stirmark中的Test_psnr值测试攻击是什么意思

StirMark基准测试程序在数字水印方案评价中的应用数字水印
扫扫二维码,随身浏览文档
手机或平板扫扫即可继续访问
StirMark基准测试程序在数字水印方案评价中的应用
举报该文档为侵权文档。
举报该文档含有违规或不良信息。
反馈该文档无法正常浏览。
举报该文档为重复文档。
推荐理由:
将文档分享至:
分享完整地址
文档地址:
粘贴到BBS或博客
flash地址:
支持嵌入FLASH地址的网站使用
html代码:
&embed src='/DocinViewer-4.swf' width='100%' height='600' type=application/x-shockwave-flash ALLOWFULLSCREEN='true' ALLOWSCRIPTACCESS='always'&&/embed&
450px*300px480px*400px650px*490px
支持嵌入HTML代码的网站使用
您的内容已经提交成功
您所提交的内容需要审核后才能发布,请您等待!
3秒自动关闭窗口StirMark – Image-watermarking robustness test
StirMark – Image-watermarking robustness test
, Computer
Laboratory, University of Cambridge
Version 1.0,
StirMark is a generic tool for simple robustness testing of image
watermarking algorithms and other steganographic techniques. It can be
applied to photographic digital images and it will distort the
watermark of too simplistic marking techniques such that the embedded
watermark or steganographic message cannot any more be detected and
decoded from the result image.
StirMark is freely available under the GNU General Public Licence in
full portable ISO C source code from
StirMark reads and writes arbitrary images in the PGM and PPM file
formats as they are used in Jef Poskanzer’s pbmplus Extended Portable
Bitmap Toolkit. These are trivially simple file formats, and the
various PBM toolkits contain converters between these formats and
practically any other commonly used graphics file format.
StirMark can be easily used to process any format on any platform.
PBM tools are for instance available from
but you will need these tools only if you do not already have other
image processing software that can handle the PPM or PGM file formats.
You can specify an input and an output file name in the command
line. If you omit any of those, stdin and stdout are used instead
respectively.
The available command line options (normally not needed, for experts
The number of pixel distances that the corner of the target
image is allowed to be inside the original image. If the
number is followed by %, then the maximum corner shift
is defined as a percentage of the image width or height,
whichever is smaller. Default is -i2.0%.
The number of pixel distances that the corner of the target
image is allowed to be outside the original image
(default 0.7). Sample values taken from outside the
original image are extrapolated. You can also specify a
percentage as with -i, but this is normally not useful
as -o values much higher than 1 cause mostly useless
extrapolations.
The maximum byte value by which any of the RGB values
of any pixel is allowed to deviate from the original
value (default 1.5).
Specify the maximum distance of a non-zero impulse response
for the Nyquist lowpass interpolation filter (default
6). Runtime depends quadratic on this parameter!
Use a simple linear interpolation instead of a
Nyquist sinc lowpass filter. This is much faster but
blurs the image somewhat.
Seed value for the random number generator. If you do
systematic measurements with StirMark, then repeat the
runs with different -s values (e.g. from -s1 to -s100),
to get significant results regarding the probability with
which StirMark breaks your steganographic technique.
Apply a lowpass filter to the image. The number indicates,
which fraction of the spectrum you want to let through.
For instance with -r1.0 (default), you do not filter
anything as the cutoff frequency is half the sampling
frequency, which is according to the sampling theorem
the highest frequency your image can contain. With -r0.2
you preserve only the lowest fifth of all frequency
components. You can also write -rxfloat and -ryfloat
to specify horizontal and vertical cutoff frequencies
separately. If the specified number is negative, you
will get a highpass filter (e.g., -rx-0.3 removes the
lowest 30% of the spectrum from the image). With the
highpass filter, a DC offset (50% white) will be added
to avoid underflows. Option -r was mostly added because
it was easy to do and in order to allow to use StirMark
also for some other image processing purposes than just
removing watermarks.
Normally you do not have to use any of those options and you should
try the default values first. If this does not remove the watermark,
then the embedding algorithm is not too bad and you can try to
increase the -i value to get a stronger geometric transform. Then try
higher -d values to get a more significant color transform or -r with
a value slightly below 1.0 to blurr the image somewhat or both. If you
want no geometric transform at all, set -i0 and -o0. If you think,
StirMark is too slow then try lower values for -n or try -l instead.
For example
stirmark -i0 -o0 -d0 test.ppm output.ppm
does not modify the image at all.
StirMark basically simulates a resampling process, i.e. it introduces
the same kind of errors into an image that you would expect if you
printed an image on a high-quality printer and then scan the image
again with a high-quality scanner. The algorithm applies a minor
geometric distortion, i.e. the image is slightly stretched, sheared,
shifted, and/or rotated by an unnoticeable random amount and then
resampled using Nyquist (or with -l bi-linear) interpolation. In
addition, a transfer function that introduces a small and smoothly
distributed error into all sample values is applied, which acts like a
small non-linear analog/digital converter imperfection typically found
in scanners and display devices.
StirMark introduces a practically unnoticeable quality loss in the
image if it is applied only once. However after a few iterated
applications of the algorithm, the image degradation becomes soon very
noticeable. This makes StirMark (especially the -d option) also a
model for algorithms that can be applied to artificially degrade
images on replay to get rid of the lossless-copying property of
digital multimedia objects.
StirMark is a generic steganographic attack tool in that it is not
targeted against any specific steganographic algorithm. I hope to
establish with StirMark a reasonable minimum robustness requirement
for steganographic image processing tools, i.e. if information
embedded by an algorithm into an image does not survive the StirMark
process, then the steganographic technique used should considered to
be unacceptably easy to break.
Suggestions for improving this software are always welcome. I am also
interested in robustness test results obtained by processing with
StirMark images that were marked with various available watermarking
Surprisingly, first experiences with various watermarking tools
show that the watermarks of *all* tools we have been able to locate
(DigiMark, JK_PGS, SysCop, SureSign, etc.) can be made unrecognizeable
more or less reliably by StirMark, especially if StirMark is followed
by a medium quality JPEG compression. See also Fabien
Petitcolas’ web pages about steganography for more information.
If you use StirMark in your scientific work, please quote
Fabien A.P. Petitcolas, Ross J. Anderson, Markus G. Kuhn:
in David Aucsmith (Ed.): Information Hiding,
Second International Workshop, IH’98, Portland, Oregon, USA,
April 15–17, 1998, Proceedings, , Springer-Verlag, ISBN 3-540-65386-4, pp. 219–239.
Funding acknowledgement: The author wrote StirMark while being a PhD
student supported by a European Commission TMR Marie-Curie grant and is
interested in robustness properties of information protection
mechanisms.
Update: Maintenance and further development of StirMark was taken over
in 1999 by .
– last modified
http://www.cl.cam.ac.uk/~mgk25/stirmark.html数字水印的攻击
扫扫二维码,随身浏览文档
手机或平板扫扫即可继续访问
数字水印的攻击
举报该文档为侵权文档。
举报该文档含有违规或不良信息。
反馈该文档无法正常浏览。
举报该文档为重复文档。
推荐理由:
将文档分享至:
分享完整地址
文档地址:
粘贴到BBS或博客
flash地址:
支持嵌入FLASH地址的网站使用
html代码:
&embed src='/DocinViewer-4.swf' width='100%' height='600' type=application/x-shockwave-flash ALLOWFULLSCREEN='true' ALLOWSCRIPTACCESS='always'&&/embed&
450px*300px480px*400px650px*490px
支持嵌入HTML代码的网站使用
您的内容已经提交成功
您所提交的内容需要审核后才能发布,请您等待!
3秒自动关闭窗口扫扫二维码,随身浏览文档
手机或平板扫扫即可继续访问
毕业论文_基于小波域的数字水印研究
举报该文档为侵权文档。
举报该文档含有违规或不良信息。
反馈该文档无法正常浏览。
举报该文档为重复文档。
推荐理由:
将文档分享至:
分享完整地址
文档地址:
粘贴到BBS或博客
flash地址:
支持嵌入FLASH地址的网站使用
html代码:
&embed src='/DocinViewer-4.swf' width='100%' height='600' type=application/x-shockwave-flash ALLOWFULLSCREEN='true' ALLOWSCRIPTACCESS='always'&&/embed&
450px*300px480px*400px650px*490px
支持嵌入HTML代码的网站使用
您的内容已经提交成功
您所提交的内容需要审核后才能发布,请您等待!
3秒自动关闭窗口图像数字水印的攻击及基准测试软件_百度文库
两大类热门资源免费畅读
续费一年阅读会员,立省24元!
评价文档:
&&¥3.00
&&¥2.00
喜欢此文档的还喜欢
图像数字水印的攻击及基准测试软件
随​着​各​种​图​像​数​字​水​印​算​法​的​提​出​,​ ​对​所​有​数​字​水​印​方​案​引​入​一​个​合​理​、​统​
​
​一​的​基​准​测​试​软​件​将​对​数​字​水​印​的​发​展​起​到​很​好​的​促​进​作​用​。​文​章​在​描​述​影​响​图​像​
​
​数​字​水​印​系​统​性​能​参​数​的​基​础​上​,​ ​对​数​字​水​印​的​各​种​典​型​的​攻​击​方​式​作​了​较​完​整​的​
​
​分​析​,​ ​最​后​对​现​有​的​基​准​测​试​程​序​S​t​i​r​m​a​r​k​ ​进​行​了​探​讨​,​ ​指​出​了​其​需​改​进​之​处​。
阅读已结束,如果下载本文需要使用
想免费下载本文?
把文档贴到Blog、BBS或个人站等:
普通尺寸(450*500pix)
较大尺寸(630*500pix)
你可能喜欢

我要回帖

更多关于 psnr matlab程序 的文章

 

随机推荐