搜索结果

找到约 19 项符合 Hiding 的查询结果

加密解密 根据W. Bender的《Techniques for data hiding》编写 %用补丁方法对图象做空间域的水印嵌入和提取

根据W. Bender的《Techniques for data hiding》编写 %用补丁方法对图象做空间域的水印嵌入和提取, %效率极高,程序简洁,属信息隐藏中常用的方法之一。 %作者:辽宁大学 信息学院 范铁生 %email:fts0@163.com
https://www.eeworm.com/dl/519/248327.html
下载: 176
查看: 1049

加密解密 根据W. Bender的《Techniques for data hiding》编写 %用补丁方法对图象做DCT域的水印嵌入和提取

根据W. Bender的《Techniques for data hiding》编写 %用补丁方法对图象做DCT域的水印嵌入和提取, %效率极高,程序简洁,属信息隐藏中常用的方法之一。 %作者:辽宁大学 信息学院 范铁生 %email:fts0@163.com
https://www.eeworm.com/dl/519/248329.html
下载: 41
查看: 1047

其他 Analysis of blind data hiding using discrete cosine transform phase modulation。

Analysis of blind data hiding using discrete cosine transform phase modulation。
https://www.eeworm.com/dl/534/341090.html
下载: 80
查看: 1025

驱动编程 The main idea of this work is to create a driver for hiding selected processes and files.

The main idea of this work is to create a driver for hiding selected processes and files.
https://www.eeworm.com/dl/618/407539.html
下载: 160
查看: 1042

文章/文档 It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electrom

It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai et al., Nat. Photon ...
https://www.eeworm.com/dl/652/421399.html
下载: 42
查看: 1073

CA认证 Hiding Text in a Image

Hiding Text in a Image
https://www.eeworm.com/dl/640/426158.html
下载: 35
查看: 1019

其他书籍 very useful ebook for data hiding

very useful ebook for data hiding
https://www.eeworm.com/dl/542/429855.html
下载: 54
查看: 1024

其他书籍 very useful ebook for data hiding

very useful ebook for data hiding
https://www.eeworm.com/dl/542/429862.html
下载: 40
查看: 1017

其他书籍 very useful ebook for data hiding

very useful ebook for data hiding
https://www.eeworm.com/dl/542/429876.html
下载: 45
查看: 1025

驱动编程 Hiding process with DKOM !采用断开系统中进程的双向链表方式

Hiding process with DKOM !采用断开系统中进程的双向链表方式,隐藏指定进程。本程序采用了硬编码,所以只能隐藏XP的进程,如果是其他系统需要修改编码地址!
https://www.eeworm.com/dl/618/437968.html
下载: 137
查看: 1021