Welcome![Sign In][Sign Up]
Location:
Search - jm 15.0

Search list

[Streaming Mpeg4jm15.0

Description: H.264编解码器最新代码,严格支持H.264标准草案,同时支持高清的压缩,支持图像分级编码。-H.264 codec latest code, Strict Supporting H.264 draft standard, while supporting high-definition compression, support for image classification coding.
Platform: | Size: 36451328 | Author: Sven | Hits:

[Compress-Decompress algrithmsavc-src-0.15

Description: T264:T264是由中国视频编码自由组织联合开发的H.264编解码器。T264和X264在程序结构和性能方面有些类似,也是注重实用性,吸收了JM、X264的优点。T264编码输出标准的H.264码流,但是其解码只能解码T264本身的码流。-T264: T264 is organized by the Chinese video coding jointly developed free H.264 codec. T264 and X264 in the program structure and performance is somewhat similar, but also focus on practicality, absorbed JM, X264 advantages. T264 coding standard H.264 bitstream output, but it can only be decoded bitstream decoding T264 itself.
Platform: | Size: 11668480 | Author: zhangxiaofan | Hits:

[CA authjm

Description: 一,产生密钥(算法实现可参照文档后的<附件1>KeyGeN.asp) 与<附件1>不同的是,实际要求密钥存放在字符串接受方数据库表KeyPool中,表结构如下: 1,personalID{主码} 2,secret_key{密钥,数据类型最好用text,与实际代码密钥生成长度有关} 3,serverTime{密钥生成时间,用以检验密钥是否失效} 接受方发现密钥失效,则拒绝验证 二,字符串加密(算法实现可参照文档后的<附件2>CRYPT.asp) 从数据库中读取密钥,并用密钥加密{函数:EnCrypt(正文),返回密文} 三,接受方获取密文以及其他数据以后,根据获取的参数personalID从数据库中读取密钥,并且比较时间戳,发现密钥超时(比如15分钟)则拒绝验证。 时间戳有效,则使用密钥解密{函数:DeCrypt(密文),返回正文}-First, the key generation (algorithm can refer to the document after <Annex 1> KeyGeN.asp) And <Annex 1> The difference is that the actual requirements of the key stored in a database table KeyPool string recipient, the table structure is as follows: 1, personalID {main} code 2, secret_key {key, data type, preferably with text, key generation and the actual code length about} 3, serverTime {key generation time, to test whether the key failure} Recipient found key lapses, refused to verify Second, string encryption (algorithm can refer to the document after <Attachment 2> CRYPT.asp) Key is read from the database and use the key to encrypt {function: EnCrypt (text) returns ciphertext} Third, the recipient, and other data acquired after the ciphertext, based on the parameters acquired personalID key read from the database, and compares the timestamp found key timeout (eg 15 minutes) the authentication is denied. Timestamp is valid, then use the key
Platform: | Size: 5120 | Author: 蔡国庆 | Hits:

CodeBus www.codebus.net