搜索资源列表
yzd
- 信息隐藏检测与攻击技术研究!02年我的毕业设计,看看网上到处有人找,忍痛奉献。水印攻击代码,请勿用于非法用途!ABOUTUS(本软件可以检测一切基于空域隐藏的信息和一部分基于频域隐藏的信息,可以攻击目前绝大部分数字水印,特别独特的IBM攻击技术可以攻击目前所有的数字水印。)-information hiding and attack detection technology! 02, I graduated from the design, look at the Internet is ful
watermark-MATLAB
- 数字水印技术是当前比较流行的防盗版技术,本程序包括水印的嵌入,一般攻击,水印提取,水印的检测-digital watermarking technology is currently more popular anti-piracy technology, the process includes the embedded watermark, the general attack Extraction watermark, watermark detection
174CA929
- 数字水印的攻击方法和对策浅析电子书胡启明(武汉理工大学信息工程学院)摘要:在保护数字图像、视频、音频等数字媒体的知识产权方面,数字水印技术是一种很有前景的方法。由于作为版权标记的数字水印正面临着越来越多的攻击,对数字水印的稳健性要求也越来越高。笔者对4类不同原理的数字水印攻击:简单水印攻击、同步水印攻击 削去水印攻击和IBM水印攻击进行了详细论述,并给出了相应的解决对策。-digital watermarking method of the attacks and countermeasures
1EC959ED
- 抗几何攻击的盲数字水印技术耿敏,李恩平,梁华庆(中国石油大学电子信息工程系,北京102249)摘要:数字水印技术是解决数字作品版权保护的一个重要手段。衡量数字水印技术可靠性的标准是能否抵抗各种水印攻击,而几何攻击是目前困扰数字水印领域发展的突出问题,数字水印多采用盲水印算法。总结了当前抗几何攻击的各种盲水印方法,并对今后的研究方向进行了探讨。-Blind digital watermarking technology Min, Li Yun Ping, Liang Hua (China Univ
watermark综述+代码
- 数字水印算法实现(matlab程序包),包含有DCT水印嵌入算法,DWT水印嵌入算法,以及水印攻击和性能测试程序。参考价值极大-digital watermarking algorithm (Matlab package), including a watermark embedded DCT algorithm, DWT algorithm embedded watermark, watermark and attack and performance testing procedures.
attack
- 一套由matlab编程的基于小波的水印应用图片例子-A set of matlab programming applications based on wavelet image watermark example
jiyudct
- DCT域数字水印源代码.水印嵌入,水印检测,攻击实验以测试鲁棒性,重要参数计算。希望对做数字水印的XDJM有所帮助。--DCT-domain digital watermarking source code. Watermark embedding, watermark detection, attack experiment to test the robustness, an important parameter calculation. Want to do digital waterm
DFT1Watermarking
- 基于DFT实现水印的嵌入与提取,实验证明可以抵抗旋转攻击-DFT based on the realization of the watermark embedding and extraction experiment can prove that the resistance spin attack
matlab
- 基于matlab做的数字水印,文件包括源代码及原图像和加入水印后的图像,经过测试,能有效抗攻击-Matlab-based digital watermarking so that the document includes the source code and the original image and adding a watermark image, tested and effective anti-attack
proj_matlab
- 实现水印嵌入,提取水印和对图像进行jpeg攻击-The realization of watermark embedding, watermark extraction and image jpeg attack
DCT-water-print
- 实现了添加水印及攻击水印的一些方法。攻击水印方法包括抖动攻击、滤波攻击、旋转攻击等-Add watermark and implementation of a number of methods to attack the watermark. Watermarking attack methods include jitter attacks, filtering attacks, spin attack
watermark
- 一个简单的基于小波变换水印算法,抗攻击能力较强-A simple Watermarking Algorithm Based on Wavelet Transform, anti-attack ability
gongji
- 对嵌入水印的图象进行不同的攻击 添加噪音,滤波,剪切,压缩,旋转45度-Watermark on the images embedded in a different attack to add noise, filter, shear, compression, rotating 45 degrees
gui
- 各种数字水印的嵌入和提取 检测和攻击 包括lsb 和dct等算法-A variety of digital watermark embedding and extraction, including detection and attack, such as algorithm lsb and dct
optimark_manual
- 水印攻击测试程序optimark。 这个比stirmark更全面测试水印程序,很好用-Watermark attack test program optimark. This more comprehensive test than stirmark watermark program, very good use
LtoLHtoH_svd
- 本算法结合小波变换和SVD奇异值变换,实现了水印的嵌入和提取,载体图像的鲁棒性和水印的不可见性,提取出的水印图像的和原水印图像基本一致,抗攻击性强。-The algorithm combines wavelet transform and SVD singular value transformation, achieved watermark embedding and extraction, vector image watermark robustness and invisibility
amorph
- Owing to the broad application value of audio watermarking in remote transmission and mobile extraction, it is very important to study watermarking approaches against A/D and D/A conversion. Based on wavelet decomposition and cepstrum technol
vm2
- Owing to the broad application value of audio watermarking in remote transmission and mobile extraction, it is very important to study watermarking approaches against A/D and D/A conversion. Based on wavelet decomposition and cepstrum technol
DCT_SVD
- 本文提出一种在原始视频DCT(离散余弦变换)与SVD(奇异值分解)域自适应嵌入水印的算法。算法首先将视频流分割成一个个场景,场景中的视频图像被变换到DCT-SVD域中,水印量化嵌入在最大奇异上,实现了水印盲检测。同时实验证明该算法在满足透明性要求下也满足一定的鲁棒性要求,能够抵抗低通滤波、中值滤波、椒盐噪声、高斯噪声、H.264压缩攻击以及统计攻击和帧剪切等攻击。-This paper presents an original video in the DCT (Discrete Cosine
watermark
- 包含完整的数字水印嵌入,提取,以及攻击算法。-Contains a complete digital watermark embedding, extraction, and attack algorithms.