搜索资源列表
数字水印攻击软件及源代码 STIRMARK
- 数字水印技术处理程序集合,具有功能全,卡发好-digital watermarking technology procedures set with a full-featured, a good card
ufogame
- 用java实现的UFO攻击游戏,里面有代码和可执行文件,操作简单,用鼠标左键单击UFO, 每击落10架之后,就会增加一架。-used to achieve the UFO attack game, and they code and executable files, simple operation, using the left mouse button click UFO, each downed 10, will be an increase.
watermark-MATLAB
- 数字水印技术是当前比较流行的防盗版技术,本程序包括水印的嵌入,一般攻击,水印提取,水印的检测-digital watermarking technology is currently more popular anti-piracy technology, the process includes the embedded watermark, the general attack Extraction watermark, watermark detection
imlogpolar
- 实现图像的对数极坐标变换,具有旋转不变性,可用于数字水印的抗几何攻击-achieving the right number of images Polar transform, with a rotating invariance, the digital watermark can be used against geometric attack
DCT_watermark
- 全套的DCT域数字水印源代码(本人毕业设计成果)内容包括:水印嵌入,水印检测,攻击实验以测试鲁棒性,重要参数计算。希望对做数字水印的XDJM有所帮助。-complete DCT digital watermarking source code (I graduated design results) include : watermark embedding, Watermark detection, attack experiment to test the robustness, an im
matlab-break
- 这是关于数字水印的攻击例程!经过调试,可以放心使用!-This is on digital watermarking attacks routines! After debugging, can be assured use!
blind
- 一种利用小波变换的水印算法,实现了盲检测,可以对抗常见的几何攻击。-a wavelet transform the watermark algorithm achieved a blind testing can be used to confront common geometric attacks.
expend
- 针对二值图像的广泛应用,嵌入鲁棒性水印,测试其抵抗结合攻击的能力。-value against the wider use of images, embedded watermark robustness testing their resistance combination attacks.
n-Queen
- 算法设计:著名的n后问题:在nXn的棋盘上放彼此不受攻击的n个皇后,按国际象棋的规则,任何2个皇后不在同一行或同一列或同一斜线上. 本算法才用回朔法来解决.-algorithm design : n after the famous question : In nXn put on the chessboard of each other against attack n empress, according to the international rules of chess, any
zhy20070522144641601.Rar
- 《86gou购物系统单用户增强版》具有强大的商品管理、赠品管理、积分管理、订阅管理、分类管理、会员管理、销售员管理、订单管理、利润结算、信息管理、帮助管理、评论管理等功能,每个功能模块都尽可能从使用者的角度实现易用性、安全性和稳定性。 卓越的访问速度和负载能力 在实现同样功能的前提下,《86gou购物系统单用户增强版》比同类软件占用数据库资源更小,页面处理时间更短,可以在极为繁忙的服务器环境下快速稳定运行,最大程度的为使用者节约了服务器资源,为访问者提高了访问速度。 周
LSB.rar
- 利用LSB算法去实现了电子水印技术。代码完全实现了嵌入以及提取, 算法同时包含了4种攻击算法以及利用psnr测量提取的水印和攻击后提取的水印,This algorithm describes digital watermark technique by using LSB. This code implement embedding and extraction. At the meanwhile, this algorithm includes 4 different kinds of att
CollectionsofWaterMarkingAttack
- 关于各种数字水印攻击的MATLAB代码,可以用于仿真实验,调用方便简单-Digital watermarking attacks on a variety of MATLAB code that can be used for simulation experiments, to facilitate a simple call to
watermarking-robust
- 一个有鲁棒性的水印算法实现,可以抵抗几何攻击并有仿真-A robust watermarking algorithm, geometric attacks and a simulation
Resist-geometric-attacks
- 该算法把计算出的图像不变质心作为对其进行对数极坐标变换的原 点, 再作傅立叶变换, 取出中频段幅值作为水印嵌入域。该算法具有较好的鲁棒性、可检测性, 能同时抵抗几何攻击和信号 处理攻击, 它在数字图像的版权保护等领域有广泛的应用前景。-The algorithm to calculate the heart of the image does not degenerate as the number of its polar transformation of the origin, f
三维制导律仿真
- 三维比例导引法仿真,可以攻击静止/机动目标(Three dimensional proportional navigation simulation can attack stationary / maneuvering targets)
图像数字水印及其攻击测试
- 图像数字水印的测试程序,内含嵌入、提取和攻击测试程序,适合初级阶段学习使用。(Image digital watermark in the test program, containing the embedding, extraction and attacks test program, suitable for primary stage learning.)
MATLB
- 选择两张图片,一张水印图,一张嵌入图,将水印图进行Arnold置乱算法将其置乱,嵌入到嵌入图中,形成数字零水印,选用白噪声、高斯低通滤波、压缩、剪切、旋转攻击测试。以此观察图像鲁棒性(Select two pictures, a watermark and an embedded graph. We will scramble the watermark image with Arnold scrambling algorithm and embed it into the embedded m
导弹攻击区
- 导弹攻击区域确定,导弹的弹道仿真模拟。轨迹优化,Sumilink仿真等等。(The missile attack area is determined, and the ballistic simulation of the missile is simulated. Trajectory optimization, Sumilink simulation and so on.)
新建文件夹
- 这是一个运用matlab实现复杂网络蓄意攻击和随机攻击 的源代码,欢迎下载,可直接调用。(This is a source code which uses MATLAB to realize deliberate attack and random attack on complex network. Welcome to download and call it directly.)
网络抗毁性,MATLAB仿真
- Matlab中对建立好的网络进行节点/连边随机、蓄意攻击,用最大连通子图、网络效率来衡量网络的抗毁性,并找出最关键的节点的仿真程序。(In MATLAB, the nodes / edges of the established network are attacked randomly and intentionally. The invulnerability of the network is measured by the maximum connectivity sub graph a