CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 文档资料 搜索资源 - watermark attack

搜索资源列表

  1. vm

    0下载:
  2. Owing to the broad application value of audio watermarking in remote transmission and mobile extraction, it is very important to study watermarking approaches against A/D and D/A conversion. Based on wavelet decomposition and cepstrum technol
  3. 所属分类:Project Design

    • 发布日期:2017-03-28
    • 文件大小:207419
    • 提供者:vinay
  1. amorph

    0下载:
  2. Owing to the broad application value of audio watermarking in remote transmission and mobile extraction, it is very important to study watermarking approaches against A/D and D/A conversion. Based on wavelet decomposition and cepstrum technol
  3. 所属分类:Project Design

    • 发布日期:2017-03-29
    • 文件大小:199477
    • 提供者:vinay
  1. vm2

    0下载:
  2. Owing to the broad application value of audio watermarking in remote transmission and mobile extraction, it is very important to study watermarking approaches against A/D and D/A conversion. Based on wavelet decomposition and cepstrum technol
  3. 所属分类:Project Design

    • 发布日期:2017-03-31
    • 文件大小:345892
    • 提供者:vinay
  1. 264

    0下载:
  2. 将压缩感知的博士论文 将压缩感知的博士论文-compressing
  3. 所属分类:Project Design

    • 发布日期:2017-05-31
    • 文件大小:13291902
    • 提供者:幻幻
  1. DCT-digital-watermarking-technology

    0下载:
  2. 提出了一种基于纠错编码的DCT域数字水印算法,该算法在检测时不需要原始图像,实现了盲检。并且对水印图像进行了利用超混沌置乱处理,提高了安全性能和抗攻击能力。纠错编码的引入使水印抗攻击能力明显增强。 -DCT digital watermarking algorithm based on error correction coding, the algorithm detected without the original image, blind. And watermark image o
  3. 所属分类:Project Design

    • 发布日期:2017-11-09
    • 文件大小:102303
    • 提供者:顾丽萍
  1. dct-watermarking

    0下载:
  2. dct数字水印程序,实现了数字水印的嵌入、提取、攻击测试、生成的图像良好,能够较好抵抗几何攻击。-DCT digital watermarking procedures to achieve the digital watermark embedding, extraction, attack test, the resulting image is good, better able to resist geometric attacks.
  3. 所属分类:Document

    • 发布日期:2017-11-14
    • 文件大小:384269
    • 提供者:李慧
  1. Watermark-steganography-attack

    0下载:
  2. 介绍水印攻击和隐写分析的算法与调用的函数等-Introduction watermark attacks and steganography algorithms and call functions, etc.
  3. 所属分类:File Formats

    • 发布日期:2017-11-12
    • 文件大小:209311
    • 提供者:changmiao
搜珍网 www.dssz.com