Description: 根据W. Bender的《Techniques for data hiding》编写
%用补丁方法对图象做DCT域的水印嵌入和提取,
%效率极高,程序简洁,属信息隐藏中常用的方法之一。
%作者:辽宁大学 信息学院 范铁生
%email:fts0@163.com-W. Bender in accordance with the Platform: |
Size: 1024 |
Author:gao |
Hits:
Description: 图像的组成无非是一些字符串或者一些字节组成的字符串,然而,每一个字节数据位的重要度并不是一样的,两个相邻字节往往只有低位是不一样的。例如:00100110和00100111代表了两个不同渐变度的红色,但是就人眼是分辨不出来的。最低有效位LSB算法,就是利用这一点,达到图像压缩,或者数字水印的功能。-The composition of the image is nothing more than some number of bytes or string composed of string, however, one byte for each data bit is not an important degree of the same, often only two adjacent low-byte is not the same. For example: 00100110 and 00100111 represent the gradient of two different degrees of red, but on the human eye is not out to tell. Least significant bit LSB algorithm, is to take advantage of this point, to achieve image compression, or digital watermark feature. Platform: |
Size: 322560 |
Author:xlz |
Hits:
Description: 这是一个用MATLAB实现的把数据隐藏到图片的最低有效位,且不影响图片的视觉效果,对研究LSB算法的同学很有帮助。-This is a MATLAB achieved by hiding the data into the least significant bit images and does not affect the picture of the visual effects, for research students LSB algorithm is very helpful. Platform: |
Size: 307200 |
Author:yyt |
Hits:
Description: DCT-based Data hiding: dataHide.m Hide the logo image into the original
dataExtract.m Extract the logo image from the original findData.m Verify the robustness of the data hiding method 。and use jpeg compress
-DCT-based Data hiding: dataHide.m Hide the logo image into the original dataExtract.m Extract the logo image from the original findData.m Verify the robustness of the data hiding method. and use jpeg compress Platform: |
Size: 5120 |
Author:潘 |
Hits:
Description: Owing to the broad application value of audio
watermarking in remote transmission and mobile
extraction, it is very important to study watermarking
approaches against A/D and D/A conversion. Based
on wavelet decomposition and cepstrum technology,
an audio watermarking algorithm is proposed where
the low-frequency wavelet coefficients are chosen for
cepstrum transforming. Then, the obtained cepstrum
data shows stable for watermark hiding by the
methods of edging data cutting and statistical mean
modification. The synchronization is not required in
the algorithm. Experimental results show that the
proposed algorithm can resist on the attack of A/D
and D/A successfully with features of large capacity
and zero bit error. It will be helpful for the mobile
audio in secure broadcast and management in the Platform: |
Size: 199680 |
Author:vinay |
Hits:
Description: Owing to the broad application value of audio
watermarking in remote transmission and mobile
extraction, it is very important to study watermarking
approaches against A/D and D/A conversion. Based
on wavelet decomposition and cepstrum technology,
an audio watermarking algorithm is proposed where
the low-frequency wavelet coefficients are chosen for
cepstrum transforming. Then, the obtained cepstrum
data shows stable for watermark hiding by the
methods of edging data cutting and statistical mean
modification. The synchronization is not required in
the algorithm. Experimental results show that the
proposed algorithm can resist on the attack of A/D
and D/A successfully with features of large capacity
and zero bit error. It will be helpful for the mobile
audio in secure broadcast and management in the Platform: |
Size: 346112 |
Author:vinay |
Hits:
Description: this the sample of matlab coding for echo hiding data audio steganography... use your own input-this is the sample of matlab coding for echo hiding data audio steganography... use your own input Platform: |
Size: 9216 |
Author:shahmin |
Hits:
Description: Data hiding in the still image presets a variety of challenges that arises due to the way human visual system (HVS) works and the typical modifications that image undergoes. Additionally, still images priced a relatively small host signal in which to hide data. A fairly typical 8-bit picture of 200*200 pixels provides approximately 40 KB of data space in which to work. This is equivalent to around 5 seconds of telephone-quality audio or less than a single frame NTSC television. Platform: |
Size: 199680 |
Author:rupesh |
Hits:
Description: 实现数据图像隐藏,无损数据隐藏,是2002年thidi&tian发表论文中的方法,现用MATLAB实现-For data hiding, lossless data hiding, is published in 2002 thidi & tian paper method is achieved using MATLAB Platform: |
Size: 216064 |
Author:Billy |
Hits:
Description: The code implements the following paper:
Guorong Xuan, Jiang Zhu, Jidong Chen, Shi Y.Q., Zhicheng Ni, Wei Su, "Distortionless data hiding based on integer wavelet transform" IET Electronics Letters, Volume: 38, Issue 25, page 1646- 1648, December 2002. (ISSN: 0013-5194)
The watermark embedding and extraction modules have been implemented separately.
The watermark embedding module embeds the watermark using bitplane compression in the integer wavelet transform domain.
The watermark extraction module extracts the previously embedded watermark and restores the original image.
A logo image is used as a watermark but can be replaced with any thing.-The code implements the following paper:
Guorong Xuan, Jiang Zhu, Jidong Chen, Shi Y.Q., Zhicheng Ni, Wei Su, "Distortionless data hiding based on integer wavelet transform" IET Electronics Letters, Volume: 38, Issue 25, page 1646- 1648, December 2002. (ISSN: 0013-5194)
The watermark embedding and extraction modules have been implemented separately.
The watermark embedding module embeds the watermark using bitplane compression in the integer wavelet transform domain.
The watermark extraction module extracts the previously embedded watermark and restores the original image.
A logo image is used as a watermark but can be replaced with any thing. Platform: |
Size: 1015808 |
Author:thinkingbig4 |
Hits:
Description: This works proposes a new data-hiding method based on pixel pair matching (PPM). The basic idea of PPM is to use the values of pixel pair as a reference coordinate, and search a coordinate in the neighborhood set of this pixel pair according to a given message digit. Exploiting modification direction (EMD) and diamond encoding (DE) are two data-hiding methods proposed recently based on PPM. The proposed method offers lower distortion than DE by providing more compact neighborhood sets and allowing embedded digits in any notational system.
-This works proposes a new data-hiding method based on pixel pair matching (PPM). The basic idea of PPM is to use the values of pixel pair as a reference coordinate, and search a coordinate in the neighborhood set of this pixel pair according to a given message digit. Exploiting modification direction (EMD) and diamond encoding (DE) are two data-hiding methods proposed recently based on PPM. The proposed method offers lower distortion than DE by providing more compact neighborhood sets and allowing embedded digits in any notational system.
Platform: |
Size: 2597888 |
Author:sabrine |
Hits: