Welcome![Sign In][Sign Up]
Location:
Search - attack watermarking

Search list

[Special EffectsInvertibility-attack-against-watermarking-based-on

Description: Invertibility attack against watermarking based on forged algorithm and a countermeasure,是讲数字水印攻击的资料
Platform: | Size: 264588 | Author: 101 | Hits:

[Graph programCheckmark

Description: 一个数字水印评测软件,包含多种评测数字水印算法的指标和攻击方法。-a digital watermark Evaluation software includes a variety of digital watermarking algorithm for evaluation of indicators and ways to attack.
Platform: | Size: 3664896 | Author: 张华 | Hits:

[Graph programwatermark综述+代码

Description: 数字水印算法实现(matlab程序包),包含有DCT水印嵌入算法,DWT水印嵌入算法,以及水印攻击和性能测试程序。参考价值极大-digital watermarking algorithm (Matlab package), including a watermark embedded DCT algorithm, DWT algorithm embedded watermark, watermark and attack and performance testing procedures. Great value
Platform: | Size: 1996800 | Author: 杨柯 | Hits:

[GDI-Bitmapyzd

Description: 信息隐藏检测与攻击技术研究!02年我的毕业设计,看看网上到处有人找,忍痛奉献。水印攻击代码,请勿用于非法用途!ABOUTUS(本软件可以检测一切基于空域隐藏的信息和一部分基于频域隐藏的信息,可以攻击目前绝大部分数字水印,特别独特的IBM攻击技术可以攻击目前所有的数字水印。)-information hiding and attack detection technology! 02, I graduated from the design, look at the Internet is full of people looking for and reluctantly dedication. Watermark attack code, do not for illegal purposes! ABOUTUS (The software can detect hidden airspace based on all the information and part is based on frequency domain hidden information, we can attack the majority of the current digital watermarking, unique special attack IBM technology can attack all current digital watermarking.)
Platform: | Size: 1735680 | Author: 杨智丹 | Hits:

[Internet-Networkattackofwatermarking

Description: 通过程序介绍的一些算法,可以对信息隐藏技术实施攻击,特别是水印技术.-procedures introduced by the algorithm, the information can be hidden to attack technology, in particular watermarking technology.
Platform: | Size: 3072 | Author: 侯开浩 | Hits:

[matlabwatermark-MATLAB

Description: 数字水印技术是当前比较流行的防盗版技术,本程序包括水印的嵌入,一般攻击,水印提取,水印的检测-digital watermarking technology is currently more popular anti-piracy technology, the process includes the embedded watermark, the general attack Extraction watermark, watermark detection
Platform: | Size: 563200 | Author: 魏凯 | Hits:

[matlabDCT_watermark

Description: 全套的DCT域数字水印源代码(本人毕业设计成果)内容包括:水印嵌入,水印检测,攻击实验以测试鲁棒性,重要参数计算。希望对做数字水印的XDJM有所帮助。-complete DCT digital watermarking source code (I graduated design results) include : watermark embedding, Watermark detection, attack experiment to test the robustness, an important parameter calculation. Want to do digital watermarking Wilson help.
Platform: | Size: 520192 | Author: 魏凯 | Hits:

[Special EffectsRSAttack

Description: RS攻击M程序,用于检测图像是否经过LSB密写-RS attack M procedures for detecting whether the image after LSB steganalysis
Platform: | Size: 1024 | Author: jack | Hits:

[Graph program174CA929

Description: 数字水印的攻击方法和对策浅析电子书胡启明(武汉理工大学信息工程学院)摘要:在保护数字图像、视频、音频等数字媒体的知识产权方面,数字水印技术是一种很有前景的方法。由于作为版权标记的数字水印正面临着越来越多的攻击,对数字水印的稳健性要求也越来越高。笔者对4类不同原理的数字水印攻击:简单水印攻击、同步水印攻击 削去水印攻击和IBM水印攻击进行了详细论述,并给出了相应的解决对策。-digital watermarking method of the attacks and countermeasures of e-books Huo (Wuhan Polytechnic University, the Information Engineering Institute) Abstract : the protection of digital images, video, audio and other digital media in regard to intellectual property rights, Digital watermarking technology is a promising approach. Due to copyright labeled as digital watermarking is facing a growing number of attacks, Digital watermarking to the stability requirements have become more sophisticated. The author of four different types of digital watermarking principle of attack : simple watermark attack Synchronous watermark attack defrocked watermark attacks and IBM watermark attacks discussed in detail. and the corresponding solutions.
Platform: | Size: 171008 | Author: ghostsx | Hits:

[Graph programblindwatermark

Description: 数字水印程序,包括多分辨嵌入水印、提取水印程序,盲水印嵌入、提取程序,以及滤波攻击和JPEG攻击程序,PSNR和相似度计算公式(MATLAB)-digital watermarking procedures, including multiresolution embedded watermark, watermark extraction procedure, blind watermark embedding and extraction procedures, Filtering and attack and attack JPEG procedures, PSNR and the similarity calculation formula (MATLAB)
Platform: | Size: 3072 | Author: 成兴 | Hits:

[Documents20070815

Description: 提出了一种基于小波域的图像数字水印算法·该算法将相互正交的两种水印(鲁棒水印和参考 水印)同时添加到经过DWT后的载体图像小波系数中,然后用小波反变换得到添加了水印的图像·用提取出 的参考水印来估计图像所受到的攻击,由于提取出的鲁棒水印所受的攻击与参考水印受到的攻击一样,因此 可以估计出原始的鲁棒水印·通过对嵌入水印的图像进行加入噪声、滤波、压缩以及裁剪等大量图像处理等试 验,均能正确检测出水印,表明该算法具有很好的感知效果和鲁棒性 -A wavelet-based image digital watermarking algorithm that the algorithm will be mutually orthogonal two watermarks (watermark robust watermarking and reference) at the same time added to the carrier after image after DWT wavelet coefficients, and then using wavelet transform has been Add a watermark image to use to extract a reference to estimate the watermark image by the attacks, as a result of the robust watermark extracted suffered attacks and the reference watermark by the same attack, it can be estimated through the original Robust Watermarking of the embedded watermark image by adding noise, filtering, compression and cutting, such as a large number of image processing such as testing, can correctly detect the watermark, show that the algorithm has good performance and robustness of perception
Platform: | Size: 190464 | Author: 李倩 | Hits:

[matlabgaosixulie_watermark

Description: 由高斯正态分布序列产生 ,经(7,4)汉明编码,得到水印信号。能抵抗压缩 滤波等攻击-Sequence generated by the Gaussian normal distribution, with (7,4) Hamming code, the watermark signal. Resistant to compression filtering attack
Platform: | Size: 9216 | Author: zhangyiyi | Hits:

[Software EngineeringDCT-based_Image_Digital_Watermarking

Description: 基于DCT域的图像数字水印技术: 摘要:数字水印技术作为数字媒体版权保护的有效办法,近年来在国内外引起了人们极大的兴趣。作者采用了DCT离散余弦变换的算法,对图像这种多媒体数字作品进行了数字水印的嵌入和检测研究。并且使用了高效实用的编程工具MATLAB来介绍了一种DCT域的图像数字水印嵌入和提取的实例,并且在最后对嵌入水印的图像进行了攻击实验,验证了该算法的鲁棒性和不可见性。-Based on the DCT domain image watermarking techniques: Abstract: Digital watermarking of digital media technology as an effective means of copyright protection, in recent years both at home and abroad has aroused great interest. The author adopted the DCT discrete cosine transform algorithms, the image of this multi-media digital works for the digital watermark embedding and detection research. And the use of efficient MATLAB programming tools useful to introduce a DCT domain image watermarking embedding and extraction examples, and in the final of the embedded watermark image of the attack experiments verify the robustness of the algorithm and non- Visibility.
Platform: | Size: 533504 | Author: 绯村剑心 | Hits:

[Special Effectswork

Description: 一种基于DCT变换的数字水印算法的实现过程,水印为伪随机序列,包括嵌入和提取两个过程。其中textmark.m为攻击实验代码。-DCT-based Digital Watermarking Algorithm Transform realize the process, the watermark for the pseudo-random sequence, including both the process of embedding and extraction. Textmark.m experiment in which the attack code.
Platform: | Size: 2048 | Author: 陈日进 | Hits:

[Special Effects048

Description: 本文设计了一种简单的实用数字水印系统。详细论述了二值数字水印的嵌入与提取算法以及具体实现,并对其抗攻击能力作了一定程度的分析。最后利用MATLAB工具实现了一个简单的基于空域变换与BP神经网络的实用数字水印系统。-In this paper, design a simple and practical digital watermarking system. Discussed in detail binary digital watermark embedding and extraction algorithms as well as the concrete realization, and its anti-attack capability of the analysis to a certain extent. Finally the use of MATLAB tools for the realization of a simple space-based transform and BP neural networks of practical digital watermarking system.
Platform: | Size: 1164288 | Author: 亓先军 | Hits:

[Special EffectsInvertibility-attack-against-watermarking-based-on

Description: Invertibility attack against watermarking based on forged algorithm and a countermeasure,是讲数字水印攻击的资料-Invertibility attack against watermarking based on forged algorithm and a countermeasure, it is speaking of information digital watermarking attacks
Platform: | Size: 264192 | Author: 101 | Hits:

[Waveletdft

Description: 基于dft的水印代码,水印注入、提取、防攻击测试-DFT-based watermarking code, watermark injection, extraction, anti-attack test
Platform: | Size: 356352 | Author: wjp | Hits:

[Graph programdakedwt1

Description: 数字水印技术攻击试验,实现噪声、滤波、剪切、压缩、旋转攻击-Digital Watermarking attack test, realize noise, filtering, shear, compression, rotation attack
Platform: | Size: 3072 | Author: 王江 | Hits:

[DocumentsOnDesignatedlyVerifiedNon-interactive)Watermarking

Description: On Designatedly Veried (Non-interactive)Watermarking Schemes-Although many watermarking schemes consider the case of universal veri¯ ability, it is undesirable in some applications. Designated veri¯ cation is a possible solution for this problem. Watermarking scheme with (non-interactive) designated veri¯ cation through non-invertible schemes was proposed by Lee et al [11] in 2003, to resolve multiple wa- termarking problem. Yoo et al [14] proposed a very similar watermarking scheme. In this paper, we propose a cryptanalytic attack on both of these schemes that allows a dishonest watermarker to send illegal watermarked images and to convince the designated veri¯ er or customer that received watermarked images are valid.We modify the above schemes to overcome the attack. Further, we also propose a new robust watermarking scheme with (non-interactive) designated veri¯ cation through non-invertible wa- termarks. Interestingly, our scheme can be extended for joint copyright protection (security of ownership rights fo
Platform: | Size: 145408 | Author: xiaowang | Hits:

[OtherLSB

Description: 本算法是用matalab编写的,主要阐述了抗攻击性的水印算法-Resistance to attack watermarking algorithm is proposed
Platform: | Size: 1024 | Author: 张敏 | Hits:
« 12 3 4 5 6 7 8 9 10 »

CodeBus www.codebus.net