搜索资源列表
DCT_watermark
- 全套的DCT域数字水印源代码(本人毕业设计成果)内容包括:水印嵌入,水印检测,攻击实验以测试鲁棒性,重要参数计算。希望对做数字水印的XDJM有所帮助。-complete DCT digital watermarking source code (I graduated design results) include : watermark embedding, Watermark detection, attack experiment to test the robustness, an im
StirmarkForAudio.rar
- 用于音频水印稳健性测试的攻击软件,非常流行。现在官方主页链接已失效。,Used to test the robustness of audio watermarking attack software, very popular. Now the official home page link has expired.
jiyudct
- DCT域数字水印源代码.水印嵌入,水印检测,攻击实验以测试鲁棒性,重要参数计算。希望对做数字水印的XDJM有所帮助。--DCT-domain digital watermarking source code. Watermark embedding, watermark detection, attack experiment to test the robustness, an important parameter calculation. Want to do digital waterm
stirmarkbenchmark409
- 用于数字水印的攻击测试,可以很好的检测水印的鲁棒性和可视性-For digital watermarking attack testing, can be a very good detection watermark robustness and visibility
DCT-SVD-Algorithm
- 基于DCT的SVD算法,对于几何攻击有很强的鲁棒性-DCT-SVD algorithm, robustness on geometry attack
SIRB
- In this paper it is studied the dynamics of the robotic bird. The system performances are analyzed in terms of time response and robustness. It is study the relation between the angle of attack and the velocity of the bird, the tail influence, the gl
LtoLHtoH_svd
- 本算法结合小波变换和SVD奇异值变换,实现了水印的嵌入和提取,载体图像的鲁棒性和水印的不可见性,提取出的水印图像的和原水印图像基本一致,抗攻击性强。-The algorithm combines wavelet transform and SVD singular value transformation, achieved watermark embedding and extraction, vector image watermark robustness and invisibility
DCT_SVD
- 本文提出一种在原始视频DCT(离散余弦变换)与SVD(奇异值分解)域自适应嵌入水印的算法。算法首先将视频流分割成一个个场景,场景中的视频图像被变换到DCT-SVD域中,水印量化嵌入在最大奇异上,实现了水印盲检测。同时实验证明该算法在满足透明性要求下也满足一定的鲁棒性要求,能够抵抗低通滤波、中值滤波、椒盐噪声、高斯噪声、H.264压缩攻击以及统计攻击和帧剪切等攻击。-This paper presents an original video in the DCT (Discrete Cosine
crtav
- 本源代码对嵌有水印的图像进行各种类型的攻击,验证其鲁棒性能。-Source code on the watermarked image various types of attack, verify its robustness.
mySift
- sift的C++版,在sift上找出鲁棒性最强的几个特征点,然后以这个点为圆心,以自适应性的尺度为半径画圆,这个非常适合运用于数字水印领域,适用于抵抗数字水印的几何攻击-sift the C++ version of the robustness of the sift to find the strongest on the number of feature points, and then to this point as the center of the scale of self-a
fourier
- 基于傅里叶域内的研究水印,实现其鲁棒性。数字水印技术,能有效的维护数字作品及数据的安全性,是信息隐藏领域的一个重要分支,它与信息安全、信息隐藏、数据加密等均有密切关系。数字水印有多个研究方向,主要集中在图像水印方面。基于傅立叶域的数字图像水印技术,是一种常见的水印算法,它具有算法简单,执行效率高,能有效对抗攻击的特点。-Research based on Fourier domain watermarking, to achieve its robustness. Digital waterma
shuiyin
- 作为信息隐藏的重要分支,数字水印是一种有效的数字产品版权保护和数据安全维护技术。近年来数字水印技术成为了信息安全领域的研究热点,也得到了较大的发展。基于变换域的水印技术是目前研究的热点和重点。本文系统介绍了数字水印的原理和应用方法,概要介绍了数字水印的几种主流算法,并重点研究了一种基于离散余弦变换(DCT)数字图像水印算法,并借助 MATLAB编程工具,实现数字水印的嵌入和提取仿真,以及为测试鲁棒性而对水印图像进行攻击实验。-As an important branch of informati
DCT-gongji
- 基于DCT的水印嵌入攻击和提取算法,对RST,加躁,JPEG压缩有较好的鲁棒性-DCT-based watermark embedding and extraction algorithm attack on RST, plus a bit, JPEG compression with better robustness
DCT
- 基于DCT的数字水印处理技术,本水印处理过程利用图像的缩放技术和调整原始图像的直方图,根据人眼视觉特性,在每个DCT变换块的DC分量上嵌入水印信息,并且在水印信息嵌入之前,对其进行置乱加密,提供双重安全保证,接着通过JPEG压缩攻击对DCT域的鲁棒性进行测试,证明了DCT的抗攻击能力。-DCT-based digital watermarking technique, the watermark processing technology and the use of image scaling
MATLAB(DCTPDWT)
- 基于DCT和DWT的水印的嵌入与提取,以及鲁棒性的检测,攻击检测-Based on the DCT and DWT watermarking embedding and extraction, as well as the robustness of detection, attack detection
lsb
- 基于LSB的彩色图像数字水印的matlab实现水印的嵌入与提取,能抵抗噪声,剪切等攻击,鲁棒性良好-Based on LSB of color image digital watermark matlab watermarking embedding and extracting, can resist noise, shear and attack, good robustness
dct
- 基于dct的伪随机序列的数字图像水印,算法较为简单,鲁棒性一般,不能很好地抵御噪声攻击-Dct pseudo-random sequence-based digital image watermarking algorithm is relatively simple and general robustness against noise attack can not
matlab.doc
- 数字音频水印的嵌入,提取,然后进行攻击性实验,检验其鲁棒性-Digital audio watermark embedding and extraction, and then attack experiment to test its robustness
kanggongji
- 水印抗攻击测试,基于小波变换,用于检测加入水印后图像的鲁棒性-Watermark anti-attack test for the detection of the robustness of the watermarked image based on wavelet transform
Internet-attack
- 研究Ienternet的鲁棒性,对某些节点进行蓄意攻击,研究网络的生命周期。-Research Ienternet robustness, deliberate attack on some nodes, research the life cycle of the network.