Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode Graph program Special Effects

Search in result

Special Effects list
Sort by :
« 1 2 ... .29 .30 .31 .32 .33 6434.35 .36 .37 .38 .39 ... 7722 »
Downloaded:0
image processing papers information
Update : 2025-02-02 Size : 3kb Publisher : windowscm

Downloaded:0
image processing papers information
Update : 2025-02-02 Size : 2kb Publisher : windowscm

Downloaded:0
content in the image authentication technology is a novel image information security technology, used to verify digital image content authenticity and integrity. This paper introduces the content-based image authenticati
Update : 2025-02-02 Size : 741kb Publisher : cici

Downloaded:0
Abstract digital watermarking technology is the image in recent years to protect technical fields of study a hot, This paper presents a wavelet transform-based image digital watermark embedding algorithm Matlab "The expe
Update : 2025-02-02 Size : 109kb Publisher : cici

Downloaded:0
dicom programming library can be used for the development of this class library
Update : 2025-02-02 Size : 1.39mb Publisher : bayy

Downloaded:0
watermark embedding and various attacks source, which is the entire source of detailed source
Update : 2025-02-02 Size : 29kb Publisher : 飞扬

Downloaded:0
I as a carrier of data, W for the watermark signal, K key, Then the watermark embedded vector can be described as Iw [124] : F = Iw (I, W, K). (1)-, F said watermark embedding strategy.
Update : 2025-02-02 Size : 1kb Publisher : 江力

Downloaded:0
established as a carrier of data, W for the watermark signal, K key, Then the watermark embedded vector can be described as Iw [124] : F = Iw (I, W, K). (1)-, F said watermark embedding strategy.
Update : 2025-02-02 Size : 1kb Publisher : 江力

Downloaded:0
established as a carrier of data, W for the watermark signal, K key, Then the watermark embedded vector can be described as Iw [124] : F = Iw (I, W, K). (1)-, F said watermark embedding strategy.
Update : 2025-02-02 Size : 1kb Publisher : 江力

Downloaded:0
established as a carrier of data, W for the watermark signal, K key, Then the watermark embedded vector can be described as Iw [124] : F = Iw (I, W, K). (1)-, F said watermark embedding strategy.
Update : 2025-02-02 Size : 1kb Publisher : 江力

Downloaded:0
MPEG encoding of the source, is worth considering, for beginners to a certain extent inspired programming, Oh
Update : 2025-02-02 Size : 875kb Publisher : 朱逸

Downloaded:0
watermark added to the low-frequency region can have good watermark robustness added to the high frequency region can be made good through Ming, but the poor robust watermark added to the IF District is a robust and tran
Update : 2025-02-02 Size : 1kb Publisher : 江力
« 1 2 ... .29 .30 .31 .32 .33 6434.35 .36 .37 .38 .39 ... 7722 »
CodeBus is the largest source code store in internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.