搜索资源列表
DCT_watermark
- 全套的DCT域数字水印源代码(本人毕业设计成果)内容包括:水印嵌入,水印检测,攻击实验以测试鲁棒性,重要参数计算。希望对做数字水印的XDJM有所帮助。-complete DCT digital watermarking source code (I graduated design results) include : watermark embedding, Watermark detection, attack experiment to test the robustness, an im
StirmarkForAudio.rar
- 用于音频水印稳健性测试的攻击软件,非常流行。现在官方主页链接已失效。,Used to test the robustness of audio watermarking attack software, very popular. Now the official home page link has expired.
jiyudct
- DCT域数字水印源代码.水印嵌入,水印检测,攻击实验以测试鲁棒性,重要参数计算。希望对做数字水印的XDJM有所帮助。--DCT-domain digital watermarking source code. Watermark embedding, watermark detection, attack experiment to test the robustness, an important parameter calculation. Want to do digital waterm
stirmarkbenchmark409
- 用于数字水印的攻击测试,可以很好的检测水印的鲁棒性和可视性-For digital watermarking attack testing, can be a very good detection watermark robustness and visibility
DCT-SVD-Algorithm
- 基于DCT的SVD算法,对于几何攻击有很强的鲁棒性-DCT-SVD algorithm, robustness on geometry attack
LtoLHtoH_svd
- 本算法结合小波变换和SVD奇异值变换,实现了水印的嵌入和提取,载体图像的鲁棒性和水印的不可见性,提取出的水印图像的和原水印图像基本一致,抗攻击性强。-The algorithm combines wavelet transform and SVD singular value transformation, achieved watermark embedding and extraction, vector image watermark robustness and invisibility
DCT_SVD
- 本文提出一种在原始视频DCT(离散余弦变换)与SVD(奇异值分解)域自适应嵌入水印的算法。算法首先将视频流分割成一个个场景,场景中的视频图像被变换到DCT-SVD域中,水印量化嵌入在最大奇异上,实现了水印盲检测。同时实验证明该算法在满足透明性要求下也满足一定的鲁棒性要求,能够抵抗低通滤波、中值滤波、椒盐噪声、高斯噪声、H.264压缩攻击以及统计攻击和帧剪切等攻击。-This paper presents an original video in the DCT (Discrete Cosine
crtav
- 本源代码对嵌有水印的图像进行各种类型的攻击,验证其鲁棒性能。-Source code on the watermarked image various types of attack, verify its robustness.
mySift
- sift的C++版,在sift上找出鲁棒性最强的几个特征点,然后以这个点为圆心,以自适应性的尺度为半径画圆,这个非常适合运用于数字水印领域,适用于抵抗数字水印的几何攻击-sift the C++ version of the robustness of the sift to find the strongest on the number of feature points, and then to this point as the center of the scale of self-a
fourier
- 基于傅里叶域内的研究水印,实现其鲁棒性。数字水印技术,能有效的维护数字作品及数据的安全性,是信息隐藏领域的一个重要分支,它与信息安全、信息隐藏、数据加密等均有密切关系。数字水印有多个研究方向,主要集中在图像水印方面。基于傅立叶域的数字图像水印技术,是一种常见的水印算法,它具有算法简单,执行效率高,能有效对抗攻击的特点。-Research based on Fourier domain watermarking, to achieve its robustness. Digital waterma
shuiyin
- 作为信息隐藏的重要分支,数字水印是一种有效的数字产品版权保护和数据安全维护技术。近年来数字水印技术成为了信息安全领域的研究热点,也得到了较大的发展。基于变换域的水印技术是目前研究的热点和重点。本文系统介绍了数字水印的原理和应用方法,概要介绍了数字水印的几种主流算法,并重点研究了一种基于离散余弦变换(DCT)数字图像水印算法,并借助 MATLAB编程工具,实现数字水印的嵌入和提取仿真,以及为测试鲁棒性而对水印图像进行攻击实验。-As an important branch of informati
DCT-gongji
- 基于DCT的水印嵌入攻击和提取算法,对RST,加躁,JPEG压缩有较好的鲁棒性-DCT-based watermark embedding and extraction algorithm attack on RST, plus a bit, JPEG compression with better robustness
DCT
- 基于DCT的数字水印处理技术,本水印处理过程利用图像的缩放技术和调整原始图像的直方图,根据人眼视觉特性,在每个DCT变换块的DC分量上嵌入水印信息,并且在水印信息嵌入之前,对其进行置乱加密,提供双重安全保证,接着通过JPEG压缩攻击对DCT域的鲁棒性进行测试,证明了DCT的抗攻击能力。-DCT-based digital watermarking technique, the watermark processing technology and the use of image scaling
MATLAB(DCTPDWT)
- 基于DCT和DWT的水印的嵌入与提取,以及鲁棒性的检测,攻击检测-Based on the DCT and DWT watermarking embedding and extraction, as well as the robustness of detection, attack detection
lsb
- 基于LSB的彩色图像数字水印的matlab实现水印的嵌入与提取,能抵抗噪声,剪切等攻击,鲁棒性良好-Based on LSB of color image digital watermark matlab watermarking embedding and extracting, can resist noise, shear and attack, good robustness
dct
- 基于dct的伪随机序列的数字图像水印,算法较为简单,鲁棒性一般,不能很好地抵御噪声攻击-Dct pseudo-random sequence-based digital image watermarking algorithm is relatively simple and general robustness against noise attack can not
matlab.doc
- 数字音频水印的嵌入,提取,然后进行攻击性实验,检验其鲁棒性-Digital audio watermark embedding and extraction, and then attack experiment to test its robustness
kanggongji
- 水印抗攻击测试,基于小波变换,用于检测加入水印后图像的鲁棒性-Watermark anti-attack test for the detection of the robustness of the watermarked image based on wavelet transform
DIGITAL-WARTERMARKING
- 使用DCT和小波变换的数字音频水印生成/解码程序,可存活于方差0.05的高斯白噪声及不同程度的剪切。内含程序/测试文件介绍。-Digital wartermarking encoding/decoding program with DCT and wavelet transform. nice robustness against Gaussian noise with variance less than 0.05 and any type of cropping attack. fu
Internet-attack
- 研究Ienternet的鲁棒性,对某些节点进行蓄意攻击,研究网络的生命周期。-Research Ienternet robustness, deliberate attack on some nodes, research the life cycle of the network.