Welcome![Sign In][Sign Up]
Location:
Search - LSB-Data-Hiding-Image

Search list

[GDI-BitmapLSByincang

Description: lsb的信息隐藏,可以下了看看,很简单的.-lsb of information hiding, they can look at a very simple.
Platform: | Size: 379904 | Author: | Hits:

[Special EffectsLSB-Data-Hiding-Image

Description: 图像的组成无非是一些字符串或者一些字节组成的字符串,然而,每一个字节数据位的重要度并不是一样的,两个相邻字节往往只有低位是不一样的。例如:00100110和00100111代表了两个不同渐变度的红色,但是就人眼是分辨不出来的。最低有效位LSB算法,就是利用这一点,达到图像压缩,或者数字水印的功能。-The composition of the image is nothing more than some number of bytes or string composed of string, however, one byte for each data bit is not an important degree of the same, often only two adjacent low-byte is not the same. For example: 00100110 and 00100111 represent the gradient of two different degrees of red, but on the human eye is not out to tell. Least significant bit LSB algorithm, is to take advantage of this point, to achieve image compression, or digital watermark feature.
Platform: | Size: 322560 | Author: xlz | Hits:

[Crack Hacklsb

Description: 信息隐藏与水印技术的经典隐写算法的lsb算法的加密,用C实现-Information Hiding and Watermarking classic lsb steganalysis algorithm encryption algorithm, using C to achieve
Platform: | Size: 1024 | Author: dedved | Hits:

[Special EffectsLSBxinxiyincangfenxi

Description: 介绍了一种基于统计特性的LSB密写分析方法,对其进行了改进并提出了可靠估计信息隐藏长度的方法。该方法利用相邻像素相关性定义了统计量,可根据阈值判断秘密信息的有无。对待检测图像进行二次嵌入,根据统计量的变化建立模型,能可靠估计秘密信息隐藏长度。实验表明,估计出的信息量比较准确。-This paper introduces a steganalysis algorithm based on statistics method for LSB steganograhpy and mends it,proposes a method estimating the quantity of hiding data reliably.The method defines statistics using the relativity of close pixels and judges the existence of secret message with threshold.It inserts message in the waiting detected image again,modeles according to the changes of statistics.The model can estimate the quantity of hiding data reliably.Experimental results show the quantity of hi...
Platform: | Size: 1536000 | Author: boe | Hits:

[matlabhidetc

Description: steganography tool for hiding data in image using LSB hiding technique
Platform: | Size: 2048 | Author: malli | Hits:

[matlabdesordtext

Description: while reading the hidden text disorder them from the cover image
Platform: | Size: 1024 | Author: malli | Hits:

[matlabIWT

Description: 基于小波的编码变换和图像的二次压缩,区别于经典的小波变换-Coding based on wavelet transform and the second image compression, wavelet transform is different from the classic
Platform: | Size: 1024 | Author: 宁凝 | Hits:

[Software EngineeringLSBtuxiangkuozhan

Description: :本文描述了一种基于LSB 扩展的图像自嵌入方法。该方法在使用LSB 数据隐藏的同时,对图像的高层位 平面采用无损数据嵌入方法,将图像的压缩信息与认证信息嵌入到图像自身中。-This paper presents a method of image self-embedding, which is based on the extension of LSB data hiding method. When LSB embedding method was used in data hiding, reversible hiding method was applied in higher bitplanes as an addition of LSB embedding capacity
Platform: | Size: 516096 | Author: lili | Hits:

[Graph programLSB-Data-Hiding

Description: LSB 信息隐藏方法,分别对BMP图像 和 YUV视屏帧进行LSB信息隐藏。-LSB information hiding, and BMP image and YUV screen frame LSB Information Hide
Platform: | Size: 3433472 | Author: 黄安安 | Hits:

[Technology ManagementNik_Shahidah_FKEE_(SKSKM2010)

Description: data hiding in image by lsb method
Platform: | Size: 390144 | Author: hemanth | Hits:

[matlabmosaic-hiding

Description: Reversible data hiding with lsb replacement in image.
Platform: | Size: 139264 | Author: Jerin Antony | Hits:

[Software Engineeringbashsteg

Description: matlab project for data hiding in image using lsb algorithm
Platform: | Size: 72704 | Author: bash rynjah | Hits:

[OtherRDH-BY-RRBE

Description: Nowadays, with the rapid growth in formation technology more and more images and data are available on the internet. So there is a need to provide some kind of authentication to such important data. When the sender transmits the image to the receiver, there may be intruders present in between who may capture the image. After capturing the image the mage the intruder may view the meaningful content in the image. This may not be the problem in some cases. But if we consider security applications like medical and military images then such distortion is unacceptable. To avoid misuse or loss of information several reversible data hiding techniques (RDH) are implemented. This paper gives details on watermarking, LSB, Histogram and RDH using optimum Thresholding with related results.-Nowadays, with the rapid growth in information technology more and more images and data are available on the internet. So there is a need to provide some kind of authentication to such important data. When the sender transmits the image to the receiver, there may be intruders present in between who may capture the image. After capturing the image the mage the intruder may view the meaningful content in the image. This may not be the problem in some cases. But if we consider security applications like medical and military images then such distortion is unacceptable. To avoid misuse or loss of information several reversible data hiding techniques (RDH) are implemented. This paper gives details on watermarking, LSB, Histogram and RDH using optimum Thresholding with related results.
Platform: | Size: 313344 | Author: Devarapu ChakraRao | Hits:

CodeBus www.codebus.net