hiding

共 19 篇文章
hiding 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 19 篇文章,持续更新中。

Increasing Payload of Echo Hiding Scheme Using Dual Backward and Forward Delay Kernels

Increasing Payload of Echo Hiding Scheme Using Dual Backward and Forward Delay Kernels

Hiding process with DKOM !采用断开系统中进程的双向链表方式

Hiding process with DKOM !采用断开系统中进程的双向链表方式,隐藏指定进程。本程序采用了硬编码,所以只能隐藏XP的进程,如果是其他系统需要修改编码地址!

very useful ebook for data hiding

very useful ebook for data hiding

outguess

<b style="font-family:宋体, Verdana, Arial, Helvetica, sans-serif;white-space:normal;background-color:#FFFFFF;">信息隐藏软件Outguess的源码 Outguess主要用于JPEg图象的steganography,本软件来自Outguess的作者Provos,欢迎大家下载研究-Informa

透明音乐播放器

[开源 绿色软件] [运行环境 Windows XP/7/8/10] [语言 简体/繁體/English/Unicode]<br /> <br /> A cool music player. Powered by Bass and BassVis.<br /> 极简本地音乐播放器,透明、纯文本界面。支持轻媒体库、歌词、可视化。最小化到托盘,占用资源少,适合边听音乐边工作。<br /> <br />

根据W. Bender的《Techniques for data hiding》编写 %用补丁方法对图象做空间域的水印嵌入和提取

根据W. Bender的《Techniques for data hiding》编写 %用补丁方法对图象做空间域的水印嵌入和提取, %效率极高,程序简洁,属信息隐藏中常用的方法之一。 %作者:辽宁大学 信息学院 范铁生 %email:fts0@163.com

Hiding Text in a Image

Hiding Text in a Image

Thinking in Java, 3rd ed. Revision 4.0 Preface Introduction 1: Introduction to Objects 2

Thinking in Java, 3rd ed. Revision 4.0 Preface Introduction 1: Introduction to Objects 2: Everything is an Object 3: Controlling Program Flow 4: Initialization & Cleanup 5: Hiding

Good free software for Folder hiding

Good free software for Folder hiding

very useful ebook for data hiding

very useful ebook for data hiding

The main idea of this work is to create a driver for hiding selected processes and files.

The main idea of this work is to create a driver for hiding selected processes and files.

very useful ebook for data hiding

very useful ebook for data hiding

Analysis of blind data hiding using discrete cosine transform phase modulation。

Analysis of blind data hiding using discrete cosine transform phase modulation。

very comprehensive example, windows WDM driver development ex The use of drive technology can s

very comprehensive example, windows WDM driver development ex The use of drive technology can s Say all ?&#55617 &#56616 e full speed equipm STM32 DAC DMA TIXINGBO Implement hiding process,

Basic hack v2.1 by xgx - http://www.ring0.donster.de/ Features: - Smooth Vector Aimbot - Fu

Basic hack v2.1 by xgx - http://www.ring0.donster.de/ Features: - Smooth Vector Aimbot - Full ESP ( Namen,Weapon,Distance,Visible,Far) - polymorph,peb hiding to prevent VAC detection

It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electrom

It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally

This method is based upon the image hiding technic into another image using LSB algorithm called as

This method is based upon the image hiding technic into another image using LSB algorithm called as Steganography.

very comprehensive example, windows WDM driver development ex The use of drive technology can s

very comprehensive example, windows WDM driver development ex The use of drive technology can s Say all &#55617 &#56616 e full speed equipm STM32 DAC DMA TIXINGBO Implement hiding process, m

根据W. Bender的《Techniques for data hiding》编写 %用补丁方法对图象做DCT域的水印嵌入和提取

根据W. Bender的《Techniques for data hiding》编写 %用补丁方法对图象做DCT域的水印嵌入和提取, %效率极高,程序简洁,属信息隐藏中常用的方法之一。 %作者:辽宁大学 信息学院 范铁生 %email:fts0@163.com