Location:
Search - copy protection
Search list
Description: 全球迅猛发展的 Internet 网络给世界经济带来了新的商机,数字技术提供了与原作品同样精美的复制品, 但同时使得数字媒体的版权保护问题日益突出。 本文介绍了最新的多媒体版权保护技术-数字水印的概念,在阐述数字水印的分类和特性的基础上,提出了以数字水印为基础的数字作品版权保护系统,并研究了数字水印系统的处理框架和数字水印算法。最后对数字水印技术进行了展望。-rapid development of the global Internet network to the world economy has brought new opportunities, Digital technology works with the original copy of the same exquisite, But at the same time makes digital media copyright protection issues have become increasingly prominent. This paper introduces the latest multimedia copyright protection technology-digital watermark concept, In explaining the classification of digital watermarking and identity on the basis of put forward a digital watermarking-based digital copyright protection system, and study of digital watermarking system processing framework and digital watermarking algorithm. Finally, the digital watermark technology forward.
Platform: |
Size: 202050 |
Author: thocr |
Hits:
Description: 文件资源管理器:多用户管理,多级目录形式,用户可设置密码保护.
B、回收站管理
C、树形和列表界面操作(包括图标、列表以及详细信息显示方式,方便的系统菜单,右键菜单,工具栏等)
D、文件的拖放操作
E、Windows剪贴板操作(复制,剪切,粘贴工作可以通过剪贴板完成)
-Resources Management : Multi-user management, multi-level menu, users can set up password protection. B, Recycling C management, tree and list interface operations (including icons, and the detailed list of information display, convenient system menu, right-menu, toolbars, etc.) D, drag and drop document E, Windows clipboard operations (copy, cut, paste work can be completed through the clipboard)
Platform: |
Size: 313511 |
Author: 李建龙 |
Hits:
Description: 黑客帝国屏幕保护程序源代码(不同于Alon的) 一,将./Font/*.* 字体文件复制到 (Windows)/Fonts中 Windows为你的视窗文件夹 二,编译之后将NO_4.exe改名为xxxx.scr 一切OK! (建议在1024*768下使用) 如有不合理之处,请多多指教-Matrix screen protection program source code (as distinct from Alon) 1,. / Font / *.* copy of the font file (Windows) / Fonts of Windows for your Windows folder 2, compiled after NO_4.exe renamed all xxxx.scr OK! (recommendation in 1024 * 768 used) if unreasonable, a great weekend
Platform: |
Size: 61516 |
Author: 张懿 |
Hits:
Description: 本设计的目的是通过设计和调试一个简单的文件系统,主要是模拟文件操作命令的执行,来模拟文件管理,使学生对主要文件操作命令的实质和执行过程有比较深入的了解,掌握它们的基本实施方法。具体要求如下:
(1) 设计一个支持n个用户的文件系统,每个用户可拥有多个文件:
(2) 采用二级或二级以上的多级文件目录管理;
(3) 对文件应设置存去控制保护方式,如“只能执行”、“允许读”、“允许写等”;
(4) 系统的外部特征应接近于真实系统,可设置下述文件操作命令:
命 令 功 能 命 令 功 能
Create 建立文件 Read 读文件
Open 打开文件 Write 写文件
Close 关闭文件 Copy 复制文件
Delete 撤消文件 Directory 查询目录
(5) 通过键盘使用该文件系统,系统应显示操作命令的执行结果。-the purpose of this design is by designing and debugging a simple file system, main operation is simulated documents the execution of the order to simulate document management, enable students to the main document commands the substance and the implementation process of a more in-depth understanding, They grasp of the basic method. Specific requirements are as follows : (1) design a support n user file system, each user can have multiple files : (2) use of two or more than two multi-level directory management; (3) the document should be set up to deposit control and protection methods, such as "the only enforcement", "allow time", "Allow writing"; (4) the external characteristics should be closer to the real system, documents can be set up to operate the follo
Platform: |
Size: 2788 |
Author: zz |
Hits:
Description: ASP是开发网站应用的快速工具,但是有些网站管理员只看到ASP的快速开发能力,却忽视了ASP安全问题。ASP从一开始就一直受到众多漏洞,后门的困扰,包括%81的噩梦,密码验证问题,IIS漏洞等等都一直使ASP网站开发人员心惊胆跳。本文试图从开放了ASP服务的操作系统漏洞和ASP程序本身漏洞,阐述ASP安全问题,并给出解决方法或者建议。-ASP Web applications is the development of rapid tool, but some webmasters only see the rapid development of ASP, ASP has been neglected safety issues. ASP from the beginning have been many loopholes in the back door of distress, including nightmares, password authentication, IIS vulnerability, etc. have been so ASP Web developers shocking. This paper attempts to open the ASP services of the operating system vulnerabilities and the process itself ASP loophole, ASP elaborate security issues, and gives solutions or suggestions.
Platform: |
Size: 322560 |
Author: 海燕 |
Hits:
Description: 目前使用最广泛的软件保护方法,我们可以将其分为两类:依赖硬件的保护文案和不依赖硬件的保护方案。依赖硬件的保护方案主要有:软盘保护,加密卡保护,软件锁保护(俗称“加密狗”)以及光盘加密等,这些方案的共同特点就是保护措施都要涉及某一具体的硬件来实现,涉及的硬件可能是软件盘,U盘,光盘或者其它外接设备-At present, the most widely used method of software protection, we can be divided into two categories: dependent on the protection of hardware and do not rely on hardware copy protection program. Rely on hardware protection programs include: a floppy disk protection, encryption card protection, software protection lock (commonly known as dongle ), as well as CD-ROM, such as encryption, a common feature of these programs is that protective measures should be involved in a specific hardware to achieve, involving The hardware may be the software disk, U disk, CD-ROMs or other external equipment
Platform: |
Size: 592896 |
Author: 姚磊 |
Hits:
Description: Watermarking schemes evaluation
Abstract鈥擠igital watermarking has been presented as a solution to copy protection of multimedia objects and dozens of schemes and algorithms have been proposed. Two main problems seriously darken the future of this technology though.
Firstly, the large number of attacks and weaknesses which appear as fast as new algorithms are proposed, emphasizes the limits of this technology and in particu-lar the fact that it may not match users expectations.
Secondly, the requirements, tools and methodologies to assess the current technologies are almost non-existent. The lack of benchmarking of current algorithms is bla-tant. This confuses rights holders as well as software and hardware manufacturers and prevents them from using the solution appropriate to their needs. Indeed basing long-lived protection schemes on badly tested watermarking technology does not make sense.
Platform: |
Size: 25600 |
Author: ashraf |
Hits:
Description: 软件加密中的防拷贝技术,是学习软件保护的好东西!-Encryption software copy protection technology, is learning software to protect the good stuff!
Platform: |
Size: 381952 |
Author: 凌晨两点 |
Hits:
Description: 超星阅读器阅览器(SSReader)是超星公司拥有自主知识产权的图书阅览器,是专门针对数字图书的阅览、下载、打印、版权保护和下载计费而研究开发的。经过多年不断改进,是国内外用户数量最多的专用图书阅览器之一。-Superstar Reader reader (SSReader) is a company with independent intellectual property rights Superstar book reader, is designed for digital books to read, download, print, copy protection and download Billing and research and development. After years of continuous improvement, is the largest number of domestic and international users of the dedicated book reader.
Platform: |
Size: 8980480 |
Author: 张玉 |
Hits:
Description: use for Copy Protection purpose
Platform: |
Size: 1024 |
Author: Heero Punjabi |
Hits:
Description: Buzan s iMindMap V4 破解补丁,复制到X:\Program Files\Buzan Online\Buzan s iMindMap\lib (X为安装的磁盘)需重新压缩成jar格式-Buzan' s iMindMap V4 crack patch, copy to X: \ Program Files \ Buzan Online \ Buzan' s iMindMap \ lib (X for the installation disk) to be re-compressed into a jar format
Platform: |
Size: 980992 |
Author: xuchen |
Hits:
Description: This is a z transform based watermarking algorithm used for copy right protection
Platform: |
Size: 1243136 |
Author: vijayan |
Hits:
Description: Way of formatting floppy disc with copy protection, based on old versions of CopyControl.
Platform: |
Size: 5120 |
Author: zencode |
Hits:
Description: 1Software Copy Protection, Web Activation, trial version
www.Licence-Protector.comcRIO PB Module
PROFIBUS DP Master/Slave Module for National Instruments CompactRIO
-1
Software Copy Protection, Web Activation, trial version
www.Licence-Protector.comcRIO PB Module
PROFIBUS DP Master/Slave Module for National Instruments CompactRIO
Platform: |
Size: 1562624 |
Author: ye yun |
Hits:
Description: 克里斯,卡巴斯基 光盘拷贝保护技术,用于破解正版光盘的防盗版技术-Chris, Kaspersky CD copy protection technology for CD-ROM genuine crack anti-piracy technology
Platform: |
Size: 2159616 |
Author: Ben |
Hits:
Description: tvp5150。它是一款高性能的视频
解码器,可将NTSC、PAL 视频信号转换成数字色差信号(YUV422),支持两个复合视频
或一个S 端子输入。输出格式为ITU-R BT.656,并支持MacrovisionTM 复制保护以及高级
的VBI 功能。不仅如此,TVP5150PBS 还具备了封装小(32 脚的TQFP)、功耗小(<150mV)
的特点,因此,非常适用于便携、批量大、高质量和高性能的视频产品。-tvp5150. It is a high-performance video decoder, NTSC, PAL video signals can be converted into digital color difference signals (YUV422) supports two composite video or S-Video input. The output format for the ITU-R BT.656 and to support MacrovisionTM copy protection and advanced VBI function. Moreover, TVP5150PBS also has a small package (32-pin TQFP), features low power consumption (< 150 mV), therefore, very suitable for portable, large-volume, high-quality and high-performance video products.
Platform: |
Size: 488448 |
Author: 王慧 |
Hits:
Description: 一句代码锁定文件夹防拷贝防删除,禁止复制 拷贝 粘贴文件保护你的文件安全源码-A code lock folder copy protection against delete, copy prohibited copy and paste your file security source file protection
Platform: |
Size: 3072 |
Author: wang |
Hits:
Description: Speech Based Watermarking for Digital Images
This paper presents a novel scheme of
watermarking of digital images for copyright protection and
authentication. In this paper we proposed a method of
embedding owner’s speech signal. Speech being a biometric data,
the watermark signal in this method is expected to be more
meaningful and has closer correlation with copyright holder.
The main issue of concern here is the capacity because the speech
data has large number of samples. Linear predictive coding is
used to encode the audio data. Here, speech samples are
imperceptibly inserted using spread spectrum technique into the
mid frequency band of wavelet transform of image which makes
it robust to lossy compression. Applications for such a speechhiding
scheme include copy protection, authentication and covert
communication.
Platform: |
Size: 195584 |
Author: Nayan Patel |
Hits:
Description: In this paper we proposed a method of
embedding owner’s speech signal. Speech being a biometric data,
the watermark signal in this method is expected to be more
meaningful and has closer correlation with copyright holder.
The main issue of concern here is the capacity because the speech
data has large number of samples. Linear predictive coding is
used to encode the audio data. Here, speech samples are
imperceptibly inserted using spread spectrum technique into the
mid frequency band of wavelet transform of image which makes
it robust to lossy compression. Applications for such a speechhiding
scheme include copy protection, authentication and covert
communication.
Platform: |
Size: 1614848 |
Author: Nayan Patel |
Hits:
Description: 灵活性与扩展性。同时还可以自由控制哪些用户组需要输入验证码,等等
防采集、防复制功能,有效保护网站内容(授权版独有)你是否恨透了别人采集与复制你的网站原创内容呢?你可以在后台开启防采集与防复制功能,别人就难以盗用你的网站内容。因为在文章的每一段都智能的加了不同的混淆字符串。
防CC攻击、防恶意刷新(授权版独有)当别人恶意刷新你的网站的时候,就会导致网站变得很慢,影响用户的正常访问,这个时候,你可以在后台开启防CC功能,就可以阻止攻击者的访问。 -Flexibility and extensibility. At the same time it can freely control which user groups need to enter the verification code, etc.
Anti acquisition, copy protection function, effectively protect the website content (authorized version of the unique) if you hate others collection and copy your original content sites? You can open in the background of anti acquisition and anti copy function, it is difficult for others to steal your website content. Because each paragraph in the article is intelligent with a different string of confusion.
Anti CC attack, prevent malicious refresh (authorized version of the unique) when others malicious refresh your website, will cause the website become very slow, affect the user s normal visit, this time, you can open in background anti CC function, can prevent an attacker access.
Platform: |
Size: 1095680 |
Author: 薛天志 |
Hits: