edu-yinzhaoxia / Reversible-Data-Hiding-in-Encrypted-Images-Based-on-multi-MSB-Prediction-and-Huffman-CodingView on GitHub
This code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding".
☆29Dec 11, 2020Updated 5 years ago
Alternatives and similar repositories for Reversible-Data-Hiding-in-Encrypted-Images-Based-on-multi-MSB-Prediction-and-Huffman-Coding
Users that are interested in Reversible-Data-Hiding-in-Encrypted-Images-Based-on-multi-MSB-Prediction-and-Huffman-Coding are comparing it to the libraries listed below
Sorting:
- This code is the implementation of the paper "Reversible Data Hiding in JPEG Images with Multi Objective Optimization".☆13Dec 11, 2020Updated 5 years ago
- Separable Reversible Data Hiding in Encrypted JPEG Bitstream☆12Aug 28, 2021Updated 4 years ago
- A simple Matlab implementation of the algorithm presented in the paper: "Reversible-data-hiding-in-Encrypted-image"☆23Sep 6, 2019Updated 6 years ago
- 新闻人物言论自动提取---->得到说话的人和说话的内容☆11Jan 17, 2020Updated 6 years ago
- A Matlab project of Histogram Transfer Based Reversible Data Hiding with Image Enhancement☆15Aug 29, 2020Updated 5 years ago
- Reversible Data Hiding in Color Image With Grayscale Invariance☆37Jul 6, 2023Updated 2 years ago
- Image encryption using chaotic maps (Arnold map) ,Mandelbrot set and DNA encryption☆16Feb 14, 2023Updated 3 years ago
- An image encryption algorithm based on 6-dimensional hyper chaotic system and DNA encoding.☆50Oct 13, 2023Updated 2 years ago
- The source code of "A Novel Image Tamper Detection and Self-recovery Algorithm Based on Watermarking and Chaotic System"☆11Apr 22, 2021Updated 4 years ago
- Training pretrained deep neural network, Xception Net, with Face Forensics ++ Dataset, and implement two different losses to learn image …☆10Apr 29, 2020Updated 5 years ago
- ☆12Sep 30, 2022Updated 3 years ago
- Cryptanalysis of an image scrambling encryption algorithm (ISEA).☆10Sep 19, 2017Updated 8 years ago
- Official code of the paper "A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning".☆15Sep 11, 2024Updated last year
- Reversible Data Hiding in Encrypted Three-Dimensional Mesh Models☆12Aug 17, 2021Updated 4 years ago
- 基于C语言实现一个简易的Web服务器,支持Http和Https(基于OpenSSL的TLS协议)☆13Sep 20, 2021Updated 4 years ago
- Several state-of-the-arts RDH schemes for JPEG images implemented by me.☆10Jun 2, 2020Updated 5 years ago
- Scholarship ကျောင်းသားများတွက် သင်ကြားသော code များကို တင်ပေးထားခြင်း ဖြစ်သည်။☆12Oct 24, 2022Updated 3 years ago
- Proof-of-concept implementation of the Obelix software hardening framework, based on LLVM.☆12May 22, 2024Updated last year
- ☆11Oct 28, 2023Updated 2 years ago
- All programs and code when I studied Computer Science on UNSA☆10Jan 19, 2023Updated 3 years ago
- Code and data for PAN and PAN-phys.☆13Mar 20, 2023Updated 2 years ago
- Software Artifacts for the paper "TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX"☆19Oct 14, 2024Updated last year
- The project covers common metrics for super-resolution performance evaluation.☆12Dec 27, 2021Updated 4 years ago
- ☆14Jun 11, 2020Updated 5 years ago
- ☆13Oct 8, 2021Updated 4 years ago
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Oct 26, 2022Updated 3 years ago
- This research proposes a new image encryption scheme based on Lorenz hyperchaotic system and Rivest-Shamir-Adleman (RSA) algorithm. First…☆16Nov 13, 2021Updated 4 years ago
- Python Flask Web application with mysql database☆10Apr 24, 2020Updated 5 years ago
- 浙江大学区块链大作业-去中心化NFT拍卖平台(前端完善版)☆10Dec 27, 2021Updated 4 years ago
- An Image Encryption Scheme Based on Chaotic Logarithmic Map and Key Generation using Deep CNN☆18Dec 29, 2020Updated 5 years ago
- 众筹案例DApp☆15Jan 24, 2023Updated 3 years ago
- JEI 2017: Cross-utilizing hyperchaotic and DNA sequences for image encryption☆17Jan 15, 2017Updated 9 years ago
- The Calorie Estimation Project can be mainly divided into two parts, identifying food from image, and estimating calorie from certain foo…☆11Jan 6, 2017Updated 9 years ago
- Watermarking on images using Discrete Cosine Transform and Haar Transform☆11Nov 22, 2022Updated 3 years ago
- image Encryption☆12Apr 25, 2017Updated 8 years ago
- 18级武汉大学国家网络安全学院暑期实训备份☆11Jul 18, 2019Updated 6 years ago
- Single image encryption (and decryption) using logistic map equation and linear feedback shift.☆12Jul 3, 2019Updated 6 years ago
- Implementation of Prompt-to-Prompt Image Editing with Cross Attention Control☆16Apr 5, 2023Updated 2 years ago
- 分别使用rnn/cnn/rcnn来实现根据患者描述,进行疾病诊断☆50May 8, 2018Updated 7 years ago