Welcome![Sign In][Sign Up]
Location:
Search - image encryption

Search list

[Crack Hackchaos

Description: 用VC++实现数字图象迭代混沌加密方法-with VC digital image iterative method Chaotic Encryption
Platform: | Size: 175104 | Author: hailynch | Hits:

[matlabMetrix

Description: 该软件和代码实现的功能是对图象的加密和解密,运行环境是Xp+matlab,代码中有说明,很容易看明白.-the software code and the functions of the image of encryption and decryption, the environment is Xp Matlab, the code is described, it is easy to see to understand.
Platform: | Size: 3562496 | Author: 叶飞 | Hits:

[matlabjpeg2000_matlab

Description: jpeg2000的matlab实现,包括实现的ppt。对图像处理和JPEG2000加密的朋友很有帮助。-JPEG2000 of Matlab realized, including the realization of ppt. Right JPEG2000 image processing and encryption of helpful friends.
Platform: | Size: 97280 | Author: 江鸟 | Hits:

[Special EffectsArnold_problem

Description: 一种置乱技术用于图象加密应用,该程序实现了Arnold算法,其中包含了加密扰乱及反扰乱过程-a scrambling encryption technology for image applications, the realization of Arnold algorithm, which contains the encryption disrupt the process and disrupt anti-
Platform: | Size: 1024 | Author: 付源 | Hits:

[Crack Hackzongsuanfa

Description: 彩色图象混沌置乱加密算法 绝对真确,给大家最好的见面礼 啊-Color Image Chaos scrambling encryption algorithm is absolutely true, for everyone to the best gift on his arrival ah.
Platform: | Size: 1024 | Author: | Hits:

[Crack HackChilkatLib2

Description: DES加密解密算法,西望大家共享.参考学习-DES encryption and decryption algorithms, west share. Reference learning
Platform: | Size: 27913216 | Author: sxue | Hits:

[Crack Hackrc4

Description: rc4算法的加密和解密源代码 加密和解密过程是可逆的-RC4 algorithm for encryption and decryption source code encryption and decryption process is reversible
Platform: | Size: 1024 | Author: | Hits:

[Crack HackDES-PIC-CBC

Description: DES加密方法加密BMP图像,CBC方式实现。-DES encryption methods encryption BMP image, CBC way.
Platform: | Size: 88064 | Author: Rex | Hits:

[Program docdigitalwatermark

Description: 用于图象处理方面的加密技术.对初学者有很好的指导作用.-Image processing for encryption technology. To have a very good beginners guide.
Platform: | Size: 741376 | Author: yedan | Hits:

[Crack HackDWT

Description: 利用同一密钥的混沌序列对经过置乱的水印信息实现双重加密,考虑小波变换的能量分布问题,把水印信息嵌入低频系数中,确保水印信息的可靠性。提取时利用图像复原方法实现盲检测。-Using the same key after a chaotic sequence of scrambling the watermark information to achieve the double encryption, consider the wavelet energy distribution problem, the watermark information embedded in low-frequency coefficients to ensure the reliability of watermark information. Extracted using image restoration method to achieve blind detection.
Platform: | Size: 625664 | Author: 王宇 | Hits:

[Crack Hackhashreplacement

Description: 在图像加密中用到的md5算法,也就是哈希置换-In the image of the md5 encryption algorithm used, that is, hash replacement
Platform: | Size: 1024 | Author: guaiguai | Hits:

[Crack Hackbinaryextract

Description: 二值图像的信息隐藏,用到md5加密和改进后的置乱算法-Binary Image Information Hiding, use md5 encryption and improved hashing algorithm
Platform: | Size: 1024 | Author: guaiguai | Hits:

[Special Effectscode

Description: 基于LSB的图像中数据加密隐藏算法程序 图像的组成无非是一些字符串或者一些字节组成的字符串,然而,每一个字节数据位的重要度并不是一样的,两个相邻字节往往只有低位是不一样的。例如:00100110和00100111代表了两个不同渐变度的红色,但是就人眼是分辨不出来的。最低有效位LSB算法,就是利用这一点,达到图像压缩,或者数字水印的功能。 -LSB of the image-based data encryption to hide the image composition algorithm procedure is nothing more than some number of bytes or string composed of string, however, one byte for each data bit is not an important degree of the same, and two adjacent words section, usually only low level is not the same. For example: 00100110 and 00100111 represent the gradient of two different degrees of red, but on the human eye is not out to tell. Least significant bit LSB algorithm, is to take advantage of this point, to achieve image compression, or digital watermark feature.
Platform: | Size: 248832 | Author: aaa | Hits:

[GDI-BitmapMyImageWork

Description: 一个网上下的源码,实现对BMP图片加密入文档类内容-Under an on-line source, the realization of the BMP image into the document encryption type content
Platform: | Size: 3879936 | Author: | Hits:

[Special Effectsdct1_watermarked

Description: Firstly, research on robust image watermarking. A digital watermarking scheme based on wavelet transform was proposed. It realizes the watermarking extract without the original image using 64×64×8 bit gray image as the watermark signal. In order to enhancing the security of the watermark, we employ an encryption technology based on chaos and bit plan. Simulation results show that our scheme have good invisibility and can survive low-quality JPEG compression, median filtering and so on. In addition, the analysis of the extracted watermark can help us to detect and localize tampers.-Firstly, research on robust image watermarking. A digital watermarking scheme based on wavelet transform was proposed. It realizes the watermarking extract without the original image using 64 × 64 × 8 bit gray image as the watermark signal. In order to enhancing the security of the watermark, we employ an encryption technology based on chaos and bit plan. Simulation results show that our scheme have good invisibility and can survive low-quality JPEG compression, median filtering and so on. In addition, the analysis of the extracted watermark can help us to detect and localize tampers.
Platform: | Size: 102400 | Author: xiaxianming | Hits:

[Special Effectsscramble

Description: 基于相邻像素间位异或的图像置乱算法,效果很好,改变图像直方图-Between the adjacent pixels based on the XOR bit of image scrambling algorithm, well, change the image histogram
Platform: | Size: 166912 | Author: 林瑞 | Hits:

[Other11111111111456

Description: 为保证网络信息传输的安全性,提出一种视频图像加密方法。该方法引入混沌系统中的Logistic映射和 Baker映射,结合H·264视频压缩编码特点,利用Baker映射对DCT (Discrete Cosine Transform)变换量化后 的块进行位置置乱, -In order to ensure the safety of information transmission network, and a video image encryption method. This method is the introduction of chaotic systems in Logistic mapping and Baker mapping, combined with H 264 video compression coding features, the use of Baker mapping of DCT (Discrete Cosine Transform) transform to quantify the location of block after scrambling,
Platform: | Size: 155648 | Author: 武同学 | Hits:

[GDI-Bitmaptexttobmp

Description: 加文字进bmp格式的图片文件,文字可以很容易地用256字节密钥以Rijndael算法加密/解密-Add language into bmp format image files, text can be easily used 256-byte key to Rijndael algorithm for encryption/decryption
Platform: | Size: 1689600 | Author: zurong | Hits:

[Otherchaoticsecureimagedata

Description: 通过细胞神经网络混沌系统对图像数据进行加密和解密 -Through the cellular neural networks for image data of chaotic systems for encryption and decryption
Platform: | Size: 94208 | Author: daijiaxing | Hits:

[Crack Hackencryptionsystem

Description: 基于混沌序列的加密系统,这里只是针对位图,但是明白混沌加密的原理后可以采用opencv图像处理库进行修改。-Based on Chaotic Sequences encryption system, where only the bitmap, but understand the principle of chaotic encryption can be used after opencv image-processing library to edit.
Platform: | Size: 1260544 | Author: 巢歌 | Hits:
« 1 2 3 4 5 6 78 9 10 11 12 ... 39 »

CodeBus www.codebus.net