Welcome![Sign In][Sign Up]
Location:
Search - image attack matlab

Search list

[Special EffectsRSAttack

Description: RS攻击M程序,用于检测图像是否经过LSB密写-RS attack M procedures for detecting whether the image after LSB steganalysis
Platform: | Size: 1024 | Author: jack | Hits:

[Graph programattack_wmk

Description: 在图像中加入水印,在提取水印时,需要知道原始的水印数据,并做了提取和攻击测试-Add watermark in image in the watermark extraction, the need to know the original watermark data and make the extraction and attack test
Platform: | Size: 2048 | Author: 王少飞 | Hits:

[Documents20070815

Description: 提出了一种基于小波域的图像数字水印算法·该算法将相互正交的两种水印(鲁棒水印和参考 水印)同时添加到经过DWT后的载体图像小波系数中,然后用小波反变换得到添加了水印的图像·用提取出 的参考水印来估计图像所受到的攻击,由于提取出的鲁棒水印所受的攻击与参考水印受到的攻击一样,因此 可以估计出原始的鲁棒水印·通过对嵌入水印的图像进行加入噪声、滤波、压缩以及裁剪等大量图像处理等试 验,均能正确检测出水印,表明该算法具有很好的感知效果和鲁棒性 -A wavelet-based image digital watermarking algorithm that the algorithm will be mutually orthogonal two watermarks (watermark robust watermarking and reference) at the same time added to the carrier after image after DWT wavelet coefficients, and then using wavelet transform has been Add a watermark image to use to extract a reference to estimate the watermark image by the attacks, as a result of the robust watermark extracted suffered attacks and the reference watermark by the same attack, it can be estimated through the original Robust Watermarking of the embedded watermark image by adding noise, filtering, compression and cutting, such as a large number of image processing such as testing, can correctly detect the watermark, show that the algorithm has good performance and robustness of perception
Platform: | Size: 190464 | Author: 李倩 | Hits:

[Special Effectsattack

Description: 这写程序是对加水印之后图像的攻击,包括加噪声,各种滤波,剪切,压缩攻击和旋转等。-This writing process is a plus watermark image after the attacks, including the increase in noise, various filtering, shear, compression and rotation attacks.
Platform: | Size: 129024 | Author: 晁文婷 | Hits:

[matlabpatchwork

Description: 利用patchwork方法,嵌入0-1水印。可设置像素修改值、选择各种经典的攻击方式和控制攻击强弱。返回提取的水印信息和峰值信噪比。利用Matlab编写。-The use of patchwork approach, embedding the watermark 0-1. Modify pixel values can be set to choose a variety of classic attacks and control the strength of the attack. Back to extract the watermark information and peak signal to noise ratio. Prepared using Matlab.
Platform: | Size: 108544 | Author: 张湛 | Hits:

[matlabSTDM

Description: 利用STDM方法嵌入水印信息,可设置量化步长,选择各种经典的攻击方式,控制攻击强弱,返回误码率和峰值信噪比-Stdm method using embedded watermark information, to set the quantization step size, choose a variety of classic attacks, controlling the strength of the attack and returned to the bit error rate and peak signal to noise ratio
Platform: | Size: 56320 | Author: 张湛 | Hits:

[Special EffectsArnold

Description: 对于图像进行ANORLD变换,在图像嵌入水印的过程中,可以对要嵌入的水印图像先进性置乱操作,可以有效地抵抗剪切攻击-For images ANORLD transform, watermark embedding in the image of the process, can the watermark image to embed the advanced nature of the scrambling operation, can effectively attack the shear resistance
Platform: | Size: 1024 | Author: 奚溪 | Hits:

[Software EngineeringDCT-based_Image_Digital_Watermarking

Description: 基于DCT域的图像数字水印技术: 摘要:数字水印技术作为数字媒体版权保护的有效办法,近年来在国内外引起了人们极大的兴趣。作者采用了DCT离散余弦变换的算法,对图像这种多媒体数字作品进行了数字水印的嵌入和检测研究。并且使用了高效实用的编程工具MATLAB来介绍了一种DCT域的图像数字水印嵌入和提取的实例,并且在最后对嵌入水印的图像进行了攻击实验,验证了该算法的鲁棒性和不可见性。-Based on the DCT domain image watermarking techniques: Abstract: Digital watermarking of digital media technology as an effective means of copyright protection, in recent years both at home and abroad has aroused great interest. The author adopted the DCT discrete cosine transform algorithms, the image of this multi-media digital works for the digital watermark embedding and detection research. And the use of efficient MATLAB programming tools useful to introduce a DCT domain image watermarking embedding and extraction examples, and in the final of the embedded watermark image of the attack experiments verify the robustness of the algorithm and non- Visibility.
Platform: | Size: 533504 | Author: 绯村剑心 | Hits:

[Graph Recognizedct1_embed

Description: research on against geometry attacks watermarking technology. A digital Watermarking scheme, which is based on combination of simple and reliable harries detector and image normalization, is proposed. The feather points remain holding after geometry attack. Applying image normalization to these non-overlapped circles which centered at the feature points, after that, we can determine area for watermark embedding. -research on against geometry attacks watermarking technology. A digital Watermarking scheme, which is based on combination of simple and reliable harries detector and image normalization, is proposed. The feather points remain holding after geometry attack. Applying image normalization to these non-overlapped circles which centered at the feature points, after that, we can determine area for watermark embedding.
Platform: | Size: 1024 | Author: xiaxianming | Hits:

[matlabattack

Description: 一套由matlab编程的基于小波的水印应用图片例子-A set of matlab programming applications based on wavelet image watermark example
Platform: | Size: 10240 | Author: chenxeifong | Hits:

[Special Effectsmatlab

Description: 基于matlab做的数字水印,文件包括源代码及原图像和加入水印后的图像,经过测试,能有效抗攻击-Matlab-based digital watermarking so that the document includes the source code and the original image and adding a watermark image, tested and effective anti-attack
Platform: | Size: 759808 | Author: 张伟 | Hits:

[Picture Viewerproj_matlab

Description: 实现水印嵌入,提取水印和对图像进行jpeg攻击-The realization of watermark embedding, watermark extraction and image jpeg attack
Platform: | Size: 1024 | Author: jjj | Hits:

[Otherhundun_svd_0525

Description: 效果非常好的数字水印的源代码,实现了基于小波变换的奇异值分解算法,选取载体图像的LH子带作为载体,并进行攻击测试算法性能-The effect of a very good source of digital watermarking, wavelet transform based on the realization of the singular value decomposition algorithm, select the carrier of the LH sub-band image as a carrier and test algorithm to attack
Platform: | Size: 2048 | Author: xiaobao89 | Hits:

[WaveletLtoLHtoH_svd

Description: 本算法结合小波变换和SVD奇异值变换,实现了水印的嵌入和提取,载体图像的鲁棒性和水印的不可见性,提取出的水印图像的和原水印图像基本一致,抗攻击性强。-The algorithm combines wavelet transform and SVD singular value transformation, achieved watermark embedding and extraction, vector image watermark robustness and invisibility, the extracted watermark image and the original watermark image are basically the same, anti-attack and strong.
Platform: | Size: 1024 | Author: liuyuan | Hits:

[Graph programDCT_SVD

Description: 本文提出一种在原始视频DCT(离散余弦变换)与SVD(奇异值分解)域自适应嵌入水印的算法。算法首先将视频流分割成一个个场景,场景中的视频图像被变换到DCT-SVD域中,水印量化嵌入在最大奇异上,实现了水印盲检测。同时实验证明该算法在满足透明性要求下也满足一定的鲁棒性要求,能够抵抗低通滤波、中值滤波、椒盐噪声、高斯噪声、H.264压缩攻击以及统计攻击和帧剪切等攻击。-This paper presents an original video in the DCT (Discrete Cosine Transform) and SVD (singular value decomposition) algorithm for adaptive watermark embedding. Firstly, a video stream is divided into scenes, scenes of the video image is converted to the DCT-SVD domain, the watermark embedded in the largest singular quantification, the realization of the watermark signal. Furthermore, the experiments show that the algorithm meet the transparency requirements are met under certain robustness requirements, can resist the low-pass filtering, median filtering, salt and pepper noise, Gaussian noise, H.264 compression attacks and attacks and frame shear statistics attack.
Platform: | Size: 63488 | Author: 久久 | Hits:

[matlabshuzishuiyindeng

Description: 基于LSB图像隐藏系统的设计与实现,LSB算法代码,信息隐藏攻击算法,DCT域的隐藏以及数字水印。-LSB based image hiding system design and implementation, LSB algorithm code, information hiding attack algorithm, DCT hiding and digital watermarking domain.
Platform: | Size: 14183424 | Author: abcd0609 | Hits:

[Special Effectsshuiyin

Description: 作为信息隐藏的重要分支,数字水印是一种有效的数字产品版权保护和数据安全维护技术。近年来数字水印技术成为了信息安全领域的研究热点,也得到了较大的发展。基于变换域的水印技术是目前研究的热点和重点。本文系统介绍了数字水印的原理和应用方法,概要介绍了数字水印的几种主流算法,并重点研究了一种基于离散余弦变换(DCT)数字图像水印算法,并借助 MATLAB编程工具,实现数字水印的嵌入和提取仿真,以及为测试鲁棒性而对水印图像进行攻击实验。-As an important branch of information hiding, digital watermarking is an effective copyright protection of digital products and data security maintenance technology. In recent years, digital watermarking has become a hot research field of information security, has also been considerable development. Transform domain watermarking technique based on the current research focus and focus. This system describes the principles and applications of digital watermarking methods, an overview of several mainstream digital watermarking algorithms, and focus on a discrete cosine transform (DCT) digital image watermarking, and with the MATLAB programming tools, digital watermark embedding and extraction simulation, as well as test the robustness of the watermark image on the attack experiments.
Platform: | Size: 2048 | Author: yang cheng | Hits:

[Special Effectsprogram

Description: 彩色图像嵌入二值水印,提取以及攻击matlab程序-Color image embedded binary watermark extraction and attack matlab program
Platform: | Size: 927744 | Author: 李司 | Hits:

[Special EffectsDigital-watermarking-attack-testing

Description: 这是我做的数字水印算法中的一部分,关于图像攻击测试的几个matlab程序,简单修改就可以直接引用了。-This is the part I do digital watermarking algorithm, image attack test several matlab program, a simple modification can be directly quoted.
Platform: | Size: 1024 | Author: 韩元超 | Hits:

[Special EffectsMATLAB数字水印[dwt+dct多攻击+GUI界面]

Description: 本课题为基于MATLAB的小波变换dwt和离散余弦dct的多方法对比数字水印系统。带GUI交互界面。有一个主界面GUI,可以调用dwt方法的子界面和dct方法的子界面。流程包括,读取宿主图像和水印图像,嵌入,多种方法的攻击(剪切,加噪,旋转等),提取,最后利用psnr峰值信噪比进行评价不同攻击下,鲁棒性的好坏。(This topic is based on MATLAB wavelet transform DWT and discrete cosine DCT multi method comparison digital watermarking system. With GUI interface. There is a main interface GUI, which can call the sub interface of DWT method and DCT method. The process includes: reading host image and watermark image, embedding, attack of various methods (cutting, adding noise, rotation, etc.), extracting, and finally evaluating the robustness of different attacks by using PSNR peak signal-to-noise ratio.)
Platform: | Size: 32044032 | Author: www.wobishe.com | Hits:
« 12 »

CodeBus www.codebus.net