Welcome![Sign In][Sign Up]
Location:
Search - DCT encryption

Search list

[CA authDCTWater

Description: 站长!这是DCT域的图像数字水印嵌入及提取程序!请查收!暂归入加密解密类别!-head! This is the DCT Digital watermark embedding and extraction procedure! Please find! Encryption and decryption temporarily classified categories!
Platform: | Size: 1477632 | Author: Jesson | Hits:

[Windows DevelopText_ImageWatermarking

Description: 文件加密和加密文件在图像中的嵌入及提取,属于图像水印范畴。对本科毕业设计具有较高的参考价值 -file encryption and file encryption in the embedded images and extraction, image watermarking areas belong. The undergraduate graduation design high reference value
Platform: | Size: 720896 | Author: 郑生朋 | Hits:

[mpeg mp3Implementation_and_improvement_of_MPEG4_video_encr

Description: 探讨了基于zigzag置乱的MPEG4视频数据加密技术,指出了这种方案在安全性方面的不足,提出了改进方 案。改进的方案中AC系数用不同的置乱表置乱,DC系数用高强度的加密算法AES加密。最后给出了改进后的加密效 果,并且从加密速度,安全性和码流变化三个指标衡量了该方案的应用价值。 -Discussion based on the zigzag Scrambling MPEG4 video data encryption technology, pointing out that such a program in the security deficiencies, suggestions to improve the program. Improvement program with a different AC coefficient table Scrambling Scrambling, DC coefficient of high-strength encryption algorithm AES encryption. Finally, the effect of the improved encryption, and from the encryption speed, safety and code changes in the three indicators to measure the flow of the program application value.
Platform: | Size: 165888 | Author: 吴笛 | Hits:

[Graph programDCTjiami

Description: dct和混沌相结合的图像加密,速度较慢但可以用来学习-DCT and chaotic combination of image encryption, slower but can be used to study
Platform: | Size: 1024 | Author: 223 | Hits:

[Other111111111

Description: 为保证网络信息传输的安全性,提出一种视频图像加密方法。该方法引入混沌系统中的Logistic映射和 Baker映射,结合H·264视频压缩编码特点,利用Baker映射对DCT (Discrete Cosine Transform)变换量化后 的块进行位置置乱, -In order to ensure the safety of information transmission network, and a video image encryption method. This method is the introduction of chaotic systems in Logistic mapping and Baker mapping, combined with H 264 video compression coding features, the use of Baker mapping of DCT (Discrete Cosine Transform) transform to quantify the location of block after scrambling,
Platform: | Size: 155648 | Author: 武同学 | Hits:

[Other11111111111456

Description: 为保证网络信息传输的安全性,提出一种视频图像加密方法。该方法引入混沌系统中的Logistic映射和 Baker映射,结合H·264视频压缩编码特点,利用Baker映射对DCT (Discrete Cosine Transform)变换量化后 的块进行位置置乱, -In order to ensure the safety of information transmission network, and a video image encryption method. This method is the introduction of chaotic systems in Logistic mapping and Baker mapping, combined with H 264 video compression coding features, the use of Baker mapping of DCT (Discrete Cosine Transform) transform to quantify the location of block after scrambling,
Platform: | Size: 155648 | Author: 武同学 | Hits:

[Crack HackImageFreqCipher

Description: 一种频域加密算法,图像经过DCT变换得到DCT系数,然后对DCT系数进行加密。然后对加密的DCT系数进行DCT反变换图像数据。最后对其加密后的图像数据进行线性变换来调整图像数据的取值范围在[0,255]。最后得到加密图像-A frequency-domain encryption algorithm, the image obtained through the DCT transform DCT coefficients, and then encrypt the DCT coefficients. And then encrypted DCT coefficients DCT inverse transform image data. The last of its encrypted image data linear transformation to adjust the image data ranges in [0,255]. Finally the image is encrypted
Platform: | Size: 13312 | Author: 林旭亮 | Hits:

[VHDL-FPGA-VerilogChapter6-9

Description: 第六章到第九章的代码 本书通过100多个模块实例,详细地讲解了Verilog HDL程序设计语言,全书共分13章,内容涉及VerilogHDL语言基本概念、建模、同步设计、异步设计、功能验证等,实例包括各种加法器/计数器、乘法器/除法器、编码器/译码器、状态机、SPIMaster Controller、I2C Master controller、CAN ProtocolController、Memory模块、JPEG图像压缩模块、加密模块、ATA控制器、8位RISC-CPU等及各个实例模块相应的Testbench,所举实例具有很强的实用性和代表性,每个实例均给出了介绍、功能分析、程序代码和结果演示。-Chapter VI to Chapter IX of the code in this book through more than 100 module instance, explain in detail the Verilog HDL programming language, the book is divided into 13 chapters, covering basic concepts VerilogHDL languages, modeling, synchronous design, asynchronous design, functional verification, etc. Examples include a variety of adder/counter, multiplier/divider, encoders/decoders, state machines, SPIMaster Controller, I2C Master controller, CAN ProtocolController, Memory modules, JPEG image compression module, encryption module, ATA controller, 8-bit RISC-CPU, etc. and the various instances of the corresponding module Testbench, The examples are highly practical and representation, each instance of it all gives the introduction, functional analysis, program code and results presentation.
Platform: | Size: 6281216 | Author: xiao | Hits:

[Special EffectsBwAdd_Y_ColorImage

Description: matlab程序添加水印的DCT算法,先将水印加密,然后嵌入图像中-matlab program to add a watermark in the DCT algorithm, first the watermark encryption, and embedded images
Platform: | Size: 2048 | Author: 高坛 | Hits:

[matlab12345

Description: 彩色数字水印的程序,实现在彩色图像中通过DCT变换来嵌入水印信息-Color digital watermarking process to achieve the color image by DCT transform to embed watermarks
Platform: | Size: 424960 | Author: song | Hits:

[matlabmatlab_watermark

Description: 本文算法是将24 位真彩图的亮度分量分块 DCT ,然后利用DCT 量化系数的奇偶特性嵌入8 位灰度水印图,并通过PN 序列加密来保证水印的 安全性。算法中,将灰度图像转换为二进制数据 流,置乱后扩频调制,隐藏在宿主DCT 系数量化值 中,提取时不需要宿主信号,实现水印信号的盲提 取。-This algorithm is 24-bit true color pictures of the luminance component of block DCT, quantization DCT coefficients and then use the parity properties of 8-bit grayscale watermark embedding map, and through the PN sequence of encryption to ensure the security of the watermark. Algorithm, the gray image into binary data stream, scrambling after the spread spectrum modulation, hidden in the host DCT coefficient quantization values, the extraction does not require the host signal, the blind watermark extraction.
Platform: | Size: 284672 | Author: 王秀梅 | Hits:

[matlabBinary-text-digital-image

Description: 提出了一种可抗 几何攻击的二值文本图像水印算法. 该算法基于DCT,它将二值图像的DCT、图像的视觉特征向 量和加密技术有机结合起来,在提取水印时不需要原始图像,是一种实用的盲水印算法-We propose a geometric attacks against Binary Text Watermarking Algorithm. The algorithm is based on DCT, it binary image DCT, the image of the visual feature vector and encryption technology combine in the watermark without the original image is a practical blind watermarking algorithm
Platform: | Size: 1190912 | Author: 切尔西 | Hits:

[Special EffectsDCT

Description: 基于DCT的数字水印处理技术,本水印处理过程利用图像的缩放技术和调整原始图像的直方图,根据人眼视觉特性,在每个DCT变换块的DC分量上嵌入水印信息,并且在水印信息嵌入之前,对其进行置乱加密,提供双重安全保证,接着通过JPEG压缩攻击对DCT域的鲁棒性进行测试,证明了DCT的抗攻击能力。-DCT-based digital watermarking technique, the watermark processing technology and the use of image scaling to adjust the original image histogram, according to the human visual system, in each block of DCT-DC components on the embedded watermark information, and information in the watermark embedding prior to its scrambling encryption to provide double security guarantees, followed by JPEG compression attacks on the DCT domain robustness of tests to demonstrate the anti-attack capability of DCT.
Platform: | Size: 1024 | Author: zhangxibin | Hits:

[GDI-BitmapDCT

Description: 实习图像的DCT变换与反变换,及图像加解密功能。-Practical image DCT transform and inverse transform, and image encryption and decryption.
Platform: | Size: 5626880 | Author: 黄安安 | Hits:

[Otherdct

Description: 心电图数字水印加密和解水印以及噪声测试 DCT方法,分段-The the ECG digital watermark encryption DCT method, segmented
Platform: | Size: 1024 | Author: helong | Hits:

[Graph programDCT-VC-master

Description: DCT算法的实现,使用VC++实现,版本为VS2010.支持24位位图的加密。-DCT algorithm achieved using VC++ realized version VS2010. Supports 24-bit encryption map.
Platform: | Size: 25600 | Author: 李* | Hits:

[VC/MFCDCT

Description: ElGamal algorithm not only used for data encryption can be used for digital signatures, their safety depends on the calculation of a finite field discrete logarithm this problem. Key to the method. First of all, choose a prime number p, the two random numbers, g and x, g, x <p, computing y = g ^ x (mod p), for its public key y, g and p. Private key is x. g and p by a group of users to share. ElGamal for digital signatures. Information was signed M, first choose a
Platform: | Size: 512000 | Author: HamzaAnwer | Hits:

[Special EffectsDCT-VC-master

Description: 利用DCT变换实现图像的加解密,包括基本的界面和文件读写(Using DCT transform to achieve image encryption and decryption, including the basic interface and file read and write)
Platform: | Size: 89010176 | Author: liuziyi | Hits:

[Graph program代码

Description: 完成基于DCT变换的数字水印,采用多相正交矩阵加密(Completing digital watermarking based on DCT transform, using Multiphase Orthogonal Matrix Encryption)
Platform: | Size: 14336 | Author: 月月0711 | Hits:

[Special Effectssimple_code_1

Description: 其使用dct的方法实现图像水印,经检测,其鲁棒性较好,原图像不可见性也较好。包含了加密解密算法,可以实现不需要原图的解密。(The use of dct method to achieve image watermarking, after testing, its robustness is better, the original image invisibility is better. Contains the encryption and decryption algorithms, you can achieve the original image does not require the decryption.)
Platform: | Size: 1024 | Author: 未曾走远 | Hits:
« 12 »

CodeBus www.codebus.net