Description: 图象数据信息的处理过程中对信息的隐藏和变换需要时可以参照此原代码.-image data information processing of information hiding and transform when necessary, taking into account the original source. Platform: |
Size: 370688 |
Author:李欣 |
Hits:
Description: 图像的组成无非是一些字符串或者一些字节组成的字符串,然而,每一个字节数据位的重要度并不是一样的,两个相邻字节往往只有低位是不一样的。例如:00100110和00100111代表了两个不同渐变度的红色,但是就人眼是分辨不出来的。最低有效位LSB算法,就是利用这一点,达到图像压缩,或者数字水印的功能。-The composition of the image is nothing more than some number of bytes or string composed of string, however, one byte for each data bit is not an important degree of the same, often only two adjacent low-byte is not the same. For example: 00100110 and 00100111 represent the gradient of two different degrees of red, but on the human eye is not out to tell. Least significant bit LSB algorithm, is to take advantage of this point, to achieve image compression, or digital watermark feature. Platform: |
Size: 322560 |
Author:xlz |
Hits:
Description: DCT-based Data hiding: dataHide.m Hide the logo image into the original
dataExtract.m Extract the logo image from the original findData.m Verify the robustness of the data hiding method 。and use jpeg compress
-DCT-based Data hiding: dataHide.m Hide the logo image into the original dataExtract.m Extract the logo image from the original findData.m Verify the robustness of the data hiding method. and use jpeg compress Platform: |
Size: 5120 |
Author:潘 |
Hits:
Description: A novel distortionless image data hiding algorithm based on integer
wavelet transform that can invert the stego-image into the original
image without any distortion after the hidden data are extracted is
proposed. This algorithm hides data into one (or more) middle bitplane(
s) of the integer wavelet transform coefficients in the middle and
high frequency subbands. It can embed much more data compared
with the existing distortionless data hiding techniques and satisfy the
imperceptibility requirement. The image histogram modification is
used to prevent greyscales from possible overflowing. Experimental
results have demonstrated the validity of the algorithm Platform: |
Size: 392192 |
Author:mehdi |
Hits:
Description: Data hiding in the still image presets a variety of challenges that arises due to the way human visual system (HVS) works and the typical modifications that image undergoes. Additionally, still images priced a relatively small host signal in which to hide data. A fairly typical 8-bit picture of 200*200 pixels provides approximately 40 KB of data space in which to work. This is equivalent to around 5 seconds of telephone-quality audio or less than a single frame NTSC television. Platform: |
Size: 199680 |
Author:rupesh |
Hits:
Description: 应用二值图像信息隐藏技术实现彩色图像中的安全隐写.pdf-Application of binary image data hiding in the safety of Image Steganography. Pdf Platform: |
Size: 316416 |
Author:方城 |
Hits:
Description: The code implements the following paper:
Guorong Xuan, Jiang Zhu, Jidong Chen, Shi Y.Q., Zhicheng Ni, Wei Su, "Distortionless data hiding based on integer wavelet transform" IET Electronics Letters, Volume: 38, Issue 25, page 1646- 1648, December 2002. (ISSN: 0013-5194)
The watermark embedding and extraction modules have been implemented separately.
The watermark embedding module embeds the watermark using bitplane compression in the integer wavelet transform domain.
The watermark extraction module extracts the previously embedded watermark and restores the original image.
A logo image is used as a watermark but can be replaced with any thing.-The code implements the following paper:
Guorong Xuan, Jiang Zhu, Jidong Chen, Shi Y.Q., Zhicheng Ni, Wei Su, "Distortionless data hiding based on integer wavelet transform" IET Electronics Letters, Volume: 38, Issue 25, page 1646- 1648, December 2002. (ISSN: 0013-5194)
The watermark embedding and extraction modules have been implemented separately.
The watermark embedding module embeds the watermark using bitplane compression in the integer wavelet transform domain.
The watermark extraction module extracts the previously embedded watermark and restores the original image.
A logo image is used as a watermark but can be replaced with any thing. Platform: |
Size: 1015808 |
Author:thinkingbig4 |
Hits:
Description: 文中提出了一种基于动态峰值的大容量可逆图像水印算法。该算法利用分块图像直方图的分布特点来确定新峰值,并通过修改相应的像素灰度值实现了在空间域中隐藏信息。该算法还可以利用嵌入点的信息无损地恢复原始图像。-In this paper, a new reversible data hiding scheme based on the dynamic peak is proposed. This algorithm utilizes a new peak between peak and zero in the histogram of the block and hides data by modifying the values of pixels. As a result,a profusion of data is embedded in the image. And this algorithm also recovers the image by hiding information. Platform: |
Size: 3950592 |
Author:coolbage |
Hits:
Description: some useful matlab code for data hiding for example psnrcompare wavelet transform arnold transform and -some useful matlab code for data hiding for example psnrcompare wavelet transform arnold transform and ... Platform: |
Size: 13312 |
Author:mehdi |
Hits:
Description: Java Data Hiding Project, We used the watermarking in the input image itself, and later decrypt the key image too. reversible data hidind project with executable code Platform: |
Size: 326656 |
Author:ashok |
Hits:
Description: ecently, more and more attention is paid to reversible
data hiding (RDH) in encrypted images, since it maintains
the excellent property that the original cover can be losslessly
recovered after embedded data is extracted while protecting the
image content’s confidentiality. All previous methods embed data
by reversibly Platform: |
Size: 2669568 |
Author:lathika |
Hits:
Description: 文件主要通过matlab实现图像的数据隐藏,以及相关优化代码(File is mainly achieved through MATLAB, image data hiding, and related optimization code) Platform: |
Size: 1315840 |
Author:Token_ |
Hits: