搜索资源列表
attack_wmk
- 各种水印攻击实验,包含了大部分的操作,例如压缩,剪切,旋转等-various experimental watermark attacks, including most of the operations, such as compression, shear, rotate, etc.
matlab-break
- 这是关于数字水印的攻击例程!经过调试,可以放心使用!-This is on digital watermarking attacks routines! After debugging, can be assured use!
cnsrf
- The Network Security Response fr a mework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Resp
xxx1111
- 利用matlab实现数字水印源码。提供了各种攻击的实现。-using Matlab digital watermarking source. Provide a variety of attacks realized.
20070815
- 提出了一种基于小波域的图像数字水印算法·该算法将相互正交的两种水印(鲁棒水印和参考 水印)同时添加到经过DWT后的载体图像小波系数中,然后用小波反变换得到添加了水印的图像·用提取出 的参考水印来估计图像所受到的攻击,由于提取出的鲁棒水印所受的攻击与参考水印受到的攻击一样,因此 可以估计出原始的鲁棒水印·通过对嵌入水印的图像进行加入噪声、滤波、压缩以及裁剪等大量图像处理等试 验,均能正确检测出水印,表明该算法具有很好的感知
DoS
- DOS攻击原理介绍。,利用syn洪水技术,使用原始套接字的伪造源地址技术-Introduce the principle of DOS attacks. The use of syn floods technology, the use of raw socket forged source address technical
Wormhole_Simulation_Code
- This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego
attack
- 这写程序是对加水印之后图像的攻击,包括加噪声,各种滤波,剪切,压缩攻击和旋转等。-This writing process is a plus watermark image after the attacks, including the increase in noise, various filtering, shear, compression and rotation attacks.
dm_dct_fenkuai
- 在DCT域,利用8*8分块DM方法,嵌入隐藏信息。可设置量化步长、选择各种经典的攻击方式和控制攻击强弱。返回误码率和峰值信噪比。利用Matlab编写。-In the DCT domain, the use of 8* 8 block DM methods, embedding hidden information. Quantization step size can be set to choose a variety of clas
php
- 壹、功能说明: 一、具有回覆留言的功能 二、可删除留言 三、可防文字灌爆攻击 四、可显示访客IP(只有版主可见) 贰、系统设定: 一、系统档设定:Setup.php,这个档案重要至极,一定要详加设定 二、设定完留言资料位置,别忘了改资料夹名称 参、下次进度报告: 一、留言版防卫系统 二、可用FrontPage等网页编辑软体整修留言版的任何版面-Next, the fun
Rijindael
- 对称密码体制的发展趋势将以分组密码为重点。分组密码算法通常由密钥扩展算法和加密(解密)算法两部分组成。密钥扩展算法将b字节用户主密钥扩展成r个子密钥。加密算法由一个密码学上的弱函数f与r个子密钥迭代r次组成。混乱和密钥扩散是分组密码算法设计的基本原则。抵御已知明文的差分和线性攻击,可变长密钥和分组是该体制的设计要点。-Symmetric cryptosystem trends will focus on block cipher. Bl
MATLAB_Watermarking
- 探讨MATLAB在 数字水印中的应用,利用MATLAB语言编程实现了一类数字水印算法的嵌入、攻击及提取过程,并给出了程序运行 的结果。 -MATLAB to explore in the digital watermarking application, the use of MATLAB programming language to achieve a class of digital watermarking algori
sss_0
- 数字水印算法实现包含有DCT水印嵌入算法,DWT水印嵌入算法,以及水印攻击和性能测试-Digital watermarking algorithm contains DCT watermark embedding algorithm, DWT watermark embedding algorithm, as well as the watermark attacks and performance testing
dct1_embed
- research on against geometry attacks watermarking technology. A digital Watermarking scheme, which is based on combination of simple and reliable harries detector and image normalization, is proposed. The feather points
dwt_recover
- we embed watermarks in the original circles. In this way, the synchronization issue for watermark embedding and detecting can be best solved. Simulation results show that this method can resist variety of Geometry Attack
we
- 图片数字水印的添加,攻击和测试,十分完整-Add a picture of digital watermarking, attacks and testing, very complete
DCT
- 基于DCT域的鲁棒水印,能抗击一定程度的压缩,剪切等攻击-Based on the DCT domain robust watermarking, can fight against a certain degree of compression, shear, such as attacks
Attacks.tar
- A very good document about TCPIP protocol Possible Attacks.Very helpful for people write network applications
DCT-water-print
- 实现了添加水印及攻击水印的一些方法。攻击水印方法包括抖动攻击、滤波攻击、旋转攻击等-Add watermark and implementation of a number of methods to attack the watermark. Watermarking attack methods include jitter attacks, filtering attacks, spin attack
Attacks
- Check mark Attacks for watermarking