Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode Graph program
Graph program list
Sort by :
« 1 2 ... .11 .12 .13 .14 .15 17916.17 .18 .19 .20 .21 ... 18705 »
Downloaded:0
established as a carrier of data, W for the watermark signal, K key, Then the watermark embedded vector can be described as Iw [124] : F = Iw (I, W, K). (1)-, F said watermark embedding strategy.
Update : 2008-10-13 Size : 1.13kb Publisher : 江力

Downloaded:0
established as a carrier of data, W for the watermark signal, K key, Then the watermark embedded vector can be described as Iw [124] : F = Iw (I, W, K). (1)-, F said watermark embedding strategy.
Update : 2008-10-13 Size : 1.6kb Publisher : 江力

Downloaded:0
established as a carrier of data, W for the watermark signal, K key, Then the watermark embedded vector can be described as Iw [124] : F = Iw (I, W, K). (1)-, F said watermark embedding strategy.
Update : 2008-10-13 Size : 1.66kb Publisher : 江力

Downloaded:0
MPEG encoding of the source, is worth considering, for beginners to a certain extent inspired programming, Oh
Update : 2008-10-13 Size : 874.84kb Publisher : 朱逸

Downloaded:0
watermark added to the low-frequency region can have good watermark robustness added to the high frequency region can be made good through Ming, but the poor robust watermark added to the IF District is a robust and tran
Update : 2008-10-13 Size : 1.43kb Publisher : 江力

Downloaded:0
Functions/Classes:
Update : 2008-10-13 Size : 859.19kb Publisher : 米剑

Downloaded:0
embedded watermark image with the original image in the visual effects are almost identical, only slight brightness on the map six simulation results Figure 7 with the simulation results. extract the watermark image with
Update : 2008-10-13 Size : 918byte Publisher : 江力

Downloaded:0
With the rapid IT development, and information security problems have become increasingly serious. how to work in an unsafe environment safe under the protection of private information, has become an important research t
Update : 2008-10-13 Size : 1.35kb Publisher : 江力

Downloaded:0
"Digital Image Recognition Technology typical case," a book of the sixth chapter of bar code technology, achieve one-and two-dimensional bar code identification and Print
Update : 2008-10-13 Size : 150.67kb Publisher : 郝丽丽

Downloaded:0
Functions/Classes:
Update : 2008-10-13 Size : 541.01kb Publisher : jys

Downloaded:0
This is a simple image of the original small software code, try it, good
Update : 2008-10-13 Size : 1.16mb Publisher : 叶畅

Downloaded:0
debugging the computer configuration : Windows2000/XP Visual Studio 6.0 Enterprise Edition is image-processing shift attention to the original code, Catalog most procedures only for 256-color image for the operation.
Update : 2008-10-13 Size : 39.5kb Publisher : 叶畅
« 1 2 ... .11 .12 .13 .14 .15 17916.17 .18 .19 .20 .21 ... 18705 »
CodeBus is the largest source code store in internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.