CheckmarkWeb
所属分类:图形图像处理
开发工具:matlab
文件大小:3565KB
下载次数:112
上传日期:2009-03-20 21:04:04
上 传 者:
lee-wind
说明: checkmark是一款数字水印攻击测试软件,很实用的软件!
(checkmark is a digital watermarking attack testing software, very useful software!)
文件列表:
CheckmarkWeb\Checkmark\attackClass.xml (7843, 2001-11-08)
CheckmarkWeb\Checkmark\AttackList.xml (845803, 2001-11-08)
CheckmarkWeb\Checkmark\Attacks\checkmark.m (5232, 2008-10-30)
CheckmarkWeb\Checkmark\Attacks\CM_collage.m (2704, 2001-11-19)
CheckmarkWeb\Checkmark\Attacks\CM_copy.m (4348, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_cropping.m (2900, 2001-11-19)
CheckmarkWeb\Checkmark\Attacks\CM_dither.m (1337, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_dpr.m (4050, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_dprcorr.m (3589, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_flip.m (1273, 2001-08-15)
CheckmarkWeb\Checkmark\Attacks\CM_fmlr.m (2023, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_gaussian.m (1389, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_hardthresh.m (2013, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_jpegcompression.m (1479, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_linear.m (2190, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_medfilt.m (1348, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_midpoint.m (1556, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_nulineremove.m (2284, 2001-08-15)
CheckmarkWeb\Checkmark\Attacks\CM_projective.m (5419, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_ratio.m (2140, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_reducecolor.m (1418, 2001-05-09)
CheckmarkWeb\Checkmark\Attacks\CM_rotation.m (2040, 2001-11-19)
CheckmarkWeb\Checkmark\Attacks\CM_rotationscale.m (1497, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_rowcol.m (1481, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_sampledownup.m (1895, 2001-11-22)
CheckmarkWeb\Checkmark\Attacks\CM_scale.m (1368, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_sharpening.m (1433, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_shearing.m (2213, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_softthresh.m (1932, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_stirmark.m (3335, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_templateremove.m (2644, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_thresh.m (1420, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_trimmedmean.m (1547, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_warp.m (2861, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_waveletcompression.m (1485, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\CM_wiener.m (1345, 2001-11-20)
CheckmarkWeb\Checkmark\Attacks\collagergb.jpg (190742, 2001-11-19)
CheckmarkWeb\Checkmark\Attacks\runCheckmark.m (3136, 2001-11-23)
CheckmarkWeb\Checkmark\Attacks\tmpcollagebw.jpg (674044, 2001-04-06)
CheckmarkWeb\Checkmark\Attacks (0, 2008-10-29)
... ...
Copyright (c) 2001, Shelby Pereira, University of Geneva, Vision Group
Permission to use, copy, modify, and distribute this software and its
documentation for any non-commercial purpose and without fee is hereby
granted under the GNU Public license (GPL), provided that the above
copyright notice appear in all copies and that both that copyright notice
and this permission notice appear in supporting documentation. This
software is provided "as is" without express or implied warranty. The
authors shall not be held liable in any event for incidental or consequential
damages in connection with, or arising out of, the furnishing, performance,
or use of this program.
If you use the Checkmark software package for your research, please cite:
Shelby Pereira, Sviatoslav Voloshynovskiy, Maribel Madueo, Stéphane
Marchand-Maillet and Thierry Pun, Second generation benchmarking and
application oriented evaluation, In Information Hiding Workshop,
Pittsburgh, PA, USA, April 2001.
---------------------------------------------------
To use checkmark first customize the file getconfig.m as a function of the system.
Running the checkmark software is then a 3 step process
1. use runcheckmark.m to generate the attacked images
2. use testdetector.m to run the detector on the attacked images and generate the xml output file
NOTE: the file executedetector.m MUST be mofied as a function of the detector being called
3. use parseresults.m to generate the HTML tables
Full Documentation is given online at
http://watermarking.unige.ch/Checkmark
近期下载者:
相关文件:
收藏者: