Search preferences
Passer aux résultats principaux de la recherche

Filtres de recherche

Type d'article

  • Tous les types de produits 
  • Livres (3)
  • Magazines & Périodiques (Aucun autre résultat ne correspond à ces critères)
  • Bandes dessinées (Aucun autre résultat ne correspond à ces critères)
  • Partitions de musique (Aucun autre résultat ne correspond à ces critères)
  • Art, Affiches et Gravures (Aucun autre résultat ne correspond à ces critères)
  • Photographies (Aucun autre résultat ne correspond à ces critères)
  • Cartes (Aucun autre résultat ne correspond à ces critères)
  • Manuscrits & Papiers anciens (Aucun autre résultat ne correspond à ces critères)

Etat En savoir plus

  • Neuf (3)
  • Comme neuf, Très bon ou Bon (Aucun autre résultat ne correspond à ces critères)
  • Assez bon ou satisfaisant (Aucun autre résultat ne correspond à ces critères)
  • Moyen ou mauvais (Aucun autre résultat ne correspond à ces critères)
  • Conformément à la description (Aucun autre résultat ne correspond à ces critères)

Reliure

Particularités

  • Ed. originale (Aucun autre résultat ne correspond à ces critères)
  • Signé (Aucun autre résultat ne correspond à ces critères)
  • Jaquette (Aucun autre résultat ne correspond à ces critères)
  • Avec images (3)
  • Sans impressions à la demande (1)

Langue (1)

Prix

  • Tous les prix 
  • Moins de EUR 20 
  • EUR 20 à EUR 45 (Aucun autre résultat ne correspond à ces critères)
  • Plus de EUR 45 (Aucun autre résultat ne correspond à ces critères)
Fourchette de prix personnalisée (EUR)

Livraison gratuite

  • Livraison gratuite à destination de Etats-Unis (Aucun autre résultat ne correspond à ces critères)

Pays

  • Wassim Al Chamaa

    Langue: anglais

    Edité par GRIN Verlag, 2019

    ISBN 10 : 3668933448 ISBN 13 : 9783668933446

    Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne

    Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

    Contacter le vendeur

    EUR 15,95

    EUR 60,28 shipping
    Expédition depuis Allemagne vers Etats-Unis

    Quantité disponible : 1 disponible(s)

    Ajouter au panier

    Taschenbuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - Project Report from the year 2018 in the subject Computer Science - Programming, , language: English, abstract: The F5 algorithm proposed by Westfeld is still one of the most known algorithms in the field of DCT-based steganography. It can make a JPEG image a container of a secret message, where no one knows the presence of the message except the sender and the intended receiver. In this programming work, we show how to realize the F5 algorithm via Matlab. We present the block diagrams of embedding and extracting processes and the entire Matlab code of the F5 algorithm.Some Notes about the F5 Matlab code:1- The implementation code works according to the method proposed by Andreas Westfield in his paper:' F5-A Steganographic Algorithm : High Capacity Despite Better Steganalysis '.Huffman coding and decoding are implemented using the Matlab JPEG Toolbox developed by Phil Sallee.2- The two-part Matlab code included in the report, embedding and extracting parts, can be executed in Matlab IDE. The embedding part reads the cover JPEG file and the message file we want to hide, then it creates a Stego JPEG file according to the F5 algorithm. On the other side, The extracting part reads the Stego JPEG file, and then it extracts the hidden message file.3- The F5 code calls the main two functions of Phil Sallee's Matlab Toolbox; JPEG reading and writing. These functions make it easier to access and manipulate the quantized DCT coefficients of a given JPEG file. Using Sallee's Toolbox should accord with the used operating system, whether it is 32 or 64 bits.4- The F5 code contains the function to form the image matrix to show the input and output images. Running this function requires ALL the Sallee's Toolbox to be installed. Otherwise, the user can REMOVE this function from the code since it doesn't affect the main F5 process and thus keep ONLY using the main two function of the Sallee's Toolbox.5- The message file we want to hide can be any file of any kind and whatever its extension. The size of the message file should be appropriate for the size of the used cover JPEG image, so no errors will occur when executed.

  • Wassim Al Chamaa

    Langue: anglais

    Edité par GRIN Verlag Jun 2019, 2019

    ISBN 10 : 3668933448 ISBN 13 : 9783668933446

    Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne

    Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

    Contacter le vendeur

    impression à la demande

    EUR 15,95

    EUR 23 shipping
    Expédition depuis Allemagne vers Etats-Unis

    Quantité disponible : 2 disponible(s)

    Ajouter au panier

    Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Project Report from the year 2018 in the subject Computer Science - Programming, , language: English, abstract: The F5 algorithm proposed by Westfeld is still one of the most known algorithms in the field of DCT-based steganography. It can make a JPEG image a container of a secret message, where no one knows the presence of the message except the sender and the intended receiver. In this programming work, we show how to realize the F5 algorithm via Matlab. We present the block diagrams of embedding and extracting processes and the entire Matlab code of the F5 algorithm.Some Notes about the F5 Matlab code:1- The implementation code works according to the method proposed by Andreas Westfield in his paper:' F5-A Steganographic Algorithm : High Capacity Despite Better Steganalysis '.Huffman coding and decoding are implemented using the Matlab JPEG Toolbox developed by Phil Sallee.2- The two-part Matlab code included in the report, embedding and extracting parts, can be executed in Matlab IDE. The embedding part reads the cover JPEG file and the message file we want to hide, then it creates a Stego JPEG file according to the F5 algorithm. On the other side, The extracting part reads the Stego JPEG file, and then it extracts the hidden message file.3- The F5 code calls the main two functions of Phil Sallee's Matlab Toolbox; JPEG reading and writing. These functions make it easier to access and manipulate the quantized DCT coefficients of a given JPEG file. Using Sallee's Toolbox should accord with the used operating system, whether it is 32 or 64 bits.4- The F5 code contains the function to form the image matrix to show the input and output images. Running this function requires ALL the Sallee's Toolbox to be installed. Otherwise, the user can REMOVE this function from the code since it doesn't affect the main F5 process and thus keep ONLY using the main two function of the Sallee's Toolbox.5- The message file we want to hide can be any file of any kind and whatever its extension. The size of the message file should be appropriate for the size of the used cover JPEG image, so no errors will occur when executed. 28 pp. Englisch.

  • Wassim Al Chamaa

    Langue: anglais

    Edité par GRIN Verlag, GRIN Verlag Jun 2019, 2019

    ISBN 10 : 3668933448 ISBN 13 : 9783668933446

    Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne

    Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

    Contacter le vendeur

    impression à la demande

    EUR 15,95

    EUR 60 shipping
    Expédition depuis Allemagne vers Etats-Unis

    Quantité disponible : 1 disponible(s)

    Ajouter au panier

    Taschenbuch. Etat : Neu. This item is printed on demand - Print on Demand Titel. Neuware -Project Report from the year 2018 in the subject Computer Science - Programming, , language: English, abstract: The F5 algorithm proposed by Westfeld is still one of the most known algorithms in the field of DCT-based steganography. It can make a JPEG image a container of a secret message, where no one knows the presence of the message except the sender and the intended receiver. In this programming work, we show how to realize the F5 algorithm via Matlab. We present the block diagrams of embedding and extracting processes and the entire Matlab code of the F5 algorithm.Some Notes about the F5 Matlab code:1- The implementation code works according to the method proposed by Andreas Westfield in his paper:' F5¿A Steganographic Algorithm : High Capacity Despite Better Steganalysis '.Huffman coding and decoding are implemented using the Matlab JPEG Toolbox developed by Phil Sallee.2- The two-part Matlab code included in the report, embedding and extracting parts, can be executed in Matlab IDE. The embedding part reads the cover JPEG file and the message file we want to hide, then it creates a Stego JPEG file according to the F5 algorithm. On the other side, The extracting part reads the Stego JPEG file, and then it extracts the hidden message file.3- The F5 code calls the main two functions of Phil Sallee's Matlab Toolbox; JPEG reading and writing. These functions make it easier to access and manipulate the quantized DCT coefficients of a given JPEG file. Using Sallee's Toolbox should accord with the used operating system, whether it is 32 or 64 bits.4- The F5 code contains the function to form the image matrix to show the input and output images. Running this function requires ALL the Sallee's Toolbox to be installed. Otherwise, the user can REMOVE this function from the code since it doesn't affect the main F5 process and thus keep ONLY using the main two function of the Sallee's Toolbox.5- The message file we want to hide can be any file of any kind and whatever its extension. The size of the message file should be appropriate for the size of the used cover JPEG image, so no errors will occur when executed.Books on Demand GmbH, Überseering 33, 22297 Hamburg 28 pp. Englisch.