Welcome![Sign In][Sign Up]
Location:
Search - JPEG image encryption

Search list

[Other resource(MATLAB)

Description: 加密解密图象隐藏原程序(MATLAB) 注:用bmp图象加密JPEG图象-hidden image encryption and decryption of the original procedure (MATLAB) Note : bmp image encryption JPEG image
Platform: | Size: 1780 | Author: 郭凯 | Hits:

[Special Effectsdct1_watermarked

Description: Firstly, research on robust image watermarking. A digital watermarking scheme based on wavelet transform was proposed. It realizes the watermarking extract without the original image using 64×64×8 bit gray image as the watermark signal. In order to enhancing the security of the watermark, we employ an encryption technology based on chaos and bit plan. Simulation results show that our scheme have good invisibility and can survive low-quality JPEG compression, median filtering and so on. In addition, the analysis of the extracted watermark can help us to detect and localize tampers.
Platform: | Size: 102725 | Author: xiaxianming | Hits:

[matlabjpeg2000_matlab

Description: jpeg2000的matlab实现,包括实现的ppt。对图像处理和JPEG2000加密的朋友很有帮助。-JPEG2000 of Matlab realized, including the realization of ppt. Right JPEG2000 image processing and encryption of helpful friends.
Platform: | Size: 97280 | Author: 江鸟 | Hits:

[Crack Hack(MATLAB)

Description: 加密解密图象隐藏原程序(MATLAB) 注:用bmp图象加密JPEG图象-hidden image encryption and decryption of the original procedure (MATLAB) Note : bmp image encryption JPEG image
Platform: | Size: 1024 | Author: 郭凯 | Hits:

[Special Effectsdct1_watermarked

Description: Firstly, research on robust image watermarking. A digital watermarking scheme based on wavelet transform was proposed. It realizes the watermarking extract without the original image using 64×64×8 bit gray image as the watermark signal. In order to enhancing the security of the watermark, we employ an encryption technology based on chaos and bit plan. Simulation results show that our scheme have good invisibility and can survive low-quality JPEG compression, median filtering and so on. In addition, the analysis of the extracted watermark can help us to detect and localize tampers.-Firstly, research on robust image watermarking. A digital watermarking scheme based on wavelet transform was proposed. It realizes the watermarking extract without the original image using 64 × 64 × 8 bit gray image as the watermark signal. In order to enhancing the security of the watermark, we employ an encryption technology based on chaos and bit plan. Simulation results show that our scheme have good invisibility and can survive low-quality JPEG compression, median filtering and so on. In addition, the analysis of the extracted watermark can help us to detect and localize tampers.
Platform: | Size: 102400 | Author: xiaxianming | Hits:

[source in ebookChapter1-5

Description: 第一章到第五章的代码 本书通过100多个模块实例,详细地讲解了Verilog HDL程序设计语言,全书共分13章,内容涉及VerilogHDL语言基本概念、建模、同步设计、异步设计、功能验证等,实例包括各种加法器/计数器、乘法器/除法器、编码器/译码器、状态机、SPIMaster Controller、I2C Master controller、CAN ProtocolController、Memory模块、JPEG图像压缩模块、加密模块、ATA控制器、8位RISC-CPU等及各个实例模块相应的Testbench,所举实例具有很强的实用性和代表性,每个实例均给出了介绍、功能分析、程序代码和结果演示。-Chapter to Chapter V of the code in this book through more than 100 module instance, explain in detail the Verilog HDL programming language, the book is divided into 13 chapters, covering basic concepts VerilogHDL languages, modeling, synchronous design, asynchronous design, function authentication, etc. Examples include a variety of adder/counter, multiplier/divider, encoders/decoders, state machines, SPIMaster Controller, I2C Master controller, CAN ProtocolController, Memory modules, JPEG image compression module, encryption module, ATA controller, 8-bit RISC-CPU, etc. and the various instances of the corresponding module Testbench, The examples are highly practical and representation, each instance of it all gives the introduction, functional analysis, program code and results presentation.
Platform: | Size: 1580032 | Author: xiao | Hits:

[VHDL-FPGA-VerilogChapter6-9

Description: 第六章到第九章的代码 本书通过100多个模块实例,详细地讲解了Verilog HDL程序设计语言,全书共分13章,内容涉及VerilogHDL语言基本概念、建模、同步设计、异步设计、功能验证等,实例包括各种加法器/计数器、乘法器/除法器、编码器/译码器、状态机、SPIMaster Controller、I2C Master controller、CAN ProtocolController、Memory模块、JPEG图像压缩模块、加密模块、ATA控制器、8位RISC-CPU等及各个实例模块相应的Testbench,所举实例具有很强的实用性和代表性,每个实例均给出了介绍、功能分析、程序代码和结果演示。-Chapter VI to Chapter IX of the code in this book through more than 100 module instance, explain in detail the Verilog HDL programming language, the book is divided into 13 chapters, covering basic concepts VerilogHDL languages, modeling, synchronous design, asynchronous design, functional verification, etc. Examples include a variety of adder/counter, multiplier/divider, encoders/decoders, state machines, SPIMaster Controller, I2C Master controller, CAN ProtocolController, Memory modules, JPEG image compression module, encryption module, ATA controller, 8-bit RISC-CPU, etc. and the various instances of the corresponding module Testbench, The examples are highly practical and representation, each instance of it all gives the introduction, functional analysis, program code and results presentation.
Platform: | Size: 6281216 | Author: xiao | Hits:

[VHDL-FPGA-VerilogChapter10

Description: 第十章的代码。 本书通过100多个模块实例,详细地讲解了Verilog HDL程序设计语言,全书共分13章,内容涉及VerilogHDL语言基本概念、建模、同步设计、异步设计、功能验证等,实例包括各种加法器/计数器、乘法器/除法器、编码器/译码器、状态机、SPIMaster Controller、I2C Master controller、CAN ProtocolController、Memory模块、JPEG图像压缩模块、加密模块、ATA控制器、8位RISC-CPU等及各个实例模块相应的Testbench,所举实例具有很强的实用性和代表性,每个实例均给出了介绍、功能分析、程序代码和结果演示-Chapter X code. This book by more than 100 module instance, explain in detail the Verilog HDL programming language, the book is divided into 13 chapters, covering basic concepts VerilogHDL languages, modeling, synchronous design, asynchronous design, functional verification, etc. Examples include a variety of additions device/counters, multipliers/dividers, encoders/decoders, state machines, SPIMaster Controller, I2C Master controller, CAN ProtocolController, Memory modules, JPEG image compression module, encryption module, ATA controller, 8-bit RISC-CPU etc. and the various instances of the corresponding module Testbench, The examples are highly practical and representation, each instance of it all gives the introduction, functional analysis, program code and the results demonstrate
Platform: | Size: 6872064 | Author: xiao | Hits:

[VHDL-FPGA-VerilogChapter11-13

Description: 第十一章到第十三章的代码 本书通过100多个模块实例,详细地讲解了Verilog HDL程序设计语言,全书共分13章,内容涉及VerilogHDL语言基本概念、建模、同步设计、异步设计、功能验证等,实例包括各种加法器/计数器、乘法器/除法器、编码器/译码器、状态机、SPIMaster Controller、I2C Master controller、CAN ProtocolController、Memory模块、JPEG图像压缩模块、加密模块、ATA控制器、8位RISC-CPU等及各个实例模块相应的Testbench,所举实例具有很强的实用性和代表性,每个实例均给出了介绍、功能分析、程序代码和结果演示。-Chapter XI to the 13th chapter of the code in this book through more than 100 module instance, explain in detail the Verilog HDL programming language, the book is divided into 13 chapters, covering basic concepts VerilogHDL languages, modeling, synchronous design, asynchronous design, functional verification, etc. Examples include a variety of adder/counter, multiplier/divider, encoders/decoders, state machines, SPIMaster Controller, I2C Master controller, CAN ProtocolController, Memory modules, JPEG image compression module, encryption module, ATA controller, 8-bit RISC-CPU, etc. and the various instances of the corresponding module Testbench, The examples are highly practical and representation, each instance of it all gives the introduction, functional analysis, program code and results presentation.
Platform: | Size: 5088256 | Author: xiao | Hits:

[Voice Compressipp_sample

Description:
Platform: | Size: 1264640 | Author: Mr liu | Hits:

[Special EffectsDCT

Description: 基于DCT的数字水印处理技术,本水印处理过程利用图像的缩放技术和调整原始图像的直方图,根据人眼视觉特性,在每个DCT变换块的DC分量上嵌入水印信息,并且在水印信息嵌入之前,对其进行置乱加密,提供双重安全保证,接着通过JPEG压缩攻击对DCT域的鲁棒性进行测试,证明了DCT的抗攻击能力。-DCT-based digital watermarking technique, the watermark processing technology and the use of image scaling to adjust the original image histogram, according to the human visual system, in each block of DCT-DC components on the embedded watermark information, and information in the watermark embedding prior to its scrambling encryption to provide double security guarantees, followed by JPEG compression attacks on the DCT domain robustness of tests to demonstrate the anti-attack capability of DCT.
Platform: | Size: 1024 | Author: zhangxibin | Hits:

[OtherIntel_IPP_basic_usage

Description: IPP“Intel Integrated Performance Primitives” ( Intel IPP )是一套跨平台的软件函数库,他提供了广泛的多媒体功能:音频解码器(例如: H263 、 MPEG-4 )、图像处理 (JPEG) 、信号处理、语音压缩(例如: G723 、 GSM 、 AMR )和加密机制。“Intel IPP” 包含各种的函数,用于进行向量与图像处理、颜色转换、过滤、分屏、设置域值、变换,以及算术、统计、几何与图形运算。对于每个函数, “Intel IPP” 均支持多种数据类型和分布,同时保持了数据结构的最小化,它提供了丰富的选项供用户在设计与优化应用程序时选用,不必再去编写特定代码。-IPP "Intel Integrated Performance Primitives" (Intel IPP) is a cross-platform software library, he Offers a wide range of multimedia features: audio decoder (for example: H263, MPEG-4), image processing (JPEG), signal processing, Voice compression (for example: G723, GSM, AMR) and encryption mechanisms. "Intel IPP" contains a variety of functions, used for the Volume and image processing, color conversion, filtering, split-screen, set the field value, transform, and mathematics, statistics, geometry and graphics operations. For each A function, "Intel IPP" are supported by multiple data types and distribution, while maintaining a minimal data structure, which provides a wealth of Options for users in the design and optimization of applications to choose from, do not have to go write specific code. IPP "Intel Integrated Performance Primitives" (Intel IPP) is a cross-platform software library, he Offers a wide range of multimedia features: audio decoder (for example: H263, MPEG-
Platform: | Size: 9216 | Author: ajax | Hits:

[Software Engineeringfdkjfkdjfdkf

Description: 数字水印文件和数字水印命令是数字水印技术在军事应用的两个重要应用。本文以一种基于分数阶傅里叶变换 (FRFT)的数字水印算法,使用chirp信号作为水印信息,嵌入到图像的分数阶傅里叶的加密域中。该算法有效地利用水印的 嵌入位置和FRFT的阶次作为密钥的同时,还利用chirp信号在分数阶傅里叶域的特点,可以很方便的检测到水印,具有良好 的不可见性和安全性的同时,还能够抵抗很强的JPEG压缩和噪声的攻击,对剪切、滤波等操作也有一定的鲁棒性。-Watermarking files and digital watermarking command are two important applications of digital watermarking technology for military applications in. In this paper, based on fractional Fourier transform (FRFT) digital watermarking algorithm using chirp signal as the watermark information is embedded into the image encryption fractional Fourier domain. The effective use of watermarking algorithm FRFT embedding position and at the same time as the order of the keys, but also take advantage of the characteristics of chirp signals in fractional Fourier domain, and can easily detect the watermark, with good Invisibility and safety, it is also highly resistant to JPEG compression and noise attacks, shear, filtering and other operations also has certain robustness.
Platform: | Size: 1003520 | Author: baibai | Hits:

CodeBus www.codebus.net