Welcome![Sign In][Sign Up]
Location:
Search - encryption decryption image

Search list

[Other resourceimage_encryption

Description: 用MATLAB编写的混沌序列图像加密程序,密钥可以从0到1之间的任何一个数,加密密钥跟解密密钥一样才能正确解密。-MATLAB prepared by the chaotic sequence image encryption procedures, Key from 0-1 between any one of the few, encryption, decryption keys with the same key can decrypt correctly.
Platform: | Size: 48009 | Author: 江鸟 | Hits:

[Other resource(MATLAB)

Description: 加密解密图象隐藏原程序(MATLAB) 注:用bmp图象加密JPEG图象-hidden image encryption and decryption of the original procedure (MATLAB) Note : bmp image encryption JPEG image
Platform: | Size: 1780 | Author: 郭凯 | Hits:

[Crack Hackrsa

Description: RSA加密/解密算法实现源码与例子 -The source code and examples of implement of RAS encryption and decryption algorithm
Platform: | Size: 18432 | Author: 站长 | Hits:

[matlabimage_encryption

Description: 用MATLAB编写的混沌序列图像加密程序,密钥可以从0到1之间的任何一个数,加密密钥跟解密密钥一样才能正确解密。-MATLAB prepared by the chaotic sequence image encryption procedures, Key from 0-1 between any one of the few, encryption, decryption keys with the same key can decrypt correctly.
Platform: | Size: 48128 | Author: 江鸟 | Hits:

[Crack Hackaes-FIPS-197.ps

Description: 加密算法,用于图像传输的加密解密,经典算法-encryption algorithm for image transmission encryption and decryption, classical algorithm
Platform: | Size: 502784 | Author: cywforce | Hits:

[Crack Hack(MATLAB)

Description: 加密解密图象隐藏原程序(MATLAB) 注:用bmp图象加密JPEG图象-hidden image encryption and decryption of the original procedure (MATLAB) Note : bmp image encryption JPEG image
Platform: | Size: 1024 | Author: 郭凯 | Hits:

[Speech/Voice recognition/combineshilianglianghua

Description: 使用矢量量化技术实现对图像的加密以及解密-The use of vector quantization technique for image encryption and decryption
Platform: | Size: 53248 | Author: lauren | Hits:

[Crack Hackjpegshow

Description: 图像加密与解密代码,容易修改参数,供大家参考-Image encryption and decryption code, easy to modify the parameters for your reference
Platform: | Size: 1866752 | Author: cc | Hits:

[GDI-Bitmaptexttobmp

Description: 加文字进bmp格式的图片文件,文字可以很容易地用256字节密钥以Rijndael算法加密/解密-Add language into bmp format image files, text can be easily used 256-byte key to Rijndael algorithm for encryption/decryption
Platform: | Size: 1689600 | Author: zurong | Hits:

[Otherchaoticsecureimagedata

Description: 通过细胞神经网络混沌系统对图像数据进行加密和解密 -Through the cellular neural networks for image data of chaotic systems for encryption and decryption
Platform: | Size: 94208 | Author: daijiaxing | Hits:

[matlabimage_encryption

Description:
Platform: | Size: 146432 | Author: wuli | Hits:

[Crack HackImageDeal.java.tar

Description: 简单的图片加密程序,把原图与作为密钥的图片进行异或操作实现图片的加密,再进行一次异或操作,实现解密-Simple image encryption procedures, the Original and different pictures as a key to achieve the image or operation of encryption, and then once exclusive or operation, to achieve decryption
Platform: | Size: 2048 | Author: Wu Zhongsheng | Hits:

[matlabSteganography

Description: steganography means we have to hide the information in the image for using encryption and decryption algorithm also.
Platform: | Size: 43008 | Author: saravana | Hits:

[Documentscellular_automata_based

Description: Image Encryption/Decryption System Using 2-D Cellular Automata ,An Efficient MPEG Video Encryption Scheme based on Chaotic Cipher and Architecture Design and VLSI Hardware Implementation ofImage Encryption/Decryption System Using Re-configurable 2-D VonNeumann Cellular Automata
Platform: | Size: 3812352 | Author: vg_vg | Hits:

[Crack Hack22

Description: 完成基于非对称密码技术的对称密钥分配工作 说明: (1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。 (2)A用Ks对一图象文件(test_pig.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2; (3)对比T1和T2;-Completion of asymmetric cryptography based on symmetric key distribution work Description: (1) the completion of the asymmetric public key certificate-based key distribution based on the work, according to the materials on asymmetric cryptography based on symmetric key distribution scheme, the completion of the allocation of symmetric key Ks. (2) A document with Ks on an image (test_pig.bmp) is encrypted and sent to B, B to decrypt receipt, compared to the original image to see if the same, and record the entire encryption/decryption time spent T2 (3) contrast T1 and T2
Platform: | Size: 43008 | Author: 熊龙生 | Hits:

[Graph programExtendedLogisticChaotic

Description: 基于混沌序列的二值图像加密算法:提 出了一种以混沌二值序列为基础的图像加密算法 , 改进了灰度差置乱度算法来评价二值图像加密 效果 , 最后对混沌序列对初始条件的敏感性、 相邻像素差置乱度、 图像加密/ 解密速度进行了大量测试。-Based on Chaotic Encryption Algorithm of Binary Image: A chaotic binary sequences with an image encryption scheme based on improved gray scrambling degree difference algorithms to encrypt binary image evaluation results, the last of the original chaotic sequence conditions of the sensitivity of adjacent pixels difference scrambling, Image encryption/decryption speed of a large number of tests.
Platform: | Size: 377856 | Author: huyunfeitian | Hits:

[matlabchaotic-encryption-

Description: 用MATLAB编写的混沌序列图像加密程序,密钥可以从0到1之间的任何一个数,加密密钥跟解密密钥一样才能正确解密.rar-Chaotic sequence using MATLAB image encryption program, the key can be from 0 to 1 between any number of encryption keys with the correct decryption key to decrypt the same. Rar
Platform: | Size: 49152 | Author: chenfeng | Hits:

[JSP/JavaLab1_3_1

Description: 1)作为通讯的双方A和B,都有一个共同信赖的第三方CA,由CA为每个人生成公钥和相应的私钥并分发给A、B。 (2)A和B分别将自己的公钥提供给对方,然后A用B的公钥加密一个数据X(整型,可自己定义,比如100)并发送给B,B用自己的私钥解密后得到数据X,然后按协商好的函数F(比如F(X)=2*X)计算得到F(X),再利用A的公钥加密后发送给A;A在本地用自己的私钥解密后得到F(x),在同本地计算得到的F(X)进行对比,如果一致,说明公钥分配成功。 (3)A用B的公钥对一图象文件(test_pig.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T1; - 1) as the communication between the parties A and B, have a common trusted third party CA, the CA public key generated for each person and the corresponding private key and distributed to A, B. (2) A and B, respectively, their own public key available to the other, then A with B s public key to encrypt a data X (integer, can define their own, such as 100) and sent to B, B with their own private key to decrypt data obtained after X, then press the agreed-function F (eg F (X) = 2* X) calculated from F (X), then use a s public key encrypted and sent to a A locally with their own private key decrypted to get F (x), in the same local calculated F (X) for comparison, if the same, indicating the success of public-key distribution. (3) A with B s public key for an image file (test_pig.bmp) is encrypted and sent to B, B to decrypt the receipt, compared to the original image to see if the same, and record the entire encryption/decryption time T1 used
Platform: | Size: 822272 | Author: 陈溢豪 | Hits:

[Software Engineeringecc

Description: ecc encryption decryption image matlab
Platform: | Size: 6144 | Author: HEMA | Hits:

[2D GraphicIMAGE

Description: 图像的matlab处理,包含图像的压缩,zigzag算法应用,图像加密,图像解密等-Matlab image processing, compression containing images, zigzag algorithm, image encryption, decryption image
Platform: | Size: 1244160 | Author: | Hits:
« 12 3 4 5 6 7 8 9 10 »

CodeBus www.codebus.net