Welcome![Sign In][Sign Up]
Location:
Search - data hiding matlab

Search list

[Crack Hackimage_patchwork_dct

Description: 根据W. Bender的《Techniques for data hiding》编写 %用补丁方法对图象做DCT域的水印嵌入和提取, %效率极高,程序简洁,属信息隐藏中常用的方法之一。 %作者:辽宁大学 信息学院 范铁生 %email:fts0@163.com-W. Bender in accordance with the
Platform: | Size: 1024 | Author: gao | Hits:

[Special EffectsLSB-Data-Hiding-Image

Description: 图像的组成无非是一些字符串或者一些字节组成的字符串,然而,每一个字节数据位的重要度并不是一样的,两个相邻字节往往只有低位是不一样的。例如:00100110和00100111代表了两个不同渐变度的红色,但是就人眼是分辨不出来的。最低有效位LSB算法,就是利用这一点,达到图像压缩,或者数字水印的功能。-The composition of the image is nothing more than some number of bytes or string composed of string, however, one byte for each data bit is not an important degree of the same, often only two adjacent low-byte is not the same. For example: 00100110 and 00100111 represent the gradient of two different degrees of red, but on the human eye is not out to tell. Least significant bit LSB algorithm, is to take advantage of this point, to achieve image compression, or digital watermark feature.
Platform: | Size: 322560 | Author: xlz | Hits:

[Graph programLSB_Data_Hiding_Image

Description: 这是一个用MATLAB实现的把数据隐藏到图片的最低有效位,且不影响图片的视觉效果,对研究LSB算法的同学很有帮助。-This is a MATLAB achieved by hiding the data into the least significant bit images and does not affect the picture of the visual effects, for research students LSB algorithm is very helpful.
Platform: | Size: 307200 | Author: yyt | Hits:

[matlabhidetc

Description: steganography tool for hiding data in image using LSB hiding technique
Platform: | Size: 2048 | Author: malli | Hits:

[Graph programTechniquesforDataHiding

Description: 数据隐藏,做为一中隐蔽、嵌入的形式, 可以进行数字媒体数据的识别,注释和版权保护。-Data hiding,a form of steganography,embeds data into digital media for the purpose of identification,annotation,and copyright.
Platform: | Size: 379904 | Author: 丫丫 | Hits:

[Special EffectsDCT_based_Data_hiding

Description: DCT-based Data hiding: dataHide.m Hide the logo image into the original dataExtract.m Extract the logo image from the original findData.m Verify the robustness of the data hiding method 。and use jpeg compress -DCT-based Data hiding: dataHide.m Hide the logo image into the original dataExtract.m Extract the logo image from the original findData.m Verify the robustness of the data hiding method. and use jpeg compress
Platform: | Size: 5120 | Author: | Hits:

[Special Effectsproj_code01210

Description: watermarking is the art of hiding data to provide authenticity and security.
Platform: | Size: 2048 | Author: zoheb | Hits:

[Software Engineeringamorph

Description: Owing to the broad application value of audio watermarking in remote transmission and mobile extraction, it is very important to study watermarking approaches against A/D and D/A conversion. Based on wavelet decomposition and cepstrum technology, an audio watermarking algorithm is proposed where the low-frequency wavelet coefficients are chosen for cepstrum transforming. Then, the obtained cepstrum data shows stable for watermark hiding by the methods of edging data cutting and statistical mean modification. The synchronization is not required in the algorithm. Experimental results show that the proposed algorithm can resist on the attack of A/D and D/A successfully with features of large capacity and zero bit error. It will be helpful for the mobile audio in secure broadcast and management in the
Platform: | Size: 199680 | Author: vinay | Hits:

[Software Engineeringvm2

Description: Owing to the broad application value of audio watermarking in remote transmission and mobile extraction, it is very important to study watermarking approaches against A/D and D/A conversion. Based on wavelet decomposition and cepstrum technology, an audio watermarking algorithm is proposed where the low-frequency wavelet coefficients are chosen for cepstrum transforming. Then, the obtained cepstrum data shows stable for watermark hiding by the methods of edging data cutting and statistical mean modification. The synchronization is not required in the algorithm. Experimental results show that the proposed algorithm can resist on the attack of A/D and D/A successfully with features of large capacity and zero bit error. It will be helpful for the mobile audio in secure broadcast and management in the
Platform: | Size: 346112 | Author: vinay | Hits:

[Audio programmatlabcodeechohiding

Description: this the sample of matlab coding for echo hiding data audio steganography... use your own input-this is the sample of matlab coding for echo hiding data audio steganography... use your own input
Platform: | Size: 9216 | Author: shahmin | Hits:

[Program docreversiblehidingICIP02

Description: Paper on reversible data hiding
Platform: | Size: 124928 | Author: mohmmed omar | Hits:

[Multimedia programstegnography

Description: Data hiding in the still image presets a variety of challenges that arises due to the way human visual system (HVS) works and the typical modifications that image undergoes. Additionally, still images priced a relatively small host signal in which to hide data. A fairly typical 8-bit picture of 200*200 pixels provides approximately 40 KB of data space in which to work. This is equivalent to around 5 seconds of telephone-quality audio or less than a single frame NTSC television.
Platform: | Size: 199680 | Author: rupesh | Hits:

[Special EffectsThodiTian

Description: 实现数据图像隐藏,无损数据隐藏,是2002年thidi&tian发表论文中的方法,现用MATLAB实现-For data hiding, lossless data hiding, is published in 2002 thidi & tian paper method is achieved using MATLAB
Platform: | Size: 216064 | Author: Billy | Hits:

[matlabSteganographycode

Description: secret hiding of data can be done by using this
Platform: | Size: 3812352 | Author: Naresh | Hits:

[matlabDistortionless_Data_Hiding

Description: The code implements the following paper: Guorong Xuan, Jiang Zhu, Jidong Chen, Shi Y.Q., Zhicheng Ni, Wei Su, "Distortionless data hiding based on integer wavelet transform" IET Electronics Letters, Volume: 38, Issue 25, page 1646- 1648, December 2002. (ISSN: 0013-5194) The watermark embedding and extraction modules have been implemented separately. The watermark embedding module embeds the watermark using bitplane compression in the integer wavelet transform domain. The watermark extraction module extracts the previously embedded watermark and restores the original image. A logo image is used as a watermark but can be replaced with any thing.-The code implements the following paper: Guorong Xuan, Jiang Zhu, Jidong Chen, Shi Y.Q., Zhicheng Ni, Wei Su, "Distortionless data hiding based on integer wavelet transform" IET Electronics Letters, Volume: 38, Issue 25, page 1646- 1648, December 2002. (ISSN: 0013-5194) The watermark embedding and extraction modules have been implemented separately. The watermark embedding module embeds the watermark using bitplane compression in the integer wavelet transform domain. The watermark extraction module extracts the previously embedded watermark and restores the original image. A logo image is used as a watermark but can be replaced with any thing.
Platform: | Size: 1015808 | Author: thinkingbig4 | Hits:

[matlabparul

Description: this code is used to do data hiding in image and then take it back ..........pandey
Platform: | Size: 17408 | Author: pandey | Hits:

[matlab[PPT]Reversible-and-high-capacity-data-hiding-in-

Description: Reversible data hiding in matlab for ppt
Platform: | Size: 1304576 | Author: Kayal | Hits:

[Otherimage-processing-data-hiding-code

Description: some useful matlab code for data hiding for example psnrcompare wavelet transform arnold transform and -some useful matlab code for data hiding for example psnrcompare wavelet transform arnold transform and ...
Platform: | Size: 13312 | Author: mehdi | Hits:

[WaveletDistortionless Data Hiding

Description: Distortionless Data Hiding, using matlab
Platform: | Size: 901120 | Author: pawanap | Hits:

[matlabInformation Hiding

Description: 文件主要通过matlab实现图像的数据隐藏,以及相关优化代码(File is mainly achieved through MATLAB, image data hiding, and related optimization code)
Platform: | Size: 1315840 | Author: Token_ | Hits:
« 12 »

CodeBus www.codebus.net