使用DWT进行加密和图像隐写术
2021-05-09 09:50:41 5.56MB aes matlab steganography dwt
1
StegaStamp:物理照片中的不可见超链接 CVPR 2020 ( ,( ,加利福尼亚大学 介绍 该存储库是在找到的ArXiv报告的代码版本。 该项目探索在图像中隐藏数据的同时保持感知相似性。 我们的贡献是能够在打印编码图像(StegaStamp)并用相机拍摄后提取数据(这些步骤会导致图像损坏)。 该存储库包含代码和经过预训练的模型,用于复制本文中显示的结果。 此外,存储库还包含训练编码器和解码器模型所需的代码。 引文 如果您认为我们的工作有用,请考虑引用: @inproceedings{2019stegastamp, title={StegaStamp: I
2021-04-12 05:55:53 211KB tensorflow qrcode barcode steganography
1
F5-steganography-master.zip
2021-02-20 15:00:14 294KB ctf
1
图像隐写算法
2021-02-14 09:02:19 3.62MB Matlab
编者 Ingemar J. Cox Matthew L. Miller Jeffrey A. Bloom Jessica Fridrich Ton Kalker 目录 Contents Preface to the First Edition xv Preface to the Second Edition xix Example Watermarking Systems xxi CHAPTER 1 Introduction 1 1.1 Information Hiding, Steganography, and Watermarking 4 1.2 History of Watermarking 6 1.3 History of Steganography 9 1.4 Importance of Digital Watermarking 11 1.5 Importance of Steganography 12 CHAPTER 2 Applications and Properties 15 2.1 Applications of Watermarking 16 2.1.1 Broadcast Monitoring 16 2.1.2 Owner Identification 19 2.1.3 Proof of Ownership 21 2.1.4 Transaction Tracking 23 2.1.5 Content Authentication 25 2.1.6 Copy Control . 27 2.1.7 Device Control 31 2.1.8 Legacy Enhancement 32 2.2 Applications of Steganography 34 2.2.1 Steganography for Dissidents 34 2.2.2 Steganography for Criminals 35 2.3 Properties of Watermarking Systems 36 2.3.1 Embedding Effectiveness 37 2.3.2 Fidelity 37 2.3.3 Data Payload 38 2.3.4 Blind or Informed Detection 39 2.3.5 False Positive Rate 39 2.3.6 Robustness 40 2.3.7 Security 41 2.3.8 Cipher and Watermark Keys 43 2.3.9 Modification and Multiple Watermarks 45 2.3.10 Cost 46 2.4 Evaluating Watermarking Systems 46 2.4.1 The Notion of “Best” 47 2.4.2 Benchmarking 47 2.4.3 Scope of Testing 48 2.5 Properties of Steganographic and Steganalysis Systems 49 2.5.1 Embedding Effectiveness 49 2.5.2 Fidelity 50 2.5.3 Steganographic Capacity, Embedding Capacity, Embedding Efficiency, and Data Payload 50 2.5.4 Blind or Informed Extraction 51 2.5.5 Blind or Targeted Steganalysis 51 2.5.6 Statistical Undetectability 52 2.5.7 False Alarm Rate 53 2.5.8 Robustness 53 2.5.9 Security 54 2.5.10 Stego Key 54 2.6 Evaluating and Testing Steganographic Systems 55 2.7 Summary 56 CHAPTER 3 Models of Watermarking 61 3.1 Notation 62 3.2 Communications 63 3.2.1 Components of Communications Systems 63 3.2.2 Classes of Transmission Channels 64 3.2.3 Secure Transmission 65 3.3 Communication-Base
2020-01-03 11:43:09 10.01MB 图像处理 数字水印
1
Digital Watermarking and Steganography英文版PDF文字版第二版 Digital Watermarking and Steganography, Second Edition Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Jessica Fridrich, and Ton Kalker
2019-12-21 19:52:09 6.63MB 数字水印 隐写术 图像处理
1