Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode Graph program Special Effects

Search in result

Special Effects list
Sort by :
« 1 2 ... .47 .48 .49 .50 .51 7452.53 .54 .55 .56 .57 ... 7722 »
Downloaded:0
wrote by Fujian Shi (fieagl e@yahoo.com.cn) It can transform the file t com o pgm file, you can watch the picture
Update : 2008-10-13 Size : 1.17kb Publisher : windowscm

Downloaded:0
jpeg image processing
Update : 2008-10-13 Size : 1.98kb Publisher : windowscm

Downloaded:0
image processing papers information
Update : 2008-10-13 Size : 3.02kb Publisher : windowscm

Downloaded:0
image processing papers information
Update : 2008-10-13 Size : 3.04kb Publisher : windowscm

Downloaded:0
image processing papers information
Update : 2008-10-13 Size : 2.57kb Publisher : windowscm

Downloaded:0
content in the image authentication technology is a novel image information security technology, used to verify digital image content authenticity and integrity. This paper introduces the content-based image authenticati
Update : 2008-10-13 Size : 740.83kb Publisher : cici

Downloaded:0
Abstract digital watermarking technology is the image in recent years to protect technical fields of study a hot, This paper presents a wavelet transform-based image digital watermark embedding algorithm Matlab "The expe
Update : 2008-10-13 Size : 108.94kb Publisher : cici

Downloaded:0
dicom programming library can be used for the development of this class library
Update : 2008-10-13 Size : 1.39mb Publisher : bayy

Downloaded:0
watermark embedding and various attacks source, which is the entire source of detailed source
Update : 2008-10-13 Size : 29.55kb Publisher : 飞扬

Downloaded:0
I as a carrier of data, W for the watermark signal, K key, Then the watermark embedded vector can be described as Iw [124] : F = Iw (I, W, K). (1)-, F said watermark embedding strategy.
Update : 2008-10-13 Size : 1.6kb Publisher : 江力

Downloaded:0
established as a carrier of data, W for the watermark signal, K key, Then the watermark embedded vector can be described as Iw [124] : F = Iw (I, W, K). (1)-, F said watermark embedding strategy.
Update : 2008-10-13 Size : 1.13kb Publisher : 江力

Downloaded:0
established as a carrier of data, W for the watermark signal, K key, Then the watermark embedded vector can be described as Iw [124] : F = Iw (I, W, K). (1)-, F said watermark embedding strategy.
Update : 2008-10-13 Size : 1.6kb Publisher : 江力
« 1 2 ... .47 .48 .49 .50 .51 7452.53 .54 .55 .56 .57 ... 7722 »
CodeBus is the largest source code store in internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.