Description: 根据W. Bender的《Techniques for data hiding》编写
%用补丁方法对图象做空间域的水印嵌入和提取,
%效率极高,程序简洁,属信息隐藏中常用的方法之一。
%作者:辽宁大学 信息学院 范铁生
%email:fts0@163.com-W. Bender in accordance with the Platform: |
Size: 1024 |
Author:gao |
Hits:
Description: 根据W. Bender的《Techniques for data hiding》编写
%用补丁方法对图象做DCT域的水印嵌入和提取,
%效率极高,程序简洁,属信息隐藏中常用的方法之一。
%作者:辽宁大学 信息学院 范铁生
%email:fts0@163.com-W. Bender in accordance with the Platform: |
Size: 1024 |
Author:gao |
Hits:
Description: Data hiding has drawn increasingly extensive attention recently. Most multimedia data hiding techniques
modify and, hence, distort the cover media in order to insert the additional information. Even though the
distortion is often small and imperceptible to human visual systems (HVS), the original cover media usually
cannot be restored completely. In other words, they are noninvertible data hiding, which is not admissible to
some sensitive applications, such as legal and medical imaging. For these applications, reversible data hiding
is desired to extract the embedded data as well as to recover the original host signal. Reversible (also often
referred to as lossless, invertible , or distortion-free) data hiding has been a very active research subject in the
last a few year-Data hiding has drawn increasingly extensive attention recently. Most multimedia data hiding techniques
modify and, hence, distort the cover media in order to insert the additional information. Even though the
distortion is often small and imperceptible to human visual systems (HVS), the original cover media usually
cannot be restored completely. In other words, they are noninvertible data hiding, which is not admissible to
some sensitive applications, such as legal and medical imaging. For these applications, reversible data hiding
is desired to extract the embedded data as well as to recover the original host signal. Reversible (also often
referred to as lossless, invertible , or distortion-free) data hiding has been a very active research subject in the
last a few year Platform: |
Size: 746496 |
Author:Ragu |
Hits:
Description: Simple steganographic techniques have been in use for hundreds of years, but with the increasing use of files in an electronic format new techniques for information hiding have become essential. This project implements the steganographic application such that the user you can embed a secret message or file inside a piece of unsuspicious information and send it without anyone knowing of the existence of the secret message. The receiver has to extract the message or file from the cover file using the same application. Except the sender and receiver, no one can even expect that the file contain some data, as the properties of the file are not changed after inserting the data. Platform: |
Size: 345088 |
Author:Mike |
Hits: