Welcome![Sign In][Sign Up]
Location:
Search - lsb data hiding

Search list

[GDI-BitmapLSByincang

Description: lsb的信息隐藏,可以下了看看,很简单的.-lsb of information hiding, they can look at a very simple.
Platform: | Size: 379904 | Author: | Hits:

[Special EffectsLSB-Data-Hiding-Image

Description: 图像的组成无非是一些字符串或者一些字节组成的字符串,然而,每一个字节数据位的重要度并不是一样的,两个相邻字节往往只有低位是不一样的。例如:00100110和00100111代表了两个不同渐变度的红色,但是就人眼是分辨不出来的。最低有效位LSB算法,就是利用这一点,达到图像压缩,或者数字水印的功能。-The composition of the image is nothing more than some number of bytes or string composed of string, however, one byte for each data bit is not an important degree of the same, often only two adjacent low-byte is not the same. For example: 00100110 and 00100111 represent the gradient of two different degrees of red, but on the human eye is not out to tell. Least significant bit LSB algorithm, is to take advantage of this point, to achieve image compression, or digital watermark feature.
Platform: | Size: 322560 | Author: xlz | Hits:

[Crack Hacklsb

Description: 信息隐藏与水印技术的经典隐写算法的lsb算法的加密,用C实现-Information Hiding and Watermarking classic lsb steganalysis algorithm encryption algorithm, using C to achieve
Platform: | Size: 1024 | Author: dedved | Hits:

[Special EffectsLSBxinxiyincangfenxi

Description: 介绍了一种基于统计特性的LSB密写分析方法,对其进行了改进并提出了可靠估计信息隐藏长度的方法。该方法利用相邻像素相关性定义了统计量,可根据阈值判断秘密信息的有无。对待检测图像进行二次嵌入,根据统计量的变化建立模型,能可靠估计秘密信息隐藏长度。实验表明,估计出的信息量比较准确。-This paper introduces a steganalysis algorithm based on statistics method for LSB steganograhpy and mends it,proposes a method estimating the quantity of hiding data reliably.The method defines statistics using the relativity of close pixels and judges the existence of secret message with threshold.It inserts message in the waiting detected image again,modeles according to the changes of statistics.The model can estimate the quantity of hiding data reliably.Experimental results show the quantity of hi...
Platform: | Size: 1536000 | Author: boe | Hits:

[Graph programLSB_Data_Hiding_Image

Description: 这是一个用MATLAB实现的把数据隐藏到图片的最低有效位,且不影响图片的视觉效果,对研究LSB算法的同学很有帮助。-This is a MATLAB achieved by hiding the data into the least significant bit images and does not affect the picture of the visual effects, for research students LSB algorithm is very helpful.
Platform: | Size: 307200 | Author: yyt | Hits:

[matlabhidetc

Description: steganography tool for hiding data in image using LSB hiding technique
Platform: | Size: 2048 | Author: malli | Hits:

[matlabdesordtext

Description: while reading the hidden text disorder them from the cover image
Platform: | Size: 1024 | Author: malli | Hits:

[matlab2004LSB-Cheng

Description: this code is LSB data hiding source book.
Platform: | Size: 226304 | Author: enes | Hits:

[matlabIWT

Description: 基于小波的编码变换和图像的二次压缩,区别于经典的小波变换-Coding based on wavelet transform and the second image compression, wavelet transform is different from the classic
Platform: | Size: 1024 | Author: 宁凝 | Hits:

[Software EngineeringLSBtuxiangkuozhan

Description: :本文描述了一种基于LSB 扩展的图像自嵌入方法。该方法在使用LSB 数据隐藏的同时,对图像的高层位 平面采用无损数据嵌入方法,将图像的压缩信息与认证信息嵌入到图像自身中。-This paper presents a method of image self-embedding, which is based on the extension of LSB data hiding method. When LSB embedding method was used in data hiding, reversible hiding method was applied in higher bitplanes as an addition of LSB embedding capacity
Platform: | Size: 516096 | Author: lili | Hits:

[Windows Develop1

Description: technique is quite small owing to the low compression ratio. Based on this, a general least significant bit-plane (LSB) embedding technique in the spatial domain was proposed by Celik et al. [6]. The payload and imperceptibility of embedded data are largely improved because of the more efficient compression technique. Domingo-Ferrer et al. [5] proposed a spread spectrum data hiding method that is only reversible with respect to the modified version of the original host signal . Xuan et al. [7] proposed a reversible data hiding algorithm carried out in the integer wavelet transform (IWT) domain. An improved version of this algorithm was reported in [11]. By exploiting the superior features of wavelet transform, in particular, the high decorre-technique is quite small owing to the low compression ratio. Based on this, a general least significant bit-plane (LSB) embedding technique in the spatial domain was proposed by Celik et al. [6]. The payload and imperceptibility of embedded data are largely improved because of the more efficient compression technique. Domingo-Ferrer et al. [5] proposed a spread spectrum data hiding method that is only reversible with respect to the modified version of the original host signal . Xuan et al. [7] proposed a reversible data hiding algorithm carried out in the integer wavelet transform (IWT) domain. An improved version of this algorithm was reported in [11]. By exploiting the superior features of wavelet transform, in particular, the high decorre
Platform: | Size: 474112 | Author: Ragu | Hits:

[Graph programLSB-Data-Hiding

Description: LSB 信息隐藏方法,分别对BMP图像 和 YUV视屏帧进行LSB信息隐藏。-LSB information hiding, and BMP image and YUV screen frame LSB Information Hide
Platform: | Size: 3433472 | Author: 黄安安 | Hits:

[Special Effectszc_LSB_MFC_100915

Description: LSB最低有效位数据隐藏,基于MFC开发,能够将任意有限数据隐藏到任一图片中,实现数据隐藏。-LSB Least Significant Bit data hiding, MFC-based development, can be in any limited data hiding any pictures, data hiding.
Platform: | Size: 3230720 | Author: 郑倡 | Hits:

[Technology ManagementNik_Shahidah_FKEE_(SKSKM2010)

Description: data hiding in image by lsb method
Platform: | Size: 390144 | Author: hemanth | Hits:

[Software Engineeringjiyuyincang1]

Description: 基于预测误差差值扩展和最低有效位替换的可逆数据隐藏,希望对大家有帮助-Based on prediction error difference expansion and LSB replacement reversible data hiding, we hope to help
Platform: | Size: 626688 | Author: 张生 | Hits:

[matlabmosaic-hiding

Description: Reversible data hiding with lsb replacement in image.
Platform: | Size: 139264 | Author: Jerin Antony | Hits:

[matlabReversibleData_hiding

Description: LSB based reversible data hiding
Platform: | Size: 1024 | Author: Jerin Antony | Hits:

[Software Engineeringbashsteg

Description: matlab project for data hiding in image using lsb algorithm
Platform: | Size: 72704 | Author: bash rynjah | Hits:

[OtherRDH-BY-RRBE

Description: Nowadays, with the rapid growth in formation technology more and more images and data are available on the internet. So there is a need to provide some kind of authentication to such important data. When the sender transmits the image to the receiver, there may be intruders present in between who may capture the image. After capturing the image the mage the intruder may view the meaningful content in the image. This may not be the problem in some cases. But if we consider security applications like medical and military images then such distortion is unacceptable. To avoid misuse or loss of information several reversible data hiding techniques (RDH) are implemented. This paper gives details on watermarking, LSB, Histogram and RDH using optimum Thresholding with related results.-Nowadays, with the rapid growth in information technology more and more images and data are available on the internet. So there is a need to provide some kind of authentication to such important data. When the sender transmits the image to the receiver, there may be intruders present in between who may capture the image. After capturing the image the mage the intruder may view the meaningful content in the image. This may not be the problem in some cases. But if we consider security applications like medical and military images then such distortion is unacceptable. To avoid misuse or loss of information several reversible data hiding techniques (RDH) are implemented. This paper gives details on watermarking, LSB, Histogram and RDH using optimum Thresholding with related results.
Platform: | Size: 313344 | Author: Devarapu ChakraRao | Hits:

[Multimedia DevelopLSB-Hiding

Description: LSB Hiding : Advanced encryption standard (AES) that has been proposed by National Institute of Standards and Technology (NIST) plays a significant role of a secure algorithm for data exchanged. Two prime processes involved: encryption (cipher) and decryption (decipher). Cipher is a process to convert data into unintelligent form called ciphertext. Similarly decipher is a process for the data to be converted back into its original form called paintext.
Platform: | Size: 1024 | Author: muthana | Hits:
« 12 »

CodeBus www.codebus.net