<< Chapter < Page Chapter >> Page >

1. wm_comp: compress the watermarked image at differential compression levels. file.

2. wm_comp_anal: Plotting the correct ratio, which is the percentatio of the right pixels in the extraced message, as a function of compression value. file.

3. wm_cox_ext: using cox's algorithm to extract the message inside a watermakred image. file.

4. wm_cox_image: using cox's algorithm to water mark an image. file.

5. wm_decoder: takes code words and convert it back to message. file.

6. wm_encoder: convert message (string) into a vector of acsii representation of doubles. file.

7. wm_msg_compare: analyze the similarity between the extracted message at differential compression level, with the original message. file.

8. wm_rand_msg_gen: generate a random 1000-length string as the message. file.

9. wm_runner: an top program that combines all the other modules and outputs results. file.

10.wm_sim_compress: use SVD algorithm to compress the watermarked image. file.

Get Jobilize Job Search Mobile App in your pocket Now!

Get it on Google Play Download on the App Store Now




Source:  OpenStax, Robustness analysis on dct watermarking technique under compression attack. OpenStax CNX. Dec 19, 2012 Download for free at http://cnx.org/content/col11472/1.1
Google Play and the Google Play logo are trademarks of Google Inc.

Notification Switch

Would you like to follow the 'Robustness analysis on dct watermarking technique under compression attack' conversation and receive update notifications?

Ask