Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode Graph program Special Effects

Search in result

Special Effects list
Sort by :
« 1 2 ... .29 .30 .31 .32 .33 6434.35 .36 .37 .38 .39 ... 7721 »
Downloaded:0
use opencv, directshow for preservation and Video Capture Motion Detection
Date : 2025-07-09 Size : 220kb User : 张德超

Downloaded:0
wrote by Fujian Shi (fieagl e@yahoo.com.cn) It can transform the file t com o pgm file, you can watch the picture
Date : 2025-07-09 Size : 1kb User : windowscm

Downloaded:0
jpeg image processing
Date : 2025-07-09 Size : 2kb User : windowscm

Downloaded:0
image processing papers information
Date : 2025-07-09 Size : 3kb User : windowscm

Downloaded:0
image processing papers information
Date : 2025-07-09 Size : 3kb User : windowscm

Downloaded:0
image processing papers information
Date : 2025-07-09 Size : 2kb User : windowscm

Downloaded:0
content in the image authentication technology is a novel image information security technology, used to verify digital image content authenticity and integrity. This paper introduces the content-based image authenticati
Date : 2025-07-09 Size : 741kb User : cici

Downloaded:0
Abstract digital watermarking technology is the image in recent years to protect technical fields of study a hot, This paper presents a wavelet transform-based image digital watermark embedding algorithm Matlab "The expe
Date : 2025-07-09 Size : 109kb User : cici

Downloaded:0
dicom programming library can be used for the development of this class library
Date : 2025-07-09 Size : 1.39mb User : bayy

Downloaded:0
watermark embedding and various attacks source, which is the entire source of detailed source
Date : 2025-07-09 Size : 29kb User : 飞扬

Downloaded:0
I as a carrier of data, W for the watermark signal, K key, Then the watermark embedded vector can be described as Iw [124] : F = Iw (I, W, K). (1)-, F said watermark embedding strategy.
Date : 2025-07-09 Size : 1kb User : 江力

Downloaded:0
established as a carrier of data, W for the watermark signal, K key, Then the watermark embedded vector can be described as Iw [124] : F = Iw (I, W, K). (1)-, F said watermark embedding strategy.
Date : 2025-07-09 Size : 1kb User : 江力
« 1 2 ... .29 .30 .31 .32 .33 6434.35 .36 .37 .38 .39 ... 7721 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.