Welcome![Sign In][Sign Up]
Location:
Search - image encryption

Search list

[Special EffectsScrambling

Description: 水印置乱处理。本文选用四幅水印图像进行融合再置乱,大大增加了加密效果。-Scrambling treatment watermark. In this paper, four selected watermark image fusion scrambling again, greatly increasing the effectiveness of encryption.
Platform: | Size: 246784 | Author: beauty | Hits:

[Other2

Description: 2007年硕士论文,基于混沌的数字图像和视频加密算法研究-Master' s thesis in 2007, based on the chaos of the digital image and video encryption algorithm
Platform: | Size: 4153344 | Author: 小杜 | Hits:

[assembly languageCode_Huffman

Description: 详细介绍了霍夫曼编码的源代码 用于图象的加密解密程序-Huffman code described in detail the source code for image encryption and decryption process
Platform: | Size: 2048 | Author: bichaozhi | Hits:

[WaveletDWT

Description: 基于混沌加密的离散小波变换域数字图像水印算法的研究的期刊论文-DWT Based on Chaotic Encryption Algorithm for Digital Image Watermarking domain of research journal articles
Platform: | Size: 553984 | Author: 刘欣 | Hits:

[Software Engineering1

Description: 图像加密,基于混沌映射的图像加密算法的实现与研究-A novel algorithm for image encryption based on mixture of chaotic maps
Platform: | Size: 281600 | Author: liming | Hits:

[Special EffectsMyImageProcessing

Description: 完成图像处理,包括基本处理,平滑,锐化,形态学处理,加密与解密,以及其他处理。-Completion of image processing, including basic processing, smoothing, sharpening, morphological processing, encryption and decryption, as well as other processing.
Platform: | Size: 101376 | Author: | Hits:

[OS programcryptographyJava

Description: Modules : 1. Conversion of secret color image into Gray scale Image. 2. Encryption by Half toning. 3. Generation of shares. 4. Selection of Secret information pixels. 5. Encrypt the shares. 6. Reveling the secret image. - Modules : 1. Conversion of secret color image into Gray scale Image. 2. Encryption by Half toning. 3. Generation of shares. 4. Selection of Secret information pixels. 5. Encrypt the shares. 6. Reveling the secret image.
Platform: | Size: 57344 | Author: anu | Hits:

[Crack Hack5956456image_encryption

Description: 加密数字图像的主要源码 加密数字图像的主要源码-encrypt image
Platform: | Size: 48128 | Author: ff | Hits:

[Crack HackAnImageEncryptionSchemeBasedonChaoticMap

Description: ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map - In this paper, a novel block digital image encryp- tion scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomposed into sub-blocks with a given size, and an external secret key with 192-bit is used and mapped to the system parameters, which are employed to generate a spatiotemporal chaotic binary sequence matrix to encrypt the block original image. Besides, the former sub-block encrypted result will be acted as a feedback to the following sub-block encryption proc- ess. The proposed scheme is described in detail, along with the security analyses such as key space analysis, sensitivity analysis, information entropy analysis and correlation coefficients analysis of adjacent pixels. The computer simulation results indicate that the suggested image encryption scheme has some properties desir- able in a good security cryptosystem.
Platform: | Size: 1104896 | Author: ff | Hits:

[Crack HackFibonacci_encryption

Description: 一种Fibonacci序列变换空域加密算法和解密算法。利用Fibonacci序列产生密钥,实现图像空域加密。-The airspace of a Fibonacci sequence transform encryption algorithm and decryption algorithm. The use of Fibonacci sequence generated key encryption to achieve the image airspace.
Platform: | Size: 12288 | Author: 林旭亮 | Hits:

[Crack HackImageFreqCipher

Description: 一种频域加密算法,图像经过DCT变换得到DCT系数,然后对DCT系数进行加密。然后对加密的DCT系数进行DCT反变换图像数据。最后对其加密后的图像数据进行线性变换来调整图像数据的取值范围在[0,255]。最后得到加密图像-A frequency-domain encryption algorithm, the image obtained through the DCT transform DCT coefficients, and then encrypt the DCT coefficients. And then encrypted DCT coefficients DCT inverse transform image data. The last of its encrypted image data linear transformation to adjust the image data ranges in [0,255]. Finally the image is encrypted
Platform: | Size: 13312 | Author: 林旭亮 | Hits:

[Crack Hacklorenz

Description: 一个Lorenz混沌系统代码,可供学习研究混沌系统的参考,对图像做加密解密处理。-A Lorenz chaotic system code available for study and research of chaotic systems reference on the image to do encryption and decryption processing.
Platform: | Size: 1024 | Author: caifei | Hits:

[source in ebookChapter1-5

Description: 第一章到第五章的代码 本书通过100多个模块实例,详细地讲解了Verilog HDL程序设计语言,全书共分13章,内容涉及VerilogHDL语言基本概念、建模、同步设计、异步设计、功能验证等,实例包括各种加法器/计数器、乘法器/除法器、编码器/译码器、状态机、SPIMaster Controller、I2C Master controller、CAN ProtocolController、Memory模块、JPEG图像压缩模块、加密模块、ATA控制器、8位RISC-CPU等及各个实例模块相应的Testbench,所举实例具有很强的实用性和代表性,每个实例均给出了介绍、功能分析、程序代码和结果演示。-Chapter to Chapter V of the code in this book through more than 100 module instance, explain in detail the Verilog HDL programming language, the book is divided into 13 chapters, covering basic concepts VerilogHDL languages, modeling, synchronous design, asynchronous design, function authentication, etc. Examples include a variety of adder/counter, multiplier/divider, encoders/decoders, state machines, SPIMaster Controller, I2C Master controller, CAN ProtocolController, Memory modules, JPEG image compression module, encryption module, ATA controller, 8-bit RISC-CPU, etc. and the various instances of the corresponding module Testbench, The examples are highly practical and representation, each instance of it all gives the introduction, functional analysis, program code and results presentation.
Platform: | Size: 1580032 | Author: xiao | Hits:

[Delphi VCLHideData

Description: Contains two functions for inserting and retreving data into an image. usefull when u want to hide data eg the encryption key
Platform: | Size: 1024 | Author: kajamo | Hits:

[matlabSteganography

Description: steganography means we have to hide the information in the image for using encryption and decryption algorithm also.
Platform: | Size: 43008 | Author: saravana | Hits:

[Graph program01

Description: delphi 写的图像加密程序 能够将文字信息加密到图片中-delphi write image encryption program can encrypt a text message to the picture
Platform: | Size: 5120 | Author: 么建兴 | Hits:

[2D GraphicArnold

Description: Arnold置乱算法代码,能根据Arnold映射实验二维图像的像素坐标置乱加密-Arnold scrambling algorithm code, according to Arnold experimental two-dimensional image map coordinates of the pixel scrambling encryption
Platform: | Size: 1024 | Author: gdwythe | Hits:

[Graph programdecrypt1

Description: 这是图像解密的源代码。可以下载分享,加密源代码,上次已经上传-This is the source code to decrypt the image. Download share, encryption source code, the last has been uploaded
Platform: | Size: 47104 | Author: 刘汉能 | Hits:

[Graph programother

Description: 数字图像加密的论文。。 混沌随机序列的MATLAB产生源程序混沌随机序列的MATLAB产生源程序-Digital Image Encryption papers. . . . Generate random sequence of MATLAB chaotic chaotic random sequence of MATLAB source code generated source code
Platform: | Size: 1668096 | Author: 刘能 | Hits:

[Windows Developdwt

Description: 实现基于小波变换数字水印的嵌入和提取,并实现对压缩,噪声等攻击的检测。-Using the same key after a chaotic sequence of scrambling the watermark information to achieve the double encryption, consider the wavelet energy distribution problem, the watermark information embedded in low-frequency coefficients to ensure the reliability of watermark information. Extracted using image restoration method to achieve blind detection.
Platform: | Size: 868352 | Author: 飞无影 | Hits:
« 1 2 3 4 5 6 7 89 10 11 12 13 ... 39 »

CodeBus www.codebus.net