Welcome![Sign In][Sign Up]
Location:
Search - steganography algorithms

Search list

[OtherLSBEmbeding

Description: 信息隐藏中用于数字隐写的常用算法:LSB替换\LSB匹配,包括随机的和排序的,以及对文件和文件夹进行操作,用CxImage类能快速读取各种格式的图象-Information Hiding for digital steganography of the commonly used algorithms: LSB replacement of LSB matching, including random and sort of, as well as files and folders to operate, using CxImage category can quickly read a variety of formats image
Platform: | Size: 6430720 | Author: 壹号通缉犯 | Hits:

[Linux-UnixTrueCrypt-6.0a-Source.tar

Description: Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encrypts a partition or drive where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the:http://www.truecrypt.org/-Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and LinuxMain Features:* Creates a virtual encrypted disk within a file and mounts it as a real disk.* Encrypts an entire partition or storage device such as USB flash drive or hard drive.* Encrypts a partition or drive where Windows is installed (pre-boot authentication).* Encryption is automatic, real-time (on-the-fly) and transparent.* Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data).* Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the: http://www.truecrypt.org/
Platform: | Size: 1686528 | Author: yangmuxiang | Hits:

[Crack HackF5Hash

Description: F5隐写算法的实现,F5算法,一种适用于JPG图像的隐写算法-F5 steganography algorithm, F5 algorithm, a JPG image for steganalysis algorithm
Platform: | Size: 494592 | Author: Fbw | Hits:

[JSP/Javaopenstego-0.5.2

Description: 是一种用JAVA执行的generic steganography工具,基于支持数据密码,并为各种算法提供插件-OpenStego is a tool implemented in Java for generic steganography, with support for password-based encryption of the data. It supports plugins for various steganographic algorithms
Platform: | Size: 291840 | Author: 谢永胜 | Hits:

[OS programSte-3

Description: 一个mfc下实现的watermark里的LSB算法的隐写、分析、提取,可自己设计隐写位数。-1 mfc achieved under the watermark inside the LSB steganography algorithms, analysis, extraction, can own design stego-bits.
Platform: | Size: 19953664 | Author: Ziqiang | Hits:

[Industry researchproject

Description: This paper presents a steganography method based on an embedded zerotree wavelet compression scheme and bitplane complexity segmentation steganography.The proposed steganography enables us to use lossy compressed images as dummy files in bit-plane-based steganographic algorithms.Large embedding rates of around 25 of the compressed image size were achieved with little noticeable degradation in image quality-This paper presents a steganography method based on an embedded zerotree wavelet compression scheme and bitplane complexity segmentation steganography.The proposed steganography enables us to use lossy compressed images as dummy files in bit-plane-based steganographic algorithms.Large embedding rates of around 25 of the compressed image size were achieved with little noticeable degradation in image quality
Platform: | Size: 346112 | Author: mat7755 | Hits:

[JSP/Javaf5

Description: f5信息隐写算法的JAVA描述,有源代码-f5 steganography algorithms JAVA information described in source code
Platform: | Size: 4096 | Author: meiyang | Hits:

[Special EffectsJPM1-steganography

Description: 加减1图像隐身算法,能够很好的保持图像一阶统计特性-Plus or minus 1 image stealth algorithms to maintain a good first-order statistical properties of image
Platform: | Size: 1665024 | Author: Hongyuan Li | Hits:

[matlabsteganography

Description: steganography function to using DCT algorithms
Platform: | Size: 1024 | Author: muhannad | Hits:

[Graph programrandinterval

Description: LSB隐写算法中的随机数生成函数,和大家一起分享,欢迎下载-Generating function of random number in LSB steganography algorithms
Platform: | Size: 1024 | Author: somnus | Hits:

[matlabSPA-based-audio-steganalysis

Description: 设计并实现一种基于SPA音频隐写分析的算法-Designed and implemented based on SPA audio steganography algorithms
Platform: | Size: 771072 | Author: changmiao | Hits:

[File FormatWatermark-steganography-attack

Description: 介绍水印攻击和隐写分析的算法与调用的函数等-Introduction watermark attacks and steganography algorithms and call functions, etc.
Platform: | Size: 208896 | Author: changmiao | Hits:

[Otheralgorithms-steganography

Description: STEGANOGRAPHY ALGIRITHMS BOOK
Platform: | Size: 1325056 | Author: prince | Hits:

[Otherarticle-2190_2

Description: Algorithms for Digital Image Steganography via Statistical Restoration
Platform: | Size: 116736 | Author: naga | Hits:

[OtherA-Novel-Strategy

Description: Image steganography technique is widely used to realize the secrecy transmission. Although its strategies on classical computers have been extensively researched, there are few studies on such strategies on quantum computers. Therefore, in this paper, a novel, secure and keyless steganography approach for images on quantum computers is proposed based on Moir´ e pattern. Algorithms based on the Moir´ e pattern are proposed for binary image embedding and extraction. Based on the novel enhanced quantum representation of digital images (NEQR), recursive and progressively layered quantum circuits for embedding and extraction operations are designed. In the end, experiments are done to verify the validity and robustness of proposed methods, which confirms that the approach in this paper is effective in quantum image steganography strategy.
Platform: | Size: 1469440 | Author: yangs | Hits:

[matlab00-AudioReader&Writer

Description: 1. Spread Spectrum matlab code audio-steganography-algorithms Conventional Algorithm for DSSS Improved Spread Spectrum
Platform: | Size: 1742848 | Author: majasdf | Hits:

[Graph program差值扩展嵌入源码

Description: 差值扩展简单嵌入算法,属于图像隐写算法的一种。(The differential extension simple embedding algorithm is one of the image steganography algorithms.)
Platform: | Size: 17408 | Author: neil0306 | Hits:

[OtherF5

Description: 图像隐藏F5算法源代码,使用matlab实现。经典的图像隐写算法之一,matlab代码,测试可用。(Image hiding F5 algorithm source code, using MATLAB to achieve. One of the classic image steganography algorithms, matlab code, the test is available.)
Platform: | Size: 793600 | Author: saasdsa | Hits:

CodeBus www.codebus.net