Welcome![Sign In][Sign Up]
Location:
Search - matlab watermark using wavelet

Search list

[GDI-BitmapExtractWatermark

Description: 采样一幅图.利用小波变根据二进制数(水印)来改变图片,提取其中一个子带的直方图.-a sampling plan. Using wavelet based binary variable (Watermark) to change the picture, which extraction of a subband histogram.
Platform: | Size: 1024 | Author: 刘德庆 | Hits:

[Graph programD542F922

Description: 彩色图像的篡改检测及自恢复算法赵春晖,孙建军,朱海峰(哈尔滨工程大学信息与通信工程学院,黑龙江哈尔滨150001)摘要:数字水印是图像认证的有效手段之一.利用小波变换提出一种计算简单的彩色图像水印算法,将一个图像的主要内容嵌入该图像自身之中,用均值量化的方法在亮度信号中嵌入水印,实现篡改检测和定位篡改区域;用多余的色度空间嵌入亮度信号和色度信号,用于恢复被篡改的图像内容.该算法可以获取较高的峰值信噪比,具有很好的鲁棒性.实验结果表明,该算法对删除、替换等恶意图像篡改具有良好的检测、定位和自修复能力.-color image tamper detection and self-recovery algorithm Zhao Chunhui, Sun Jianjun, Zhu Haifeng (Harbin Engineering University, Information and Communication Engineering Institute, Harbin, Heilongjiang 150001) Abstract : digital watermark image authentication is one of the effective means. Using wavelet transform A simple calculation of the color image watermarking algorithm, an image of the main elements embedded in the image itself, and use of quantitative methods mean the luminance signal embedded watermark, achieve tamper detection and localization tampering with the region; use of surplus space embedded color luminance signals and chrominance signals, for the restoration of tampering with the image content. The algorithm can generate a higher signal-to-noise ratio of the peak value, h
Platform: | Size: 237568 | Author: ghostsx | Hits:

[Software Engineeringwatermark_2

Description: 提出了一种离散小波变换域实现图像水印的方法。这种算法充分利用小波变换的特点,把原始图像及水印图像塔式分解,在多分辨率分解后的相同的频段来嵌入水印信息。该方法也利用了人眼视觉特性,算法简单而有效。实验证明,该算法较好地解决了水印不可见性与鲁棒性之间的矛盾,对常见的水印攻击都有较强的鲁棒性。-presents a discrete wavelet transform domain image watermarking method. This algorithm using wavelet transform characteristics, the original image and the watermark image tower decomposition, Multiresolution decomposition in the same frequency band to the embedded watermark. The method has also been used HVS, the algorithm is simple and effective. Experiments show that the algorithm can solve the watermark is visible with the robust nature of, common to have more attacks watermark robustness.
Platform: | Size: 151552 | Author: yy | Hits:

[File Format12456897514254265825

Description: 文章利用MATLAB语言及其小波工具箱,采用小波变换算法,开发数字水印嵌入系统,通过对原始静态图像和二值图像水印进行小波多分辨率分解,组合对应方向上的小波细节子图数据,从而实现了在原始静态图像上嵌入二值图像水印。有部分代码-article using MATLAB language and its toolbox, wavelet transform algorithm, development of digital watermark embedded systems, right through static images and the original binary image watermarking multiresolution wavelet decomposition, Portfolio corresponding direction on the details of wavelet-map data, thus realizing the original static image embedded binary image watermarking. Some code
Platform: | Size: 52224 | Author: ming-ming | Hits:

[Documents20070815

Description: 提出了一种基于小波域的图像数字水印算法·该算法将相互正交的两种水印(鲁棒水印和参考 水印)同时添加到经过DWT后的载体图像小波系数中,然后用小波反变换得到添加了水印的图像·用提取出 的参考水印来估计图像所受到的攻击,由于提取出的鲁棒水印所受的攻击与参考水印受到的攻击一样,因此 可以估计出原始的鲁棒水印·通过对嵌入水印的图像进行加入噪声、滤波、压缩以及裁剪等大量图像处理等试 验,均能正确检测出水印,表明该算法具有很好的感知效果和鲁棒性 -A wavelet-based image digital watermarking algorithm that the algorithm will be mutually orthogonal two watermarks (watermark robust watermarking and reference) at the same time added to the carrier after image after DWT wavelet coefficients, and then using wavelet transform has been Add a watermark image to use to extract a reference to estimate the watermark image by the attacks, as a result of the robust watermark extracted suffered attacks and the reference watermark by the same attack, it can be estimated through the original Robust Watermarking of the embedded watermark image by adding noise, filtering, compression and cutting, such as a large number of image processing such as testing, can correctly detect the watermark, show that the algorithm has good performance and robustness of perception
Platform: | Size: 190464 | Author: 李倩 | Hits:

[Special Effectswatermark

Description: Simple watermarking by using wavelets. Required Products: Image Processing Toolbox -Simple watermarking by using wavelets.Required Products: Image Processing Toolbox
Platform: | Size: 857088 | Author: 余于 | Hits:

[Crack Hackdctmatlab

Description: 提取图像的边缘信息 采用小波离散变换进行水印的嵌入 -Image edge information extraction using discrete wavelet transform of the embedded watermark
Platform: | Size: 1024 | Author: 奚溪 | Hits:

[Special Effectsdwt_embed

Description: 用Matlab实现的关于离散小波变换的数字水印嵌入的源代码,希望能对各位研究者有所帮助-Matlab realize using discrete wavelet transform on the digital watermark embedded in the source code, I hope you can help researchers
Platform: | Size: 1024 | Author: ysnowren | Hits:

[Waveletwavelets

Description: 用小波变换,对其小波系数进行提取关系,计算图像的psnr,可以在此基础上用小波系数加水印或提特征.-Using wavelet transform, the wavelet coefficients extracted their relations, computing image psnr, can be used on the basis of the wavelet coefficients plus the characteristics of a watermark or mention.
Platform: | Size: 2048 | Author: zhan | Hits:

[Waveletpcnnemb

Description: PCNN实现水印嵌入,利用PCNN对载体图象进行分割,找出边界,然后进行小波变换嵌入水印。-PCNN realize watermark embedding, using PCNN segmentation of vector images to identify the border, and then wavelet transform to embed watermarks.
Platform: | Size: 1024 | Author: 赵荣昌 | Hits:

[Crack HackDWT

Description: 利用同一密钥的混沌序列对经过置乱的水印信息实现双重加密,考虑小波变换的能量分布问题,把水印信息嵌入低频系数中,确保水印信息的可靠性。提取时利用图像复原方法实现盲检测。-Using the same key after a chaotic sequence of scrambling the watermark information to achieve the double encryption, consider the wavelet energy distribution problem, the watermark information embedded in low-frequency coefficients to ensure the reliability of watermark information. Extracted using image restoration method to achieve blind detection.
Platform: | Size: 625664 | Author: 王宇 | Hits:

[Special Effectswatermarking

Description: 采用小波变换的方法实现了数字水印的嵌入与提取,效果非常不错!-Using wavelet transform method to achieve the digital watermark embedding and extraction, the effect is very good!
Platform: | Size: 123904 | Author: wjh | Hits:

[matlabdwt_gray_watermaking

Description: 一种基于小波变换的灰度数字水印嵌入算法,使用matlab实现,含有原始论文。不过不是很理想,希望大家改进-Gray-scale based on wavelet transform digital watermark embedding algorithm, using matlab implementation, containing the original papers. But not very good, hope that we improve the
Platform: | Size: 258048 | Author: 陈小潘 | Hits:

[Crack Hackdwt_embed

Description: 数字水印嵌入算法,利用离散小波变换的(dwt)算法-Digital watermark embedding algorithm, using discrete wavelet transform (dwt) algorithm
Platform: | Size: 1024 | Author: 肖乐 | Hits:

[Software Engineeringdctwater

Description: 一种基于DCT域的不可见数字水印算法,文章源于IEEExplore-PERCEPTUAL DIGITAL WATERMARK OF IMAGES USING WAVELET TRANSFORM.pdf,down loaden from IEEE xplore
Platform: | Size: 446464 | Author: lifeng | Hits:

[matlabDistortionless_Data_Hiding

Description: The code implements the following paper: Guorong Xuan, Jiang Zhu, Jidong Chen, Shi Y.Q., Zhicheng Ni, Wei Su, "Distortionless data hiding based on integer wavelet transform" IET Electronics Letters, Volume: 38, Issue 25, page 1646- 1648, December 2002. (ISSN: 0013-5194) The watermark embedding and extraction modules have been implemented separately. The watermark embedding module embeds the watermark using bitplane compression in the integer wavelet transform domain. The watermark extraction module extracts the previously embedded watermark and restores the original image. A logo image is used as a watermark but can be replaced with any thing.-The code implements the following paper: Guorong Xuan, Jiang Zhu, Jidong Chen, Shi Y.Q., Zhicheng Ni, Wei Su, "Distortionless data hiding based on integer wavelet transform" IET Electronics Letters, Volume: 38, Issue 25, page 1646- 1648, December 2002. (ISSN: 0013-5194) The watermark embedding and extraction modules have been implemented separately. The watermark embedding module embeds the watermark using bitplane compression in the integer wavelet transform domain. The watermark extraction module extracts the previously embedded watermark and restores the original image. A logo image is used as a watermark but can be replaced with any thing.
Platform: | Size: 1015808 | Author: thinkingbig4 | Hits:

[matlabdwt-matLab-marking

Description: 提出了一种基于小波变换可抗击几何攻击算法。在水印嵌人 部分# 首先对宿主图像进行小波分解 、 嵌人水印, 再通过余弦变换求得该水印图像的一个特征向量, 利用该特征向量和水印 信息通过12 31 函数生成一个二值逻辑系列, 将该序列作为密钥/ 水印提取部分为# 对待测的图像进行小波变换, 再通过余 弦变换求得待测图像的一个特征向量, 利用该特征向量和密钥通过1 2 4 1 函数提取出水印。-Proposed based on wavelet transform algorithm can be against geometric attacks.# Watermark embedded in the first part of the host image wavelet decomposition, embedded watermark, and then through the cosine transform of the watermarked image obtained by a feature vector, using the feature vector and the watermark information through 1231 to generate a binary logic function series, the sequence as the key/watermark extraction part is# treated transform measured image, and then obtained through the cosine transform the image of a feature vector under test, using the feature vector and the key function by 1241 to extract the watermark .
Platform: | Size: 523264 | Author: 切尔西 | Hits:

[matlabWavelet-based-audio-watermark--code

Description: 基于小波的音频水印嵌入代码。采用DB1小波-Wavelet-based audio watermark embedding code. Using wavelet DB1
Platform: | Size: 3072 | Author: CNC | Hits:

[Special Effectswatermarking-image-aimage

Description: 在Matlab环境下实现图片的水印嵌入,利用离散小波变换,较好的实现了应有的功能,并且通过计算PSNR值很好的验证了水印算法的不可见性和鲁棒性。-Watermark image is realized in Matlab environment, using the discrete wavelet transform, achieve a better functions, and are in good agreement with the watermark imperceptibility and robustness by calculating the value of PSNR.
Platform: | Size: 622592 | Author: 石海凤 | Hits:

[Special EffectsMATLAB数字水印[dwt+dct多攻击+GUI界面]

Description: 本课题为基于MATLAB的小波变换dwt和离散余弦dct的多方法对比数字水印系统。带GUI交互界面。有一个主界面GUI,可以调用dwt方法的子界面和dct方法的子界面。流程包括,读取宿主图像和水印图像,嵌入,多种方法的攻击(剪切,加噪,旋转等),提取,最后利用psnr峰值信噪比进行评价不同攻击下,鲁棒性的好坏。(This topic is based on MATLAB wavelet transform DWT and discrete cosine DCT multi method comparison digital watermarking system. With GUI interface. There is a main interface GUI, which can call the sub interface of DWT method and DCT method. The process includes: reading host image and watermark image, embedding, attack of various methods (cutting, adding noise, rotation, etc.), extracting, and finally evaluating the robustness of different attacks by using PSNR peak signal-to-noise ratio.)
Platform: | Size: 32044032 | Author: www.wobishe.com | Hits:
« 12 »

CodeBus www.codebus.net