CheckmarkWeb

所属分类:图形图像处理
开发工具:matlab
文件大小:3565KB
下载次数:112
上传日期:2009-03-20 21:04:04
上 传 者lee-wind
说明:  checkmark是一款数字水印攻击测试软件,很实用的软件!
(checkmark is a digital watermarking attack testing software, very useful software!)

文件列表:
CheckmarkWeb\Checkmark\attackClass.xml (7843, 2001-11-08)
CheckmarkWeb\Checkmark\AttackList.xml (845803, 2001-11-08)
CheckmarkWeb\Checkmark\Attacks\checkmark.m (5232, 2008-10-30)
CheckmarkWeb\Checkmark\Attacks\CM_collage.m (2704, 2001-11-19)
CheckmarkWeb\Checkmark\Attacks\CM_copy.m (4348, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_cropping.m (2900, 2001-11-19)
CheckmarkWeb\Checkmark\Attacks\CM_dither.m (1337, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_dpr.m (4050, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_dprcorr.m (3589, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_flip.m (1273, 2001-08-15)
CheckmarkWeb\Checkmark\Attacks\CM_fmlr.m (2023, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_gaussian.m (1389, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_hardthresh.m (2013, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_jpegcompression.m (1479, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_linear.m (2190, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_medfilt.m (1348, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_midpoint.m (1556, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_nulineremove.m (2284, 2001-08-15)
CheckmarkWeb\Checkmark\Attacks\CM_projective.m (5419, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_ratio.m (2140, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_reducecolor.m (1418, 2001-05-09)
CheckmarkWeb\Checkmark\Attacks\CM_rotation.m (2040, 2001-11-19)
CheckmarkWeb\Checkmark\Attacks\CM_rotationscale.m (1497, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_rowcol.m (1481, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_sampledownup.m (1895, 2001-11-22)
CheckmarkWeb\Checkmark\Attacks\CM_scale.m (1368, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_sharpening.m (1433, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_shearing.m (2213, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_softthresh.m (1932, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_stirmark.m (3335, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_templateremove.m (2644, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_thresh.m (1420, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_trimmedmean.m (1547, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_warp.m (2861, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_waveletcompression.m (1485, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_wiener.m (1345, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\collagergb.jpg (190742, 2001-11-19)
CheckmarkWeb\Checkmark\Attacks\runCheckmark.m (3136, 2001-11-23)
CheckmarkWeb\Checkmark\Attacks\tmpcollagebw.jpg (674044, 2001-04-06)
CheckmarkWeb\Checkmark\Attacks (0, 2008-10-29)
... ...

Copyright (c) 2001, Shelby Pereira, University of Geneva, Vision Group Permission to use, copy, modify, and distribute this software and its documentation for any non-commercial purpose and without fee is hereby granted under the GNU Public license (GPL), provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. This software is provided "as is" without express or implied warranty. The authors shall not be held liable in any event for incidental or consequential damages in connection with, or arising out of, the furnishing, performance, or use of this program. If you use the Checkmark software package for your research, please cite: Shelby Pereira, Sviatoslav Voloshynovskiy, Maribel Madueo, Stéphane Marchand-Maillet and Thierry Pun, Second generation benchmarking and application oriented evaluation, In Information Hiding Workshop, Pittsburgh, PA, USA, April 2001. --------------------------------------------------- To use checkmark first customize the file getconfig.m as a function of the system. Running the checkmark software is then a 3 step process 1. use runcheckmark.m to generate the attacked images 2. use testdetector.m to run the detector on the attacked images and generate the xml output file NOTE: the file executedetector.m MUST be mofied as a function of the detector being called 3. use parseresults.m to generate the HTML tables Full Documentation is given online at http://watermarking.unige.ch/Checkmark

近期下载者

相关文件


收藏者