Location:
Search - embeds
Search list
Description: DDM(Delicate Document Manager) is a tool for searching, browsing and managing PDF documents. It provides an Explorer-like view of PDF files with their titles instead of file names. It embeds a fast incremental search function for finding PDF files. -DDM (Delicate Document Manager) is a tool f or searching, browsing and managing PDF documents. It provid es an Explorer-like view of PDF files with their titles instead of file names. It embeds in a fast cremental search function for finding PDF file s.
Platform: |
Size: 105265 |
Author: baohu |
Hits:
Description: Mod_python is an Apache module that embeds the Python interpreter within the server. With mod_python you can write web-based applications in Python that will run many times faster than traditional CGI and will have access to advanced features such as ability to retain database connections and other data between hits and access to Apache internals. A more detailed description of what mod_python can do is available in this O Reilly article.
Platform: |
Size: 590237 |
Author: dipeng |
Hits:
Description: DDM(Delicate Document Manager) is a tool for searching, browsing and managing PDF documents. It provides an Explorer-like view of PDF files with their titles instead of file names. It embeds a fast incremental search function for finding PDF files. -DDM (Delicate Document Manager) is a tool f or searching, browsing and managing PDF documents. It provid es an Explorer-like view of PDF files with their titles instead of file names. It embeds in a fast cremental search function for finding PDF file s.
Platform: |
Size: 104448 |
Author: baohu |
Hits:
Description: Mod_python is an Apache module that embeds the Python interpreter within the server. With mod_python you can write web-based applications in Python that will run many times faster than traditional CGI and will have access to advanced features such as ability to retain database connections and other data between hits and access to Apache internals. A more detailed description of what mod_python can do is available in this O Reilly article. -Mod_python is an Apache module that embeds the Python interpreter within the server. With mod_python you can write web-based applications in Python that will run many times faster than traditional CGI and will have access to advanced features such as ability to retain database connections and other data between hits and access to Apache internals. A more detailed description of what mod_python can do is available in this O Reilly article.
Platform: |
Size: 589824 |
Author: dipeng |
Hits:
Description: SkipStone is a Gtk+ Web Browser that embeds Mozilla s rendering component Gecko. It aims to be light and fast with few dependencies. As of version 1.0.0 - Support for Apple WebKit has been added.-SkipStone is a Gtk+ Web Browser that embeds Mozilla s rendering component Gecko. It aims to be light and fast with few dependencies. As of version 1.0.0- Support for Apple WebKit has been added.
Platform: |
Size: 417792 |
Author: 王佳联 |
Hits:
Description: 线性非时变系统的卷积的demo,有助于对卷积的理解。欢迎大家分享之-As one would learn in a basic signal processing/controls/dynamical systems class, the multiplication by an LTI transfer function F(s) in the frequency domain is the same operation as convolution with f(t) in the time domaininformation hiding that is known as self-embedding. In essence, the process embeds a copy of the media into itself, of course it goes without saying that the copy has to be encrypted before the embedding takes place. The program is written purely in MATLAB with some scripts in PHP and HTML.
Platform: |
Size: 10240 |
Author: 李继 |
Hits:
Description: 数据隐藏,做为一中隐蔽、嵌入的形式,
可以进行数字媒体数据的识别,注释和版权保护。-Data hiding,a form of steganography,embeds
data into digital media for the purpose of
identification,annotation,and copyright.
Platform: |
Size: 379904 |
Author: 丫丫 |
Hits:
Description: 天嵌2440的bootloader的源代码,初学者可做参考-Days of the 2440 embedded bootloader' s source code, for beginners to do reference
Platform: |
Size: 50176 |
Author: 周强 |
Hits:
Description: In this paper, we present a novel content-based
image authentication framework which embeds the
authentication information into the host image using a
lossless data hiding approach
Platform: |
Size: 299008 |
Author: mehdi |
Hits:
Description: The code implements the following paper:
Guorong Xuan, Jiang Zhu, Jidong Chen, Shi Y.Q., Zhicheng Ni, Wei Su, "Distortionless data hiding based on integer wavelet transform" IET Electronics Letters, Volume: 38, Issue 25, page 1646- 1648, December 2002. (ISSN: 0013-5194)
The watermark embedding and extraction modules have been implemented separately.
The watermark embedding module embeds the watermark using bitplane compression in the integer wavelet transform domain.
The watermark extraction module extracts the previously embedded watermark and restores the original image.
A logo image is used as a watermark but can be replaced with any thing.-The code implements the following paper:
Guorong Xuan, Jiang Zhu, Jidong Chen, Shi Y.Q., Zhicheng Ni, Wei Su, "Distortionless data hiding based on integer wavelet transform" IET Electronics Letters, Volume: 38, Issue 25, page 1646- 1648, December 2002. (ISSN: 0013-5194)
The watermark embedding and extraction modules have been implemented separately.
The watermark embedding module embeds the watermark using bitplane compression in the integer wavelet transform domain.
The watermark extraction module extracts the previously embedded watermark and restores the original image.
A logo image is used as a watermark but can be replaced with any thing.
Platform: |
Size: 1015808 |
Author: thinkingbig4 |
Hits:
Description: Watermarking embeds information into a digital signal like
audio, image, or video. Reversible image watermarking can restore the
original image without any distortion after the hidden data is extracted.
In this paper, we present a novel reversible watermarking scheme using
an interpolation technique, which can embed a large amount of covert
data into images with imperceptible modification. Different from previous
watermarking schemes, we utilize the interpolation-error, the difference
between interpolation value and corresponding pixel value
Platform: |
Size: 999424 |
Author: isclor |
Hits:
Description: Watermarking embeds information into a digital signal like
audio, image, or video. Reversible image watermarking can restore the
original image without any distortion after the hidden data is extracted.
In this paper, we present a novel reversible watermarking scheme using
an interpolation technique, which can embed a large amount of covert
data into images with imperceptible modification. Different from previous
watermarking schemes, we utilize the interpolation-error, the difference
between interpolation value and corresponding pixel value
Platform: |
Size: 2541568 |
Author: isclor |
Hits:
Description: Watermarking embeds information into a digital signal like
audio, image, or video. Reversible image watermarking can restore the
original image without any distortion after the hidden data is extracted.
In this paper, we present a novel reversible watermarking scheme using
an interpolation technique, which can embed a large amount of covert
data into images with imperceptible modification. Different from previous
watermarking schemes, we utilize the interpolation-error, the difference
between interpolation value and corresponding pixel value
Platform: |
Size: 225280 |
Author: isclor |
Hits:
Description: EMBEDBP Embeds the data in the bth bit plane of the image
Platform: |
Size: 1024 |
Author: loubna |
Hits:
Description: Vector Autoregression (VAR) estimation and direct forecasting with VECM. Uses Le Sage vare.m
Code embeds lrvar.m to compute LRT for optimal VAR size and compmatrix.m to find companion matrix of coefficient vectors.
Performs also in- and out-of-sample forecasting. Guido Travaglini, Università di Roma 1, jay_of_may@yahoo.com, November 2011.
-Vector Autoregression (VAR) estimation and direct forecasting with VECM. Uses Le Sage vare.m
Code embeds lrvar.m to compute LRT for optimal VAR size and compmatrix.m to find companion matrix of coefficient vectors.
Performs also in- and out-of-sample forecasting. Guido Travaglini, Università di Roma 1, jay_of_may@yahoo.com, November 2011.
Platform: |
Size: 1024 |
Author: jay |
Hits:
Description: The F5 algorithm embeds message bits into randomly-chosen DCT coefficients
and employs matrix embedding that minimizes the necessary number of changes to
embed a message of certain length.
Platform: |
Size: 736256 |
Author: swati |
Hits:
Description: In this paper, a security model is proposed which imposes the concept of secrecy over
privacy for text messages. In the recent years, we have plenty of security tools which are
developed to protect the transmission of multimedia objects. But approaches for the security
of text messages are comparatively less. The model proposed by us combines cryptography,
steganography (taken as security layers) and along with that an extra layer of security has
been imposed in between them. This newly introduced extra layer of security changes the
format of normal encrypted message and the security layer followed by it embeds the
encrypted message behind a multimedia cover object.
Keywords: Stenography, Text stenography, Security, Secrecy, Privacy.
Platform: |
Size: 105472 |
Author: MD. JAKIR HOSSAIN |
Hits:
Description: 隐藏数据列到图像,信息隐藏中的一种重要方法-EMBEDBP Embeds the data in the bth bit plane of the image
Platform: |
Size: 1024 |
Author: 申淑媛 |
Hits:
Description: a self- embedding block wise fragile watermarking scheme with tamper detection and content recovery capability. The proposed scheme embeds the shuffled extensive ten bit Recovery
data and two bit Authentication data of the image block into the least
significant bits (LSB) of its corresponding mapping block.The integrity
of a test block is decided by comparing 2×2 non overlapping block
of the test block with its corresponding mapping block. Experimental
results show that the suggested scheme outperforms conventional self recovery fragile watermarking algorithms in alteration detection as well
as in tamper recovery of the image.
Platform: |
Size: 273408 |
Author: durgesh singh |
Hits:
Description: Least Significant Bit (LSB) embedding is a simple strategy to implement steganography. Like all steganographic methods, it embeds the data into the cover so that it cannot be detected by a casual observer. The technique works by replacing some of the information in a given pixel with information from the data in the image.
Platform: |
Size: 2048 |
Author: Jal |
Hits: