Description: 根据W. Bender的《Techniques for data hiding》编写
%用补丁方法对图象做DCT域的水印嵌入和提取,
%效率极高,程序简洁,属信息隐藏中常用的方法之一。
%作者:辽宁大学 信息学院 范铁生
%email:fts0@163.com-W. Bender in accordance with the Platform: |
Size: 1024 |
Author:gao |
Hits:
Description: 图像的组成无非是一些字符串或者一些字节组成的字符串,然而,每一个字节数据位的重要度并不是一样的,两个相邻字节往往只有低位是不一样的。例如:00100110和00100111代表了两个不同渐变度的红色,但是就人眼是分辨不出来的。最低有效位LSB算法,就是利用这一点,达到图像压缩,或者数字水印的功能。-The composition of the image is nothing more than some number of bytes or string composed of string, however, one byte for each data bit is not an important degree of the same, often only two adjacent low-byte is not the same. For example: 00100110 and 00100111 represent the gradient of two different degrees of red, but on the human eye is not out to tell. Least significant bit LSB algorithm, is to take advantage of this point, to achieve image compression, or digital watermark feature. Platform: |
Size: 322560 |
Author:xlz |
Hits:
Description: 这是一个用MATLAB实现的把数据隐藏到图片的最低有效位,且不影响图片的视觉效果,对研究LSB算法的同学很有帮助。-This is a MATLAB achieved by hiding the data into the least significant bit images and does not affect the picture of the visual effects, for research students LSB algorithm is very helpful. Platform: |
Size: 307200 |
Author:yyt |
Hits:
Description: DCT-based Data hiding: dataHide.m Hide the logo image into the original
dataExtract.m Extract the logo image from the original findData.m Verify the robustness of the data hiding method 。and use jpeg compress
-DCT-based Data hiding: dataHide.m Hide the logo image into the original dataExtract.m Extract the logo image from the original findData.m Verify the robustness of the data hiding method. and use jpeg compress Platform: |
Size: 5120 |
Author:潘 |
Hits:
Description: Owing to the broad application value of audio
watermarking in remote transmission and mobile
extraction, it is very important to study watermarking
approaches against A/D and D/A conversion. Based
on wavelet decomposition and cepstrum technology,
an audio watermarking algorithm is proposed where
the low-frequency wavelet coefficients are chosen for
cepstrum transforming. Then, the obtained cepstrum
data shows stable for watermark hiding by the
methods of edging data cutting and statistical mean
modification. The synchronization is not required in
the algorithm. Experimental results show that the
proposed algorithm can resist on the attack of A/D
and D/A successfully with features of large capacity
and zero bit error. It will be helpful for the mobile
audio in secure broadcast and management in the Platform: |
Size: 199680 |
Author:vinay |
Hits:
Description: Owing to the broad application value of audio
watermarking in remote transmission and mobile
extraction, it is very important to study watermarking
approaches against A/D and D/A conversion. Based
on wavelet decomposition and cepstrum technology,
an audio watermarking algorithm is proposed where
the low-frequency wavelet coefficients are chosen for
cepstrum transforming. Then, the obtained cepstrum
data shows stable for watermark hiding by the
methods of edging data cutting and statistical mean
modification. The synchronization is not required in
the algorithm. Experimental results show that the
proposed algorithm can resist on the attack of A/D
and D/A successfully with features of large capacity
and zero bit error. It will be helpful for the mobile
audio in secure broadcast and management in the Platform: |
Size: 346112 |
Author:vinay |
Hits:
Description: this the sample of matlab coding for echo hiding data audio steganography... use your own input-this is the sample of matlab coding for echo hiding data audio steganography... use your own input Platform: |
Size: 9216 |
Author:shahmin |
Hits:
Description: Data hiding in the still image presets a variety of challenges that arises due to the way human visual system (HVS) works and the typical modifications that image undergoes. Additionally, still images priced a relatively small host signal in which to hide data. A fairly typical 8-bit picture of 200*200 pixels provides approximately 40 KB of data space in which to work. This is equivalent to around 5 seconds of telephone-quality audio or less than a single frame NTSC television. Platform: |
Size: 199680 |
Author:rupesh |
Hits:
Description: 实现数据图像隐藏,无损数据隐藏,是2002年thidi&tian发表论文中的方法,现用MATLAB实现-For data hiding, lossless data hiding, is published in 2002 thidi & tian paper method is achieved using MATLAB Platform: |
Size: 216064 |
Author:Billy |
Hits:
Description: The code implements the following paper:
Guorong Xuan, Jiang Zhu, Jidong Chen, Shi Y.Q., Zhicheng Ni, Wei Su, "Distortionless data hiding based on integer wavelet transform" IET Electronics Letters, Volume: 38, Issue 25, page 1646- 1648, December 2002. (ISSN: 0013-5194)
The watermark embedding and extraction modules have been implemented separately.
The watermark embedding module embeds the watermark using bitplane compression in the integer wavelet transform domain.
The watermark extraction module extracts the previously embedded watermark and restores the original image.
A logo image is used as a watermark but can be replaced with any thing.-The code implements the following paper:
Guorong Xuan, Jiang Zhu, Jidong Chen, Shi Y.Q., Zhicheng Ni, Wei Su, "Distortionless data hiding based on integer wavelet transform" IET Electronics Letters, Volume: 38, Issue 25, page 1646- 1648, December 2002. (ISSN: 0013-5194)
The watermark embedding and extraction modules have been implemented separately.
The watermark embedding module embeds the watermark using bitplane compression in the integer wavelet transform domain.
The watermark extraction module extracts the previously embedded watermark and restores the original image.
A logo image is used as a watermark but can be replaced with any thing. Platform: |
Size: 1015808 |
Author:thinkingbig4 |
Hits:
Description: 作为信息隐藏的重要分支,数字水印是一种有效的数字产品版权保护和数据安全维护技术。近年来数字水印技术成为了信息安全领域的研究热点,也得到了较大的发展。基于变换域的水印技术是目前研究的热点和重点。本文系统介绍了数字水印的原理和应用方法,概要介绍了数字水印的几种主流算法,并重点研究了一种基于离散余弦变换(DCT)数字图像水印算法,并借助 MATLAB编程工具,实现数字水印的嵌入和提取仿真,以及为测试鲁棒性而对水印图像进行攻击实验。-As an important branch of information hiding, digital watermarking is an effective copyright protection of digital products and data security maintenance technology. In recent years, digital watermarking has become a hot research field of information security, has also been considerable development. Transform domain watermarking technique based on the current research focus and focus. This system describes the principles and applications of digital watermarking methods, an overview of several mainstream digital watermarking algorithms, and focus on a discrete cosine transform (DCT) digital image watermarking, and with the MATLAB programming tools, digital watermark embedding and extraction simulation, as well as test the robustness of the watermark image on the attack experiments. Platform: |
Size: 2048 |
Author:yang cheng |
Hits: