Description: 图像的组成无非是一些字符串或者一些字节组成的字符串,然而,每一个字节数据位的重要度并不是一样的,两个相邻字节往往只有低位是不一样的。例如:00100110和00100111代表了两个不同渐变度的红色,但是就人眼是分辨不出来的。最低有效位LSB算法,就是利用这一点,达到图像压缩,或者数字水印的功能。-The composition of the image is nothing more than some number of bytes or string composed of string, however, one byte for each data bit is not an important degree of the same, often only two adjacent low-byte is not the same. For example: 00100110 and 00100111 represent the gradient of two different degrees of red, but on the human eye is not out to tell. Least significant bit LSB algorithm, is to take advantage of this point, to achieve image compression, or digital watermark feature. Platform: |
Size: 322560 |
Author:xlz |
Hits:
Description: 介绍了一种基于统计特性的LSB密写分析方法,对其进行了改进并提出了可靠估计信息隐藏长度的方法。该方法利用相邻像素相关性定义了统计量,可根据阈值判断秘密信息的有无。对待检测图像进行二次嵌入,根据统计量的变化建立模型,能可靠估计秘密信息隐藏长度。实验表明,估计出的信息量比较准确。-This paper introduces a steganalysis algorithm based on statistics method for LSB steganograhpy and mends it,proposes a method estimating the quantity of hiding data reliably.The method defines statistics using the relativity of close pixels and judges the existence of secret message with threshold.It inserts message in the waiting detected image again,modeles according to the changes of statistics.The model can estimate the quantity of hiding data reliably.Experimental results show the quantity of hi... Platform: |
Size: 1536000 |
Author:boe |
Hits:
Description: A novel distortionless image data hiding algorithm based on integer
wavelet transform that can invert the stego-image into the original
image without any distortion after the hidden data are extracted is
proposed. This algorithm hides data into one (or more) middle bitplane(
s) of the integer wavelet transform coefficients in the middle and
high frequency subbands. It can embed much more data compared
with the existing distortionless data hiding techniques and satisfy the
imperceptibility requirement. The image histogram modification is
used to prevent greyscales from possible overflowing. Experimental
results have demonstrated the validity of the algorithm Platform: |
Size: 392192 |
Author:mehdi |
Hits:
Description: Data hiding in the still image presets a variety of challenges that arises due to the way human visual system (HVS) works and the typical modifications that image undergoes. Additionally, still images priced a relatively small host signal in which to hide data. A fairly typical 8-bit picture of 200*200 pixels provides approximately 40 KB of data space in which to work. This is equivalent to around 5 seconds of telephone-quality audio or less than a single frame NTSC television. Platform: |
Size: 199680 |
Author:rupesh |
Hits:
Description: The code implements the following paper:
Guorong Xuan, Jiang Zhu, Jidong Chen, Shi Y.Q., Zhicheng Ni, Wei Su, "Distortionless data hiding based on integer wavelet transform" IET Electronics Letters, Volume: 38, Issue 25, page 1646- 1648, December 2002. (ISSN: 0013-5194)
The watermark embedding and extraction modules have been implemented separately.
The watermark embedding module embeds the watermark using bitplane compression in the integer wavelet transform domain.
The watermark extraction module extracts the previously embedded watermark and restores the original image.
A logo image is used as a watermark but can be replaced with any thing.-The code implements the following paper:
Guorong Xuan, Jiang Zhu, Jidong Chen, Shi Y.Q., Zhicheng Ni, Wei Su, "Distortionless data hiding based on integer wavelet transform" IET Electronics Letters, Volume: 38, Issue 25, page 1646- 1648, December 2002. (ISSN: 0013-5194)
The watermark embedding and extraction modules have been implemented separately.
The watermark embedding module embeds the watermark using bitplane compression in the integer wavelet transform domain.
The watermark extraction module extracts the previously embedded watermark and restores the original image.
A logo image is used as a watermark but can be replaced with any thing. Platform: |
Size: 1015808 |
Author:thinkingbig4 |
Hits:
Description: 基于傅里叶域内的研究水印,实现其鲁棒性。数字水印技术,能有效的维护数字作品及数据的安全性,是信息隐藏领域的一个重要分支,它与信息安全、信息隐藏、数据加密等均有密切关系。数字水印有多个研究方向,主要集中在图像水印方面。基于傅立叶域的数字图像水印技术,是一种常见的水印算法,它具有算法简单,执行效率高,能有效对抗攻击的特点。-Research based on Fourier domain watermarking, to achieve its robustness. Digital watermarking technology to digital works and the effective maintenance of data security, information hiding is an important branch of the field, it is with information security, information hiding, data encryption Dengjun closely related. Digital watermarking has a number of research directions, mainly in terms of image watermarking. Fourier domain-based digital image watermarking technology, is a common watermarking algorithm, which algorithm is simple, the implementation of efficient, effective against attack characteristics. Platform: |
Size: 52224 |
Author:问题 |
Hits:
Description: BMP图像信息隐藏,在不影响图像正常显示的情况下,在24位真彩色BMP图像中隐藏信息。主要是根据BMP图像的文件结构来实现。BMP图像由文件头,信息头,调色板区和数据区组成,而24位真彩色图像中没有调色板信息。此源码主要是在24位真彩色BMP图像中隐藏信息。-BMP image information hiding, without affecting the normal image display cases, in 24-bit true-color BMP images in the hidden information. Mainly based on the BMP image file structure to achieve. BMP image from the file header, header, palette composed of area and data area, and 24-bit true color image without palette information. This source mainly in the 24-bit true-color BMP images hidden information. Platform: |
Size: 667648 |
Author:kayak |
Hits:
Description: This project is designed basically to make us understand the concept of least significant bit insertion method in Steganography. Steganography is the technique hiding the very existing of hidden data in an image. Platform: |
Size: 961536 |
Author:Masoud |
Hits:
Description: 基于预测误差差值扩展的彩色图像无损数据隐藏,希望对大家有帮助-Prediction error difference expansion based color image lossless data hiding, we hope to help Platform: |
Size: 544768 |
Author:张生 |
Hits:
Description: propose a novel joint data-hiding
and compression scheme for digital images using side match
vector quantization (SMVQ) and image inpainting. The two
functions of data hiding and image compression can be integrated
into one single module seamlessly. On the sender side, except for
the blocks in the leftmost and topmost of the image, each of the
other residual blocks in raster-scanning order can be embedded
with secret data and compressed simultaneously by SMVQ or
image inpainting adaptively according to the current embedding
bit. Vector quantization is also utilized for some complex blocks
to control the visual distortion and error diffusion caused by the
progressive compression. After segmenting the image compressed
codes into a series of sections by the indicator bits, the receiver
can achieve the extraction of secret bits and image decompression
successfully according to the index values in the segmented
sections. Experimental results demonstrate the effectiveness of
the proposed scheme. Platform: |
Size: 965632 |
Author:bala |
Hits:
Description: ecently, more and more attention is paid to reversible
data hiding (RDH) in encrypted images, since it maintains
the excellent property that the original cover can be losslessly
recovered after embedded data is extracted while protecting the
image content’s confidentiality. All previous methods embed data
by reversibly Platform: |
Size: 2669568 |
Author:lathika |
Hits:
Description: Nowadays, with the rapid growth in formation technology more and more images and data are available on the internet. So there is a need to provide some kind of authentication to such important data. When the sender transmits the image to the receiver, there may be intruders present in between who may capture the image. After capturing the image the mage the intruder may view the meaningful content in the image. This may not be the problem in some cases. But if we consider security applications like medical and military images then such distortion is unacceptable. To avoid misuse or loss of information several reversible data hiding techniques (RDH) are implemented. This paper gives details on watermarking, LSB, Histogram and RDH using optimum Thresholding with related results.-Nowadays, with the rapid growth in information technology more and more images and data are available on the internet. So there is a need to provide some kind of authentication to such important data. When the sender transmits the image to the receiver, there may be intruders present in between who may capture the image. After capturing the image the mage the intruder may view the meaningful content in the image. This may not be the problem in some cases. But if we consider security applications like medical and military images then such distortion is unacceptable. To avoid misuse or loss of information several reversible data hiding techniques (RDH) are implemented. This paper gives details on watermarking, LSB, Histogram and RDH using optimum Thresholding with related results. Platform: |
Size: 313344 |
Author:Devarapu ChakraRao |
Hits:
Description: Advances in formation technology have gradually changed people’s lives and lifestyles in recent years. The Internet provides a convenient environment for users to exchange secret data or communicate with one another regardless of their physical locations. Telemedicine is a well-known application, where enormous amount of medical data need to be securely transferred over the public network and manipulate effectively. If the information is accessed by unauthorized person, it may lead to malicious attack or any alteration of medical image may result in misdiagnosis. Thus to ensure the patient’s data integrity, recently several researchers have applied data hiding technique named steganography, since it is an appropriate tool to be used for enhancing security and authentication of medical data.-Advances in information technology have gradually changed people’s lives and lifestyles in recent years. The Internet provides a convenient environment for users to exchange secret data or communicate with one another regardless of their physical locations. Telemedicine is a well-known application, where enormous amount of medical data need to be securely transferred over the public network and manipulate effectively. If the information is accessed by unauthorized person, it may lead to malicious attack or any alteration of medical image may result in misdiagnosis. Thus to ensure the patient’s data integrity, recently several researchers have applied data hiding technique named steganography, since it is an appropriate tool to be used for enhancing security and authentication of medical data. Platform: |
Size: 1090560 |
Author:karthikeyan |
Hits:
Description: Since the birth of digital data hiding, image authentication has been one of its most widespread applications. During the first years, aside a few numbers of works, this application was limited to verifying the integrity of the image or locating its tampered regions. Nowadays, these watermarks are designed in sophisticated ways to not only localize the image tampering, but also recover the lost content in those areas. In tampering protection and self-recovery schemes, the goal is to embed a representation of the original image into itself in a way to efficiently compromise between three design parameters the quality of the watermarked image, the quality of the content recovery in tampered areas, and the tolerable tampering rate (TTR). -Since the birth of digital data hiding, image authentication has been one of its most widespread applications. During the first years, aside a few numbers of works, this application was limited to verifying the integrity of the image or locating its tampered regions. Nowadays, these watermarks are designed in sophisticated ways to not only localize the image tampering, but also recover the lost content in those areas. In tampering protection and self-recovery schemes, the goal is to embed a representation of the original image into itself in a way to efficiently compromise between three design parameters the quality of the watermarked image, the quality of the content recovery in tampered areas, and the tolerable tampering rate (TTR). Platform: |
Size: 250880 |
Author:parthiban |
Hits:
Description: Digital watermark embeds informa-
tion bits into digital cover such as images and
videos to prove the creator’s ownership of his
work. In this paper, we propose a robust image
watermark algorithm based on a generative
adversarial network. This model includes two
modules, generator and adversary. Generator
is mainly used to generate images embedded
with watermark, and decode the image dam-
aged by noise to obtain the watermark. Adver-
sary is used to discriminate whether the image
is embedded with watermark and damage the
image by noise. Based on the model Hidden
(hiding data with deep networks), we add a
high-pass filter in front of the discriminator,
making the watermark tend to be embedded in
the mid-frequency region of the image. Since
the human visual system pays more attention
to the central area of the image, we give a
higher weight to the image center region, and
a lower weight to the edge region when calcu-
lating the loss between cover and embedded
image. The watermarked image obtained by
this scheme has a better visual performance.
Experimental results show that the proposed
architecture is more robust against noise
interference compared with the state-of-art
schemes. Platform: |
Size: 704508 |
Author:bamzi334 |
Hits: