搜索资源列表
-
0下载:
本文算法是将24 位真彩图的亮度分量分块
DCT ,然后利用DCT 量化系数的奇偶特性嵌入8
位灰度水印图,并通过PN 序列加密来保证水印的
安全性。算法中,将灰度图像转换为二进制数据
流,置乱后扩频调制,隐藏在宿主DCT 系数量化值
中,提取时不需要宿主信号,实现水印信号的盲提
取。-This algorithm is 24-bit true color pictures of the luminance component of block DCT, quantiza
-
-
0下载:
在保密数据传递等应用中,有时采用将一句话或一段文字或一段音乐隐藏在另一段音乐中,然后利用专门的算法来提取所传的信息-Data transfer in applications such as security, sometimes using the word or a text or a piece of music hidden in another section of music, and then use a special algorithm to extract the infor
-
-
0下载:
数字水印的傅里叶算法,大学本科论文,图像处理,信息安全等。-Fourier transform algorithm of the digital watermark, undergraduate thesis, image processing, information security.
-
-
0下载:
The DES (Data Encryption Standard) algorithm is the most widely used encryption algorithm in the world. The Data Encryption Standard (DES) specifies a FIPS approved cryptographic algorithm as required by FIPS 140-1. Developed in the 1970s by the Nati
-
-
0下载:
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm".
-
-
0下载:
This paper deals with the improvement of the Dirty Paper Trellis Code (DPTC) watermarking algorithm. This watermarking algorithm is known to be one of the best among the high rate watermarking schemes. Nevertheless, recent researches reveal its secur
-
-
0下载:
This paper deals with the improvement of the Dirty Paper Trellis Code (DPTC) watermarking algorithm. This watermarking algorithm is known to be one of the best among the high rate watermarking schemes. Nevertheless, recent researches reveal its secur
-
-
0下载:
Nowadays security becomes a most important issue regarding a spoof attack. So, multimodal biometrics technology has attracted
substantial interest for its highest user acceptance, high security, high accuracy, low spoof attack and high recognition
-
-
0下载:
Image Encryption based on the RGB PIXEL Transposition and Shuffling
Abstract — Privacy is one of the key issues information Security addresses. Through encryption one can prevent a third party from understanding raw data during signal transmissi
-
-
0下载:
Recently, digital multimedia has become widely distributed in computer and network technology. For digital
multimedia distribution applications, issues surrounding information security have received significant attention. Data hiding has been one o
-
-
0下载:
部分信道状态信息已知条件下,发射信号预处理、后处理,并采用注水算法,仿真得出保密容量-Under partial channel state information known conditions, transmission signal preprocessing, post processing, and using water-filling algorithm, simulation results security capacity
-
-
0下载:
An Automatic Wavelet-based Nonlinear Image
Enhancement Technique for Aerial Imagery
Recently we proposed a wavelet-based dynamic range
compression algorithm to improve the visual quality of digital
images captured in the high dynamic range
-
-
1下载:
matlab编程,粒子群智能算法求解安全域边界,已配合主程序验证-matlab programming, particle swarm intelligence algorithm security domain boundaries, with the main program has been verified
-