Mercurial > hg > wm
annotate Meerwald/cmp_corvi_sig.c @ 20:bd669312f068
suppress warnings, fix link errors
author | Peter Meerwald-Stadler <pmeerw@pmeerw.net> |
---|---|
date | Sat, 28 Jan 2023 23:54:58 +0100 |
parents | 4987db85cfae |
children |
rev | line source |
---|---|
0 | 1 #include "wm.h" |
2 | |
3 char *progname; | |
4 | |
5 void usage(void) { | |
6 fprintf(stderr, "usage: %s [-h] [-C] [-o file] [-v n] -s file file\n\n", progname); | |
7 fprintf(stderr, "\t-C\t\toutput correlation only\n"); | |
8 fprintf(stderr, "\t-h\t\tprint usage\n"); | |
9 fprintf(stderr, "\t-o file\t\toutput file\n"); | |
10 fprintf(stderr, "\t-v n\t\tverbosity level\n"); | |
11 fprintf(stderr, "\t-s file\t\toriginal signature file\n"); | |
12 exit(0); | |
13 } | |
14 | |
15 int main(int argc, char *argv[]) { | |
16 | |
17 FILE *in = stdin; | |
18 FILE *out = stdout; | |
19 FILE *sig = NULL; | |
20 | |
21 char signature_name[MAXPATHLEN]; | |
22 char output_name[MAXPATHLEN] = "(stdout)"; | |
23 char input_name[MAXPATHLEN] = "(stdin)"; | |
24 | |
25 int c; | |
26 int sig_n, in_n; | |
27 double s1, s2, s3; | |
28 char line[32]; | |
29 int matches; | |
30 | |
31 int verbose = 0; | |
32 int correlation_only = 0; | |
33 | |
34 progname = argv[0]; | |
35 | |
36 while ((c = getopt(argc, argv, "h?o:s:v:C")) != EOF) { | |
37 switch (c) { | |
38 case 'h': | |
39 case '?': | |
40 usage(); | |
41 break; | |
42 case 'o': | |
43 if ((out = fopen(optarg, "w")) == NULL) { | |
44 fprintf(stderr, "%s: unable to open output file %s\n", progname, optarg); | |
45 exit(1); | |
46 } | |
47 strcpy(output_name, optarg); | |
48 break; | |
49 case 's': | |
50 if ((sig = fopen(optarg, "r")) == NULL) { | |
51 fprintf(stderr, "%s: unable to open signature file %s\n", progname, optarg); | |
52 exit(1); | |
53 } | |
54 strcpy(signature_name, optarg); | |
55 break; | |
56 case 'v': | |
57 verbose = atoi(optarg); | |
58 if (verbose < 0) { | |
59 fprintf(stderr, "%s: verbosity level %d out of range\n", progname, verbose); | |
60 exit(1); | |
61 } | |
62 break; | |
63 case 'C': | |
64 correlation_only = 1; | |
65 break; | |
66 } | |
67 } | |
68 | |
69 argc -= optind; | |
70 argv += optind; | |
71 | |
72 if (argc > 1) { | |
73 usage(); | |
74 exit(1); | |
75 } | |
76 | |
8 | 77 if (argc == 1 && *argv[0] != '-') { |
0 | 78 if ((in = fopen(argv[0], "r")) == NULL) { |
79 fprintf(stderr, "%s: unable to open input file %s\n", progname, argv[0]); | |
80 exit(1); | |
81 } | |
82 else | |
83 strcpy(input_name, argv[0]); | |
8 | 84 } |
85 | |
0 | 86 if (!sig) { |
87 fprintf(stderr, "%s: original signature file not specified, use -s file option\n", progname); | |
88 exit(1); | |
89 } | |
90 | |
91 fgets(line, sizeof(line), sig); | |
92 if (strspn(line, "CVSG") < 4) { | |
93 fprintf(stderr, "%s: original signature file %s invalid\n", progname, signature_name); | |
94 exit(1); | |
95 } | |
96 | |
97 fgets(line, sizeof(line), in); | |
98 if (strspn(line, "CVWM") < 4) { | |
99 fprintf(stderr, "%s: signature file %s invalid\n", progname, input_name); | |
100 exit(1); | |
101 } | |
102 | |
103 fscanf(sig, "%d\n", &sig_n); | |
104 fscanf(in, "%d\n", &in_n); | |
105 if (sig_n != in_n) { | |
106 fprintf(stderr, "%s: watermark length mismatch (original %d, input %d)\n", progname, sig_n, in_n); | |
107 exit(1); | |
108 } | |
109 if (sig_n <= 0 || sig_n > 1000) { | |
110 fprintf(stderr, "%s: invalid original watermark length %d\n", progname, sig_n); | |
111 exit(1); | |
112 } | |
113 if (in_n <= 0 || in_n > 1000) { | |
114 fprintf(stderr, "%s: invalid watermark length %d\n", progname, in_n); | |
115 exit(1); | |
116 } | |
117 | |
16
4987db85cfae
fix another scanf() warning
Peter Meerwald <pmeerw@cosy.sbg.ac.at>
parents:
8
diff
changeset
|
118 fscanf(sig, "%*f\n"); |
0 | 119 fscanf(sig, "%*d\n"); |
120 fscanf(sig, "%*d\n"); | |
121 fscanf(sig, "%*[^\n\r]\n"); | |
122 | |
123 /* | |
124 * normalized correlation | |
125 * Craver, S., "Can Invisible Watermarks Resolve Rightful Ownership?", IBM Research Report, 1996, p. 5 | |
126 */ | |
127 | |
128 s1 = s2 = s3 = 0.0; | |
129 matches = 0; | |
130 while (in_n > 0) { | |
131 double sig_x, in_x; | |
132 | |
133 fscanf(sig, "%lf\n", &sig_x); | |
134 fscanf(in, "%lf\n", &in_x); | |
135 | |
136 matches += SIGN(sig_x * in_x); | |
137 | |
138 if (verbose >= 1) { | |
139 fprintf(stderr, "orig %f input %f\n", sig_x, in_x); | |
140 } | |
141 | |
142 s1 += sig_x * in_x; | |
143 s2 += in_x * in_x; | |
144 s3 += sig_x * sig_x; | |
145 | |
146 in_n--; | |
147 } | |
148 | |
149 if (!correlation_only) { | |
150 fprintf(out, "%s: correlation %f, hamming distance %f\n", progname, s1 / sqrt(s2 * s3), (double) matches / sig_n); | |
151 } | |
152 else | |
153 fprintf(out, "%f\n", (double) matches / sig_n); | |
154 | |
155 fclose(sig); | |
156 fclose(out); | |
157 fclose(in); | |
158 | |
159 exit(0); | |
160 } |