Welcome![Sign In][Sign Up]
Location:
Search - hidden image

Search list

[Speech/Voice recognition/combineHidden Markov Models for Speech Recognition-lect19

Description: HMM模型在语音识别中的应用,相信对HMM模型感兴趣的语音或图像等专业人员应该明白价值。-It is about Hidden Markov Models (HMM) method in Speech Recognition research. those interested in HMM or speech/image processing should know it s value.
Platform: | Size: 34074 | Author: 何伟 | Hits:

[Graph program218752354420051152056193960009

Description: 主题: 遗传编程源程序.rar 内容概要: 遗传编程源程序.rar,使用VisualC++编写的遗传算法源代码,各位可在紫基础上进行自己的研究工作,如图像处理,数据挖掘、图像隐秘分析等,绝对让您满意 -theme : genetic programming source. Rar outline : genetic programming source. Rar, prepared using Visual C genetic algorithm source code, you can be on the basis of the Purple conduct their own research work, such as image processing, data mining, hidden image analysis, let your absolute satisfaction
Platform: | Size: 48595 | Author: 宁宇 | Hits:

[Crack HackNumberWaterMark

Description: 给定一副图像和一段文字,设计某种图象处理方法将这段文字隐藏到图像中-given a paragraph of text and image, image processing design some way to the wording of the hidden image
Platform: | Size: 576456 | Author: 胡雪飞 | Hits:

[GDI-Bitmapshowpic24

Description: 渐隐渐显地显示图像-gradually revealed to the upcoming Hidden Image
Platform: | Size: 38281 | Author: | Hits:

[Other resourceInformationHide

Description: 这是一个在图象中隐藏信息的算法,他能实现在图象中隐藏文本信息的目的-This is a hidden image in the algorithm information, he can achieve the image hidden text information purposes
Platform: | Size: 3521 | Author: 杨永 | Hits:

[Other resource(MATLAB)

Description: 加密解密图象隐藏原程序(MATLAB) 注:用bmp图象加密JPEG图象-hidden image encryption and decryption of the original procedure (MATLAB) Note : bmp image encryption JPEG image
Platform: | Size: 1780 | Author: 郭凯 | Hits:

[GDI-Bitmapshowpic24

Description: 渐隐渐显地显示图像-gradually revealed to the upcoming Hidden Image
Platform: | Size: 37888 | Author: | Hits:

[Graph program218752354420051152056193960009

Description: 主题: 遗传编程源程序.rar 内容概要: 遗传编程源程序.rar,使用VisualC++编写的遗传算法源代码,各位可在紫基础上进行自己的研究工作,如图像处理,数据挖掘、图像隐秘分析等,绝对让您满意 -theme : genetic programming source. Rar outline : genetic programming source. Rar, prepared using Visual C genetic algorithm source code, you can be on the basis of the Purple conduct their own research work, such as image processing, data mining, hidden image analysis, let your absolute satisfaction
Platform: | Size: 48128 | Author: 宁宇 | Hits:

[Crack HackNumberWaterMark

Description: 给定一副图像和一段文字,设计某种图象处理方法将这段文字隐藏到图像中-given a paragraph of text and image, image processing design some way to the wording of the hidden image
Platform: | Size: 576512 | Author: 胡雪飞 | Hits:

[Picture ViewerInformationHide

Description: 这是一个在图象中隐藏信息的算法,他能实现在图象中隐藏文本信息的目的-This is a hidden image in the algorithm information, he can achieve the image hidden text information purposes
Platform: | Size: 3072 | Author: 杨永 | Hits:

[Crack Hack(MATLAB)

Description: 加密解密图象隐藏原程序(MATLAB) 注:用bmp图象加密JPEG图象-hidden image encryption and decryption of the original procedure (MATLAB) Note : bmp image encryption JPEG image
Platform: | Size: 1024 | Author: 郭凯 | Hits:

[File Formathang123

Description: 数字水印技术是指用信号处理的方法在数字化的多媒体数据中嵌入隐蔽的标记,这种标记通常是不可见的,只有通过专用的检测器或阅读器才能提取。数字水印在信息隐藏及图象隐藏方面有着极为广泛的应用。-Digital watermarking technology is that by using the method of signal processing in the digital multimedia data embedded hidden tag, this tag is not usually visible only through a dedicated detector or reader can be extracted. Digital Watermarking and Information Hiding in the hidden image has a very wide range of applications.
Platform: | Size: 14336 | Author: 周狼 | Hits:

[Special EffectsPictures_Hiding

Description: 包括:隐藏混沌序列即隐藏参数的生成;对图像进行隐藏;恢复出隐藏前置乱的目标图像;恢复出原目标图像;对隐藏目标置乱处理等-Include: hidden chaotic sequence that is hidden parameter generation images hidden the restoration of a hidden goal of arbitrary pre-image the restoration of the original target image to hide the goal of treatment, such as scrambling
Platform: | Size: 3072 | Author: 方娟 | Hits:

[Documentslevelset

Description: 水平集方法及其在图像分割上的应用,对水平集方法的原理进行了比较详细的阐述,并将其应用于图分割-Level Set Method and Its Application in Image Segmentation on the application of the principle of level set methods have been fairly detailed, and applied to graph partitioning
Platform: | Size: 240640 | Author: 万成凯 | Hits:

[Special Effectsbw_fragile

Description: matlab编写的对二值图像的数字水印添加与提取程序。压缩包中有示例图片。可以添加水印,结果肉眼不易分辨出变化,不影响使用。可加入信息长度达100个字节。提取时可验证是否被修改过,如未修改,可提取隐藏信息。-matlab prepared binary image of the digital watermark added and extraction procedures. Compression package has sample images. Can add watermarks, the results of the changes are not easily distinguishable from the naked eye, does not affect use. Can be added to the information length of 100 bytes. Verifiable extraction has been modified, if modified, can extract hidden information.
Platform: | Size: 76800 | Author: 张亮 | Hits:

[AlgorithmHMT-Hidden-Markov-Contourlet[1]

Description: 这是一个Matlab实现的隐马尔科夫树模型,用于计算图像的Contourlet系数。程序同时还包括图像去噪、纹理恢复的应用模型。-This is a Matlab realization of Hidden Markov Tree Model, used to calculate the coefficient Contourlet images. Program also includes image denoising, texture restoration of the application model.
Platform: | Size: 2464768 | Author: 小单 | Hits:

[JSP/JavaSetup-OpenStego-0.5.2

Description: Setup-OpenStego is a tool implemented in Java for image based steganography, with support for password-based encryption of the data. It currently supports embedding of messages/files in a 24bpp images. Implementation of the same in C++ is also planned-Setup-OpenStegoOpenStego is a tool implemented in Java for image based steganography, with support for password-based encryption of the data. It currently supports embedding of messages/files in a 24bpp images. Implementation of the same in C++ is also planned
Platform: | Size: 19456 | Author: lixiaopei | Hits:

[Special Effectsimage_to_wav_conversion

Description: 转换图像文件程序(方形,为音乐的最高120x120像素)文件(*. WAV和噪音)。你可以看在音乐谱图隐藏的图像 - 过程被称为声音隐秘。 -Program converts image file (square shape, maximum 120x120 pixels) into music file (*.wav, noise). You can watch the hidden image in spectrogram of music- process called sound steganography.
Platform: | Size: 9132032 | Author: cuijianzhu | Hits:

[Graph programHMT-Hidden-Markov-Contourlet

Description: Contourlet变换中的隐马尔科夫树模型程序 Hidden Markov Tree model of Contourlet Transform ,一个Matlab实现的隐马尔科夫树模型,用于计算图像的Contourlet系数。程序同时还包括图像去噪、纹理恢复的应用模型。这些程序都是基于"Directional Multiscale Modeling of Images Using the Contourlet Transform" by D. D.-Y. Po and M. N. Do,这个文章的; 同时需要Minh N. Do的Contourlet工具箱,该工具箱可以从这里http://www.ifp.uiuc.edu/~minhdo/software/得到。 -Contourlet transform the hidden Markov model procedures for Hidden Markov Tree model of Contourlet Transform, a Matlab implementation of the Hidden Markov Tree Model, used to calculate the image Contourlet factor. Program also includes denoising, texture recovery application model. These procedures are based on the " Directional Multiscale Modeling of Images Using the Contourlet Transform" by DD-Y. Po and MN Do, this article also need Minh N. Do the Contourlet toolbox, the toolbox is available here http://www.ifp.uiuc.edu/ ~ minhdo/software/receive.
Platform: | Size: 2482176 | Author: 徐英 | Hits:

[Crack Hackimage-hiding-

Description: 这是我本科毕业设计论文《基于混沌序列的加密图像隐藏技术的设计与实现》,就是把一张图片加密后隐藏在载体图像中,可以抵御各种攻击,用到了Matlab,里面包括开题报告,论文,可执行程序。本文系统介绍了混沌加密、信息隐藏技术。归纳了混沌加密、信息隐藏的分类、特性与应用,给出了混沌加密、信息隐藏的原理和基本框架以及其性能的评价方法,介绍了几种图像的攻击方法。实现了一种混沌加密和图像隐藏的方法。使用混沌加密对待隐藏图像进行加密后嵌入载体图像中,并对嵌入待隐藏图像的载体图像进行了几种攻击以验证其鲁棒性。本系统运用MATLAB编程实现对图像的混沌加密,运用LSB算法将加密后图像嵌入载体图像中,并能承受图像剪切,图像增亮,图像变暗,增加对比度,减低对比度,添加积性噪声,添加高斯噪声,旋转45度,直方图均衡化等一定程度的毁损和各种攻击检测,仍然能解密得到原图像,原图像清晰可辨,鲁棒性非常好。总之本文较好的实现了基于混沌序列的加密图像隐藏技术。-This is my graduation design thesis Design and implementation of chaotic sequence image hiding technique based encryption is encrypted to hide the picture in the carrier image, can withstand a variety of attacks, uses Matlab, which includes opening report, thesis, an executable program. This article describes the chaos encryption system, information hiding technology. Summed up the chaos encryption, information hiding classification, characteristics and application, given the chaotic encryption, information hiding principle and basic framework and its performance uation methods, and introduces the method of attack several images. It implements a chaotic encryption and hidden image method. After using Chaotic Encryption treat hidden image encryption embedded vector images, vector images and embedded image to be concealed several attacks carried out in order to verify its robustness. This system using MATLAB programming chaotic image encryption, use LSB algorithm encrypted image is em
Platform: | Size: 4505600 | Author: sdgvf | Hits:
« 12 3 4 5 6 7 8 9 10 ... 17 »

CodeBus www.codebus.net