Welcome![Sign In][Sign Up]
Location:
Search - attacks

Search list

[Windows Developattack_wmk

Description: 各种水印攻击实验,包含了大部分的操作,例如压缩,剪切,旋转等-various experimental watermark attacks, including most of the operations, such as compression, shear, rotate, etc.
Platform: | Size: 2048 | Author: 刘江 | Hits:

[matlabmatlab-break

Description: 这是关于数字水印的攻击例程!经过调试,可以放心使用!-This is on digital watermarking attacks routines! After debugging, can be assured use!
Platform: | Size: 3072 | Author: 水印 | Hits:

[Internet-Networkcnsrf

Description: The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses. -The Network Security Response Framework ( NSRF) allows for testing different computer se curity response engines and methodologies. It supports simulated and real : Intrusion Detection Systems (sensors). Attacks, and Responses.
Platform: | Size: 1217536 | Author: 高铁柱 | Hits:

[Special Effectsxxx1111

Description: 利用matlab实现数字水印源码。提供了各种攻击的实现。-using Matlab digital watermarking source. Provide a variety of attacks realized.
Platform: | Size: 2048 | Author: lum | Hits:

[Documents20070815

Description: 提出了一种基于小波域的图像数字水印算法·该算法将相互正交的两种水印(鲁棒水印和参考 水印)同时添加到经过DWT后的载体图像小波系数中,然后用小波反变换得到添加了水印的图像·用提取出 的参考水印来估计图像所受到的攻击,由于提取出的鲁棒水印所受的攻击与参考水印受到的攻击一样,因此 可以估计出原始的鲁棒水印·通过对嵌入水印的图像进行加入噪声、滤波、压缩以及裁剪等大量图像处理等试 验,均能正确检测出水印,表明该算法具有很好的感知效果和鲁棒性 -A wavelet-based image digital watermarking algorithm that the algorithm will be mutually orthogonal two watermarks (watermark robust watermarking and reference) at the same time added to the carrier after image after DWT wavelet coefficients, and then using wavelet transform has been Add a watermark image to use to extract a reference to estimate the watermark image by the attacks, as a result of the robust watermark extracted suffered attacks and the reference watermark by the same attack, it can be estimated through the original Robust Watermarking of the embedded watermark image by adding noise, filtering, compression and cutting, such as a large number of image processing such as testing, can correctly detect the watermark, show that the algorithm has good performance and robustness of perception
Platform: | Size: 190464 | Author: 李倩 | Hits:

[Internet-NetworkDoS

Description: DOS攻击原理介绍。,利用syn洪水技术,使用原始套接字的伪造源地址技术-Introduce the principle of DOS attacks. The use of syn floods technology, the use of raw socket forged source address technical
Platform: | Size: 12288 | Author: 尤好 | Hits:

[OtherWormhole_Simulation_Code

Description: This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego, 5-6 February 2004. -This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego, 5-6 February 2004.
Platform: | Size: 41984 | Author: 旺老财 | Hits:

[Special Effectsattack

Description: 这写程序是对加水印之后图像的攻击,包括加噪声,各种滤波,剪切,压缩攻击和旋转等。-This writing process is a plus watermark image after the attacks, including the increase in noise, various filtering, shear, compression and rotation attacks.
Platform: | Size: 129024 | Author: 晁文婷 | Hits:

[matlabdm_dct_fenkuai

Description: 在DCT域,利用8*8分块DM方法,嵌入隐藏信息。可设置量化步长、选择各种经典的攻击方式和控制攻击强弱。返回误码率和峰值信噪比。利用Matlab编写。-In the DCT domain, the use of 8* 8 block DM methods, embedding hidden information. Quantization step size can be set to choose a variety of classic attacks and control the strength of the attack. Return to the bit error rate and peak signal to noise ratio. Prepared using Matlab.
Platform: | Size: 148480 | Author: 张湛 | Hits:

[WEB Codephp

Description: 壹、功能说明:  一、具有回覆留言的功能  二、可删除留言  三、可防文字灌爆攻击  四、可显示访客IP(只有版主可见) 贰、系统设定:  一、系统档设定:Setup.php,这个档案重要至极,一定要详加设定  二、设定完留言资料位置,别忘了改资料夹名称 参、下次进度报告:  一、留言版防卫系统  二、可用FrontPage等网页编辑软体整修留言版的任何版面-Next, the functional description: First, a reply message with the function of two or three messages can be deleted, the text can be anti-灌爆four attacks, to show visitors IP (Moderators only visible) Second, the system settings: First, the system configuration file : Setup.php, this file extremely important, we must carefully set II, set the End of message data location, do not forget to change the name of the folder Senate, the next progress report: First, Second, message board defense system that can be used, such as FrontPage web page editing software of any renovation message board layout
Platform: | Size: 31744 | Author: geful | Hits:

[Crack HackRijindael

Description: 对称密码体制的发展趋势将以分组密码为重点。分组密码算法通常由密钥扩展算法和加密(解密)算法两部分组成。密钥扩展算法将b字节用户主密钥扩展成r个子密钥。加密算法由一个密码学上的弱函数f与r个子密钥迭代r次组成。混乱和密钥扩散是分组密码算法设计的基本原则。抵御已知明文的差分和线性攻击,可变长密钥和分组是该体制的设计要点。-Symmetric cryptosystem trends will focus on block cipher. Block cipher algorithm is usually extended by the key algorithm and encryption (decryption) algorithm is composed of two parts. Key Expansion Algorithm will b-byte master key customers to expand into r sub-key. Encryption algorithm from a weak cryptography on the function f and r sub r th iteration key component. The spread of chaos and key block cipher algorithm is the basic principle of design. Explicitly known to resist differential and linear attacks, variable length keys and grouping of the system design features.
Platform: | Size: 3072 | Author: 王晓明 | Hits:

[matlabMATLAB_Watermarking

Description: 探讨MATLAB在 数字水印中的应用,利用MATLAB语言编程实现了一类数字水印算法的嵌入、攻击及提取过程,并给出了程序运行 的结果。 -MATLAB to explore in the digital watermarking application, the use of MATLAB programming language to achieve a class of digital watermarking algorithm for embedding, attacks and extraction process, and gives the results of the program is running.
Platform: | Size: 204800 | Author: zhaolei | Hits:

[Special Effectssss_0

Description: 数字水印算法实现包含有DCT水印嵌入算法,DWT水印嵌入算法,以及水印攻击和性能测试-Digital watermarking algorithm contains DCT watermark embedding algorithm, DWT watermark embedding algorithm, as well as the watermark attacks and performance testing
Platform: | Size: 4677632 | Author: 王安乾 | Hits:

[Graph Recognizedct1_embed

Description: research on against geometry attacks watermarking technology. A digital Watermarking scheme, which is based on combination of simple and reliable harries detector and image normalization, is proposed. The feather points remain holding after geometry attack. Applying image normalization to these non-overlapped circles which centered at the feature points, after that, we can determine area for watermark embedding. -research on against geometry attacks watermarking technology. A digital Watermarking scheme, which is based on combination of simple and reliable harries detector and image normalization, is proposed. The feather points remain holding after geometry attack. Applying image normalization to these non-overlapped circles which centered at the feature points, after that, we can determine area for watermark embedding.
Platform: | Size: 1024 | Author: xiaxianming | Hits:

[Special Effectsdwt_recover

Description: we embed watermarks in the original circles. In this way, the synchronization issue for watermark embedding and detecting can be best solved. Simulation results show that this method can resist variety of Geometry Attack, such as rotation, scaling, shearing and other common signal attacks. -we embed watermarks in the original circles. In this way, the synchronization issue for watermark embedding and detecting can be best solved. Simulation results show that this method can resist variety of Geometry Attack, such as rotation, scaling, shearing and other common signal attacks .
Platform: | Size: 1024 | Author: xiaxianming | Hits:

[Special Effectswe

Description: 图片数字水印的添加,攻击和测试,十分完整-Add a picture of digital watermarking, attacks and testing, very complete
Platform: | Size: 2048 | Author: 无字 | Hits:

[Special EffectsDCT

Description: 基于DCT域的鲁棒水印,能抗击一定程度的压缩,剪切等攻击-Based on the DCT domain robust watermarking, can fight against a certain degree of compression, shear, such as attacks
Platform: | Size: 43008 | Author: Robin | Hits:

[Software EngineeringAttacks.tar

Description: A very good document about TCPIP protocol Possible Attacks.Very helpful for people write network applications
Platform: | Size: 56320 | Author: spider | Hits:

[Special EffectsDCT-water-print

Description: 实现了添加水印及攻击水印的一些方法。攻击水印方法包括抖动攻击、滤波攻击、旋转攻击等-Add watermark and implementation of a number of methods to attack the watermark. Watermarking attack methods include jitter attacks, filtering attacks, spin attack
Platform: | Size: 1372160 | Author: 任双印 | Hits:

[OtherAttacks

Description: Check mark Attacks for watermarking
Platform: | Size: 171008 | Author: peyman ayubi | Hits:
« 12 3 4 5 6 7 8 9 10 ... 50 »

CodeBus www.codebus.net