-
四叉树的例子
四叉树示例
- 2022-05-30 09:51:50下载
- 积分:1
-
the DES implemented in C, simple and effected, worthy of look.
用C语言实现的DES加密算法,简单高效,值得看看。-the DES implemented in C, simple and effected, worthy of look.
- 2022-07-12 13:19:27下载
- 积分:1
-
教你如何配置安全的个人计算机
教你如何配置安全的个人计算机-teach you how to configure the personal computer security
- 2023-01-30 21:20:04下载
- 积分:1
-
消除登录主机后的痕迹/日志信息的程序
消除登录主机后的痕迹/日志信息的程序-A program which remove all information for host register and logs
- 2022-05-27 05:13:21下载
- 积分:1
-
黑雨HTTP网页密码自动尝试登录器.
黑雨HTTP网页密码自动尝试登录器.-Black HTTP website password to log on automatically.
- 2023-04-07 08:00:03下载
- 积分:1
-
对原始信号做DCT的算法:Cox 和Piva 等人提出的DCT技术的经典之作。Cox利用随机数发生器产生标准正态序列作为水印信息对图像进行整体DCT变换后,选取...
对原始信号做DCT的算法:Cox 和Piva 等人提出的DCT技术的经典之作。Cox利用随机数发生器产生标准正态序列作为水印信息对图像进行整体DCT变换后,选取除去DC系数之外部分较低频率系数叠加水印信息 Piva则修改整幅图像的中频部分。对原始信号分块后,再作DCT的算法:Hsu和Wu 把图像进行8*8分块,将一个二进制序列作为水印放入DCT的中频区;有些学者则计算整个图像的DCT,把一个实数序列嵌入DCT的中频系数上。选择中频区的好处是一方面尽量减少嵌入信息对图像主观视觉的影响;同时,尽量避免有损压缩对水印信息可能带来的损失。还有一种DCT方法就是把水印信息嵌入到高频系数上,但是采用这种方法,抗压缩性非常差。-done to the original signal DCT algorithm : Cox Piva and others made the DCT technology classic. Cox using random number generator producing standard normal sequence information as a watermark image of the overall DCT, DC coefficient selection removed outside some lower frequency coefficient superposition watermark information Piva will be replaced by images of the entire IF part. The original signal block, before making the DCT algorithm : Wu Hsu and put images 8* 8 block, a binary sequence as watermarks Add DCT IF; Some scholars calculated whole image of DCT, a real sequence embedded IF DCT coefficients. IF the choice is a good one to minimize the embedded information to the sub
- 2023-01-30 00:55:03下载
- 积分:1
-
源的Internet Explorer 5RN查看器器
Source Viewer Changer for Internet Explorer 5rn
- 2022-05-17 02:41:24下载
- 积分:1
-
Winpooch can monitor Windows systems (2000, XP, 2003, but only 32
Winpooch可以监控Windows 系统(2000, XP, 2003, but only 32-bits). 它能监测系统更改,以便能检测木马或间谍软件的安装。-Winpooch can monitor Windows systems (2000, XP, 2003, but only 32-bits). It monitoring system changes in order to detect Trojan horse or spyware installed.
- 2022-03-13 02:59:23下载
- 积分:1
-
用c语言实现Ping命令的示范程序
用c语言实现Ping命令的示范程序-used language Ping orders of the model procedures
- 2022-02-03 03:33:37下载
- 积分:1
-
用三种方式进行文件缓存的操作,并通过比较平均时间来了解文件缓存的工作原理,涉及的主要API函数有CreateFile,ReadFile和WriteFile,Ge...
用三种方式进行文件缓存的操作,并通过比较平均时间来了解文件缓存的工作原理,涉及的主要API函数有CreateFile,ReadFile和WriteFile,GetOverlappedResult函数-Three way file cache operation, and by comparing the average time to understand the file cache
- 2022-06-27 00:46:57下载
- 积分:1