下载  >  安全技术  >  网络安全  > Reversible Data Hiding in Encrypted Domain Based on Stream Cipher

Reversible Data Hiding in Encrypted Domain Based on Stream Cipher 评分

基于流密码加密的密文域可逆信息隐藏代码,属于张新鹏老师一篇论文中算法的实现,利用流密码加密加密图像,然后进行信息嵌入与提取,可完全恢复原始图像

...展开详情
所需积分/C币:6 上传时间:2020-02-15 资源大小:7KB
举报 举报 收藏 收藏
分享 分享
Reversible Data Embedding Using a Difference Expansion算法实现

Reversible Data Embedding Using a Difference Expansion算法matlab实现

立即下载
reversible-data-embedding-using-a-difference-expansion

基于田军的在小波变换方法的论文 是对这种数据隐藏技术的详细的说明

立即下载
An algorithm for synthesis of reversible logic circuits

IEEE收录,write by Pallav Gupta,Abhinav Agrawal, and Niraj K. Jha, Fellow,可逆逻辑方面的权威论文之一

立即下载
Simulation of a reversible SOFC with Aspen Plus

SOFC的Aspen Plus分析 SOFC的相关文献 对研究很有帮助

立即下载
A 16-bit Carry Skip Adder Designed by Reversible Logic

A 16-bit Carry Skip Adder Designed by Reversible Logic

立即下载
An Arithmetic Logic Unit Design Based on Reversible Logic Gates

论文名称:基于可逆逻辑的算术逻辑单元,利用可逆门重新构造74138

立即下载
ANSI X9.31-1998 Digital Signatures Using Reversible Public Key

American National Standard for Financial Services X9.31 -1998 Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry (rDSA)

立即下载
data hiding

可逆信息隐藏算法,介绍一种可能的脆弱水印隐藏技术

立即下载
reversible data hiding in jpeg.zip

reversible data hiding in jpeg压缩图像的应用,欢迎使用代码

立即下载
Visual Knowledge Discovery and Machine Learning

Emergence of Data Science placed knowledge discovery, machine learning, and data mining in multidimensional data, into the forefront of a wide range of current research, and application activities in computer science, and many domains far beyond it. Discovering patterns, in multidimensional data, us

立即下载
Visual Knowledge Discovery and Machine Learning-Springer(2018).pdf

Emergence of Data Science placed knowledge discovery, machine learning, and data mining in multidimensional data, into the forefront of a wide range of current research, and application activities in computer science, and many domains far beyond it. Discovering patterns, in multidimensional data, us

立即下载
Visual Knowledge Discovery and Machine Learnin

This book combines the advantages of high-dimensional data visualization and machine learning in the context of identifying complex n-D data patterns. It vastly expands the class of reversible lossless 2-D and 3-D visualization methods, which preserve the n-D information. This class of visual repres

立即下载
PI7C9X1110

桥芯片DATASHEET,145页。 PCI EXPRESS TO PCI REVERSIBLE BRIDGE REVISION 2.4

立即下载
A Novel High Reliability Dual-Boost Half-Bridge

A novel dual-boost half-bridge (DBHB) reversible Pulse Width Modulation (PWM) rectifier is proposed in this paper. Compared with the conventional full-bridge or half-bridge reversible PWM rectifier, the proposed DBHB rectifier exhibits two distinct advantages: (a) No power switches are connected in

立即下载
MD5 HASHING FOR VFP

MD5 for VFP is derived from the RSA Data Security, Inc. MD5<br> Message-Digest Algorithm. MD5 is a hashing function that accepts a<br> string of arbitrary length and generates a 16-byte encrypted<br> "message digest" that is (a) unique and (b) not reversible. It is<br> much more reliable t

立即下载
An Application of Non-Uniform Cellular Automata for Efficient Cryptography

One of the core issues for robust cryptographic systems is to deal with the rate of diffusion and distribution of keys. We try to strengthen this aspect by increasing the length of block ciphers. We present a new encryption and decryption algorithm for block cipher that supports 27 bit block size. A

立即下载
基于直方图平移的可逆水印算法

A Reversible Watermarking Based on Histogram Shifting可逆水印算法方面的经典文献,利用直方图平移成像质量高的特点,结合位图技术给出了一个无需附加信息的高质量可逆算法。

立即下载
Engineering plasticity

When a solid metal is subjected to a load of small magnitude, it deforms elastically such that the strain is directly proportional to the stress and when relieved of the stress, it eventually returns to its original dimension. Elastic deformation is therefore a reversible and linear deformation.

立即下载
Computing and Combinatorics

目录 Invited Talks.- Understanding and Inductive Inference.- Computing with Cells: Membrane Systems.- Complexity and Inapproximability.- Boxicity and Poset Dimension.- On the Hardness against Constant-Depth Linear-Size Circuits.- A K-Provers Parallel Repetition Theorem for a Version of No-Signaling Mo

立即下载
Springer.Markov.Random.Field.Modeling.In.Image.Analysis.3rd.Edition.Mar.2009.eBook-ELOHiM

Markov random field (MRF) theory provides a basis for modeling contextual constraints in visual processing and interpretation. It enables us to develop optimal vision algorithms systematically when used with optimization principles. This book presents a comprehensive study on the use of MRFs for sol

立即下载