Description: 2007年硕士论文,基于混沌的数字图像和视频加密算法研究-Master' s thesis in 2007, based on the chaos of the digital image and video encryption algorithm Platform: |
Size: 4153344 |
Author:小杜 |
Hits:
Description: 详细介绍了霍夫曼编码的源代码 用于图象的加密解密程序-Huffman code described in detail the source code for image encryption and decryption process Platform: |
Size: 2048 |
Author:bichaozhi |
Hits:
Description: 基于混沌加密的离散小波变换域数字图像水印算法的研究的期刊论文-DWT Based on Chaotic Encryption Algorithm for Digital Image Watermarking domain of research journal articles Platform: |
Size: 553984 |
Author:刘欣 |
Hits:
Description: 完成图像处理,包括基本处理,平滑,锐化,形态学处理,加密与解密,以及其他处理。-Completion of image processing, including basic processing, smoothing, sharpening, morphological processing, encryption and decryption, as well as other processing. Platform: |
Size: 101376 |
Author: |
Hits:
Description:
Modules : 1. Conversion of secret color image into Gray scale
Image.
2. Encryption by Half toning.
3. Generation of shares.
4. Selection of Secret information pixels.
5. Encrypt the shares.
6. Reveling the secret image. -
Modules : 1. Conversion of secret color image into Gray scale
Image.
2. Encryption by Half toning.
3. Generation of shares.
4. Selection of Secret information pixels.
5. Encrypt the shares.
6. Reveling the secret image.
Platform: |
Size: 57344 |
Author:anu |
Hits:
Description: ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security cryptosystem. Platform: |
Size: 1104896 |
Author:ff |
Hits:
Description: 一种Fibonacci序列变换空域加密算法和解密算法。利用Fibonacci序列产生密钥,实现图像空域加密。-The airspace of a Fibonacci sequence transform encryption algorithm and decryption algorithm. The use of Fibonacci sequence generated key encryption to achieve the image airspace. Platform: |
Size: 12288 |
Author:林旭亮 |
Hits:
Description: 一种频域加密算法,图像经过DCT变换得到DCT系数,然后对DCT系数进行加密。然后对加密的DCT系数进行DCT反变换图像数据。最后对其加密后的图像数据进行线性变换来调整图像数据的取值范围在[0,255]。最后得到加密图像-A frequency-domain encryption algorithm, the image obtained through the DCT transform DCT coefficients, and then encrypt the DCT coefficients. And then encrypted DCT coefficients DCT inverse transform image data. The last of its encrypted image data linear transformation to adjust the image data ranges in [0,255]. Finally the image is encrypted Platform: |
Size: 13312 |
Author:林旭亮 |
Hits:
Description: 一个Lorenz混沌系统代码,可供学习研究混沌系统的参考,对图像做加密解密处理。-A Lorenz chaotic system code available for study and research of chaotic systems reference on the image to do encryption and decryption processing. Platform: |
Size: 1024 |
Author:caifei |
Hits:
Description: 第一章到第五章的代码
本书通过100多个模块实例,详细地讲解了Verilog HDL程序设计语言,全书共分13章,内容涉及VerilogHDL语言基本概念、建模、同步设计、异步设计、功能验证等,实例包括各种加法器/计数器、乘法器/除法器、编码器/译码器、状态机、SPIMaster Controller、I2C Master controller、CAN ProtocolController、Memory模块、JPEG图像压缩模块、加密模块、ATA控制器、8位RISC-CPU等及各个实例模块相应的Testbench,所举实例具有很强的实用性和代表性,每个实例均给出了介绍、功能分析、程序代码和结果演示。-Chapter to Chapter V of the code in this book through more than 100 module instance, explain in detail the Verilog HDL programming language, the book is divided into 13 chapters, covering basic concepts VerilogHDL languages, modeling, synchronous design, asynchronous design, function authentication, etc. Examples include a variety of adder/counter, multiplier/divider, encoders/decoders, state machines, SPIMaster Controller, I2C Master controller, CAN ProtocolController, Memory modules, JPEG image compression module, encryption module, ATA controller, 8-bit RISC-CPU, etc. and the various instances of the corresponding module Testbench, The examples are highly practical and representation, each instance of it all gives the introduction, functional analysis, program code and results presentation. Platform: |
Size: 1580032 |
Author:xiao |
Hits:
Description: Contains two functions for inserting and retreving data into an image.
usefull when u want to hide data eg the encryption key Platform: |
Size: 1024 |
Author:kajamo |
Hits:
Description: steganography means we have to hide the information in the image for using encryption and decryption algorithm also. Platform: |
Size: 43008 |
Author:saravana |
Hits:
Description: delphi 写的图像加密程序 能够将文字信息加密到图片中-delphi write image encryption program can encrypt a text message to the picture Platform: |
Size: 5120 |
Author:么建兴 |
Hits:
Description: 这是图像解密的源代码。可以下载分享,加密源代码,上次已经上传-This is the source code to decrypt the image. Download share, encryption source code, the last has been uploaded Platform: |
Size: 47104 |
Author:刘汉能 |
Hits:
Description: 实现基于小波变换数字水印的嵌入和提取,并实现对压缩,噪声等攻击的检测。-Using the same key after a chaotic sequence of scrambling the watermark information to achieve the double encryption, consider the wavelet energy distribution problem, the watermark information embedded in low-frequency coefficients to ensure the reliability of watermark information. Extracted using image restoration method to achieve blind detection. Platform: |
Size: 868352 |
Author:飞无影 |
Hits: