豆丁网
拖拽LOGO到书签栏收藏网站
小学数学知识点精讲汇总
加入大会员,文档免费下
权威考研资料库,备考必看
登录
注册
文档
专辑
用户
建筑
合同
报告
医疗
企业工具
按相关排序
按相关
最多阅读
最新上传
全部格式
全部格式
DOC
PDF
PPT
XLS
TXT
豆单
全部页数
全部页数
1-8页
9-100页
100页以上
时间不限
全部
2024年
2023年
2022年及以前
只看优质
只看可投资
展开
排序:
相关
最多阅读
最新上传
格式:
全部
doc
pdf
ppt
xls
txt
豆单
页数:
全部
1-8页
9-100页
100页以上
时间:
全部
2024年
2023年
2022年及以前
10
Illustration
Watermarks
for Vector Graphics
.pdf
vector graphics illustration cover illustration as an illustration vector vector magic java vector vector用法
106802045
热度:
收藏到书房
7
An Unusual Position of
Watermarks
in an Italian …
.pdf
An Unusual Position of Watermarks in an Italian …
uvlqnx11
热度:
收藏到书房
3
Genomic Polymorphisms as Inherent
Watermarks
for Tracking Infectious Agents
.pdf
Genomic Polymorphisms as Inherent Watermarks for Tracking Infectious Agents
299447
热度:
收藏到书房
4
Dual detection of
watermarks
embedded in the DCT domain
.pdf
Dual detection of watermarks embedded in the DCT domain
qushagu1314
热度:
收藏到书房
6
Robust FPGA Intellectual Property Protection Through Multiple Small
Watermarks
.pdf
Robust FPGA Intellectual Property Protection Through Multiple Small Watermarks
taotao286272
热度:
收藏到书房
6
Using Vilenkin-Chrestenson Functions for Generating
Watermarks
with Given Properties
.pdf
A new scheme for generating watermarks on the basis of the Vilenkin-Chrestenson functions is proposed. The scheme allows to generate the watermarks with an irregular structure in a given frequency domain. The parameters of the watermarks may be chosen so as to maximize the robustness of the watermarking scheme against such dangerous attacks as JPEG compression, low pass filtering and cropping. The proposed scheme for generating watermarks vary from the existing methods reported in the literature. We have performed a series of experiments to confirm the effectiveness of the proposed scheme. Simulation results show their robustness for surviving intentional attacks and, hence, their effectiveness in protecting copyrights.
englishpapers
热度:
收藏到书房
5
Watermarks
encrypted in a concealogram and deciphered by a…
.pdf
Watermarks encrypted in a concealogram and deciphered by a…
elevtb86
热度:
收藏到书房
13
a reliability model for the detection of electronic
watermarks
in digital images; symposium on communications and vehicular technology (5th) held in enschede, the netherlands on oct 1997(..
.pdf
a reliability model for the detection of electronic watermarks in digital images; symposium on communications and vehicular technology (5th) held in enschede, the netherlands on oct 1997(226.94kb)
rlwx3859
热度:
收藏到书房
14
Software
Watermarks
amp; Fingerprints
.pdf
Software Watermarks
micrometastasis
热度:
收藏到书房
20
Watermarks
, fingerprints, and digital signatures - JISC
.doc
Watermarks, fingerprints, and digital signatures - JISC
affda
热度:
收藏到书房
3
4
5
6
7
8
9
10
11
12
13
向豆丁求助:有没有
watermarks
?
95%
的用户最终下载了:
pdf
digital
watermarks
for copy...
pdf
New Attacks on Timing-based...
如要投诉违规内容,请
联系我们
按需举报;如要提出意见建议,请到
社区论坛
发帖反馈。