文件名称:FULL-CODE
介绍说明--下载内容均来自于网络,请自行研究使用
Since the birth of digital data hiding, image authentication has been one of its most widespread applications. During the first years, aside a few numbers of works, this application was limited to verifying the integrity of the image or locating its tampered regions. Nowadays, these watermarks are designed in sophisticated ways to not only localize the image tampering, but also recover the lost content in those areas. In tampering protection and self-recovery schemes, the goal is to embed a representation of the original image into itself in a way to efficiently compromise between three design parameters the quality of the watermarked image, the quality of the content recovery in tampered areas, and the tolerable tampering rate (TTR). -Since the birth of digital data hiding, image authentication has been one of its most widespread applications. During the first years, aside a few numbers of works, this application was limited to verifying the integrity of the image or locating its tampered regions. Nowadays, these watermarks are designed in sophisticated ways to not only localize the image tampering, but also recover the lost content in those areas. In tampering protection and self-recovery schemes, the goal is to embed a representation of the original image into itself in a way to efficiently compromise between three design parameters the quality of the watermarked image, the quality of the content recovery in tampered areas, and the tolerable tampering rate (TTR).
(系统自动生成,下载前可以参看下载内容)
下载文件列表
文件名 | 大小 | 更新时间 | ||
---|---|---|---|---|
| ||||
PROJECT_MAIN.fig | ||||
PROJECT_MAIN.m | ||||
psnr.m | ||||
raf | 220x200 | 075 | f | fafafa ca443f4786.u1.jpg |
rec.m | ||||
recover.asv | ||||
recover.m | ||||
recover.rar | ||||
rg.m | ||||
small.bmp | ||||
Steg.m | ||||
stu.m | ||||
switch.asv | ||||
switch.txt | ||||
switch2.m | ||||
texture_feature.m |