基于位平面压缩和直方图平移法的图像可逆信息隐藏算法
☆16Jul 11, 2019Updated 6 years ago
Alternatives and similar repositories for Reversible-data-hiding-in-encrypted-image
Users that are interested in Reversible-data-hiding-in-encrypted-image are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆16Dec 11, 2020Updated 5 years ago
- ☆17Jun 14, 2017Updated 8 years ago
- Data for SDI detection (SUPP.AI)☆10Sep 13, 2021Updated 4 years ago
- Visual cryptography algorithms for grayscale images, to accompany the book "Improving Image Quality in Visual Cryptography"☆13May 22, 2019Updated 6 years ago
- The source code of "A Novel Image Tamper Detection and Self-recovery Algorithm Based on Watermarking and Chaotic System"☆11Apr 22, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- This is a course proect,using DWT,DCT,LSB & Arnold scrambling to hiding watermark within a RGB picture.☆11Jun 6, 2017Updated 8 years ago
- ☆17Aug 31, 2022Updated 3 years ago
- PRA-TPE: Perfectly recoverable approximate thumbnail-preserving image encryption☆11Mar 24, 2022Updated 4 years ago
- Image Steganography using K-Means clustering and DES encryption☆11Dec 7, 2020Updated 5 years ago
- Implementation of Reversible Data Hiding technique☆12Oct 28, 2016Updated 9 years ago
- The implementation of "Component Aware Image Steganography via Adversarial Global-and-Part Checking"☆13Oct 12, 2023Updated 2 years ago
- 为bubbliiiing的yolo系列代码进行onnx部署(C++),目前已完美适配yolov4>>yolov5>>yolov5-6.1>>yolov7☆12Nov 16, 2022Updated 3 years ago
- A Blockchain Implementation in MATLAB.☆12May 1, 2023Updated 2 years ago
- Separable Reversible Data Hiding in Encrypted JPEG Bitstream☆12Aug 28, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- DES, String Cipher, Steganography with LSB☆20Mar 27, 2019Updated 7 years ago
- computer vision practise☆22Mar 24, 2022Updated 4 years ago
- 《信息隐藏技术》第三次大作业——基于图像块分组的加密域可逆信息隐藏(研读文献)☆28Mar 29, 2018Updated 7 years ago
- ☆13Sep 2, 2024Updated last year
- 深度学习 隐写术;使用神经网络以图藏图(NIPS2017),torch版本 paper:Hiding Images in Plain Sight:Deep Steganography https://papers.nips.cc/paper/2017/hash/838e8…☆23Dec 4, 2020Updated 5 years ago
- ☆20Dec 29, 2023Updated 2 years ago
- Image encryption using chaotic maps (Arnold map) ,Mandelbrot set and DNA encryption☆16Feb 14, 2023Updated 3 years ago
- Format preserving string substitution encryption☆29Feb 25, 2025Updated last year
- 采用单目相机对目标进行定位测量距离,可采用同理获取物体尺寸。☆19Jul 14, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Fast and none blocking live video streaming over network with OpenCV and and (ZMQ or TCP).☆25Dec 1, 2025Updated 3 months ago
- 21届苏州大学计算机学院考研初复试笔记☆23Jun 7, 2021Updated 4 years ago
- This code is the implementation of the paper "An Improved Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labelin…☆18Dec 11, 2020Updated 5 years ago
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆32Aug 15, 2024Updated last year
- ☆31Mar 11, 2021Updated 5 years ago
- Discrete wavelet transform based image watermarking approach along with chaotic map based encryption of watermarks☆25Oct 1, 2021Updated 4 years ago
- A simple Matlab implementation of the algorithm presented in the paper: "Reversible-data-hiding-in-Encrypted-image"☆23Sep 6, 2019Updated 6 years ago
- This code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆29Dec 11, 2020Updated 5 years ago
- 云课堂《X86/X64软件逆向分析入门》示例代码☆47May 16, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- An Image is divided into N different shares using KN Secret Sharing Algorithm. These N shares can be distributed but, the end user needs…☆33Jul 2, 2017Updated 8 years ago
- Client/Server framework for encrypted machine learning using homomorphic encryption☆43Oct 1, 2021Updated 4 years ago
- Implementation of several Steganography and steganalysis techniques.☆50Nov 20, 2025Updated 4 months ago
- ☆52Feb 24, 2024Updated 2 years ago
- 一个定制自己渗透测试的python框架☆14Jun 10, 2021Updated 4 years ago
- php webshell bypass D盾、safedog、360、火绒等,仅支持php7☆18Aug 25, 2025Updated 7 months ago
- a Android demo of depth_anything_v1 and depth_anything_v2☆69Jun 18, 2024Updated last year