-
-
[
Matlab]
patchwork.rar
... patchwork approach, embedding the watermark 0-1. Modify pixel values can be set to choose a variety of classic attacks and control the strength of the attack. Back to extract the watermark information and peak signal to noise ratio. Prepared using Matlab.
Category:
matlab Upload User:
szss20 Size:
106K
-
[
Matlab]
STDM.rar
Stdm method using embedded watermark information, to set the quantization step size, choose a variety of classic attacks, controlling the strength of the attack and returned to the bit error rate and peak signal to noise ratio
Category:
matlab Upload User:
wenhongsy Size:
55K
-
[
Visual C++ (VC++)]
proj3_18.rar
The famous CIH virus regularly attack each year, which would require the use of timers to control the implementation of the procedures
-
[
Matlab]
gaosixulie_watermark.rar
Sequence generated by the Gaussian normal distribution, with (7,4) Hamming code, the watermark signal. Resistant to compression filtering attack
-
[
PDF]
fragilewatermark.rar
... vulnerability of digital image watermarking technology, the basic characteristics, the general principles of research, the development direction of attack methods and make a synthesis with a view to further promoting China s in this cutting-edge research ...
-
[
Unix_Linux]
takesource.rar
There are records of several attacks on the function of specific procedures on what the attack looked know. :)
-
[
Matlab]
Arnold.rar
For images ANORLD transform, watermark embedding in the image of the process, can the watermark image to embed the advanced nature of the scrambling operation, can effectively attack the shear resistance
-
[
SQL]
mysql-database-improvement.rar
MySQL big attack, a detailed and comprehensive introduction to the now widely used to use mysql database is to improve the book Getting Started
Category:
MySQL Upload User:
liuyi21cn Size:
5785K
-
[
Java/JSP]
ufo.rar
Using java s applet to achieve the ufo attack game. Use of animation and audio processing.
-
[
C/C++]
tuxingsuanfa1.rar
Here we go again ~ ~ Following the last after another heavy attack, the process is filled with graphics