Welcome![Sign In][Sign Up]
Location:
Search - image hiding matlab

Search list

[Special Effectsmain

Description: 实现在一副图像中嵌入多幅图像,实现了大容量的信息隐藏-To achieve an image embedded in the multiple images to achieve a large capacity of information hiding
Platform: | Size: 1024 | Author: guaiguai | Hits:

[Crack Hackbinaryextract

Description: 二值图像的信息隐藏,用到md5加密和改进后的置乱算法-Binary Image Information Hiding, use md5 encryption and improved hashing algorithm
Platform: | Size: 1024 | Author: guaiguai | Hits:

[DocumentsHaar

Description: 基于Haar小波变换的数字图像水印算法,信息隐藏, 数字水印,小波变换 -Based on the Haar wavelet transform algorithm for digital image watermarking, information hiding, digital watermarking, wavelet transform
Platform: | Size: 162816 | Author: 陈彩琼 | Hits:

[Communication-Mobileyuyinxinghao

Description: 隐藏语音信号 信息隐藏于1994年的国际图像处理会议上(ICIP)正式提出,它通过信号处理的方法将隐藏信息嵌入到宿主(声音、图像、视频和文档等)中,具有不可感知性-只有通过专用的检测器才能获取该隐藏信息。同时隐藏信息并不会影响宿主的内容,具有很强的主观听觉或视觉上的欺骗性。-Hide voice signal information hiding in 1994, the International Conference on Image Processing (ICIP) formally proposed, through signal processing methods will be hidden information embedded into the host (sound, images, video and documents, etc.), can not be perceived sexual- only through a dedicated detector to obtain the hidden information. At the same time, hide information and will not affect the contents of the host, and highly subjective hearing or visually deceptive.
Platform: | Size: 2048 | Author: weijie | Hits:

[Special EffectsLSB-Data-Hiding-Image

Description: 图像的组成无非是一些字符串或者一些字节组成的字符串,然而,每一个字节数据位的重要度并不是一样的,两个相邻字节往往只有低位是不一样的。例如:00100110和00100111代表了两个不同渐变度的红色,但是就人眼是分辨不出来的。最低有效位LSB算法,就是利用这一点,达到图像压缩,或者数字水印的功能。-The composition of the image is nothing more than some number of bytes or string composed of string, however, one byte for each data bit is not an important degree of the same, often only two adjacent low-byte is not the same. For example: 00100110 and 00100111 represent the gradient of two different degrees of red, but on the human eye is not out to tell. Least significant bit LSB algorithm, is to take advantage of this point, to achieve image compression, or digital watermark feature.
Platform: | Size: 322560 | Author: xlz | Hits:

[Windows Developimagehide

Description: 图像隐藏。。将一副图像隐藏到另一副图像中 -Image hiding. . To hide an image to another deputy images
Platform: | Size: 1024 | Author: andy | Hits:

[Crack HackPROGRAM

Description: This method is based upon the image hiding technic into another image using LSB algorithm called as Steganography.
Platform: | Size: 329728 | Author: R.P.Singh | Hits:

[Special EffectsInformation_Hiding

Description: 数字图像的信息隐藏方法。不可多得的优秀课件。-Digital Image Information Hiding. Outstanding courseware rare.
Platform: | Size: 4615168 | Author: lqner | Hits:

[Graph programIntegration_Information_Hiding

Description: 基于插值融合的数字图像信息隐藏完整matlab源码-Interpolation-based integration of a complete digital image information hiding matlab source
Platform: | Size: 148480 | Author: lqner | Hits:

[source in ebookdct2_out

Description: 数字水印(digitalwatermarking)是一种信息隐藏技术,它的基本思想是在数字图像、音频或视频等数字媒体作品中嵌入秘密信息,以便保护数字作品的版权、证明作品的真实可靠性、跟踪盗版行为或提供作品的附加信息。-Digital Watermarking (digitalwatermarking) is a kind of information hiding technology, its basic idea is in the digital image, audio or video digital media works, such as embedded secret information in order to protect the copyright of digital works to prove that the true reliability of the work, tracking piracy works or provide additional information.
Platform: | Size: 1024 | Author: huhao | Hits:

[matlabhidetc

Description: steganography tool for hiding data in image using LSB hiding technique
Platform: | Size: 2048 | Author: malli | Hits:

[Special EffectsDCT_based_Data_hiding

Description: DCT-based Data hiding: dataHide.m Hide the logo image into the original dataExtract.m Extract the logo image from the original findData.m Verify the robustness of the data hiding method 。and use jpeg compress -DCT-based Data hiding: dataHide.m Hide the logo image into the original dataExtract.m Extract the logo image from the original findData.m Verify the robustness of the data hiding method. and use jpeg compress
Platform: | Size: 5120 | Author: | Hits:

[Multimedia programstegnography

Description: Data hiding in the still image presets a variety of challenges that arises due to the way human visual system (HVS) works and the typical modifications that image undergoes. Additionally, still images priced a relatively small host signal in which to hide data. A fairly typical 8-bit picture of 200*200 pixels provides approximately 40 KB of data space in which to work. This is equivalent to around 5 seconds of telephone-quality audio or less than a single frame NTSC television.
Platform: | Size: 199680 | Author: rupesh | Hits:

[matlabshuzishuiyindeng

Description: 基于LSB图像隐藏系统的设计与实现,LSB算法代码,信息隐藏攻击算法,DCT域的隐藏以及数字水印。-LSB based image hiding system design and implementation, LSB algorithm code, information hiding attack algorithm, DCT hiding and digital watermarking domain.
Platform: | Size: 14183424 | Author: abcd0609 | Hits:

[matlabDistortionless_Data_Hiding

Description: The code implements the following paper: Guorong Xuan, Jiang Zhu, Jidong Chen, Shi Y.Q., Zhicheng Ni, Wei Su, "Distortionless data hiding based on integer wavelet transform" IET Electronics Letters, Volume: 38, Issue 25, page 1646- 1648, December 2002. (ISSN: 0013-5194) The watermark embedding and extraction modules have been implemented separately. The watermark embedding module embeds the watermark using bitplane compression in the integer wavelet transform domain. The watermark extraction module extracts the previously embedded watermark and restores the original image. A logo image is used as a watermark but can be replaced with any thing.-The code implements the following paper: Guorong Xuan, Jiang Zhu, Jidong Chen, Shi Y.Q., Zhicheng Ni, Wei Su, "Distortionless data hiding based on integer wavelet transform" IET Electronics Letters, Volume: 38, Issue 25, page 1646- 1648, December 2002. (ISSN: 0013-5194) The watermark embedding and extraction modules have been implemented separately. The watermark embedding module embeds the watermark using bitplane compression in the integer wavelet transform domain. The watermark extraction module extracts the previously embedded watermark and restores the original image. A logo image is used as a watermark but can be replaced with any thing.
Platform: | Size: 1015808 | Author: thinkingbig4 | Hits:

[ELanguageProje

Description: Steganography code in matlab hiding and extracting text file and image
Platform: | Size: 3072 | Author: Gürkan Toker | Hits:

[Special Effectsimage-stegenography

Description: This file Image stegenography is one of the best method of information hiding i.e. text in an image
Platform: | Size: 68608 | Author: acts | Hits:

[matlabHidingTextFilesInImageWithSteganography

Description: This ZIP file includes the algorithm for hiding the text file in image with LSB.
Platform: | Size: 19456 | Author: yoones | Hits:

[Crack Hackimage-hiding-

Description: 这是我本科毕业设计论文《基于混沌序列的加密图像隐藏技术的设计与实现》,就是把一张图片加密后隐藏在载体图像中,可以抵御各种攻击,用到了Matlab,里面包括开题报告,论文,可执行程序。本文系统介绍了混沌加密、信息隐藏技术。归纳了混沌加密、信息隐藏的分类、特性与应用,给出了混沌加密、信息隐藏的原理和基本框架以及其性能的评价方法,介绍了几种图像的攻击方法。实现了一种混沌加密和图像隐藏的方法。使用混沌加密对待隐藏图像进行加密后嵌入载体图像中,并对嵌入待隐藏图像的载体图像进行了几种攻击以验证其鲁棒性。本系统运用MATLAB编程实现对图像的混沌加密,运用LSB算法将加密后图像嵌入载体图像中,并能承受图像剪切,图像增亮,图像变暗,增加对比度,减低对比度,添加积性噪声,添加高斯噪声,旋转45度,直方图均衡化等一定程度的毁损和各种攻击检测,仍然能解密得到原图像,原图像清晰可辨,鲁棒性非常好。总之本文较好的实现了基于混沌序列的加密图像隐藏技术。-This is my graduation design thesis Design and implementation of chaotic sequence image hiding technique based encryption is encrypted to hide the picture in the carrier image, can withstand a variety of attacks, uses Matlab, which includes opening report, thesis, an executable program. This article describes the chaos encryption system, information hiding technology. Summed up the chaos encryption, information hiding classification, characteristics and application, given the chaotic encryption, information hiding principle and basic framework and its performance uation methods, and introduces the method of attack several images. It implements a chaotic encryption and hidden image method. After using Chaotic Encryption treat hidden image encryption embedded vector images, vector images and embedded image to be concealed several attacks carried out in order to verify its robustness. This system using MATLAB programming chaotic image encryption, use LSB algorithm encrypted image is em
Platform: | Size: 4505600 | Author: sdgvf | Hits:

[matlabbinaryhide

Description: 二值图像隐藏算法,信息隐藏技术实验第三章(Two valued image hiding)
Platform: | Size: 3072 | Author: miaomiaojiang | Hits:
« 12 3 4 »

CodeBus www.codebus.net