Welcome![Sign In][Sign Up]
Location:
Search - attack on digital watermarking

Search list

[GDI-Bitmapyzd

Description: 信息隐藏检测与攻击技术研究!02年我的毕业设计,看看网上到处有人找,忍痛奉献。水印攻击代码,请勿用于非法用途!ABOUTUS(本软件可以检测一切基于空域隐藏的信息和一部分基于频域隐藏的信息,可以攻击目前绝大部分数字水印,特别独特的IBM攻击技术可以攻击目前所有的数字水印。)-information hiding and attack detection technology! 02, I graduated from the design, look at the Internet is full of people looking for and reluctantly dedication. Watermark attack code, do not for illegal purposes! ABOUTUS (The software can detect hidden airspace based on all the information and part is based on frequency domain hidden information, we can attack the majority of the current digital watermarking, unique special attack IBM technology can attack all current digital watermarking.)
Platform: | Size: 1735477 | Author: 杨智丹 | Hits:

[Graph program9B788F87

Description: 数字水印对抗几何攻击方法的研究膏净,台莉春,张志请(同济大学计算机科学与工程系,上海200092)搞蔓:提出了一种新的基于图像原点矩的几何变换参数估计算法,经实验验证它能有效地估计图像的旋转角度和尺度缩放参数,利用这些参数可以对被测水印化载体图像进行相应校正和水印检测。-confrontation geometric digital watermarking method of attack paste net, Taiwan-Li-chun, Zhang requested (Tongji University Department of Computer Science and Engineering, Shanghai 200092) engage vines : presents a new image based on the geometric origin moment transform parameter estimation algorithm, Experiments showed it can effectively estimate the image rotation and scaling parameters. use these parameters can be measured on the carrier watermark image corresponding watermark detection and correction.
Platform: | Size: 199432 | Author: ghostsx | Hits:

[Graph Recognizedct1_embed

Description: research on against geometry attacks watermarking technology. A digital Watermarking scheme, which is based on combination of simple and reliable harries detector and image normalization, is proposed. The feather points remain holding after geometry attack. Applying image normalization to these non-overlapped circles which centered at the feature points, after that, we can determine area for watermark embedding.
Platform: | Size: 1580 | Author: xiaxianming | Hits:

[GDI-Bitmapyzd

Description: 信息隐藏检测与攻击技术研究!02年我的毕业设计,看看网上到处有人找,忍痛奉献。水印攻击代码,请勿用于非法用途!ABOUTUS(本软件可以检测一切基于空域隐藏的信息和一部分基于频域隐藏的信息,可以攻击目前绝大部分数字水印,特别独特的IBM攻击技术可以攻击目前所有的数字水印。)-information hiding and attack detection technology! 02, I graduated from the design, look at the Internet is full of people looking for and reluctantly dedication. Watermark attack code, do not for illegal purposes! ABOUTUS (The software can detect hidden airspace based on all the information and part is based on frequency domain hidden information, we can attack the majority of the current digital watermarking, unique special attack IBM technology can attack all current digital watermarking.)
Platform: | Size: 1735680 | Author: 杨智丹 | Hits:

[Graph program9B788F87

Description: 数字水印对抗几何攻击方法的研究膏净,台莉春,张志请(同济大学计算机科学与工程系,上海200092)搞蔓:提出了一种新的基于图像原点矩的几何变换参数估计算法,经实验验证它能有效地估计图像的旋转角度和尺度缩放参数,利用这些参数可以对被测水印化载体图像进行相应校正和水印检测。-confrontation geometric digital watermarking method of attack paste net, Taiwan-Li-chun, Zhang requested (Tongji University Department of Computer Science and Engineering, Shanghai 200092) engage vines : presents a new image based on the geometric origin moment transform parameter estimation algorithm, Experiments showed it can effectively estimate the image rotation and scaling parameters. use these parameters can be measured on the carrier watermark image corresponding watermark detection and correction.
Platform: | Size: 198656 | Author: ghostsx | Hits:

[Software EngineeringDCT-based_Image_Digital_Watermarking

Description: 基于DCT域的图像数字水印技术: 摘要:数字水印技术作为数字媒体版权保护的有效办法,近年来在国内外引起了人们极大的兴趣。作者采用了DCT离散余弦变换的算法,对图像这种多媒体数字作品进行了数字水印的嵌入和检测研究。并且使用了高效实用的编程工具MATLAB来介绍了一种DCT域的图像数字水印嵌入和提取的实例,并且在最后对嵌入水印的图像进行了攻击实验,验证了该算法的鲁棒性和不可见性。-Based on the DCT domain image watermarking techniques: Abstract: Digital watermarking of digital media technology as an effective means of copyright protection, in recent years both at home and abroad has aroused great interest. The author adopted the DCT discrete cosine transform algorithms, the image of this multi-media digital works for the digital watermark embedding and detection research. And the use of efficient MATLAB programming tools useful to introduce a DCT domain image watermarking embedding and extraction examples, and in the final of the embedded watermark image of the attack experiments verify the robustness of the algorithm and non- Visibility.
Platform: | Size: 533504 | Author: 绯村剑心 | Hits:

[Special Effects048

Description: 本文设计了一种简单的实用数字水印系统。详细论述了二值数字水印的嵌入与提取算法以及具体实现,并对其抗攻击能力作了一定程度的分析。最后利用MATLAB工具实现了一个简单的基于空域变换与BP神经网络的实用数字水印系统。-In this paper, design a simple and practical digital watermarking system. Discussed in detail binary digital watermark embedding and extraction algorithms as well as the concrete realization, and its anti-attack capability of the analysis to a certain extent. Finally the use of MATLAB tools for the realization of a simple space-based transform and BP neural networks of practical digital watermarking system.
Platform: | Size: 1164288 | Author: 亓先军 | Hits:

[Graph Recognizedct1_embed

Description: research on against geometry attacks watermarking technology. A digital Watermarking scheme, which is based on combination of simple and reliable harries detector and image normalization, is proposed. The feather points remain holding after geometry attack. Applying image normalization to these non-overlapped circles which centered at the feature points, after that, we can determine area for watermark embedding. -research on against geometry attacks watermarking technology. A digital Watermarking scheme, which is based on combination of simple and reliable harries detector and image normalization, is proposed. The feather points remain holding after geometry attack. Applying image normalization to these non-overlapped circles which centered at the feature points, after that, we can determine area for watermark embedding.
Platform: | Size: 1024 | Author: xiaxianming | Hits:

[Special EffectsInvertibility-attack-against-watermarking-based-on

Description: Invertibility attack against watermarking based on forged algorithm and a countermeasure,是讲数字水印攻击的资料-Invertibility attack against watermarking based on forged algorithm and a countermeasure, it is speaking of information digital watermarking attacks
Platform: | Size: 264192 | Author: 101 | Hits:

[Special Effectsstirmark1

Description: stirmark是一款数字水印攻击测试软件,很实用的软件!-checkmark is a digital watermarking attack testing software, very useful software!
Platform: | Size: 6780928 | Author: lee | Hits:

[Software EngineeringApplicationofDigitalWatermarkingandthebenchmarking

Description: 图像数字水印的应用及基准测试软件:在讨论图像数字水印的各种应用及影响图像数字水印系统的重要参数的基础上,对数字水印的各种典型 的攻击方式进行了较完整的分析,最后对现有的典型基准测试程序进行了探讨,指出了它们的局限性.-Application of Digital Watermarking and the benchmarking software: Image Watermarking in the discussion of a wide range of applications and the impact of image watermarking system, an important parameter based on a variety of digital watermarking typical way to attack a more complete analysis, the final typical of the existing benchmarks are discussed, pointing out their limitations.
Platform: | Size: 279552 | Author: xinyi | Hits:

[Special EffectsApplicationonCopyrightProtectionofAudioDigitalWate

Description: 音频数字水印在版权保护中的应用 本文将数字水印技术应用于数字产品的版权保护中, 可以在MP3、CD 等作品中嵌入水印, 在人耳不能察觉的情况下达 到版权保护的目的, 并提出基于离散小波变换的音频数字水印方案和一种基于小波变换的音频数字水印的隐藏和检测算 法———基于信噪比确定伸缩因子α的自适应加性音频水印算法。-Application on Copyright Protection of Audio Digital Watermarking
Platform: | Size: 167936 | Author: Echo | Hits:

[Otherhundun_svd_0525

Description: 效果非常好的数字水印的源代码,实现了基于小波变换的奇异值分解算法,选取载体图像的LH子带作为载体,并进行攻击测试算法性能-The effect of a very good source of digital watermarking, wavelet transform based on the realization of the singular value decomposition algorithm, select the carrier of the LH sub-band image as a carrier and test algorithm to attack
Platform: | Size: 2048 | Author: xiaobao89 | Hits:

[OtherDCTwatermarking

Description: 基于数字水印算法,包含多种攻击方法,同时兼有脆弱和鲁棒水印。-Based on digital watermarking system, which involves a variety of attack methods, while both fragile and robust watermark.
Platform: | Size: 2686976 | Author: 杨龙 | Hits:

[OpenCVmySift

Description: sift的C++版,在sift上找出鲁棒性最强的几个特征点,然后以这个点为圆心,以自适应性的尺度为半径画圆,这个非常适合运用于数字水印领域,适用于抵抗数字水印的几何攻击-sift the C++ version of the robustness of the sift to find the strongest on the number of feature points, and then to this point as the center of the scale of self-adaptive radius circle, it is very suitable for the field of digital watermarking for Geometric attack resistant watermarking
Platform: | Size: 13123584 | Author: 房英明 | Hits:

[Special Effectsfourier

Description: 基于傅里叶域内的研究水印,实现其鲁棒性。数字水印技术,能有效的维护数字作品及数据的安全性,是信息隐藏领域的一个重要分支,它与信息安全、信息隐藏、数据加密等均有密切关系。数字水印有多个研究方向,主要集中在图像水印方面。基于傅立叶域的数字图像水印技术,是一种常见的水印算法,它具有算法简单,执行效率高,能有效对抗攻击的特点。-Research based on Fourier domain watermarking, to achieve its robustness. Digital watermarking technology to digital works and the effective maintenance of data security, information hiding is an important branch of the field, it is with information security, information hiding, data encryption Dengjun closely related. Digital watermarking has a number of research directions, mainly in terms of image watermarking. Fourier domain-based digital image watermarking technology, is a common watermarking algorithm, which algorithm is simple, the implementation of efficient, effective against attack characteristics.
Platform: | Size: 52224 | Author: 问题 | Hits:

[Special EffectsHash--and-watermarking

Description: 基于hash算法与信息安全,数字水印的嵌入和数字水印的攻击方法-Based on hash algorithm and information security, digital watermarking embedding and the attack methods of digital watermarking
Platform: | Size: 333824 | Author: wangtong | Hits:

[Software EngineeringDCT-digital-watermarking-technology

Description: 提出了一种基于纠错编码的DCT域数字水印算法,该算法在检测时不需要原始图像,实现了盲检。并且对水印图像进行了利用超混沌置乱处理,提高了安全性能和抗攻击能力。纠错编码的引入使水印抗攻击能力明显增强。 -DCT digital watermarking algorithm based on error correction coding, the algorithm detected without the original image, blind. And watermark image of the the hyperchaotic scrambling process, improve the safety performance and anti-attack capability. The introduction of error correction coding watermark anti-attack capability significantly enhanced.
Platform: | Size: 102400 | Author: 顾丽萍 | Hits:

[Special EffectsSVDshuzishuiyinsuanfayanjiu

Description: 基于SVD的数字水印算法研究,其中包括加密,攻击,解密,提取以及参数比较、运行时间的显示-Research on digital watermarking algorithm based on SVD, including encryption, attack, decrypt, extract and compare the parameters, run time display
Platform: | Size: 3072 | Author: 刘瑞雪 | Hits:

[Special EffectsDigital-watermarking-technology

Description: 数字水印算法,首先从原始图像中读出水印,再将水印图像进行压缩,然后将嵌入水印的图像读取出来,在对图像进行攻击后,对图像进行多次分解和重构,最终图像与原图应该差别不大 -The image digital watermarking, first the original image readout watermark, watermark is compressed, and then the watermark is embedded in the compressed image is read out, after the attack on the image, after multiple decomposition and reconstruction images and image should be little difference
Platform: | Size: 4672512 | Author: 裴蕾 | Hits:
« 12 »

CodeBus www.codebus.net