英语人>网络例句>隐藏 相关的搜索结果
网络例句

隐藏

与 隐藏 相关的网络例句 [注:此内容来源于网络,仅供参考]

He recalls the words of the Chief Constable of Birkenhead in his annual report for 1936: 'Any film that prompts a child to commit crime, teaches him to conceal stolen goods, or to evade the Police of the truth, should never be allowed to criculate'.

他还看到1936年伯肯黑德的警察局长的在报告里的一些话:&每一部迅速的导致孩子犯罪的电影,都能教他们隐藏偷来的赃物,或者向警方隐藏事实,这些电影必须被禁播。&

A new algorithm for digital audio watermarking is proposed in this paper. This algorithm bases on the wavelet transform. By using this algorithm, the watermarked speech signal sounds the same as the original one. The tiny difference is neglectable by human ear.

主要研究了在数字语音信号中加入数字水印的方法,提出了一种基于小波变换的数字水印隐藏与检测算法,用这种算法隐藏水印具有很强的隐蔽性,对原始语音的影响基本上察觉不出来。

An algorithm for image hiding is presented to embed important image into the k rightmost LSBs of the host image.

摘要提出一种图像隐藏算法,它将重要图像隐藏在另一宿主图像的LSBs中。

Secret information embedded asymmetrically made the correlative degree of adjacent pixels sequence of carrier image reduced, especially the correlative degree of some local image may saltate. This phenomenon enhanced the risk of secret information being detected.

隐藏信息的非均匀嵌入使得载体图像的相邻像素序列相关度降低,而且图像局部有相关度突变的现象,增大了隐藏信息被检测到的风险。

Steg B(superscript +)-Tree, which uses steganographic technologies to overcome above mentioned weakness is presented by hiding the existence of data so that an adversary could get no information about whether the protected data ever exists without correct object name and access key.

介绍一种新的着重于隐藏数据的存在性的加密手段-隐文加密(Steganography,隐写术)来对重要文件的存储进行加密,该方法采用隐文B树Steg B(上标+ Tree建立UNIX系统的文件索引,并通过隐藏表将隐文B树索引隐蔽起来,使攻击者无法知道重要信息的存在,从而使要保护的信息更安全。

It has an easy to use clipboard encryption and supports steganography, the hiding of text in images.

它也提供了容易的剪贴板加密功能,支持信息隐藏,可以在图片中隐藏文本。

The evaluation of the steganography performance draws wide attention from the public in the research of the information hiding.

在基于图像的信息隐藏研究过程中,人们对信息隐藏性能的评价十分关注。

It protects your privacy while you are connected and makes you not trackable, hiding your identity and crypting everything you are sending/receiving from others.

当你连接的时候它为你保守隐私,并且使你不被跟踪,隐藏你的Ip和隐藏你发送或从他人那你接受的任何东西。

Based on visual perception and image statistic characteristics, propose new techniques for content-aware key feature measurement, extraction and encryption of vidual media, consolidate foundations of mathematic theories of information hiding and embedding, propose robust capacity models and estimation methods for visual media information hiding and embedding; solve the key problems inherent in digital content certification of visual media, systematically establish controllable content-aware security mechanism of visual media

基于视觉感知和图像统计特性,提出可视媒体基于内容的关键特征度量、提取和加密的新方法;完善信息嵌入与隐藏的数学理论基础,提出高鲁棒性的可视媒体信息嵌入与隐藏的容量模型和方法,解决可视媒体的内容认证问题,系统地建立可控的可视媒体内容安全新机制。

The hundreds of billions of dollars in the shadow banking system—the notorious SIVs and conduits that have caused the banks so much pain—have been warehoused there to get round the rules.

隐藏在影子银行系统的上百亿美金资产---例如造成银行痛楚的那些最有害的结构性投资工具及管路---均是绕过这些规定而隐藏下来的。

第8/100页 首页 < ... 4 5 6 7 8 9 10 11 12 ... > 尾页
推荐网络例句

Means the parent directory, so this command means to execute "toolchain.sh," which is in the current directory.

代表父目录,所以这个命令就是执行当前目录下的"toolchain.sh"。

Yes,In fact,I'm on our city ream.

是的。事实上我是我们市队的。

The strong ionospheric disturbances caused by the significant magnetic storm appeared on the whole world.

用欧亚大陆地面电离层垂测站资料考察1989年3月12~16日磁暴期间的电离层暴形态及其发展变化。