Welcome![Sign In][Sign Up]
Location:
Search - data hiding using lsb

Search list

[Crack Hacklsb

Description: 信息隐藏与水印技术的经典隐写算法的lsb算法的加密,用C实现-Information Hiding and Watermarking classic lsb steganalysis algorithm encryption algorithm, using C to achieve
Platform: | Size: 1024 | Author: dedved | Hits:

[Special EffectsLSBxinxiyincangfenxi

Description: 介绍了一种基于统计特性的LSB密写分析方法,对其进行了改进并提出了可靠估计信息隐藏长度的方法。该方法利用相邻像素相关性定义了统计量,可根据阈值判断秘密信息的有无。对待检测图像进行二次嵌入,根据统计量的变化建立模型,能可靠估计秘密信息隐藏长度。实验表明,估计出的信息量比较准确。-This paper introduces a steganalysis algorithm based on statistics method for LSB steganograhpy and mends it,proposes a method estimating the quantity of hiding data reliably.The method defines statistics using the relativity of close pixels and judges the existence of secret message with threshold.It inserts message in the waiting detected image again,modeles according to the changes of statistics.The model can estimate the quantity of hiding data reliably.Experimental results show the quantity of hi...
Platform: | Size: 1536000 | Author: boe | Hits:

[matlabhidetc

Description: steganography tool for hiding data in image using LSB hiding technique
Platform: | Size: 2048 | Author: malli | Hits:

[matlabIWT

Description: 基于小波的编码变换和图像的二次压缩,区别于经典的小波变换-Coding based on wavelet transform and the second image compression, wavelet transform is different from the classic
Platform: | Size: 1024 | Author: 宁凝 | Hits:

[Software Engineeringbashsteg

Description: matlab project for data hiding in image using lsb algorithm
Platform: | Size: 72704 | Author: bash rynjah | Hits:

[OtherRDH-BY-RRBE

Description: Nowadays, with the rapid growth in formation technology more and more images and data are available on the internet. So there is a need to provide some kind of authentication to such important data. When the sender transmits the image to the receiver, there may be intruders present in between who may capture the image. After capturing the image the mage the intruder may view the meaningful content in the image. This may not be the problem in some cases. But if we consider security applications like medical and military images then such distortion is unacceptable. To avoid misuse or loss of information several reversible data hiding techniques (RDH) are implemented. This paper gives details on watermarking, LSB, Histogram and RDH using optimum Thresholding with related results.-Nowadays, with the rapid growth in information technology more and more images and data are available on the internet. So there is a need to provide some kind of authentication to such important data. When the sender transmits the image to the receiver, there may be intruders present in between who may capture the image. After capturing the image the mage the intruder may view the meaningful content in the image. This may not be the problem in some cases. But if we consider security applications like medical and military images then such distortion is unacceptable. To avoid misuse or loss of information several reversible data hiding techniques (RDH) are implemented. This paper gives details on watermarking, LSB, Histogram and RDH using optimum Thresholding with related results.
Platform: | Size: 313344 | Author: Devarapu ChakraRao | Hits:

CodeBus www.codebus.net