Digital image watermarking and extraction
2016-08-23
0 0 0
no vote
Other
Earn points
% 1, you can start running MAIN.m watermark embedding and extraction.
% 2, folder two pictures of the carrier image and watermark images.
% 3, other custom functions called by the main program file, as follows:
% Sdwt.m: Tree wavelet decomposition of the image according to the visual energy
% Embed.m: point mark for the embedded watermark embedding
% Nembed.m: implementation of watermark embedding for each node
% Sidwt.m: embedded tree subgraph after inverse wavelet transform to restructure
% Sdwt_ex.m: according to the key tree containing watermark image decomposition
% Extract.m: extract the watermark according to key tree
% Nextract.m: implementation of watermark extraction for each node
% JadeR.m: JADE algorithm used to implement ICA
% Fuse_pca.m: PCA algorithm used to achieve integration
% Rand_orth.m: random number generation mixing matrix
% 2, folder two pictures of the carrier image and watermark images.
% 3, other custom functions called by the main program file, as follows:
% Sdwt.m: Tree wavelet decomposition of the image according to the visual energy
% Embed.m: point mark for the embedded watermark embedding
% Nembed.m: implementation of watermark embedding for each node
% Sidwt.m: embedded tree subgraph after inverse wavelet transform to restructure
% Sdwt_ex.m: according to the key tree containing watermark image decomposition
% Extract.m: extract the watermark according to key tree
% Nextract.m: implementation of watermark extraction for each node
% JadeR.m: JADE algorithm used to implement ICA
% Fuse_pca.m: PCA algorithm used to achieve integration
% Rand_orth.m: random number generation mixing matrix
others
图像
提取
数字
水印
添加
Related Source Codes
DCT transform the image
0
0
no vote
digital image processing
0
0
no vote
Image super-resolution implementation
0
0
no vote
image mosaic
0
0
no vote
Three methods of image graying
0
0
no vote
No comment