登录
首页 » matlab » attackjsteg

attackjsteg

于 2009-05-24 发布 文件大小:3825KB
0 116
下载积分: 1 下载次数: 332

代码说明:

  抗jsteg的隐写分析,jsteg jpeg图像隐写的重要方法之一。(Anti-jsteg of steganalysis, jsteg jpeg image steganography one of the important ways.)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • WinRAR-ZIP
    直流电机的起动,制动,调速。其中含有各个部分的matlab仿真模型。(DC motor starting, braking, speed. Which contains various parts of matlab simulation model.)
    2013-11-28 21:10:37下载
    积分:1
  • qiyipuxielv11
    分析并实现了奇异谱斜率的方法,编程实现了时域信号的检测。(And to achieve a singular spectrum analysis method of slope, programming of the time-domain signal detection.)
    2013-09-01 15:29:35下载
    积分:1
  • RTSdevelopment
    <系统实时仿真开发环境与应用>,matlab平台搭建实时仿真系统参考书。(<Real-time simulation development environment and application>, matlab platform to build real-time simulation system reference.)
    2011-12-02 09:53:31下载
    积分:1
  • M
    说明:  《现代通信系统第二版》书中例子的MATLAB 源代码(&quot Modern Communication Systems 2nd Edition&quot book MATLAB source code for the example)
    2009-11-07 13:43:31下载
    积分:1
  • wk
    说明:  WK算法是可以实现精确SAR成像的算法,采用stolt插值。(WK algorithm could realize exact imaging in SAR, which includes Stolt interpolation.)
    2017-06-07 15:41:34下载
    积分:1
  • face_database
    人脸检测,使用的是matlab来做的,可以自由改动(facial detection)
    2012-02-08 16:01:38下载
    积分:1
  • abcmodel0
    abe model matlab very good
    2014-01-16 17:24:59下载
    积分:1
  • Gibbs
    本程序用于观察数字信号处理中的吉布斯现象,有助于加深对窗与信号截断的理解(Change the length of the window and observe the Gibbs phenomenon)
    2011-01-19 16:37:00下载
    积分:1
  • PSOforWTA
    用Matlab编写的武器目标分配算法程序(Prepared using Matlab weapon target assignment algorithm)
    2021-04-20 09:48:50下载
    积分:1
  • 16-BoydEdit
    Abstract- Although the vast majority of EMV payments are processed without a hitch, there are occasions when the cardholder later repudiates a payment. The cardholder may be adamant that he or she was not present to authorize the transaction, but the issuing bank considers the transaction data and certificate to evidence otherwise because they show that the chip and PIN mechanism had been used to authenticate the cardholder. A solution is proposed that leaves a cryptographic mark on the card’s chip which could help determine whether or not that card was present for the transaction and thereby help adjudication.
    2014-10-12 12:12:33下载
    积分:1
  • 696518资源总数
  • 104349会员总数
  • 32今日下载