搜索资源列表
Example05
- 因为本系统在写成电子稿件的时候,界面是英文的,因此在书中介绍代码的时候,都是采用英文界面名称,如“\"Encrypt\"按钮单击事件代码”,但是书上的界面后来被汉化,导致文本和图不一致,因此在此提供英文界面和中文界面两个版本的系统。-because of the system of electronic articles written in a time when the interface is in English, the book on the code, are English in
sanpack_rsa_vs2003sln_src
- 分析RSA算法的应用现状,论证文件加密应用RSA算法的可行性和意义。设计一套完整实用的RSA文件加密解决方案,具体编码实现。对RSA算法进行研究,从常规RSA算法出发,用C++实现RSA加密算法类库,并在32位windows平台封装成组件。在.Net平台引用此组件,实现可以对任意文件进行RSA加密操作的窗体应用程序。经过加密的文件以及密钥文件都是文本文件。给出关键类类图、整个应用程序的结构描述文档、关键模块流程图、较详细的接口文档、所有源代码。对应用程序进行测试,对测试结果进行分析研究,进而对应
otherlogonmode
- 另类密码登录窗体(拼图),只有正确拼出结果图才能进入。-alternative Password Login Window (puzzles), the only correct map decorated results can be admitted.
加密解密地图
- VC加密解密地图-VC encryption and decryption map
hideinbmp
- 在位图文档中如何进行基本的信息隐藏-incumbent map document how the basic information hiding
frey.rar
- frey map混沌随机序列的MATLAB产生源程序-frey map chaotic random sequences generated source MATLAB ,frey map chaotic random sequence of MATLAB generated source-frey map chaotic random sequences generated source MATLAB
X61-X61S-X61T-24S08
- IBM X6系列的笔记本主板解密的图的接点位置 看了直接接点 就可以解密了-IBM X6 Series notebook motherboard to decrypt the location of the contact map can be read directly contacts declassified
T60alt
- 这是IBM T60型号的主板解密连接线位置图 按标下的点接线就可以解密了-This is the IBM T60 type of motherboard location map according to declassified cables under the standard point wiring can decrypt the Oh
AES
- 实现AES加密与解密算法,输入为任意长度的字符串,输出为加密后的字符(直接由IISC码表映射得到)-Implement AES encryption and decryption algorithm, a string of arbitrary length input and output for the encrypted characters (code table directly from the map by IISC)
informationhide
- 基于混沌系统的图像加密算法,先采用Arnold猫映射进行像素点位置置乱,然后对置乱后的图像的像素值进行Liu混沌加密或者Lorenz混沌加密。-Chaotic systems based on image encryption algorithm, first using Arnold cat map for the location of pixel scrambling, and then scrambling image pixel values Liu chaotic encryptio
CatMap
- chaos theory , chaotic map, cat map
ANewImageEncryptionArithmetic
- ieee加密新文章A New Image Encryption Arithmetic Based on a Three-dimensional Map -A New Image Encryption Arithmetic Based on a Three-dimensional Map
AnImageEncryptionSchemeBasedonChaoticMap
- ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map - In this paper, a novel block digital image encryp- tion scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomp
Newcolorimageencryptionalgorithmbasedonchaoticsequ
- IEEE2008年文章An Image Encryption Scheme Based on Chaotic Map -An Image Encryption Scheme Based on Chaotic Map
an_intellegent_audio_water_marking_based_on_dwt-s
- All three, Discrete Wavelet Transform (DWT) - Singular Value Decomposition (SVD) and Adaptive Tabu Search (ATS) have been used as mathematical tools for embedding data into an audio signal. In this paper, we present a new robust audio waterma
Logistichecat
- 将猫映射(cat map ) 与Logist ic 映射相结合, 构造了一种语音加密算法. 该算法首先将语音数据堆叠成二维, 然后利用二维猫映射将数据的位置置乱, 最后利用一维Logist ic 映射构造替换表, 对数据进行扩散.-The cat map (cat map) and Logist ic mapping the combination of a voice encryption algorithm is constructed. The algorithm first voic
arnold
- arnold map used in encryption
Image-Encryption-using-the-Ikeda-map
- Presentation to link IKEDA maps with DES encryption for secure encryption of images
cccodes
- In this paper,wepropose a newloss-less symmetric imagecipher basedonthe widelyusedsubstitution– diffusion architecture which utilizes chaotic standard and logisticmaps. It is specifically designed for the coloured images, which are 3D arrays of d
chaotic-cipher-cheby-shev-map
- chaotic cipher chebyshev map diffusion