Description: The procedure used to select the location of embedded information can be generated by random sequence to achieve the embedding of information security to meet the requirements of
- [image_encryption] - MATLAB prepared by the chaotic sequence
- [lsb] - Several images embedded in the text of t
- [dct11] - DCT1.m for the one-dimensional discrete
- [psk31dd] - DELPHI PSK wireless communications, soun
- [exp] - exp1.m for the secondary decomposition o
- [randinterval] - Code describes how to carry out in the D
File list (Check if you may need any files):