Description:
Modules : 1. Conversion of secret color image into Gray scale
Image.
2. Encryption by Half toning.
3. Generation of shares.
4. Selection of Secret information pixels.
5. Encrypt the shares.
6. Reveling the secret image. -
Modules : 1. Conversion of secret color image into Gray scale
Image.
2. Encryption by Half toning.
3. Generation of shares.
4. Selection of Secret information pixels.
5. Encrypt the shares.
6. Reveling the secret image.
Platform: |
Size: 57344 |
Author:anu |
Hits:
Description: 一种Fibonacci序列变换空域加密算法和解密算法。利用Fibonacci序列产生密钥,实现图像空域加密。-The airspace of a Fibonacci sequence transform encryption algorithm and decryption algorithm. The use of Fibonacci sequence generated key encryption to achieve the image airspace. Platform: |
Size: 12288 |
Author:林旭亮 |
Hits:
Description: 一种频域加密算法,图像经过DCT变换得到DCT系数,然后对DCT系数进行加密。然后对加密的DCT系数进行DCT反变换图像数据。最后对其加密后的图像数据进行线性变换来调整图像数据的取值范围在[0,255]。最后得到加密图像-A frequency-domain encryption algorithm, the image obtained through the DCT transform DCT coefficients, and then encrypt the DCT coefficients. And then encrypted DCT coefficients DCT inverse transform image data. The last of its encrypted image data linear transformation to adjust the image data ranges in [0,255]. Finally the image is encrypted Platform: |
Size: 13312 |
Author:林旭亮 |
Hits:
Description: Setup-OpenStego is a tool implemented in Java for image based steganography, with support for password-based encryption of the data. It currently supports embedding of messages/files in a 24bpp images. Implementation of the same in C++ is also planned-Setup-OpenStegoOpenStego is a tool implemented in Java for image based steganography, with support for password-based encryption of the data. It currently supports embedding of messages/files in a 24bpp images. Implementation of the same in C++ is also planned Platform: |
Size: 19456 |
Author:lixiaopei |
Hits:
Description: 简单的图片加密程序,把原图与作为密钥的图片进行异或操作实现图片的加密,再进行一次异或操作,实现解密-Simple image encryption procedures, the Original and different pictures as a key to achieve the image or operation of encryption, and then once exclusive or operation, to achieve decryption Platform: |
Size: 2048 |
Author:Wu Zhongsheng |
Hits:
Description: 基于混沌加密算法的图像加密软件,使用Java awt做的界面设计-Image encryption algorithm based on chaotic encryption software, to use Java awt to do interface design Platform: |
Size: 35840 |
Author:于大海 |
Hits:
Description: 完成基于非对称密码技术的对称密钥分配工作
说明:
(1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。
(2)A用Ks对一图象文件(test_pig.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2;
(3)对比T1和T2;-Completion of asymmetric cryptography based on symmetric key distribution work
Description:
(1) the completion of the asymmetric public key certificate-based key distribution based on the work, according to the materials on asymmetric cryptography based on symmetric key distribution scheme, the completion of the allocation of symmetric key Ks.
(2) A document with Ks on an image (test_pig.bmp) is encrypted and sent to B, B to decrypt receipt, compared to the original image to see if the same, and record the entire encryption/decryption time spent T2
(3) contrast T1 and T2 Platform: |
Size: 43008 |
Author:熊龙生 |
Hits:
Description: 运用java技术,基于RSA算法,实现对图片文件进行加密解密的源代码-Using java technology, based on RSA algorithm, the image files on the source code for encryption and decryption Platform: |
Size: 2048 |
Author:窦小敏 |
Hits:
Description: 实现骑士游历问题。 骑士游历问题是一个经典的数学问题。其思想在电路图的设计及图像加密等方面都有帮助,如果能将骑士游历问题算法通过计算机语言程序化将对其在其他领域中的应用有极大帮助。通过研究骑士游历的规则对问题进行数学模型抽象,通过研究骑士游历的方向与可到达情况,将骑士的空间移动抽象成数学表达式,进而映射到程序中所需对应的数据结构形式,最后通过利用JAVA语言得以实现骑士游历问题中骑士游历过程的动态图形演示。 -Knight traveled to achieve the problem. Knights tour problem is a classical mathematical problem. Their thoughts on the schematic design and image encryption and other aspects to help, if the knight can travel through a computer algorithm for the problem of the language program in its application in other areas of great help. Knight traveled by studying the rules of abstract mathematical models of problems, Knight traveled by studying the direction and the situation can be reached, the Knights of room to move into the abstract mathematical expressions, and then mapped to the corresponding program data structures required in the form of final adoption can be achieved using JAVA language issues knight knights traveled traveled the process of dynamic graphical presentation. Platform: |
Size: 4096 |
Author:蒋立 |
Hits:
Description: 1)作为通讯的双方A和B,都有一个共同信赖的第三方CA,由CA为每个人生成公钥和相应的私钥并分发给A、B。
(2)A和B分别将自己的公钥提供给对方,然后A用B的公钥加密一个数据X(整型,可自己定义,比如100)并发送给B,B用自己的私钥解密后得到数据X,然后按协商好的函数F(比如F(X)=2*X)计算得到F(X),再利用A的公钥加密后发送给A;A在本地用自己的私钥解密后得到F(x),在同本地计算得到的F(X)进行对比,如果一致,说明公钥分配成功。
(3)A用B的公钥对一图象文件(test_pig.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T1;
-
1) as the communication between the parties A and B, have a common trusted third party CA, the CA public key generated for each person and the corresponding private key and distributed to A, B.
(2) A and B, respectively, their own public key available to the other, then A with B s public key to encrypt a data X (integer, can define their own, such as 100) and sent to B, B with their own private key to decrypt data obtained after X, then press the agreed-function F (eg F (X) = 2* X) calculated from F (X), then use a s public key encrypted and sent to a A locally with their own private key decrypted to get F (x), in the same local calculated F (X) for comparison, if the same, indicating the success of public-key distribution.
(3) A with B s public key for an image file (test_pig.bmp) is encrypted and sent to B, B to decrypt the receipt, compared to the original image to see if the same, and record the entire encryption/decryption time T1 used
Platform: |
Size: 822272 |
Author:陈溢豪 |
Hits:
Description: Java code for multi-layer/multi-level image encryption. At first level, effectively encrypts the image. At second level, re-encrypt the encrypted image. Little hard to understand. Have patience when reading the code (an honest advise for java beginners) Platform: |
Size: 30720 |
Author:Ajitpal Brar |
Hits:
Description: 加解密软件实现对文件的加解密,其中包含有文档是对其的形象描述,运用的是sql ,java等知识。-Encryption software encryption and decryption of the document, which contains the image of the document to its description, use the sql, java and other knowledge. Platform: |
Size: 2304000 |
Author:aiqinhai |
Hits:
Description: 用java写的一个图片视频加密解密的小工具,方便给自己的资源加密-Using java to write a video image encryption and decryption of small tools, easy to encrypt their own resources Platform: |
Size: 33792 |
Author:邱赫 |
Hits:
Description: 完成基于非对称密码技术的对称密钥分配工作
说明:
(1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。
(2)A用Ks对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2;
(3)对比T1和T2;
要求:
(1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密,基于DES完成对称密码技术的加/解密(JAVA有库函数支持);
(2)通信内容为一图象文件(test_pic.bmp);
(3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上);
(4)所分配的对称密钥皆为一次一密,随机产生;
(5)具体密钥分配过程请以课本中基于非对称密码技术的对称密钥分配方案为参考,完成从步骤1到步骤4的全过程;
-Completed based on asymmetric cryptography symmetric key distribution work
Description:
( 1 ) Upon completion of the above-mentioned asymmetric public key certificate-based key distribution based on the work , according to the materials on asymmetric cryptography-based symmetric key distribution scheme , the completion of the distribution of symmetric key Ks work .
(2) A use of an image file Ks (test_pic.bmp) is encrypted and sent to B, B to decrypt after receipt , compared to see if the same original image , and records the encryption/decryption used time T2
( 3 ) comparing T1 and T2
Requirements:
(1) JAVA programming language, based on the RSA asymmetric cryptographic techniques to complete encryption/decryption , based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported )
( 2) The content of the communication is an image file (test_pic.bmp)
( 3 ) complete network-based key distribution job ( as the Platform: |
Size: 45056 |
Author:丁元元 |
Hits:
Description: 完成基于非对称密码技术的对称密钥分配工作
说明:
(1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。
(2)A用Ks对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2;
(3)对比T1和T2;
要求:
(1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密,基于DES完成对称密码技术的加/解密(JAVA有库函数支持);
(2)通信内容为一图象文件(test_pic.bmp);
(3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上);
(4)所分配的对称密钥皆为一次一密,随机产生;
(5)具体密钥分配过程请以课本中基于非对称密码技术的对称密钥分配方案为参考,完成从步骤1到步骤4的全过程;-Completed based on asymmetric cryptography symmetric key distribution work
Description:
( 1 ) Upon completion of the above-mentioned asymmetric public key certificate-based key distribution based on the work , according to the materials on asymmetric cryptography-based symmetric key distribution scheme , the completion of the distribution of symmetric key Ks work .
(2) A use of an image file Ks (test_pic.bmp) is encrypted and sent to B, B to decrypt after receipt , compared to see if the same original image , and records the encryption/decryption used time T2
( 3 ) comparing T1 and T2
Requirements:
(1) JAVA programming language, based on the RSA asymmetric cryptographic techniques to complete encryption/decryption , based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported )
( 2) The content of the communication is an image file (test_pic.bmp)
( 3 ) complete network-based key distribution job ( as the Platform: |
Size: 15360 |
Author:丁元元 |
Hits: