根据W. Bender的《Techniques for data Hiding》编写 %用补丁方法对图象做空间域的水印嵌入和提取, %效率极高,程序简洁,属信息隐藏中常用的方法之一。 %作者:辽宁大学 信息学院 范铁生 %email:fts0@163.com
标签: W. Techniques Bender Hiding
上传时间: 2016-01-19
上传用户:stella2015
根据W. Bender的《Techniques for data Hiding》编写 %用补丁方法对图象做DCT域的水印嵌入和提取, %效率极高,程序简洁,属信息隐藏中常用的方法之一。 %作者:辽宁大学 信息学院 范铁生 %email:fts0@163.com
标签: W. Techniques Bender Hiding
上传时间: 2013-12-03
上传用户:eclipse
Analysis of blind data Hiding using discrete cosine transform phase modulation。
标签: modulation transform Analysis discrete
上传时间: 2013-12-27
上传用户:yzy6007
The main idea of this work is to create a driver for Hiding selected processes and files.
标签: processes selected create driver
上传时间: 2014-01-09
上传用户:yyq123456789
It was proposed that perfect invisibility cloaks can be constructed for Hiding objects from electromagnetic illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai et al., Nat. Photon. 1, p. 224) have however simplified material parameters in order to facilitate easier realization as well as to avoid infinities in optical constants. Here we show that the cylindrical cloaks with simplified material parameters inherently allow the zeroth-order cylindrical wave to pass through the cloak as if the cloak is made of a homogeneous isotropic medium, and thus visible. To all high-order cylindrical waves, our numerical simulation suggests that the simplified cloak inherits some properties of the ideal cloak, but finite scatterings exist.
标签: invisibility constructed proposed electrom
上传时间: 2013-12-18
上传用户:13215175592
Hiding Text in a Image
上传时间: 2014-09-01
上传用户:小宝爱考拉
very useful ebook for data Hiding
上传时间: 2014-01-26
上传用户:edisonfather
very useful ebook for data Hiding
上传时间: 2017-04-20
上传用户:tb_6877751
very useful ebook for data Hiding
上传时间: 2014-01-03
上传用户:hwl453472107
Hiding process with DKOM !采用断开系统中进程的双向链表方式,隐藏指定进程。本程序采用了硬编码,所以只能隐藏XP的进程,如果是其他系统需要修改编码地址!
上传时间: 2017-05-10
上传用户:恋天使569