Mercurial > hg > wm
view Meerwald/cmp_kim_sig.c @ 18:3bdb67e76858
mse opt.
author | Peter Meerwald <pmeerw@cosy.sbg.ac.at> |
---|---|
date | Fri, 30 Jan 2009 12:46:49 +0100 |
parents | f83ef905a63d |
children |
line wrap: on
line source
#include "wm.h" char *progname; void usage(void) { fprintf(stderr, "usage: %s [-h] [-C] [-o file] [-v n] -s file file\n\n", progname); fprintf(stderr, "\t-C\t\toutput correlation only\n"); fprintf(stderr, "\t-h\t\tprint usage\n"); fprintf(stderr, "\t-o file\t\toutput file\n"); fprintf(stderr, "\t-v n\t\tverbosity level\n"); fprintf(stderr, "\t-s file\t\toriginal signature file\n"); exit(0); } int main(int argc, char *argv[]) { FILE *in = stdin; FILE *out = stdout; FILE *sig = NULL; char signature_name[MAXPATHLEN]; char output_name[MAXPATHLEN] = "(stdout)"; char input_name[MAXPATHLEN] = "(stdin)"; int c, i; int in_level; double *input_watermark, *orig_watermark; int sig_n, in_n; double sig_a; double sig_A; int sig_l; int sig_e, sig_f; double s1, s2, s3; double correlation; char line[32]; int verbose = 0; int correlation_only = 0; progname = argv[0]; while ((c = getopt(argc, argv, "h?Co:s:v:")) != EOF) { switch (c) { case 'h': case '?': usage(); break; case 'C': correlation_only = 1; break; case 'o': if ((out = fopen(optarg, "w")) == NULL) { fprintf(stderr, "%s: unable to open output file %s\n", progname, optarg); exit(1); } strcpy(output_name, optarg); break; case 's': if ((sig = fopen(optarg, "r")) == NULL) { fprintf(stderr, "%s: unable to open signature file %s\n", progname, optarg); exit(1); } strcpy(signature_name, optarg); break; case 'v': verbose = atoi(optarg); if (verbose < 0) { fprintf(stderr, "%s: verbosity level %d out of range\n", progname, verbose); exit(1); } break; } } argc -= optind; argv += optind; if (argc > 1) { usage(); exit(1); } if (argc == 1 && *argv[0] != '-') { if ((in = fopen(argv[0], "r")) == NULL) { fprintf(stderr, "%s: unable to open input file %s\n", progname, argv[0]); exit(1); } else strcpy(input_name, argv[0]); } if (!sig) { fprintf(stderr, "%s: original signature file not specified, use -s file option\n", progname); exit(1); } fgets(line, sizeof(line), sig); if (strspn(line, "KISG") < 4) { fprintf(stderr, "%s: original signature file %s invalid\n", progname, signature_name); exit(1); } fgets(line, sizeof(line), in); if (strspn(line, "KIWM") < 4) { fprintf(stderr, "%s: watermark file %s invalid\n", progname, input_name); exit(1); } fscanf(sig, "%d\n", &sig_n); fscanf(in, "%d\n", &in_n); if (sig_n <= 0 || sig_n > 32000) { fprintf(stderr, "%s: invalid original watermark length %d\n", progname, sig_n); exit(1); } fscanf(sig, "%lf\n", &sig_a); fscanf(sig, "%lf\n", &sig_A); fscanf(sig, "%d\n", &sig_l); fscanf(sig, "%d\n", &sig_e); fscanf(sig, "%d\n", &sig_f); fscanf(sig, "%*[^\n\r]\n"); orig_watermark = malloc(sig_n * sizeof(double)); for (i = 0; i < sig_n; i++) fscanf(sig, "%lf\n", &orig_watermark[i]); fclose(sig); fscanf(in, "%d\n", &in_level); input_watermark = malloc(in_n * sizeof(double)); for (i = 0; i < in_n; i++) fscanf(in, "%lf\n", &input_watermark[i]); fclose(in); /* * normalized correlation * Craver, S., "Can Invisible Watermarks Resolve Rightful Ownership?", IBM Research Report, 1996, p. 5 */ s1 = s2 = s3 = 0.0; for (i = 0; i < in_n; i++) { double in_x, sig_x; in_x = input_watermark[i]; sig_x = orig_watermark[i % sig_n]; s1 += sig_x * in_x; s2 += in_x * in_x; s3 += sig_x * sig_x; } correlation = s1 / sqrt(s2 * s3); if (!correlation_only) fprintf(out, "%s: correlation: %f\n", progname, correlation); else fprintf(out, "%f\n", correlation); fclose(out); free(orig_watermark); free(input_watermark); exit(0); }