Welcome![Sign In][Sign Up]
Location:
Search - image hiding in matlab

Search list

[Special EffectsArnoldcheck123

Description: 图像置乱变换,用于图像在传输过程中信息的隐藏加密-image scrambling transformation for image transmission in the process of hiding information encryption
Platform: | Size: 1024 | Author: jiwei | Hits:

[Crack Hackzigzag

Description: % 这是参照 University of California 提供的 MPEG 源代码的基础上编制的。 %用分块方法(8x8的块)对图象做zigzag变换, %效率极高,程序简洁,属信息隐藏中常用的方法之一。 %作者:辽宁大学 信息学院 范铁生 %email:fts0@163.com- This is a reference to University of California to provide the MPEG source code based on the establishment. Of sub-block method (8x8 block) to make zigzag transform images, high efficiency and simple procedure, which is commonly used in information hiding methods. Author: Liaoning University School of Informatics Fan Tiesheng email: fts0@163.com
Platform: | Size: 1024 | Author: gao | Hits:

[Special Effectsmain

Description: 实现在一副图像中嵌入多幅图像,实现了大容量的信息隐藏-To achieve an image embedded in the multiple images to achieve a large capacity of information hiding
Platform: | Size: 1024 | Author: guaiguai | Hits:

[Crack Hackbinaryextract

Description: 二值图像的信息隐藏,用到md5加密和改进后的置乱算法-Binary Image Information Hiding, use md5 encryption and improved hashing algorithm
Platform: | Size: 1024 | Author: guaiguai | Hits:

[DocumentsHaar

Description: 基于Haar小波变换的数字图像水印算法,信息隐藏, 数字水印,小波变换 -Based on the Haar wavelet transform algorithm for digital image watermarking, information hiding, digital watermarking, wavelet transform
Platform: | Size: 162816 | Author: 陈彩琼 | Hits:

[Communication-Mobileyuyinxinghao

Description: 隐藏语音信号 信息隐藏于1994年的国际图像处理会议上(ICIP)正式提出,它通过信号处理的方法将隐藏信息嵌入到宿主(声音、图像、视频和文档等)中,具有不可感知性-只有通过专用的检测器才能获取该隐藏信息。同时隐藏信息并不会影响宿主的内容,具有很强的主观听觉或视觉上的欺骗性。-Hide voice signal information hiding in 1994, the International Conference on Image Processing (ICIP) formally proposed, through signal processing methods will be hidden information embedded into the host (sound, images, video and documents, etc.), can not be perceived sexual- only through a dedicated detector to obtain the hidden information. At the same time, hide information and will not affect the contents of the host, and highly subjective hearing or visually deceptive.
Platform: | Size: 2048 | Author: weijie | Hits:

[Special EffectsLSB-Data-Hiding-Image

Description: 图像的组成无非是一些字符串或者一些字节组成的字符串,然而,每一个字节数据位的重要度并不是一样的,两个相邻字节往往只有低位是不一样的。例如:00100110和00100111代表了两个不同渐变度的红色,但是就人眼是分辨不出来的。最低有效位LSB算法,就是利用这一点,达到图像压缩,或者数字水印的功能。-The composition of the image is nothing more than some number of bytes or string composed of string, however, one byte for each data bit is not an important degree of the same, often only two adjacent low-byte is not the same. For example: 00100110 and 00100111 represent the gradient of two different degrees of red, but on the human eye is not out to tell. Least significant bit LSB algorithm, is to take advantage of this point, to achieve image compression, or digital watermark feature.
Platform: | Size: 322560 | Author: xlz | Hits:

[Windows Developimagehide

Description: 图像隐藏。。将一副图像隐藏到另一副图像中 -Image hiding. . To hide an image to another deputy images
Platform: | Size: 1024 | Author: andy | Hits:

[Special EffectsInformation_Hiding

Description: 数字图像的信息隐藏方法。不可多得的优秀课件。-Digital Image Information Hiding. Outstanding courseware rare.
Platform: | Size: 4615168 | Author: lqner | Hits:

[source in ebookdct2_out

Description: 数字水印(digitalwatermarking)是一种信息隐藏技术,它的基本思想是在数字图像、音频或视频等数字媒体作品中嵌入秘密信息,以便保护数字作品的版权、证明作品的真实可靠性、跟踪盗版行为或提供作品的附加信息。-Digital Watermarking (digitalwatermarking) is a kind of information hiding technology, its basic idea is in the digital image, audio or video digital media works, such as embedded secret information in order to protect the copyright of digital works to prove that the true reliability of the work, tracking piracy works or provide additional information.
Platform: | Size: 1024 | Author: huhao | Hits:

[matlabhidetc

Description: steganography tool for hiding data in image using LSB hiding technique
Platform: | Size: 2048 | Author: malli | Hits:

[Special EffectsDCT_based_Data_hiding

Description: DCT-based Data hiding: dataHide.m Hide the logo image into the original dataExtract.m Extract the logo image from the original findData.m Verify the robustness of the data hiding method 。and use jpeg compress -DCT-based Data hiding: dataHide.m Hide the logo image into the original dataExtract.m Extract the logo image from the original findData.m Verify the robustness of the data hiding method. and use jpeg compress
Platform: | Size: 5120 | Author: | Hits:

[Multimedia programstegnography

Description: Data hiding in the still image presets a variety of challenges that arises due to the way human visual system (HVS) works and the typical modifications that image undergoes. Additionally, still images priced a relatively small host signal in which to hide data. A fairly typical 8-bit picture of 200*200 pixels provides approximately 40 KB of data space in which to work. This is equivalent to around 5 seconds of telephone-quality audio or less than a single frame NTSC television.
Platform: | Size: 199680 | Author: rupesh | Hits:

[matlabDistortionless_Data_Hiding

Description: The code implements the following paper: Guorong Xuan, Jiang Zhu, Jidong Chen, Shi Y.Q., Zhicheng Ni, Wei Su, "Distortionless data hiding based on integer wavelet transform" IET Electronics Letters, Volume: 38, Issue 25, page 1646- 1648, December 2002. (ISSN: 0013-5194) The watermark embedding and extraction modules have been implemented separately. The watermark embedding module embeds the watermark using bitplane compression in the integer wavelet transform domain. The watermark extraction module extracts the previously embedded watermark and restores the original image. A logo image is used as a watermark but can be replaced with any thing.-The code implements the following paper: Guorong Xuan, Jiang Zhu, Jidong Chen, Shi Y.Q., Zhicheng Ni, Wei Su, "Distortionless data hiding based on integer wavelet transform" IET Electronics Letters, Volume: 38, Issue 25, page 1646- 1648, December 2002. (ISSN: 0013-5194) The watermark embedding and extraction modules have been implemented separately. The watermark embedding module embeds the watermark using bitplane compression in the integer wavelet transform domain. The watermark extraction module extracts the previously embedded watermark and restores the original image. A logo image is used as a watermark but can be replaced with any thing.
Platform: | Size: 1015808 | Author: thinkingbig4 | Hits:

[ELanguageProje

Description: Steganography code in matlab hiding and extracting text file and image
Platform: | Size: 3072 | Author: Gürkan Toker | Hits:

[matlabparul

Description: this code is used to do data hiding in image and then take it back ..........pandey
Platform: | Size: 17408 | Author: pandey | Hits:

[Special Effectsimage-stegenography

Description: This file Image stegenography is one of the best method of information hiding i.e. text in an image
Platform: | Size: 68608 | Author: acts | Hits:

[matlabHidingTextFilesInImageWithSteganography

Description: This ZIP file includes the algorithm for hiding the text file in image with LSB.
Platform: | Size: 19456 | Author: yoones | Hits:

[Special Effectsshuiyin

Description: 作为信息隐藏的重要分支,数字水印是一种有效的数字产品版权保护和数据安全维护技术。近年来数字水印技术成为了信息安全领域的研究热点,也得到了较大的发展。基于变换域的水印技术是目前研究的热点和重点。本文系统介绍了数字水印的原理和应用方法,概要介绍了数字水印的几种主流算法,并重点研究了一种基于离散余弦变换(DCT)数字图像水印算法,并借助 MATLAB编程工具,实现数字水印的嵌入和提取仿真,以及为测试鲁棒性而对水印图像进行攻击实验。-As an important branch of information hiding, digital watermarking is an effective copyright protection of digital products and data security maintenance technology. In recent years, digital watermarking has become a hot research field of information security, has also been considerable development. Transform domain watermarking technique based on the current research focus and focus. This system describes the principles and applications of digital watermarking methods, an overview of several mainstream digital watermarking algorithms, and focus on a discrete cosine transform (DCT) digital image watermarking, and with the MATLAB programming tools, digital watermark embedding and extraction simulation, as well as test the robustness of the watermark image on the attack experiments.
Platform: | Size: 2048 | Author: yang cheng | Hits:

[Crack Hackimage-hiding-

Description: 这是我本科毕业设计论文《基于混沌序列的加密图像隐藏技术的设计与实现》,就是把一张图片加密后隐藏在载体图像中,可以抵御各种攻击,用到了Matlab,里面包括开题报告,论文,可执行程序。本文系统介绍了混沌加密、信息隐藏技术。归纳了混沌加密、信息隐藏的分类、特性与应用,给出了混沌加密、信息隐藏的原理和基本框架以及其性能的评价方法,介绍了几种图像的攻击方法。实现了一种混沌加密和图像隐藏的方法。使用混沌加密对待隐藏图像进行加密后嵌入载体图像中,并对嵌入待隐藏图像的载体图像进行了几种攻击以验证其鲁棒性。本系统运用MATLAB编程实现对图像的混沌加密,运用LSB算法将加密后图像嵌入载体图像中,并能承受图像剪切,图像增亮,图像变暗,增加对比度,减低对比度,添加积性噪声,添加高斯噪声,旋转45度,直方图均衡化等一定程度的毁损和各种攻击检测,仍然能解密得到原图像,原图像清晰可辨,鲁棒性非常好。总之本文较好的实现了基于混沌序列的加密图像隐藏技术。-This is my graduation design thesis Design and implementation of chaotic sequence image hiding technique based encryption is encrypted to hide the picture in the carrier image, can withstand a variety of attacks, uses Matlab, which includes opening report, thesis, an executable program. This article describes the chaos encryption system, information hiding technology. Summed up the chaos encryption, information hiding classification, characteristics and application, given the chaotic encryption, information hiding principle and basic framework and its performance uation methods, and introduces the method of attack several images. It implements a chaotic encryption and hidden image method. After using Chaotic Encryption treat hidden image encryption embedded vector images, vector images and embedded image to be concealed several attacks carried out in order to verify its robustness. This system using MATLAB programming chaotic image encryption, use LSB algorithm encrypted image is em
Platform: | Size: 4505600 | Author: sdgvf | Hits:
« 12 »

CodeBus www.codebus.net