Welcome![Sign In][Sign Up]
Location:
Search - encryption steganography

Search list

[Crack HackBasic Steganography

Description: 文件的加密解密实现-document encryption and decryption achieve
Platform: | Size: 74634 | Author: 赵利 | Hits:

[Crack HackBasic Steganography

Description: 文件的加密解密实现-document encryption and decryption achieve
Platform: | Size: 74752 | Author: | Hits:

[Linux-UnixTrueCrypt-6.0a-Source.tar

Description: Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encrypts a partition or drive where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the:http://www.truecrypt.org/-Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and LinuxMain Features:* Creates a virtual encrypted disk within a file and mounts it as a real disk.* Encrypts an entire partition or storage device such as USB flash drive or hard drive.* Encrypts a partition or drive where Windows is installed (pre-boot authentication).* Encryption is automatic, real-time (on-the-fly) and transparent.* Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data).* Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the: http://www.truecrypt.org/
Platform: | Size: 1686528 | Author: yangmuxiang | Hits:

[Crack HackDMIS_Ch3_InfoHiding

Description: 信息隐藏基础 数字媒体包括了图像、文字以及音频、视频等各种形式,以及传播形式和传播内容中采用数字化,即信息的采集、存取、加工和分发的数字化过程。数字媒体已经成为继语言、文字和电子技术之后的最新的信息载体。 通过本文你可以了解现代密码系统的基本知识,掌握常用的图像加密技术的基本思想。 具体包含: 1 信息隐藏概述 2 隐写术的基本原理 3 隐写 4 隐写分析技术-Information hiding based on digital media including images, text and audio, video and other forms, as well as the spread and dissemination of the contents of the form used in digital, that is, information collection, access, processing and distribution of the digital process. Digital media has become the language and the latest electronic technology of the information carrier. Through this article you can learn the basic of modern cryptography knowledge, the images used to master the basic idea of encryption technology. Specifically includes: 1 information hiding steganography outlined 2 of the 3 basic principles of steganography steganalysis technique 4
Platform: | Size: 370688 | Author: Yummy | Hits:

[JSP/Javaopenstego-0.5.2

Description: 是一种用JAVA执行的generic steganography工具,基于支持数据密码,并为各种算法提供插件-OpenStego is a tool implemented in Java for generic steganography, with support for password-based encryption of the data. It supports plugins for various steganographic algorithms
Platform: | Size: 291840 | Author: 谢永胜 | Hits:

[JSP/JavaSetup-OpenStego-0.5.2

Description: Setup-OpenStego is a tool implemented in Java for image based steganography, with support for password-based encryption of the data. It currently supports embedding of messages/files in a 24bpp images. Implementation of the same in C++ is also planned-Setup-OpenStegoOpenStego is a tool implemented in Java for image based steganography, with support for password-based encryption of the data. It currently supports embedding of messages/files in a 24bpp images. Implementation of the same in C++ is also planned
Platform: | Size: 19456 | Author: lixiaopei | Hits:

[matlabSteganography

Description: steganography means we have to hide the information in the image for using encryption and decryption algorithm also.
Platform: | Size: 43008 | Author: saravana | Hits:

[Crack Hacklsb_crypt

Description: steganography based on lsb substitution along with encryption
Platform: | Size: 1849344 | Author: Nidhin | Hits:

[Crack HackDouble-encryption

Description: 使用IDEA算法对文件进行加密后,在使用数字水印技术实现信息隐写-Use the IDEA algorithm to encrypt files, in the use of digital watermarking technology to realize the Information Steganography
Platform: | Size: 3179520 | Author: 林晓斌 | Hits:

[File Formatsecurity

Description: encryption and decryption word and steganography in word
Platform: | Size: 1049600 | Author: jalalh | Hits:

[JSP/JavaEncryption

Description: steganography using java
Platform: | Size: 4096 | Author: crimelord | Hits:

[Software Engineeringxx

Description: image steganography encryption and decryption using matlab
Platform: | Size: 2048 | Author: puneeth | Hits:

[Software Engineeringsteganography

Description: D.Rajeshkumar,Erode matlab PAPER FOR ENCRYPTION
Platform: | Size: 874496 | Author: rajeshkumar | Hits:

[Special EffectsImageCrypto

Description: 图像加密/隐写, 通过在图像中加入字符,加密后,隐写到图像中。隐写部分的字符通过指定算法可恢复-Image encryption/steganography
Platform: | Size: 368640 | Author: liwen | Hits:

[Otherfinal-(1)

Description: both encryption and steganography technique was used to improve the security of both patient’s privacy and investigation images. Firstly, the patient’s data is XOR encrypted with the help of secret key in order to provide a first level security. Secondly, a Contourlet Transform was applied to the host medical image. After obtaining the transform coefficients of the image, the data embedding process was employed over the high frequency sub-band of the image. Next, the encrypted patient privacy data was embedded over the High frequency components of a transformed image using Exploiting Modification Direction (EMD) algorithm. Finally, the host medical image and the embedded patient privacy data were retrieved the stego-image and quality of the retrieved image is analysed.-both encryption and steganography technique was used to improve the security of both patient’s privacy and investigation images. Firstly, the patient’s data is XOR encrypted with the help of secret key in order to provide a first level security. Secondly, a Contourlet Transform was applied to the host medical image. After obtaining the transform coefficients of the image, the data embedding process was employed over the high frequency sub-band of the image. Next, the encrypted patient privacy data was embedded over the High frequency components of a transformed image using Exploiting Modification Direction (EMD) algorithm. Finally, the host medical image and the embedded patient privacy data were retrieved the stego-image and quality of the retrieved image is analysed.
Platform: | Size: 669696 | Author: karthikeyan | Hits:

[Crack Hackmatlab-lsb-steganography

Description: Data Encryption by watermarking using lsb
Platform: | Size: 72704 | Author: majeded | Hits:

[Otherstegano-master

Description: steganography encryption and decrption
Platform: | Size: 800768 | Author: danny1111111 | Hits:

[Crack HackCryptoStego-master

Description: JS library for steganography with encryption - Hide text in an image with encryption and obfuscation.
Platform: | Size: 228352 | Author: rainI7 | Hits:

[Crack HackImage-Steganography

Description: Image steganography using key encryption, edge-detection and pixel substitution
Platform: | Size: 844800 | Author: rainI7 | Hits:

[Crack HackSteganography6

Description: Steganography in java using LSB technique for hiding message in PNG image & using AES and SHA-2 algorithm for encryption/decryption of message.
Platform: | Size: 22528 | Author: rainI7 | Hits:

CodeBus www.codebus.net