登录
首页 » matlab » shuzishuiyindeng

shuzishuiyindeng

于 2021-03-13 发布 文件大小:13851KB
0 246
下载积分: 1 下载次数: 304

代码说明:

  基于LSB图像隐藏系统的设计与实现,LSB算法代码,信息隐藏攻击算法,DCT域的隐藏以及数字水印。(LSB based image hiding system design and implementation, LSB algorithm code, information hiding attack algorithm, DCT hiding and digital watermarking domain.)

文件列表:

数字水印

........\LSB
........\...\im2bin.m,221,2010-06-02
........\...\LSB
........\...\...\bin2im.m,145,2010-06-02


........\...\...\LSB.asv,963,2010-06-02
........\...\...\LSB.m,1038,2010-06-02
........\...\...\recover.m,285,2010-06-02



........\...\...\watermark_recover.asv,582,2010-06-02
........\...\...\watermark_recover.m,384,2010-06-02
........\...\LSB 算法代码.docx,14239,2010-06-02
........\...\LSB.asv,746,2010-06-02
........\...\LSB.m,746,2010-06-02
........\...\LSB.rar,398843,2010-06-02

........\...\numbin2dec.m,131,2010-06-02
........\...\numdec2bin.m,164,2010-06-02


........\...\基于LSB图像隐藏系统的设计与实现.pdf,332342,2010-06-02
........\实验1-6
........\........\DCT域隐藏


........\........\.........\hide.asv,1974,2010-06-02

........\........\.........\hist_image.m,194,2010-06-02
........\........\.........\inhide.asv,514,2010-06-02
........\........\.........\myhide.asv,2937,2010-06-02
........\........\.........\myhide.m,3210,2010-06-02
........\........\.........\myinhide.asv,681,2010-06-02
........\........\.........\myinhide.m,885,2010-06-02
........\........\.........\readme.txt,700,2010-06-02
........\........\.........\signal.bmp
........\........\.........\signal.jpg
........\........\.........\source.bmp,30118,2010-06-02
........\........\.........\source.jpg,14375,2010-06-02
........\........\.........\watermark.jpg,2056,2010-06-02

........\........\LSB隐藏
........\........\.......\abstract.asv,135,2010-06-02
........\........\.......\abstract.m,164,2010-06-02
........\........\.......\abstractdown.m,184,2010-06-02
........\........\.......\bin2im.m,145,2010-06-02





........\........\.......\elephant.tif,800164,2010-06-02
........\........\.......\feather.jpg,24281,2010-06-02
........\........\.......\fun717.m,1416,2010-06-02
........\........\.......\im2bin.m,221,2010-06-02
........\........\.......\im3.jpg,86458,2010-06-02
........\........\.......\imcat3.m,247,2010-06-02
........\........\.......\inwatermarking.tif,92454,2010-06-02
........\........\.......\inwatermarking1.tif,92454,2010-06-02
........\........\.......\inwatermarking2.tif,92454,2010-06-02
........\........\.......\LSB.asv,590,2010-06-02
........\........\.......\LSB.m,569,2010-06-02
........\........\.......\LSB1.asv,564,2010-06-02
........\........\.......\LSB1.m,564,2010-06-02
........\........\.......\LSB2.m,584,2010-06-02
........\........\.......\LSB3.asv,607,2010-06-02
........\........\.......\LSB3.m,605,2010-06-02
........\........\.......\LSB4.m,616,2010-06-02
........\........\.......\lsbmain.asv,1026,2010-06-02
........\........\.......\lsbmain.m,997,2010-06-02
........\........\.......\main.tif,162084,2010-06-02
........\........\.......\numbin2dec.m,131,2010-06-02
........\........\.......\numdec2bin.m,164,2010-06-02
........\........\.......\readme.txt,461,2010-06-02
........\........\.......\recover.m,273,2010-06-02
........\........\.......\reLSB.asv,317,2010-06-02
........\........\.......\reLSB.m,413,2010-06-02
........\........\.......\shuiyin.jpg,8451,2010-06-02
........\........\.......\source.jpg,14260,2010-06-02
........\........\.......\submain.asv,304,2010-06-02
........\........\.......\submain.m,340,2010-06-02
........\........\.......\watermark.bmp,276534,2010-06-02
........\........\.......\watermark.jpg,9077,2010-06-02
........\........\.......\watermarknew1.tif,25250,2010-06-02
........\........\.......\watermarknew2.tif,25250,2010-06-02
........\........\.......\图像分层

........\........\.......\........\LSB3.m,605,2010-06-02
........\........\.......\........\numbin2dec.m,131,2010-06-02
........\........\.......\........\numdec2bin.m,164,2010-06-02
........\........\.......\图像分层.rar,214997,2010-06-02
........\........\信息隐藏攻击算法

........\........\................\myattack.asv,745,2010-06-02
........\........\................\myattack.m,745,2010-06-02
........\........\................\mycompress.m,93,2010-06-02

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • IMAGE--RESTORATION
    matlab code for image restoration
    2013-11-01 02:06:39下载
    积分:1
  • soursesandcom
    本程序验证手写fft频谱分析的正确性,并用于信号频域积分和频率检测。包含文档详细解释。(This procedure verified the correctness of handwritten fft spectrum analysis, and for the signal frequency-domain points and frequency of testing. Contains the document explained in detail.)
    2009-12-17 14:37:33下载
    积分:1
  • decode_chase2_halfiter
    自己编的一个chase算法的小程序,只进行了一次迭代运算,关于多次迭代计算需进一步研究(developed an algorithm for small chase procedures, only a iteration, on the number of iterative calculations required further study)
    2007-05-27 23:08:13下载
    积分:1
  • 0898716438
    Linear programming with matlab. A good book about thia topic.
    2009-10-05 11:13:09下载
    积分:1
  • NNcontrol_0
    Name:neural Network Control, for Matlab,tipical description for control problems with NN method, additionally, there are some useful examples to be referenced.(Name : neural Network Control, for Matlab, tipical description for problems with control NN method, additionally, there are some useful examples to be referenced .)
    2006-12-24 10:56:45下载
    积分:1
  • adaptive-signal-arithmetic
    Some algorithms of variable step size LMS adaptive filtering are studied.The VS—LMS algorithm is improved. Another new non-linear function between肛and e(/ t)is established.The theoretic analysis and computer simulation results show that this algorithm converges more quickly than the origina1.Furthermore,better antinoise property is exhibited under Low—SNR environment than the original one.(variable step size of a LMS daptive filtering are studied. The VS-LMS algorithm is improved. Another new non-linear function between anus and e (/ t) is established. The theoretic analysis and computer simulatio n results show that this algorithm converges mo 're quickly than the origina1. Furthermore, better antinoise property is exhibited under L ow- SNR environment than the original one.)
    2007-05-24 19:55:28下载
    积分:1
  • MATLAB-energy-source-chaos
    典型的能源系统的混沌三相图,包含函数的设定以及x-y-z,x-t,y-t,z-y的图像模拟(Typical chaotic phase diagram of the energy system, contains a set of functions as well as xyz, xt, yt, zy image simulation)
    2013-04-03 21:09:13下载
    积分:1
  • QPSKAWGN-RAILEY-
    QPSK信号在高斯和瑞利信道下的调制解调,并画出误码率曲线和星座图(QPSK Modulation and demodulation)
    2020-06-29 14:40:02下载
    积分:1
  • Qi_hyperchaos
    hyper chaos that can be used in encryption
    2010-09-08 21:42:25下载
    积分:1
  • mppt_disturb_s
    用S函数实现的电导增量法,可以对方便修改为变步长电导增量法(S function realization of conductance increment method)
    2018-01-24 20:02:56下载
    积分:1
  • 696516资源总数
  • 106913会员总数
  • 8今日下载