Location:
Search - hiding
Search list
Description: 2000下进程隐藏的一种方案的例子-2000 under the process of hiding a program example
Platform: |
Size: 20480 |
Author: kyao |
Hits:
Description: 本人的本科毕业设计成果,给出了一个信息隐藏技术的图像处理实现方法,实现语言:VB。-I graduated in the design results are given an information hiding techniques of image processing method to achieve language : VB.
Platform: |
Size: 382976 |
Author: 李永波 |
Hits:
Description: 图像信息隐藏变换,包括图像置乱变化,格式变化,图像加密解密,图像处理技术(色彩变化,边缘处理,信息隐藏)-Information Hiding transform images, including images Scrambling changes, format changes, image encoding and decoding, image processing technologies (color changes, edge treatment, information hiding)
Platform: |
Size: 368640 |
Author: 陈其星 |
Hits:
Description: 图象数据信息的处理过程中对信息的隐藏和变换需要时可以参照此原代码.-image data information processing of information hiding and transform when necessary, taking into account the original source.
Platform: |
Size: 370688 |
Author: 李欣 |
Hits:
Description: Many users have got used that Windows NT Task Manager shows all processes, and many consider that i s impossible to hide a process from Task Manager. Actually, process hiding is incredibly simple. There are lots of methods available for such a purpose and there are source codes available. It still amazes me that there are only a few trojans using these methods. Literally only 1 trojan from a 1000 is hidden. I think that trojan authors are lazy, since it requires extra work to hide the process and it is always easier to use ready-made sources and copy-paste them. Therefore we should expect hidden trojan processes in a near future.-Many users have got used that Windows NT Tas k Manager shows all processes, and many consider that i s impossible to hide a process from Task Manager. Actually, hiding process is incredibly simple. There are lots of methods available for such a purpose and there are source codes available. It still amaz es me that there are only a few trojans using thes e methods. Literally only a variant is from a 1000 hidden. I think that disables authors are lazy, since it requires extra work to hide the process and it is always easier to use ready-made source s and copy-paste them. Therefore we should Expe ct hidden variant processes in a near future.
Platform: |
Size: 15360 |
Author: inwing |
Hits:
Description: lsb的信息隐藏,可以下了看看,很简单的.-lsb of information hiding, they can look at a very simple.
Platform: |
Size: 379904 |
Author: |
Hits:
Description: 信息隐藏的一个经典检测算法,stegdetect-Information Hiding a classic detection algorithm stegdetect
Platform: |
Size: 1268736 |
Author: wp |
Hits:
Description:
实现LSB图像信息隐藏,不过只能打开位图 -achieve LSB image information hiding, but only open the bitmap
Platform: |
Size: 41984 |
Author: ZENG |
Hits:
Description: 基于图象dct变换域的信息隐藏算法,是信息隐藏基本的算法之一-image-based Extra transform domain algorithm of information hiding, information hiding is the basic algorithm
Platform: |
Size: 1024 |
Author: |
Hits:
Description: 图像处理,模式识别,数字水印,图像隐藏技术-image processing, pattern recognition, digital watermarking and image Hiding
Platform: |
Size: 201728 |
Author: hanuk |
Hits:
Description: 数字水印技术是指用信号处理的方法在数字化的多媒体数据中嵌入隐蔽的标记,这种标记通常是不可见的,只有通过专用的检测器或阅读器才能提取。数字水印在信息隐藏及图象隐藏方面有着极为广泛的应用。-Digital watermarking technology is that by using the method of signal processing in the digital multimedia data embedded hidden tag, this tag is not usually visible only through a dedicated detector or reader can be extracted. Digital Watermarking and Information Hiding in the hidden image has a very wide range of applications.
Platform: |
Size: 14336 |
Author: 周狼 |
Hits:
Description: 信息隐藏理论与技术讲义(钮心忻)信息隐藏和数字水印的基本原理,基础知识及相应算法-Information Hiding Theory and Technology Materials (NIU Xin-xin) Information hiding and digital watermarking the basic principles of basic knowledge and the corresponding algorithm
Platform: |
Size: 15017984 |
Author: 李一 |
Hits:
Description: 关联规则隐藏技术算法的资料,厘米昂阐述了两种算法实现。-Association Rule Hiding Algorithm of data, cm Aung described two algorithms.
Platform: |
Size: 142336 |
Author: ajpf |
Hits:
Description: 应用二值图像信息隐藏技术实现彩色图像中的安全隐写.pdf-Application of binary image data hiding in the safety of Image Steganography. Pdf
Platform: |
Size: 316416 |
Author: 方城 |
Hits:
Description: 实现大容量的图像信息隐藏,采用双随机置乱算法-Realize large-capacity image information hiding, using double-random scrambling algorithm
Platform: |
Size: 1024 |
Author: chen |
Hits:
Description: 提出一种无损信息隐藏方法,接收端不但可以提取额外嵌入的秘密信息,而且可以无损恢复原始
图像-Lossless information hiding method is proposed, the receiver can not only extract the additional information embedded in the secret, and can recover the original lossless image
Platform: |
Size: 455680 |
Author: 陈万虹 |
Hits:
Description: 本程序实现了语音信号中的信息隐藏,采用DCT和LSB方法。-the information hiding technique is completed with the carrier of voice signal.
Platform: |
Size: 10479616 |
Author: |
Hits:
Description: Reversible data hiding technique paper
Platform: |
Size: 631808 |
Author: Kayal |
Hits:
Description: Reversible data hiding in matlab for ppt
Platform: |
Size: 1304576 |
Author: Kayal |
Hits:
Description: 文中提出了一种基于动态峰值的大容量可逆图像水印算法。该算法利用分块图像直方图的分布特点来确定新峰值,并通过修改相应的像素灰度值实现了在空间域中隐藏信息。该算法还可以利用嵌入点的信息无损地恢复原始图像。-In this paper, a new reversible data hiding scheme based on the dynamic peak is proposed. This algorithm utilizes a new peak between peak and zero in the histogram of the block and hides data by modifying the values of pixels. As a result,a profusion of data is embedded in the image. And this algorithm also recovers the image by hiding information.
Platform: |
Size: 3950592 |
Author: coolbage |
Hits:
« 12
3
4
5
6
7
8
9
10
...
50
»