Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode Graph program
Graph program list
Sort by :
« 1 2 ... .10 .11 .12 .13 .14 17915.16 .17 .18 .19 .20 ... 18703 »
Downloaded:0
OpenGL programming examples with a pair of OpenGL particle system flame, smoke, Simulation of the explosion.
Date : 2008-10-13 Size : 15.5kb User : 项作伟

Downloaded:0
content in the image authentication technology is a novel image information security technology, used to verify digital image content authenticity and integrity. This paper introduces the content-based image authenticati
Date : 2008-10-13 Size : 740.83kb User : cici

Downloaded:0
Abstract digital watermarking technology is the image in recent years to protect technical fields of study a hot, This paper presents a wavelet transform-based image digital watermark embedding algorithm Matlab "The expe
Date : 2008-10-13 Size : 108.94kb User : cici

Downloaded:0
dicom programming library can be used for the development of this class library
Date : 2008-10-13 Size : 1.39mb User : bayy

Downloaded:0
watermark embedding and various attacks source, which is the entire source of detailed source
Date : 2008-10-13 Size : 29.55kb User : 飞扬

Downloaded:0
local binary mode LBP, introduced three different LBP operator, Image Analysis for the local texture characteristics.
Date : 2008-10-13 Size : 3.96kb User : 刘子凡

Downloaded:0
I as a carrier of data, W for the watermark signal, K key, Then the watermark embedded vector can be described as Iw [124] : F = Iw (I, W, K). (1)-, F said watermark embedding strategy.
Date : 2008-10-13 Size : 1.6kb User : 江力

Downloaded:0
established as a carrier of data, W for the watermark signal, K key, Then the watermark embedded vector can be described as Iw [124] : F = Iw (I, W, K). (1)-, F said watermark embedding strategy.
Date : 2008-10-13 Size : 1.13kb User : 江力

Downloaded:0
established as a carrier of data, W for the watermark signal, K key, Then the watermark embedded vector can be described as Iw [124] : F = Iw (I, W, K). (1)-, F said watermark embedding strategy.
Date : 2008-10-13 Size : 1.6kb User : 江力

Downloaded:0
established as a carrier of data, W for the watermark signal, K key, Then the watermark embedded vector can be described as Iw [124] : F = Iw (I, W, K). (1)-, F said watermark embedding strategy.
Date : 2008-10-13 Size : 1.66kb User : 江力

Downloaded:0
MPEG encoding of the source, is worth considering, for beginners to a certain extent inspired programming, Oh
Date : 2008-10-13 Size : 874.84kb User : 朱逸

Downloaded:0
watermark added to the low-frequency region can have good watermark robustness added to the high frequency region can be made good through Ming, but the poor robust watermark added to the IF District is a robust and tran
Date : 2008-10-13 Size : 1.43kb User : 江力
« 1 2 ... .10 .11 .12 .13 .14 17915.16 .17 .18 .19 .20 ... 18703 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.