搜索结果
找到约 19 项符合
Hiding 的查询结果
按分类筛选
加密解密 根据W. Bender的《Techniques for data hiding》编写 %用补丁方法对图象做空间域的水印嵌入和提取
根据W. Bender的《Techniques for data hiding》编写
%用补丁方法对图象做空间域的水印嵌入和提取,
%效率极高,程序简洁,属信息隐藏中常用的方法之一。
%作者:辽宁大学 信息学院 范铁生
%email:fts0@163.com
加密解密 根据W. Bender的《Techniques for data hiding》编写 %用补丁方法对图象做DCT域的水印嵌入和提取
根据W. Bender的《Techniques for data hiding》编写
%用补丁方法对图象做DCT域的水印嵌入和提取,
%效率极高,程序简洁,属信息隐藏中常用的方法之一。
%作者:辽宁大学 信息学院 范铁生
%email:fts0@163.com
其他 Analysis of blind data hiding using discrete cosine transform phase modulation。
Analysis of blind data hiding using discrete cosine transform phase modulation。
驱动编程 The main idea of this work is to create a driver for hiding selected processes and files.
The main idea of this work is to create a driver for hiding selected processes and files.
文章/文档 It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electrom
It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic
illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally
demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai et al., Nat. Photon ...
CA认证 Hiding Text in a Image
Hiding Text in a Image
其他书籍 very useful ebook for data hiding
very useful ebook for data hiding
其他书籍 very useful ebook for data hiding
very useful ebook for data hiding
其他书籍 very useful ebook for data hiding
very useful ebook for data hiding
驱动编程 Hiding process with DKOM !采用断开系统中进程的双向链表方式
Hiding process with DKOM !采用断开系统中进程的双向链表方式,隐藏指定进程。本程序采用了硬编码,所以只能隐藏XP的进程,如果是其他系统需要修改编码地址!