-
html语言文档,基础教程!清华大学出版社
html语言文档,基础教程!清华大学出版社-html language documents, based Directory! Qinghua University Press
- 2023-04-19 11:40:04下载
- 积分:1
-
Is mainly the Xi an University of Science and Technology matlab programming prog...
Is mainly the Xi an University of Science and Technology matlab programming programs with C
- 2022-02-03 08:13:46下载
- 积分:1
-
数据库
数据库-Database
- 2023-05-18 11:25:03下载
- 积分:1
-
俄罗斯方块
俄罗斯方块-Tetris
- 2022-03-13 09:33:16下载
- 积分:1
-
呵呵,再传一个看看,是关于icos的冬冬啊
呵呵,再传一个看看,是关于icos的冬冬啊-Oh, a look at the SA is on the kick AzCom ah.
- 2022-01-28 23:19:15下载
- 积分:1
-
做USB键盘是好资料,本人从一位朋友那里索取到的,所有HID的USB Key scancode.做USB键盘的该笑了.!...
做USB键盘是好资料,本人从一位朋友那里索取到的,所有HID的USB Key scancode.做USB键盘的该笑了.!-USB keyboard is so good, from my friends at one of the all HID USB Key scancode. Do USB keyboard of the smiling. !
- 2022-07-13 16:40:18下载
- 积分:1
-
汇编指令帮助文档,巨好!
汇编指令帮助文档,巨好!-compilation directives help documentation, giant!
- 2022-06-12 22:36:30下载
- 积分:1
-
This article is about IPL and OpenCV presentation, it can be said there are no s...
这篇文章是关于IPL和OpenCV的介绍,可以说国内还没有类似的文章。-This article is about IPL and OpenCV presentation, it can be said there are no similar articles.
- 2022-07-04 03:39:50下载
- 积分:1
-
文字识别
一、 编写目的为了实现屏幕显示图片上的文字内容进行简单方便的捕捉和光学识别。本软件将屏幕图像捕捉、保存功能和OFFICE的扩展功能相结合,快捷方便地实现屏幕上部分区域的文字内容识别和保存。二、 软件、硬件运行环境软件:Windows2000/XP/Vista,Microsoft Office,建议 Windows XP, Office 2003 硬件:最低硬件环境,Intel Pentium III或同等的处理器,最低要求233MHz,128MB内存,400MB可用硬盘空间。三、 编程语言版本号、及程序 Visual C++ 6.0 四、软件功能与特点主要功能:对屏幕显示的内容进行图
- 2022-12-12 20:35:04下载
- 积分:1
-
提出了一种基于小波域的图像数字水印算法・该算法将相互正交的两种水印(鲁棒水印和参考
水印)同时添加到经过DWT后的载体图像小波系数中,然后用小波反变换得到添...
提出了一种基于小波域的图像数字水印算法・该算法将相互正交的两种水印(鲁棒水印和参考
水印)同时添加到经过DWT后的载体图像小波系数中,然后用小波反变换得到添加了水印的图像・用提取出
的参考水印来估计图像所受到的攻击,由于提取出的鲁棒水印所受的攻击与参考水印受到的攻击一样,因此
可以估计出原始的鲁棒水印・通过对嵌入水印的图像进行加入噪声、滤波、压缩以及裁剪等大量图像处理等试
验,均能正确检测出水印,表明该算法具有很好的感知效果和鲁棒性
-A wavelet-based image digital watermarking algorithm that the algorithm will be mutually orthogonal two watermarks (watermark robust watermarking and reference) at the same time added to the carrier after image after DWT wavelet coefficients, and then using wavelet transform has been Add a watermark image to use to extract a reference to estimate the watermark image by the attacks, as a result of the robust watermark extracted suffered attacks and the reference watermark by the same attack, it can be estimated through the original Robust Watermarking of the embedded watermark image by adding noise, filtering, compression and cutting, such as a large number of image processing such as testing, can correctly detect the watermark, show that the algorithm has good
- 2023-07-21 02:35:04下载
- 积分:1