完美者(wmzhe.com)网站以软件下载为基础,改版后的网站对功能性板块进行扩充,以期能够解决用户在软件使用过程中遇见的所有问题。网站新增了“软件百科”、“锦囊妙技”等频道,可以更好地对用户的软件使用全周期进行更加专业地服务。
一款可以将文字信息或附件隐藏在 png 图片文档的软件。我们可以把 SteganoImage 看做一款轻量级的加密软件,当你有一些不得不放在显眼位置的信息,比如微博,而只想让某位看到你的留言,只需约定一下密码就好了。当拿到处理过的图片,用 SteganoImage解密就可以看到原信息。提醒一下,不要隐藏过多的文件,一张图片有不相符的大小,还是会让人怀疑的。"锦囊妙技"栏目是聚合全网软件使用的技巧或者软件使用过程中各种问题的解答类文章,栏目设立伊始,小编欢迎各路软件大神朋友们踊跃投稿,在完美者平台分享大家的独门技巧。
本站文章素材来源于网络,大部分文章作者名称佚失,为了更利于用户阅读和使用,根据需要进行了重新排版和部分改编,本站收录文章只是以帮助用户解决实际问题为目的,如有版权问题请联系小编修改或删除,谢谢合作。
软件大小:5.11 MB
其实你要的工具 有很多...或许只是你没注意到而已提供三种 自己搜了下载吧种子啦图种生成器 (种子隐藏工具) v1.0内涵图制作工具V2.0图片隐藏种子(SteganoImage) 1.0 Beta支持将指定的文件隐藏在PNG图片中祝你成功
Tesseract是图盲,默认情况下只能看得懂未压缩的TIFF图像,如果直接用tesseract处理其它格式的图片,会报错如下: Tesseract Open Source OCR Engine name_to_image_type:Error:Unrecognized image type:code.jpg IMAGE::read_header:Error:Can’t read this image type:code.jpg tesseract:Error:Read of file failed:code.jpg 所以我们需要用ImageMagick来转换图片格式,ImageMagick (TM) 是一个免费的创建、编辑、合成图片的软件。它可以读取、转换、写入多种格式的图片。图片切割、颜色替换、各种效果的应用,图片的旋转、组合,文本,直线,多边形,椭圆,曲线,附加到图片伸展旋转。ImageMagick是免费软件:全部源码开放,可以自由使用,复制,修改,发布。它遵守GPL许可协议。它可以运行于大多数的操作系统。ImageMagick的大多数功能的使用都来源于命令行工具。通常来说,它可以支持以下程序语言: Perl, C, C++, Python, PHP, Ruby, Java;现成的ImageMagick接口(PerlMagick, Magick++, PythonMagick, MagickWand for PHP, RubyMagick, and JMagick)是可利用的。这使得自动的动态的修改创建图片变为可能。ImageMagick支持至少90种图片格式: A, ART, AVI, AVS, B, BIE, BMP, BMP2, BMP3, C, CACHE, CAPTION, CIN, CIP, CLIP, CLIPBOARD, CMYK, CMYKA, CUR, CUT, DCM, DCX, DNG, DOT, DPS, DPX, EMF, EPDF, EPI, EPS, EPS2, EPS3, EPSF, EPSI, EPT, EPT2, EPT3, FAX, FITS, FPX, FRACTAL, G, G3, GIF, GIF87, GRADIENT, GRAY, HDF, HISTOGRAM, HTM, HTML, ICB, ICO, ICON, JBG, JBIG, JNG, JP2, JPC, JPEG, JPG, JPX, K, LABEL, M, M2V, MAP, MAT, MATTE, MIFF, MNG, MONO, MPC, MPEG, MPG, MSL, MTV, MVG, NULL, O, OTB, P7, PAL, PALM, PATTERN, PBM, PCD, PCDS, PCL, PCT, PCX, PDB, PDF, PFA, PFB, PGM, PGX, PICON, PICT, PIX, PJPEG, PLASMA, PNG, PNG24, PNG32, PNG8, PNM, PPM, PREVIEW, PS, PS2, PS3, PSD, PTIF, PWP, R, RAS, RGB, RGBA, RGBO, RLA, RLE, SCR, SCT, SFW, SGI, SHTML, STEGANO, SUN, SVG, SVGZ, TEXT, TGA, TIF, TIFF, TILE, TIM, TTC, TTF, TXT, UIL, UYVY, VDA, VICAR, VID, VIFF, VST, WBMP, WMF, WMFWIN32, WMZ, WPG, X, XBM, XC, XCF, XPM, XV, XWD, Y, YCbCr, YCbCrA, YUV, ImageMagick .NET的相关项目: Use MagickNet to convert, compose, and edit images from Windows .NET. ImageMagickApp is a .NET application written in C# that utilizes the ImageMagick command line to allow conversion of multiple image formats to different formats. 假设需要识别的图片验证码为code.jpg,我们需要做的只有两步: d:\ImageMagick\convert.exe -compress none -depth 8 -alpha off ./code.gif ./code.tif D:\\tesseract\\tesseract.exe ./code.tif ./result 结果就在文本文件./result.txt里面了,tesseract会自动地在./result后面添加上后缀名.txt。然后再对两个命令做点解释。 convert.exe:ImageMagick套件的一部分,负责图片格式转换,各个参数的意义如下: -compress none:转换后的图片不要压缩,如果没有加这一项,后续tesseract处理的时候会报错:read_tif_image:Error:Illegal image format:Compression -depth 8:设置转换后图像的色深为8位,也就是bpp为8。如果没有此参数,后果如下: Tesseract Open Source OCR Engine check_legal_image_size:Error:Only 1,2,4,5,6,8 bpp are supported:16 Segmentation fault -alpha off:在转换后的图像中不要添加alpha图层。如果没有此参数,后果同上。 紧跟着就是待转换的图片的文件名,最后是转换后的图片的文件名。
Steganographic methods Encyclopedia from: - articles directories 1 2 source 1. Outlines directory Steganographic methods are hidden information about the plan, don't let anyone know outside the recipient of information transmission events (not just information content) a skill and science. Steganographic methods ", "English Steganography from John terry's meters, the book is about dark magic, looks are actually speak cryptography and a book of steganographic methods Steganographia. The book title comes from the Greek and means "secret to write". Generally speaking, the implicit writing information looks like some other things, such as a shopping list, an essay, a drawing or other "camouflage" (care). Hidden information prior written by some traditional usually encryption methods, and then use a method of modifying a "text" (covertext) disguise, make its contain encrypted messages, form of so-called "hidden text" (stegotext). For example, text size, spacing, font, or hide the other characteristics of text can be modified to include hidden information. Only the recipient (he knew he plans to use the hidden information technology) to restore to decrypt it then. 2 source directory Francis Bacon proposed a hidden message. One example from modern practice Hide the size of the hidden text relative text content, according to index (bits), the latter is more easy to hide. For this reason, the digital image (contain large amounts of data on the Internet and other media) is widely used in hidden message. This method USES extensive degree is unknown. Example: a 24 bits of each pixel in the bitmap three color component (red, green and blue) the use of 8 bits to say. If we are just considering the blue, there is 28 different values of different shades of blue said. But as 11111111 and 11111110 two values of blue eye, says almost impossible to distinguish. Therefore, the lowest effectie bits can be (in some extent undetectable) used to store the colour information of some outside. If we were to red and green are the same work, we can in less than three (nearly pixel stored in a byte of information. Something a bit more formal, make written to detect the hidden information, also is the guarantee of the payload (need to be concealed signal) to "carrier" (i.e., the original signal) to the influence of the carrier modulation (ideal condition looks even in statistical) can be ignored. That is to say, this kind of change and the noise of the carrier should be distinguished. From the point of view (information, this means that the capacity of the channel must be greater than transmission "surface" signal demand. This is called channel redundancy. For a digital image, the redundancy is probably the noise in image unit; the digital audio recording or may be generated noise amplification equipment. Any of the system is simulated amplification level will have the so-called thermal noise (or "1 / f" noise), which can be used as a disguise. In addition, such as JPEG lossy compression technology (in) after decompression of data into some errors, use these errors as steganographic methods may also use). Steganographic methods can also be used as a digital watermarking, here is a message (often just an identifier) to an image is hidden in the source can be tracking or calibration. In Japan, "... actually BBS and content identifier Japanese digital content association has started testing a digital watermarking system to prevent piracy "(Japanese times online, on August 26, 2001)."