Description: This procedure is mainly to achieve a number of digital image processing algorithms, there is source code, including the watermark embedding, extraction and to prevent some attacks, for beginners there is a certain degree of help
To Search:
File list (Check if you may need any files):
攻击.doc