CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
SourceCode
Graph program
Special Effects
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Search in result
Search
Special Effects list
Sort by :
«
1
2
...
.29
.30
.31
.32
.33
6434
.35
.36
.37
.38
.39
...
7722
»
jcmarker
Downloaded:0
image processing papers information
Update
: 2025-02-02
Size
: 3kb
Publisher
:
windowscm
jfdctint
Downloaded:0
image processing papers information
Update
: 2025-02-02
Size
: 2kb
Publisher
:
windowscm
harisuciciwatermark
Downloaded:0
content in the image authentication technology is a novel image information security technology, used to verify digital image content authenticity and integrity. This paper introduces the content-based image authenticati
Update
: 2025-02-02
Size
: 741kb
Publisher
:
cici
dwtshuzishuiyin
Downloaded:0
Abstract digital watermarking technology is the image in recent years to protect technical fields of study a hot, This paper presents a wavelet transform-based image digital watermark embedding algorithm Matlab "The expe
Update
: 2025-02-02
Size
: 109kb
Publisher
:
cici
dicomPapyrustoolkit3
Downloaded:0
dicom programming library can be used for the development of this class library
Update
: 2025-02-02
Size
: 1.39mb
Publisher
:
bayy
Digitalwatermark
Downloaded:0
watermark embedding and various attacks source, which is the entire source of detailed source
Update
: 2025-02-02
Size
: 29kb
Publisher
:
飞扬
1_embed
Downloaded:0
I as a carrier of data, W for the watermark signal, K key, Then the watermark embedded vector can be described as Iw [124] : F = Iw (I, W, K). (1)-, F said watermark embedding strategy.
Update
: 2025-02-02
Size
: 1kb
Publisher
:
江力
1_recover
Downloaded:0
established as a carrier of data, W for the watermark signal, K key, Then the watermark embedded vector can be described as Iw [124] : F = Iw (I, W, K). (1)-, F said watermark embedding strategy.
Update
: 2025-02-02
Size
: 1kb
Publisher
:
江力
2_embed
Downloaded:0
established as a carrier of data, W for the watermark signal, K key, Then the watermark embedded vector can be described as Iw [124] : F = Iw (I, W, K). (1)-, F said watermark embedding strategy.
Update
: 2025-02-02
Size
: 1kb
Publisher
:
江力
3_embed_recover
Downloaded:0
established as a carrier of data, W for the watermark signal, K key, Then the watermark embedded vector can be described as Iw [124] : F = Iw (I, W, K). (1)-, F said watermark embedding strategy.
Update
: 2025-02-02
Size
: 1kb
Publisher
:
江力
TMPGEnc-0.11.27.111
Downloaded:0
MPEG encoding of the source, is worth considering, for beginners to a certain extent inspired programming, Oh
Update
: 2025-02-02
Size
: 875kb
Publisher
:
朱逸
2recover
Downloaded:0
watermark added to the low-frequency region can have good watermark robustness added to the high frequency region can be made good through Ming, but the poor robust watermark added to the IF District is a robust and tran
Update
: 2025-02-02
Size
: 1kb
Publisher
:
江力
«
1
2
...
.29
.30
.31
.32
.33
6434
.35
.36
.37
.38
.39
...
7722
»
CodeBus
is the largest source code store in internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.