登录
首页 » 加密解密 » encrypt image

encrypt image

于 2023-04-06 发布 文件大小:46.89 kB
0 183
下载积分: 2 下载次数: 1

代码说明:

加密数字图像的主要源码 加密数字图像的主要源码-encrypt image

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • DES算法及有关说明(HTM)
    DES加密算法及有关说明(HTM)-DES encryption algorithm and the (HTM)
    2022-02-02 19:39:09下载
    积分:1
  • pgp sdk optest
    PGP Software Development Kit Cryptographic Module  Operational Test Notes WHAT IS IT? ---------- The optest program is used as part of the FIPS 140-2 validation process. In particular, section  TE03.14.02  which requires that the tester shall perform each of the specified services and observe that that they have been implemented  properly.   As a side benefit to clients of the  SDK this code can also be used a good example of how to perform a number of commonly used functions, whether or not the developer intends to run in FIPS mode.   Depending on what option is chosen from the command line the following tests will be run: FIPS MODE SPECIFIC TESTS ------------------ - Invoke the Approved mode of operation (optest.c)     This involves Initializing the SDK, checking
    2022-02-02 03:16:08下载
    积分:1
  • 数字 数字 数字
    数字加密 数字加密 数字加密 -digital encryption, digital encryption, digital encryption, digital encryption, digital encryption, digital encryption
    2022-03-23 12:18:33下载
    积分:1
  • 代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
    What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
    2023-06-18 10:00:03下载
    积分:1
  • MIME(Quoted
    MIME(Quoted-Printable & Base64) 编码解码程序-MIME (Quoted-Printable Base64) codec procedures
    2023-02-26 12:40:03下载
    积分:1
  • 一种国际上通用的算法―DES算法的原理
    一种国际上通用的加密算法―DES算法的原理-a common encryption algorithms-DES algorithm Principle
    2023-07-24 01:05:04下载
    积分:1
  • C# ranking Daquan source code, a number of ranking methods for the development o...
    C#的排序大全源代码,有多种排序方法,对于程序开发可以直接使用。-C# ranking Daquan source code, a number of ranking methods for the development of procedures can be used directly.
    2022-04-08 04:54:25下载
    积分:1
  • RSA算法的实验报告,有源码、流程图、时间复杂度分析等。
    RSA算法的实验报告,有源码、流程图、时间复杂度分析等。-RSA algorithm experimental reports, source code, flowcharts, time complexity analysis.
    2022-08-03 14:25:10下载
    积分:1
  • 哈希数据编码码实现(Hash) 需安全openssl等安全证书
    哈希数据编码解码实现(Hash) 需安全openssl等安全证书-Hash data codec implementation (Hash) need to secure safety certificate openssl, etc.
    2022-05-15 10:26:49下载
    积分:1
  • right ORCLE database protection, and highly functional, encryption, access, dele...
    对ORCLE数据库进行保护,具有很强的功能,有加密,访问,删除,等保护功能-right ORCLE database protection, and highly functional, encryption, access, deletion, such as the protection function
    2022-10-22 18:15:03下载
    积分:1
  • 696516资源总数
  • 106436会员总数
  • 7今日下载