Welcome![Sign In][Sign Up]
Location:
Search - tamper

Search list

[File OperateDiskChange

Description: 对扇区绝对读写,一个实例,可随意更改.如有密码,请输flastar-Sector absolute right to read and write, a case can tamper with them. For password, lost flastar
Platform: | Size: 180081 | Author: 阿冲 | Hits:

[VOIP programMChat

Description: 一个可以在局域网进行视频聊天的源代码,语音压缩采用G729,视频压缩采用H.263,网络传输采用RTP。本程序介绍了视频聊天的基本技术,稍加改动就可以直接运用于Internet网络。本人主要进行流媒体传输方面的工作,有兴趣者可以和本人联系。email:cxingpeng@gmail.com-a LAN can video chat source code, voice compression using G729. H.263 video compression and network transmission using RTP. The procedures of the basic video chat technology, tamper on the Internet can be directly applied to the network. I mainly carried out with regard to the transmission of streaming media work, are interested in and I can link. Email : cxingpeng@gmail.com
Platform: | Size: 564916 | Author: cxingpeng | Hits:

[SMSlog_SMS

Description: 手机或模块串口发送短信息的VC源码,稍加改动就可以为你的系统添加短信功能。-phone or send short serial module VC source of information, we will be able to tamper with your system to add SMS functions.
Platform: | Size: 140759 | Author: liulei | Hits:

[Software Engineeringlunwen1023

Description: 基于DSP的全数字电气传动控制板的研制,以传动系统中起核心作用的调速装置为研究对象,背景是国家863计划的攻关项目。论文的目的有两个:一是实现数字调速装置的国有化,二是研制具有自主知识产权的调速控制板。 论文通过学习和借鉴国外产品先进的设计理念和国内现有的优秀成果,提出了设计数字平台的方案,实现控制装置的数字化、通用化。通过构建数字化平台,达到一板多用的目的,使一块控制板在硬件不加改动或稍加改动的情况下,通过对软件进行改动即可应用于交、直流调速,无功补偿等方面,同时实现控制的实时性、可靠性。在硬件设计中提出了DSP+ASIC结构,即DSP+FPGA的实时信号处理系统,为实现系统的实时响应奠定了硬件基础。-DSP-based Digital Electric Transmission Control Board Development, Transmission to play a core role in the governor studied the background of the state's 863 plan research projects. Papers served two purposes : First, the digital converter for the nationalization, 2 is developed with independent intellectual property rights speed control panel. Papers passed to learn from foreign products advanced design concepts and existing domestic outstanding achievements, Design of a digital platform programs to achieve control of digital devices, and generalized. By building digital platforms, reaching more than a plate of purpose make a control panel in hardware without change or tamper with the case, through software changes can be applied to diplomacy, and DC converter, reactive power compensa
Platform: | Size: 5431380 | Author: Liang | Hits:

[Graph programD542F922

Description: 彩色图像的篡改检测及自恢复算法赵春晖,孙建军,朱海峰(哈尔滨工程大学信息与通信工程学院,黑龙江哈尔滨150001)摘要:数字水印是图像认证的有效手段之一.利用小波变换提出一种计算简单的彩色图像水印算法,将一个图像的主要内容嵌入该图像自身之中,用均值量化的方法在亮度信号中嵌入水印,实现篡改检测和定位篡改区域;用多余的色度空间嵌入亮度信号和色度信号,用于恢复被篡改的图像内容.该算法可以获取较高的峰值信噪比,具有很好的鲁棒性.实验结果表明,该算法对删除、替换等恶意图像篡改具有良好的检测、定位和自修复能力.-color image tamper detection and self-recovery algorithm Zhao Chunhui, Sun Jianjun, Zhu Haifeng (Harbin Engineering University, Information and Communication Engineering Institute, Harbin, Heilongjiang 150001) Abstract : digital watermark image authentication is one of the effective means. Using wavelet transform A simple calculation of the color image watermarking algorithm, an image of the main elements embedded in the image itself, and use of quantitative methods mean the luminance signal embedded watermark, achieve tamper detection and localization tampering with the region; use of surplus space embedded color luminance signals and chrominance signals, for the restoration of tampering with the image content. The algorithm can generate a higher signal-to-noise ratio of the peak value, h
Platform: | Size: 238214 | Author: ghostsx | Hits:

[Delphi VCLmybutton2A

Description: 自己写的一个,鼠标进入区域,离开区域后按钮,改变贴图的控件,也可稍加改动,做三态的贴图按钮-himself wrote a click of the mouse to enter and leave the region after the button and change the map controls can also tamper do three state map button
Platform: | Size: 2830 | Author: 延宵 | Hits:

[ConsoleNewApp

Description: vc工具开发的一个可以运行于windows平台的服务程序模板,可以稍加改动,使程序如系统的服务程序一样运行。-vc development of a tool can be run on the windows platform services for the template, can tamper with the process, if the system of services for the same operation.
Platform: | Size: 80823 | Author: lvzhuqiang | Hits:

[Game Programzhengren

Description: 整人专家之精灵卫士,是未来工作室开发的系列免费软件之一。它既可当作电脑安全卫士(防止他人乱动您的电脑),也可当作一恶作剧程序(用它来整人。当然,前提是对方不知道关闭它的方法)。软件运行后,将控制系统(但不会做任何破坏活动),使别人无法使用电脑,重新启动也一样。软件关闭有两种方法:第一种是鼠标热键,当按下键盘键Ctrl,同时点鼠标右键(Ctrl+鼠标右键);第二种是键盘热键,当按下键盘键Alt,同时按下键盘键F8(Alt+F8),既可关闭程序,一切恢复正常。 -whole experts Wizard's guardian, is the future development of the workshop series one of the free software. It can as a computer security guards (to prevent others tamper with your computer), also be treated as a prank (it is used to the whole people. Of course, the prerequisite is to know each other not to shut down its methods). After running the software, control systems (but not do any destructive activities), so that others can not use computers restart is the same. Software closed two methods : the first one is hotkeys mouse, keyboard when you press the Ctrl key. Meanwhile point with the right mouse button (Ctrl with the right mouse button); The second keyboard hotkeys, when the keyboard by pressing Alt, Meanwhile keyboard by pressing the F8 key (Alt-F8), can shut down procedures
Platform: | Size: 40303 | Author: 穆勒 | Hits:

[Develop ToolsDJyyxt

Description: DJ音乐小偷免维护版,动态更新~可随意更改传播,但必须保留本信息。-DJ music thieves maintenance-free version can be dynamically updated to tamper with transmission, but must retain the information.
Platform: | Size: 159564 | Author: 应英 | Hits:

[Other resource15.1-Tamper

Description: STM32 开发板例子:tamper. 开发环境:Keil For ARM
Platform: | Size: 328314 | Author: 叶子 | Hits:

[Graph programD542F922

Description: 彩色图像的篡改检测及自恢复算法赵春晖,孙建军,朱海峰(哈尔滨工程大学信息与通信工程学院,黑龙江哈尔滨150001)摘要:数字水印是图像认证的有效手段之一.利用小波变换提出一种计算简单的彩色图像水印算法,将一个图像的主要内容嵌入该图像自身之中,用均值量化的方法在亮度信号中嵌入水印,实现篡改检测和定位篡改区域;用多余的色度空间嵌入亮度信号和色度信号,用于恢复被篡改的图像内容.该算法可以获取较高的峰值信噪比,具有很好的鲁棒性.实验结果表明,该算法对删除、替换等恶意图像篡改具有良好的检测、定位和自修复能力.-color image tamper detection and self-recovery algorithm Zhao Chunhui, Sun Jianjun, Zhu Haifeng (Harbin Engineering University, Information and Communication Engineering Institute, Harbin, Heilongjiang 150001) Abstract : digital watermark image authentication is one of the effective means. Using wavelet transform A simple calculation of the color image watermarking algorithm, an image of the main elements embedded in the image itself, and use of quantitative methods mean the luminance signal embedded watermark, achieve tamper detection and localization tampering with the region; use of surplus space embedded color luminance signals and chrominance signals, for the restoration of tampering with the image content. The algorithm can generate a higher signal-to-noise ratio of the peak value, h
Platform: | Size: 237568 | Author: ghostsx | Hits:

[OtherBKP

Description: This example shows how to write/read data to/from Backup data registers and demonstrates the Tamper detection feature. The associated software performs the following: Configures the Tamper pin to be active on low level and enable Tamper interrupt. Then all Backup data registers are programmed after that we check if the written data are correct. If yes a led connected to PC.06 is turned on, otherwise a led connected to PC.07 is turned on. Once a low level is applied on PC.13 pin (ANTI_TAMP) the Backup data registers are reset and the Tamper interrupt is generated. In the corresponding ISR we check if the Backup data registers are cleared, if yes a led connected to PC.08 is turned on otherwise a led connected to PC.09 is turned on. In this example the system is clocked by the HSE(8MHz).
Platform: | Size: 281600 | Author: kz02bcxg | Hits:

[ARM-PowerPC-ColdFire-MIPS15.1-Tamper

Description: STM32 开发板例子:tamper. 开发环境:Keil For ARM-STM32 development board example: tamper. Development Environment: Keil For ARM
Platform: | Size: 327680 | Author: 叶子 | Hits:

[Software EngineeringAVR465

Description: AVR465 - Single-Phase Energy Meter with Tamper Detection-AVR465- Single-Phase Energy Meter with Tamper Detection
Platform: | Size: 275456 | Author: Irfan | Hits:

[Industry researchsift1

Description: 针对现有的图像复制遮盖篡改检测算法需要某些先验信息、对后处理操作失效且计算量大等问题, 借鉴图像匹配技术中的SIFT(scale invariant feature transform)特征匹配算法,首次提出将其用于检测复制 遮盖的篡改操作。 -Cover the existing image copy for tamper detection algorithm needs some prior information on the calculation of post-processing and the failure of large issues, draw the image matching technology in the SIFT (scale invariant feature transform) features matching algorithm, first proposed The cover copy for the detection of the tampering operation.
Platform: | Size: 466944 | Author: LIDAN | Hits:

[Software Engineeringa-tamper-system-design

Description: 大学里面的学生科技创新项目,一个防窃电系统的设计。-University students in science and technology innovation projects inside a tamper system design.
Platform: | Size: 38912 | Author: Ace | Hits:

[Graph programthe-JPEG-image-tamper-detection-code

Description: 基于JPEG的图像篡改检测代码 平台matlab -Platform based on the JPEG image tamper detection code matlab
Platform: | Size: 3072 | Author: 我不改名 | Hits:

[Othertamper

Description: 网页防篡改--源码, 定时将网页信息下数据库中的网页信息进行比较,如果发生了变化,则覆盖现在网页-Page tamper- source
Platform: | Size: 84992 | Author: hxg | Hits:

[Software Engineeringtamper-detection

Description: implementation this paper in matlab Dual watermark for image tamper detection and recovery http://www.sciencedirect.com/science/article/pii/S003132030800174X
Platform: | Size: 174080 | Author: bbh | Hits:

[SCMSTM32F0使用RTC Tamper的几个注意事项

Description: STM32F0使用RTC Tamper的几个注意事项(Several considerations for using STM32F0 RTC Tamper)
Platform: | Size: 100352 | Author: LXH_1987 | Hits:
« 12 3 4 5 6 7 »

CodeBus www.codebus.net