Welcome![Sign In][Sign Up]
Location:
Search - watermark attacks

Search list

[Windows Developattack_wmk

Description: 各种水印攻击实验,包含了大部分的操作,例如压缩,剪切,旋转等-various experimental watermark attacks, including most of the operations, such as compression, shear, rotate, etc.
Platform: | Size: 2771 | Author: 刘江 | Hits:

[Graph program174CA929

Description: 数字水印的攻击方法和对策浅析电子书胡启明(武汉理工大学信息工程学院)摘要:在保护数字图像、视频、音频等数字媒体的知识产权方面,数字水印技术是一种很有前景的方法。由于作为版权标记的数字水印正面临着越来越多的攻击,对数字水印的稳健性要求也越来越高。笔者对4类不同原理的数字水印攻击:简单水印攻击、同步水印攻击 削去水印攻击和IBM水印攻击进行了详细论述,并给出了相应的解决对策。-digital watermarking method of the attacks and countermeasures of e-books Huo (Wuhan Polytechnic University, the Information Engineering Institute) Abstract : the protection of digital images, video, audio and other digital media in regard to intellectual property rights, Digital watermarking technology is a promising approach. Due to copyright labeled as digital watermarking is facing a growing number of attacks, Digital watermarking to the stability requirements have become more sophisticated. The author of four different types of digital watermarking principle of attack : simple watermark attack Synchronous watermark attack defrocked watermark attacks and IBM watermark attacks discussed in detail. and the corresponding solutions.
Platform: | Size: 171299 | Author: ghostsx | Hits:

[Windows Developattack_wmk

Description: 各种水印攻击实验,包含了大部分的操作,例如压缩,剪切,旋转等-various experimental watermark attacks, including most of the operations, such as compression, shear, rotate, etc.
Platform: | Size: 2048 | Author: 刘江 | Hits:

[Firewall-SecurityStirMark_3_1_79

Description: StirMark可以从多方面测试水印算法的鲁棒性,用于测试的攻击手段包括线性滤波、非线性滤波、剪切/拼接攻击、同步性等。-StirMark from numerous tests robust watermark algorithm, used in testing the means of attack, including linear filter, non-linear filtering, shear/splicing attacks, such as synchronization.
Platform: | Size: 1007616 | Author: 杨琴 | Hits:

[matlabblind

Description: 一种利用小波变换的水印算法,实现了盲检测,可以对抗常见的几何攻击。-a wavelet transform the watermark algorithm achieved a blind testing can be used to confront common geometric attacks.
Platform: | Size: 1024 | Author: 袭乐宣 | Hits:

[Graph program174CA929

Description: 数字水印的攻击方法和对策浅析电子书胡启明(武汉理工大学信息工程学院)摘要:在保护数字图像、视频、音频等数字媒体的知识产权方面,数字水印技术是一种很有前景的方法。由于作为版权标记的数字水印正面临着越来越多的攻击,对数字水印的稳健性要求也越来越高。笔者对4类不同原理的数字水印攻击:简单水印攻击、同步水印攻击 削去水印攻击和IBM水印攻击进行了详细论述,并给出了相应的解决对策。-digital watermarking method of the attacks and countermeasures of e-books Huo (Wuhan Polytechnic University, the Information Engineering Institute) Abstract : the protection of digital images, video, audio and other digital media in regard to intellectual property rights, Digital watermarking technology is a promising approach. Due to copyright labeled as digital watermarking is facing a growing number of attacks, Digital watermarking to the stability requirements have become more sophisticated. The author of four different types of digital watermarking principle of attack : simple watermark attack Synchronous watermark attack defrocked watermark attacks and IBM watermark attacks discussed in detail. and the corresponding solutions.
Platform: | Size: 171008 | Author: ghostsx | Hits:

[Special Effectsxxx1111

Description: 利用matlab实现数字水印源码。提供了各种攻击的实现。-using Matlab digital watermarking source. Provide a variety of attacks realized.
Platform: | Size: 2048 | Author: lum | Hits:

[Special Effectsdwtprocedure

Description: 整个数字水印的程序。包括峰值信躁比的计算,各种攻击后的水印提取等等。-entire digital watermarking process. Including peak impatient than the letter, after the attacks watermark extraction, and so on.
Platform: | Size: 4096 | Author: 荆泽 | Hits:

[Documents20070815

Description: 提出了一种基于小波域的图像数字水印算法·该算法将相互正交的两种水印(鲁棒水印和参考 水印)同时添加到经过DWT后的载体图像小波系数中,然后用小波反变换得到添加了水印的图像·用提取出 的参考水印来估计图像所受到的攻击,由于提取出的鲁棒水印所受的攻击与参考水印受到的攻击一样,因此 可以估计出原始的鲁棒水印·通过对嵌入水印的图像进行加入噪声、滤波、压缩以及裁剪等大量图像处理等试 验,均能正确检测出水印,表明该算法具有很好的感知效果和鲁棒性 -A wavelet-based image digital watermarking algorithm that the algorithm will be mutually orthogonal two watermarks (watermark robust watermarking and reference) at the same time added to the carrier after image after DWT wavelet coefficients, and then using wavelet transform has been Add a watermark image to use to extract a reference to estimate the watermark image by the attacks, as a result of the robust watermark extracted suffered attacks and the reference watermark by the same attack, it can be estimated through the original Robust Watermarking of the embedded watermark image by adding noise, filtering, compression and cutting, such as a large number of image processing such as testing, can correctly detect the watermark, show that the algorithm has good performance and robustness of perception
Platform: | Size: 190464 | Author: 李倩 | Hits:

[Special Effectssss_0

Description: 数字水印算法实现包含有DCT水印嵌入算法,DWT水印嵌入算法,以及水印攻击和性能测试-Digital watermarking algorithm contains DCT watermark embedding algorithm, DWT watermark embedding algorithm, as well as the watermark attacks and performance testing
Platform: | Size: 4677632 | Author: 王安乾 | Hits:

[Graph Recognizedct1_embed

Description: research on against geometry attacks watermarking technology. A digital Watermarking scheme, which is based on combination of simple and reliable harries detector and image normalization, is proposed. The feather points remain holding after geometry attack. Applying image normalization to these non-overlapped circles which centered at the feature points, after that, we can determine area for watermark embedding. -research on against geometry attacks watermarking technology. A digital Watermarking scheme, which is based on combination of simple and reliable harries detector and image normalization, is proposed. The feather points remain holding after geometry attack. Applying image normalization to these non-overlapped circles which centered at the feature points, after that, we can determine area for watermark embedding.
Platform: | Size: 1024 | Author: xiaxianming | Hits:

[Special Effectsdwt_recover

Description: we embed watermarks in the original circles. In this way, the synchronization issue for watermark embedding and detecting can be best solved. Simulation results show that this method can resist variety of Geometry Attack, such as rotation, scaling, shearing and other common signal attacks. -we embed watermarks in the original circles. In this way, the synchronization issue for watermark embedding and detecting can be best solved. Simulation results show that this method can resist variety of Geometry Attack, such as rotation, scaling, shearing and other common signal attacks .
Platform: | Size: 1024 | Author: xiaxianming | Hits:

[Special EffectsDCT-water-print

Description: 实现了添加水印及攻击水印的一些方法。攻击水印方法包括抖动攻击、滤波攻击、旋转攻击等-Add watermark and implementation of a number of methods to attack the watermark. Watermarking attack methods include jitter attacks, filtering attacks, spin attack
Platform: | Size: 1372160 | Author: 任双印 | Hits:

[Software EngineeringAsequence-basedembeddedDCTdomainwatermarkingalgori

Description: ,应用MATLAB仿真按序选择嵌入位的DCT变换算法,对仿真程序运行后的各种参数 和效果图的变化进行了分析;最后结合GUI开发设计出数字水印执行过程仿真控制界面,并用常见的水印攻击测试了该算 法的鲁棒性。-Application MATLAB simulation embedded spaces in sequence selection algorithm of DCT transform, simulation program running on the various parameters and the effect of changes in the map analysis Finally, the design of GUI development of the implementation of digital watermarking process simulation control interface, and common watermark attacks tested the robustness of the algorithm.
Platform: | Size: 320512 | Author: xinyi | Hits:

[Special Effectswatermark

Description: 基于MATLAB环境的图像水印攻击试验源程序-MATLAB-based image watermarking attacks environment test source
Platform: | Size: 1024 | Author: shiyun | Hits:

[matlabwatermark

Description: 基于小波变换的数字水印算法matlab代码,含有各种攻击的效果对比,对做毕设的同学应该有帮助。-Digital Watermarking Based on Wavelet Transform algorithm matlab code, containing a variety of attacks on the effect of contrast on the Bi-based students should do help.
Platform: | Size: 484352 | Author: 占志刚 | Hits:

[Otheraudiowatermark

Description: 音频水印算法实现,其中包括水印的嵌入,音频水印常用攻击,以及检测算法的实现。-Audio watermarking algorithms, including the watermark embedding, audio watermarking common attacks, and the detection algorithm.
Platform: | Size: 2048 | Author: 王景 | Hits:

[matlabwatermark

Description: 嵌入同步信号以确定水印的嵌入位置,同时还可以抵抗各种时间轴上的同步攻击-Embedded sync signal to determine the location of the embedded watermark, but also resistant to a variety of simultaneous attacks timeline
Platform: | Size: 1024 | Author: 菁菁 | Hits:

[File FormatWatermark-steganography-attack

Description: 介绍水印攻击和隐写分析的算法与调用的函数等-Introduction watermark attacks and steganography algorithms and call functions, etc.
Platform: | Size: 208896 | Author: changmiao | Hits:

[Special Effectswatermark

Description: 基于脆弱性的水印嵌入算法,包括水印嵌入,水印攻击等-Based on the vulnerability of the watermark embedding algorithm, including watermark embedding, watermark attacks and so on
Platform: | Size: 748544 | Author: 柯南 | Hits:
« 12 3 4 5 6 »

CodeBus www.codebus.net