搜索资源列表
tfn2k.rar
- DOS攻击源码,有smurf攻击、SYN FLOOd攻击等,仅供学习研究之用,不可用于违背他人利益,DOS attack source, there are smurf attacks, SYN FLOOd attacks, for study purposes, not for others, contrary to the interests of
watermark
- 基于MATLAB环境的图像水印攻击试验源程序-MATLAB-based image watermarking attacks environment test source
audiowatermark
- 音频水印算法实现,其中包括水印的嵌入,音频水印常用攻击,以及检测算法的实现。-Audio watermarking algorithms, including the watermark embedding, audio watermarking common attacks, and the detection algorithm.
DCT
- 基于DCT域的鲁棒水印,能抗击一定程度的压缩,剪切等攻击-Based on the DCT domain robust watermarking, can fight against a certain degree of compression, shear, such as attacks
DCT-water-print
- 实现了添加水印及攻击水印的一些方法。攻击水印方法包括抖动攻击、滤波攻击、旋转攻击等-Add watermark and implementation of a number of methods to attack the watermark. Watermarking attack methods include jitter attacks, filtering attacks, spin attack
Checkmark
- Checkmark 是数字水印中应用的攻击测试软件,是每个在做数字水印的人的必须使用的工具,这个文章告诉你怎么使用checkmark-Checkmark is the application of digital watermarking attacks testing software, are each at digital watermarking to do the people have to use a tool, this article tell you how to use c
xiaobobian
- 本代码是一些关于水印处理的一些算法用小波变换来实现,在嵌入水印之后用各种攻击检验算法的鲁棒性-The code is some deal about a number of watermarking algorithm using wavelet transform to achieve, in the embedded watermark after the attacks with a variety of test algorithm robustness
LANShield2.0
- LANShield是一款本人自己写的网络防火墙程序,LAN Shield 2.0.rar为主程序源码,开发环境为VS2005;MyFireWallLSP.rar为过滤模块; Server为服务器源码,Java编写,非阻塞模式。 软件功能: 1.有效拦截局域网内的ARP攻击,并具有保护网关功能 2.可配合服务器端,更有效管理局域网网络 3.自带应用层过滤模块,有效控制本机进程的网络访问 4.自带攻击模块,用于反击,包含所有AR
stirmark
- 实现对数字水印各种攻击的软件。刚才已经上载过了,但由于一直没得到回应。麻烦站长审核通过,急需一些代码做毕设。。。非常感谢。-To achieve a variety of attacks on digital watermarking software. Have already been uploaded, but no response has been. Trouble station approved, completion of an urgent need to do some se
CollectionsofWaterMarkingAttack
- 关于各种数字水印攻击的MATLAB代码,可以用于仿真实验,调用方便简单-Digital watermarking attacks on a variety of MATLAB code that can be used for simulation experiments, to facilitate a simple call to
AnIntroductiontoWatermarkRecoveryfromImages
- 简要地讨论了在数字图像恢复水印方法,并且提出相关的当前和今后的安全信息系统(CSIS)工作中心。-briefly discuss a method of recovering watermarks in digital images after such attacks and introduce related current and future work in the Center for Secure Information Systems (CSIS).
ABufferOverflowStudyAttacksandDefenses
- A Buffer Overflow Study - Attacks and Defenses 一本介绍缓冲区溢出非常好的书,讲解详细,通俗易懂,是值得收藏的好资料-A Buffer Overflow Study- Attacks and Defenses 1 describes a buffer overflow very good book, explained in detail, easy to understand, is worthy of a good collection of i
DCT_watermarking_System
- A gr8 Adaptive DCT based watermarking system is implemented with a nice GUI for embedding, extraction and attacks
Hacker-and-attacks-techniques
- 这是一些黑客与攻击技术,网络安全方面的技术。-This is the number of hackers and attacks technology, network security technology.
HackingExposed10
- HACKING IIS 5 IISsecurity exploits have enjoyed a long,rich tradition. Microsoft’s flag ship Webserver platform has been plagued by such vulnerabilities as source code revelati on attacks like-HACKING IIS 5 IISsecurity exploits have enjoyed a l
attack
- this file explains attacks on AODV
Resist-geometric-attacks
- 该算法把计算出的图像不变质心作为对其进行对数极坐标变换的原 点, 再作傅立叶变换, 取出中频段幅值作为水印嵌入域。该算法具有较好的鲁棒性、可检测性, 能同时抵抗几何攻击和信号 处理攻击, 它在数字图像的版权保护等领域有广泛的应用前景。-The algorithm to calculate the heart of the image does not degenerate as the number of its polar transformation of the origin, f
Buffer-overflow-attacks
- 关于缓冲区溢出相关,简单的介绍一些缓冲区溢出的知识点,以及利用方式-Buffer Overflow Attacks
System-Attacks
- This very simple article on System attacks. By reading this article, we can understand how day to day attacks are possible on Computer. I think this is good reading for new people in Computer Security domain.-This is very simple article on System att
Attacks
- Check mark Attacks for watermarking