搜索结果
找到约 19 项符合
hiding 的查询结果
按分类筛选
加密解密 This method is based upon the image hiding technic into another image using LSB algorithm called as
This method is based upon the image hiding technic into another image using LSB algorithm called as Steganography.
加密解密 根据W. Bender的《Techniques for data hiding》编写 %用补丁方法对图象做空间域的水印嵌入和提取
根据W. Bender的《Techniques for data hiding》编写
%用补丁方法对图象做空间域的水印嵌入和提取,
%效率极高,程序简洁,属信息隐藏中常用的方法之一。
%作者:辽宁大学 信息学院 范铁生
%email:fts0@163.com
加密解密 根据W. Bender的《Techniques for data hiding》编写 %用补丁方法对图象做DCT域的水印嵌入和提取
根据W. Bender的《Techniques for data hiding》编写
%用补丁方法对图象做DCT域的水印嵌入和提取,
%效率极高,程序简洁,属信息隐藏中常用的方法之一。
%作者:辽宁大学 信息学院 范铁生
%email:fts0@163.com
其他 Basic hack v2.1 by xgx - http://www.ring0.donster.de/ Features: - Smooth Vector Aimbot - Fu
Basic hack v2.1 by xgx - http://www.ring0.donster.de/
Features:
- Smooth Vector Aimbot
- Full ESP ( Namen,Weapon,Distance,Visible,Far)
- polymorph,peb hiding to prevent VAC detection
驱动编程 very comprehensive example, windows WDM driver development ex The use of drive technology can s
very comprehensive example,
windows WDM driver development ex
The use of drive technology can s
Say all ?� � e full speed equipm
STM32 DAC DMA TIXINGBO
Implement hiding process, make pr
dma ddk driver
电子书籍 very comprehensive example, windows WDM driver development ex The use of drive technology can s
very comprehensive example,
windows WDM driver development ex
The use of drive technology can s
Say all � � e full speed equipm
STM32 DAC DMA TIXINGBO
Implement hiding process, make pr
dma ddk driver
源码 outguess
信息隐藏软件Outguess的源码 Outguess主要用于JPEg图象的steganography,本软件来自Outguess的作者Provos,欢迎大家下载研究-Information Hiding Outguess source software is mainly used Outguess JPEG image steganography, this software from Outguess author of Provos, welcomed everyone to download research ...
Java编程 Thinking in Java, 3rd ed. Revision 4.0 Preface Introduction 1: Introduction to Objects 2
Thinking in Java, 3rd ed. Revision 4.0
Preface
Introduction
1: Introduction to Objects
2: Everything is an Object
3: Controlling Program Flow
4: Initialization & Cleanup
5: Hiding the Implementation
6: Reusing Classes
7: Polymorphism
8: Interfaces & Inner Classes
9: Error Handling with Ex ...