搜索资源列表
dvmultiwatermarks源码
- 是关于视频数字水印的一个程序,可以实行视频数字水印的嵌入和检测。-on video digital watermarking a procedure that allows the video digital watermark embedding and testing.
ParticleFilterTrackerwithIsomap
- We propose a novel approach for head tracking, which combines particle filters with Isomap. The particle filter works on the low-dimensional embedding of training images. It indexes into the Isomap with its state variables to find the closest templat
WaterMark
- 视频水印程序,利用VC实现,不用于一般的空域水印,可以实现动态随机嵌入水印位置。-Video Watermarking procedures, the use of VC implementation, not for general airspace watermark, you can achieve dynamic random watermark embedding location.
mediaPlayer
- 在VC中嵌入mediaPlayer 实现视频,音频的播放 可行,源码,功能比较简洁-Embedding in VC mediaPlayer video, audio playback possible, source, function is relatively simple
WaterMark8
- 数字水印处理,嵌入、提取、认证,可以在图形,视频和文本中添加数字水印,增强文档的保密,防止泄密-Digital watermarking processing, embedding, extraction, authentication, can be in graphics, video and digital watermarking to add text to enhance the confidentiality of documents to prevent leak
dataembedding
- Data embedding in scrambled Digital video
YouTubeScriptGenerator
- C#编写的YouTube API,用于在ASP.NET网页中嵌入视频播放器,提供多种定制选项。-YouTube API written in C# allows embedding video player into ASP.NET Web page, providing multiple customization options.
LtoLHtoH_svd
- 本算法结合小波变换和SVD奇异值变换,实现了水印的嵌入和提取,载体图像的鲁棒性和水印的不可见性,提取出的水印图像的和原水印图像基本一致,抗攻击性强。-The algorithm combines wavelet transform and SVD singular value transformation, achieved watermark embedding and extraction, vector image watermark robustness and invisibility
DigitalVideoWatermarkingintheDiscreteCosineTransfo
- 一种在离散余弦变换下的视频水印的嵌入和提取方法。-Of a discrete cosine transform of video watermark embedding and extraction methods.
DCT_SVD
- 本文提出一种在原始视频DCT(离散余弦变换)与SVD(奇异值分解)域自适应嵌入水印的算法。算法首先将视频流分割成一个个场景,场景中的视频图像被变换到DCT-SVD域中,水印量化嵌入在最大奇异上,实现了水印盲检测。同时实验证明该算法在满足透明性要求下也满足一定的鲁棒性要求,能够抵抗低通滤波、中值滤波、椒盐噪声、高斯噪声、H.264压缩攻击以及统计攻击和帧剪切等攻击。-This paper presents an original video in the DCT (Discrete Cosine
1
- 本文提出一种基于H.264低比特率视频流的半脆弱盲水印方法,通过在H.264特有的的帧内预 测和运动向量预测中分别嵌入鲁棒水印和脆弱水印,达到版权保护和内容完整性认证的双重目的.通过在嵌入强 度和预测模式选择的拉格朗日乘子中引入H.264量化因子,增强了水印对重量化编码的抵抗力,取得更好的率 失真平衡,减小水印嵌入对视频流比特率的影响.该算法可以实现水印的快速嵌入提取,满足视频实时处理的要 求,实验结果证明了该算法的有效性.-A novel semi—fragile blind
A.Blind.MPEG-2.Video.Watermarking.Robust.to.Regula
- Abstract—Based on the observation that low-frequency DCT coefficients of an image are less affected by geometric processing, we propose a new blind MPEG-2 video watermarking algorithm robust to camcorder recording. Both the embedding and extr
A-guide-tour-of-video-watermarking
- 本文主要阐述数字视频水印的基本特征、原理、模型、嵌入/检测算法等,是学习视频水印的最佳资料。-This paper describes the basic features of digital video watermarking, principles, models, embedding/detection algorithm, is to learn the best video watermarking information.
videowatermarkDCT
- 一个基于DCT系数的视频水印嵌入程序,读取yuv文件,提取其中的若干帧,然后对每帧做DCT变换,在中低频修改系数值,然后做IDCT,再把每帧图像组成YUV格式播放。-DCT coefficients of a video-based watermark embedding program, read the yuv file, extract the number of frames, and then do each frame DCT transform coefficients in th
a1
- 首先将YUV格式的视频转换为MAtlab适用的格式,通过主要采用DCT变换的方式,实现视频水印的嵌入。-First, the YUV format video conversion MAtlab for the format, mainly DCT transform by way of video watermark embedding.
dshowImg
- 抓拍的视频图象属性设置包括分辨率颜色亮度硬件接口选择等,图片嵌入,字体文字嵌入,简单图象拼接等,可加入图象检测识别处理应用,也可识别检测结果发送远程数据库或者以数据记录块的方式上传远程服务比对。另建程序加入测-Capture video image attribute settings include resolution color brightness hardware interface selection, picture into text, font embedding, simpl
video-copmression
- code for Video Compression and data embedding approach
lightflow_blockmatch_DEW
- 数字视频处理(光流法、块匹配、视差运动估计和DEW水印嵌入和提取)的例子,整合到一个程序中了。-Digital video processing (optical flow method, block matching motion estimation and disparity DEW watermark embedding and extraction) examples, integrated into a program in it.
embedVideo2Video
- embedding one video into a another Main video, with many
Cristy-video-data-hiding-code
- Recently, digital multimedia has become widely distributed in computer and network technology. For digital multimedia distribution applications, issues surrounding information security have received significant attention. Data hiding has been one o