Description: 本文构造一种扩频和量化混合模型,并提出了一种图像多小波变换域内基于扩频和量化的混合数字水印方案,通过理论分析给出了扩频长度、信道容量、检测错误率等参数间的关系,实验结果表明算法实现了水印鲁棒性前提下的水印容量最大化的目的.-this paper, a spread spectrum and quantitative hybrid model, and proposes a number of images based on wavelet transform domain spread spectrum and quantification of mixed digital watermarking programs, Through theoretical analysis of the spread spectrum given length, channel capacity, the error rate testing parameters such as the relationship between them, Experimental results show that the watermark algorithm robust watermark under the premise of the purpose of maximizing capacity. Platform: |
Size: 469524 |
Author:阳光 |
Hits:
Description: RAKE receiver for direct-sequence spread spectrum systems
Simulink model of a simple direct-sequence spread spectrum system with RAKE reception-RAKE receiver for direct-sequence spread spectrum systems Simulink model of a simple dir ect- sequence spread spectrum system with RAKE reception Platform: |
Size: 11264 |
Author:李艳芬 |
Hits:
Description: 本文构造一种扩频和量化混合模型,并提出了一种图像多小波变换域内基于扩频和量化的混合数字水印方案,通过理论分析给出了扩频长度、信道容量、检测错误率等参数间的关系,实验结果表明算法实现了水印鲁棒性前提下的水印容量最大化的目的.-this paper, a spread spectrum and quantitative hybrid model, and proposes a number of images based on wavelet transform domain spread spectrum and quantification of mixed digital watermarking programs, Through theoretical analysis of the spread spectrum given length, channel capacity, the error rate testing parameters such as the relationship between them, Experimental results show that the watermark algorithm robust watermark under the premise of the purpose of maximizing capacity. Platform: |
Size: 468992 |
Author:阳光 |
Hits:
Description: 利用DCT域进行扩频水印的嵌入,含实验图像,和各种经典的攻击方式。可选择嵌入强度和攻击强度。利用Matlab编写-DCT domain using spread-spectrum watermark embedding, with the experimental images, and various classical attacks. The option embedded in the strength and intensity of attacks. Prepared using Matlab Platform: |
Size: 115712 |
Author:张湛 |
Hits:
Description: COX提出DCT域扩频水印嵌入算法。
这个算法是一个非盲水印,可以在此基础上改进得到盲水印算法-COX proposed DCT-domain spread spectrum watermark embedding algorithm. The algorithm is a non-blind watermarking, you can improve on this basis to be Blind Watermarking Algorithm Platform: |
Size: 1024 |
Author:lulu |
Hits:
Description: This an pdf file for information on spread spectrum.-This is an pdf file for information on spread spectrum. Platform: |
Size: 1024 |
Author:giridhar |
Hits:
Description: 一种基于DCT的扩频水印算法,本算法通过对水印信息进行扩频,在原始载体图像的DCT域内进行水印嵌入。-DCT-based spread spectrum watermarking algorithm, the algorithm is spreading through the watermark information in the original carrier image of the DCT domain for watermark embedding. Platform: |
Size: 28672 |
Author:林旭亮 |
Hits:
Description: 基于扩频的数字水印技术,水印信息分布于载体作品的多个频率系数,每个频率系数上负荷的水印能量很小,平衡水印的鲁棒性和不可感知性上的矛盾。-Digital watermarking based on spread spectrum technology, the watermark is found in a number of frequency coefficient vector works, each frequency coefficient on the load of the watermark energy is small, balance the robustness and non-perception of the conflict. Platform: |
Size: 126976 |
Author:梁兰 |
Hits:
Description: 本文算法是将24 位真彩图的亮度分量分块
DCT ,然后利用DCT 量化系数的奇偶特性嵌入8
位灰度水印图,并通过PN 序列加密来保证水印的
安全性。算法中,将灰度图像转换为二进制数据
流,置乱后扩频调制,隐藏在宿主DCT 系数量化值
中,提取时不需要宿主信号,实现水印信号的盲提
取。-This algorithm is 24-bit true color pictures of the luminance component of block DCT, quantization DCT coefficients and then use the parity properties of 8-bit grayscale watermark embedding map, and through the PN sequence of encryption to ensure the security of the watermark. Algorithm, the gray image into binary data stream, scrambling after the spread spectrum modulation, hidden in the host DCT coefficient quantization values, the extraction does not require the host signal, the blind watermark extraction. Platform: |
Size: 284672 |
Author:王秀梅 |
Hits:
Description: 基于小波变换的扩频图象数字水印,将水印嵌入到小波中。以保证信息的安全-Spread spectrum based on wavelet transform image watermarking, the watermark is embedded into the wavelet. To ensure information security Platform: |
Size: 1024 |
Author:lina |
Hits:
Description: One of the threats to watermarking security is unauthorized removal. In this paper, we present a framework based on extended TPM to solve this problem. As to the spread spectrum (SS) watermarking schemes we believe that it has the capability of read- but-not-remove if the platform software environment on which watermark detection process run is trusted. Platform: |
Size: 1024 |
Author:Joben |
Hits:
Description: One of the threats to watermarking security is unauthorized removal. In this paper, we present a framework based on extended TPM to solve this problem. As to the spread spectrum (SS) watermarking schemes we believe that it has the capability of read- but-not-remove if the platform software environment on which watermark detection process run is trusted. Platform: |
Size: 66560 |
Author:Joben |
Hits:
Description: Speech Based Watermarking for Digital Images
This paper presents a novel scheme of
watermarking of digital images for copyright protection and
authentication. In this paper we proposed a method of
embedding owner’s speech signal. Speech being a biometric data,
the watermark signal in this method is expected to be more
meaningful and has closer correlation with copyright holder.
The main issue of concern here is the capacity because the speech
data has large number of samples. Linear predictive coding is
used to encode the audio data. Here, speech samples are
imperceptibly inserted using spread spectrum technique into the
mid frequency band of wavelet transform of image which makes
it robust to lossy compression. Applications for such a speechhiding
scheme include copy protection, authentication and covert
communication. Platform: |
Size: 195584 |
Author:Nayan Patel |
Hits:
Description: In this paper we proposed a method of
embedding owner’s speech signal. Speech being a biometric data,
the watermark signal in this method is expected to be more
meaningful and has closer correlation with copyright holder.
The main issue of concern here is the capacity because the speech
data has large number of samples. Linear predictive coding is
used to encode the audio data. Here, speech samples are
imperceptibly inserted using spread spectrum technique into the
mid frequency band of wavelet transform of image which makes
it robust to lossy compression. Applications for such a speechhiding
scheme include copy protection, authentication and covert
communication. Platform: |
Size: 1614848 |
Author:Nayan Patel |
Hits:
Description: 实现直接序列扩频水印的嵌入与提取。基于待嵌入消息生成二进制水印序列,生成扩频码,用消息序列调制生成水印序列。依次处理灰度图像的每一个载体图像像素,根据相应位置 水印序列完成嵌入修改。(Realize the embedding and extraction of direct sequence spread spectrum watermark. The binary watermark sequence is generated based on the message to be embedded, the spread spectrum code is generated, and the watermark sequence is generated by message sequence modulation. Each carrier image pixel of gray image is processed in turn, and the embedding modification is completed according to the corresponding position watermark sequence.) Platform: |
Size: 2048 |
Author:Ryotsuto |
Hits:
Description: Watermarking is an operation of embedding infor-
mation into an image in a way that allows to identify ownership
of the image despite applying some distortions on it. In this
paper, we present a novel end-to-end solution for embedding and
recovering the watermark in the digital image using convolutional
neural networks. We propose a spreading method of the message
over the spatial domain of the image, hence reducing the local
bits per pixel capacity and significantly increasing robustness. To
obtain the model we use adversarial training, apply noiser layers
between the encoder and the decoder, and implement a precise
JPEG approximation. Moreover, we broaden the spectrum of
typically considered attacks on the watermark and we achieve
high overall robustness, most notably against JPEG compression,
Gaussian blur, subsampling or resizing. We show that an appli-
cation of some attacks could increase robustness against other
non-seen during training distortions across one group of attacks
— a proper grouping of the attacks according to their scope
allows to achieve high general robustness Platform: |
Size: 774757 |
Author:bamzi334 |
Hits: