Welcome![Sign In][Sign Up]
Location:
Search - image watermarking using lsb

Search list

[Special EffectsWaterMarkLSB

Description: 一个简单水印系统,可以在图像中嵌入和提取水印,使用的是LSB方法,可供参考-a simple watermarking system that can image watermark embedding and extraction, using the LSB methods available for reference,
Platform: | Size: 1091431 | Author: zhuxingliang | Hits:

[Special EffectsWaterMarkLSB

Description: 一个简单水印系统,可以在图像中嵌入和提取水印,使用的是LSB方法,可供参考-a simple watermarking system that can image watermark embedding and extraction, using the LSB methods available for reference,
Platform: | Size: 1091584 | Author: zhuxingliang | Hits:

[Otherlsb

Description: 用matlab实现的基于LSB的数字水印算法。算法可以在BMP灰度图像中嵌入水印,水印信息为二值图像,并将其扩展到与原始图像同样大小,进行重复嵌入,提高鲁棒性。同时算法中给出了PSNR值以评价水印图像的效果,-Using matlab realize the number of LSB-based watermarking algorithm. Algorithm can be embedded BMP gray image watermark, watermark information for the binary image, and its expansion to the original image the same size, the repetition of embedding, improve robustness. At the same time algorithm PSNR values are given to evaluate the effect of watermark images,
Platform: | Size: 150528 | Author: zheng | Hits:

[Special EffectsLSB

Description: 用matlab语言编写的lab图像水印源代码 可以进行图像的嵌入与提取-Using matlab language lab Image Watermarking source code can be embedded in images and extract
Platform: | Size: 99328 | Author: qw | Hits:

[Crack Hacklsb

Description: 信息隐藏与水印技术的经典隐写算法的lsb算法的加密,用C实现-Information Hiding and Watermarking classic lsb steganalysis algorithm encryption algorithm, using C to achieve
Platform: | Size: 1024 | Author: dedved | Hits:

[Special EffectsSpaceWatermark

Description: 一种图像水印算法。利用图像的LSB在图像叠加噪声时影响很小的特点,提出一种基于LSB的图像水印算法-An image watermarking algorithm. The LSB in the image using image overlay little effect on the characteristics of the noise when the proposed LSB based Image Watermarking Algorithm
Platform: | Size: 24576 | Author: 林旭亮 | Hits:

[Special Effectslsb-watermarking-3

Description: If you re wondering about the number 7 on the equation, the watermark is inserted every 7 pixels. Why not in every pixel? You could, but this way, you can add a second watermark (and a 3rd, and a 4th, etc.) at the same time using the pixels in between (not scripted here yet). And the insertion process is complete. The new image is saved as a bitmap format (.bmp) which saves the data as it is, without any compression whatsoever.
Platform: | Size: 1024 | Author: gege | Hits:

[Algorithmcodelama

Description: watermarking image using lsb method and matlab
Platform: | Size: 174080 | Author: viruz | Hits:

[Special EffectsDigitalwatermarking-research

Description: 同时本论文针对LSB水印系统的算法保密性差的特点,研究了为隐藏信息加密的DES算法。通过对多种空域水印算法优缺点的分析,提出了基于DES算法的空域数字图像水印加入方法。引入的加密方法确保了隐藏信息的安全性,并利用VC++6.0对该方法进行了设计实现-This thesis studied for LSB watermarking system algorithm confidentiality of poor the encrypted DES algorithm to hide information. The analysis of the advantages and disadvantages of a variety of airspace watermarking algorithm proposed adding digital image watermarking based on the DES algorithm airspace. The introduction of encryption methods to ensure the security of hidden information and using VC++6.0 the method designed to achieve
Platform: | Size: 1310720 | Author: 腾飞 | Hits:

[Special Effectswatermark

Description: 嵌入水印,提取水印,以及批量嵌入水印。水印可以是文本水印,也可以是图片水印。 采用LSB算法。-Watermark embedding, watermark extraction, and batch watermark embedding. The watermark can be text watermarking, and can also be image watermarking.Using LSB algorithm.
Platform: | Size: 4209664 | Author: 小许 | Hits:

[Windows DevelopWatermarking

Description: using LSB method for putting ke text file in an image
Platform: | Size: 118784 | Author: mini | Hits:

[Crack HackWatermark_embedding_encryption

Description: image encrypted watermarking using LSB
Platform: | Size: 2048 | Author: Unknown | Hits:

[OtherRDH-BY-RRBE

Description: Nowadays, with the rapid growth in formation technology more and more images and data are available on the internet. So there is a need to provide some kind of authentication to such important data. When the sender transmits the image to the receiver, there may be intruders present in between who may capture the image. After capturing the image the mage the intruder may view the meaningful content in the image. This may not be the problem in some cases. But if we consider security applications like medical and military images then such distortion is unacceptable. To avoid misuse or loss of information several reversible data hiding techniques (RDH) are implemented. This paper gives details on watermarking, LSB, Histogram and RDH using optimum Thresholding with related results.-Nowadays, with the rapid growth in information technology more and more images and data are available on the internet. So there is a need to provide some kind of authentication to such important data. When the sender transmits the image to the receiver, there may be intruders present in between who may capture the image. After capturing the image the mage the intruder may view the meaningful content in the image. This may not be the problem in some cases. But if we consider security applications like medical and military images then such distortion is unacceptable. To avoid misuse or loss of information several reversible data hiding techniques (RDH) are implemented. This paper gives details on watermarking, LSB, Histogram and RDH using optimum Thresholding with related results.
Platform: | Size: 313344 | Author: Devarapu ChakraRao | Hits:

[matlabLSB

Description: image watermarking using lsb method
Platform: | Size: 563200 | Author: gopika | Hits:

[matlabWATERMARKING

Description: WATERMARKING IN DIGITAL IMAGE USING DCT AND LSB METHODS
Platform: | Size: 14336 | Author: kvmanas | Hits:

CodeBus www.codebus.net