究.有兴趣的可以看一下-Chaos fragile watermark image reliability study. Are interested can look at
Platform: | Size: 43008 | Author: 彭克武 | Hits:

[Special Effectssvd

Description: 一个基于奇异值分解的数字水印源代码,其中可以实现混沌之乱和奇异之分解的数字水印嵌入 -A singular value decomposition-based Digital Watermarking source code, which can be achieved Chaos chaos and singular decomposition of the digital watermark embedded
Platform: | Size: 82944 | Author: anlang | Hits:

[Special Effectsdct1_watermarked

Description: Firstly, research on robust image watermarking. A digital watermarking scheme based on wavelet transform was proposed. It realizes the watermarking extract without the original image using 64×64×8 bit gray image as the watermark signal. In order to enhancing the security of the watermark, we employ an encryption technology based on chaos and bit plan. Simulation results show that our scheme have good invisibility and can survive low-quality JPEG compression, median filtering and so on. In addition, the analysis of the extracted watermark can help us to detect and localize tampers.-Firstly, research on robust image watermarking. A digital watermarking scheme based on wavelet transform was proposed. It realizes the watermarking extract without the original image using 64 × 64 × 8 bit gray image as the watermark signal. In order to enhancing the security of the watermark, we employ an encryption technology based on chaos and bit plan. Simulation results show that our scheme have good invisibility and can survive low-quality JPEG compression, median filtering and so on. In addition, the analysis of the extracted watermark can help us to detect and localize tampers.
Platform: | Size: 102400 | Author: xiaxianming | Hits:

[Graph programlogistic

Description: 生成混沌种子。能对原始的数字水印信息进行加密,分别显示-Generation of Chaos seed. To the original information of the digital watermark is encrypted, respectively, show
Platform: | Size: 1024 | Author: 肖涛 | Hits:

[Crack Hackhundun_svd

Description: 基于混沌加密的奇异值分解算法的源代码,实现了水印技术的预处理及嵌入提取过程。-Chaos-based encryption algorithm, singular value decomposition of the source code, a watermark embedding technology and extraction pretreatment.
Platform: | Size: 103424 | Author: xiaobao89 | Hits:

[Special Effectsmiyao

Description: 本文提出了基于二维混沌映射的数字图像水印算法,混沌具有随机性、似噪声及对初始条件的极端敏感性等特点。将经过二维混沌映射置乱后的数字水印信号嵌入图像小波域的低频系数,实现了数字水印的隐蔽性、保密性和稳固性;利用二维混沌映射Arnold变换对水印信号进行置乱,不仅增强了水印信号保密性,同时有效提高了视觉上抵抗图像剪切攻击的能力。-In this paper, two-dimensional chaotic map based on digital image watermarking algorithm, Chaos with random noise and the likelihood of extreme sensitivity to initial conditions and so on. Two-dimensional chaotic map will be scrambling after the digital watermark embedded image signal of the low-frequency coefficients in wavelet domain, the realization of a digital watermark hidden, security and stability the use of two-dimensional chaotic map on Arnold transform scrambling watermark signal, not only enhances the confidentiality of the watermark signal at the same time improve the visual image shear resistance attacks.
Platform: | Size: 668672 | Author: lafeng | Hits:

[Crack Hackchaos

Description: 实现对图像文件的三种变换功能,最主要的是混沌加密功能-To realize three kinds of image file conversion functions, most notably chaotic encryption
Platform: | Size: 1393664 | Author: leaf | Hits:

[Special EffectsArnold

Description: Arnold算法是一种用于混沌水印的算法。其本质是利用数学方法对矩阵进行置乱。该算法有一个别名叫做“猫水印”。-Arnold, chaos watermark, panda watermark
Platform: | Size: 1024 | Author: sular | Hits:

[Crack Hackchaos

Description: 基于混沌理论加密的图片水印加密技术源代码-Based on chaos theory, the image watermark encryption technology encryption source code
Platform: | Size: 7410688 | Author: hejian | Hits:

[Crack Hack自己敲的混沌加密

Description: 简单的混沌加密,在网易云课堂听课,做的笔记,简单的几个混沌加密,数字水印混沌加密,混沌加密生成二值图像、灰度图像、RGB图像(Simple chaos encryption, in the netease cloud class, take notes, a few simple chaos encryption, digital watermark chaos encryption, chaos encryption generated binary image, gray image, RGB image)
Platform: | Size: 4096 | Author: 李庆丹 | Hits:

CodeBus www.codebus.net