Welcome![Sign In][Sign Up]
Location:
Search - image encryption in java

Search list

[JSP/JavaAnImplementationofJPEG2000ImageEncoding

Description: 基于Java语言的JPEG2000图像编码实现 基于JPEG2000的图像加密算法_英文-Java-based JPEG2000 image coding based on JPEG2000 image encryption algorithm _ English
Platform: | Size: 113664 | Author: 刘峰 | Hits:

[OS programcryptographyJava

Description: Modules : 1. Conversion of secret color image into Gray scale Image. 2. Encryption by Half toning. 3. Generation of shares. 4. Selection of Secret information pixels. 5. Encrypt the shares. 6. Reveling the secret image. - Modules : 1. Conversion of secret color image into Gray scale Image. 2. Encryption by Half toning. 3. Generation of shares. 4. Selection of Secret information pixels. 5. Encrypt the shares. 6. Reveling the secret image.
Platform: | Size: 57344 | Author: anu | Hits:

[Crack HackFibonacci_encryption

Description: 一种Fibonacci序列变换空域加密算法和解密算法。利用Fibonacci序列产生密钥,实现图像空域加密。-The airspace of a Fibonacci sequence transform encryption algorithm and decryption algorithm. The use of Fibonacci sequence generated key encryption to achieve the image airspace.
Platform: | Size: 12288 | Author: 林旭亮 | Hits:

[Crack HackImageFreqCipher

Description: 一种频域加密算法,图像经过DCT变换得到DCT系数,然后对DCT系数进行加密。然后对加密的DCT系数进行DCT反变换图像数据。最后对其加密后的图像数据进行线性变换来调整图像数据的取值范围在[0,255]。最后得到加密图像-A frequency-domain encryption algorithm, the image obtained through the DCT transform DCT coefficients, and then encrypt the DCT coefficients. And then encrypted DCT coefficients DCT inverse transform image data. The last of its encrypted image data linear transformation to adjust the image data ranges in [0,255]. Finally the image is encrypted
Platform: | Size: 13312 | Author: 林旭亮 | Hits:

[JSP/JavaSetup-OpenStego-0.5.2

Description: Setup-OpenStego is a tool implemented in Java for image based steganography, with support for password-based encryption of the data. It currently supports embedding of messages/files in a 24bpp images. Implementation of the same in C++ is also planned-Setup-OpenStegoOpenStego is a tool implemented in Java for image based steganography, with support for password-based encryption of the data. It currently supports embedding of messages/files in a 24bpp images. Implementation of the same in C++ is also planned
Platform: | Size: 19456 | Author: lixiaopei | Hits:

[Crack HackImageEncryption

Description: 基于混沌加密算法的图像加密软件,使用Java awt做的界面设计-Image encryption algorithm based on chaotic encryption software, to use Java awt to do interface design
Platform: | Size: 35840 | Author: 于大海 | Hits:

[J2MEJ2ME

Description: j2me中的图片压缩和加密技术的应用和说明-j2me in the image compression and encryption technology, and express
Platform: | Size: 4096 | Author: ytl | Hits:

[Crack HackRSA

Description: 运用java技术,基于RSA算法,实现对图片文件进行加密解密的源代码-Using java technology, based on RSA algorithm, the image files on the source code for encryption and decryption
Platform: | Size: 2048 | Author: 窦小敏 | Hits:

[Crack Hackkt

Description: 实现骑士游历问题。 骑士游历问题是一个经典的数学问题。其思想在电路图的设计及图像加密等方面都有帮助,如果能将骑士游历问题算法通过计算机语言程序化将对其在其他领域中的应用有极大帮助。通过研究骑士游历的规则对问题进行数学模型抽象,通过研究骑士游历的方向与可到达情况,将骑士的空间移动抽象成数学表达式,进而映射到程序中所需对应的数据结构形式,最后通过利用JAVA语言得以实现骑士游历问题中骑士游历过程的动态图形演示。 -Knight traveled to achieve the problem. Knights tour problem is a classical mathematical problem. Their thoughts on the schematic design and image encryption and other aspects to help, if the knight can travel through a computer algorithm for the problem of the language program in its application in other areas of great help. Knight traveled by studying the rules of abstract mathematical models of problems, Knight traveled by studying the direction and the situation can be reached, the Knights of room to move into the abstract mathematical expressions, and then mapped to the corresponding program data structures required in the form of final adoption can be achieved using JAVA language issues knight knights traveled traveled the process of dynamic graphical presentation.
Platform: | Size: 4096 | Author: 蒋立 | Hits:

[JSP/JavaLab1_3_1

Description: 1)作为通讯的双方A和B,都有一个共同信赖的第三方CA,由CA为每个人生成公钥和相应的私钥并分发给A、B。 (2)A和B分别将自己的公钥提供给对方,然后A用B的公钥加密一个数据X(整型,可自己定义,比如100)并发送给B,B用自己的私钥解密后得到数据X,然后按协商好的函数F(比如F(X)=2*X)计算得到F(X),再利用A的公钥加密后发送给A;A在本地用自己的私钥解密后得到F(x),在同本地计算得到的F(X)进行对比,如果一致,说明公钥分配成功。 (3)A用B的公钥对一图象文件(test_pig.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T1; - 1) as the communication between the parties A and B, have a common trusted third party CA, the CA public key generated for each person and the corresponding private key and distributed to A, B. (2) A and B, respectively, their own public key available to the other, then A with B s public key to encrypt a data X (integer, can define their own, such as 100) and sent to B, B with their own private key to decrypt data obtained after X, then press the agreed-function F (eg F (X) = 2* X) calculated from F (X), then use a s public key encrypted and sent to a A locally with their own private key decrypted to get F (x), in the same local calculated F (X) for comparison, if the same, indicating the success of public-key distribution. (3) A with B s public key for an image file (test_pig.bmp) is encrypted and sent to B, B to decrypt the receipt, compared to the original image to see if the same, and record the entire encryption/decryption time T1 used
Platform: | Size: 822272 | Author: 陈溢豪 | Hits:

[Crack HackSteganography6

Description: Steganography in java using LSB technique for hiding message in PNG image & using AES and SHA-2 algorithm for encryption/decryption of message.
Platform: | Size: 22528 | Author: rainI7 | Hits:

CodeBus www.codebus.net