隱寫術 的英文怎麼說

中文拼音 [yǐnxiěshù]
隱寫術 英文
steganography
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : 寫構詞成分。
  • : 術名詞1. (技藝; 技術; 學術) art; skill; technique 2. (方法; 策略) method; tactics 3. (姓氏) a surname
  1. Theoretical expatiate on general concepts and fundamental principles of information hiding and steganography, also point out possible directions for further research, also analysis the probability of speech as the host carry signal and efficient masking characteristics of psycho - acoustic model, it is shown that : there is an improvement on imperceptibility according to human auditory masking effect

    闡述了信息藏技的重要概念、基本理論以及廣闊的應用前景。分析了將語音信號作為宿主載體信號的可行性,參考心理聲學模型的特性,得出結論:基於人耳聽覺掩蔽效應的演算法,在蔽性上有很大的提高。
  2. As a new branch of information security, information hiding technology including digital watermarking and steganography aims to protect intellectual property rights of multimedia contents and to send secret messages under the cover of a carrier signal

    信息藏是信息安全領域中的一項新興技,主要有數字水印和數字密兩大分支,分別用於多媒體數據的版權保護和蔽通信。
  3. Six hermits was premiered at the sydney conservatorium of music in october 2002, and was later featured at the melbourne festival. coming to hong kong for the first time, the work has been described as " a substantial and sometimes bemusing musical statement, covering a gamut of emotions and styles from tongue - in - cheek parody to intense contemplation.

    士"於2002年10月在悉尼首演,並為同年墨爾本藝節的節目,兩次演出均空前成功,一份當年的樂評道: "這是一組有份量的音樂創作,有引人沉思片斷風格多樣,從漫不經意的嘲弄模仿到深思熟慮的嚴肅創作,兼而有之。
  4. To the common requirement of invisibility of the two, the paper presents a information hiding strategy which first uses cluster analysis methods ( this paper uses k - means algorithm ) to classify the image to get the nature of the image, and then uses one embedding algorithm, accounting the improvement on the conceal effect using image ' s character

    接著對信息藏技的兩個重要分支隱寫術與數字水印技,闡述其各自特點及異同點,針對二者在不可見性上的共同要求,從利於圖像自身的特性增強掩密效果的思路出發,提出先用聚類分析的方法(本文採用了k -均值演算法)對圖像的像素點進行分類以充分發掘圖像自然的內在特性,再結合嵌入演算法的信息藏策略。
  5. Firstly, this paper summarizes modern weaponry stealth technology at home and abroad, and lays special emphasis on analyzing stealth problem of cruise missile ’ s guidance head cover, aerocraft radar canopy and other privileged sites. secondly it makes a research on related theories of transparent metallic mesh that applied to missile ’ s guidance head cover and aerocraft radar canopy, and deduces relational expression between transparent metallic mesh structural parameters and radar wave - shielding efficiency, infrared transmitting. we use laser direct writing technique to fabricate a metallic mesh ( dimension : 70mm 70mm ; line width : 5 m ; period : 350 m ) on glass surface, then do experiment to test radar wave - shielding of metallic mesh via radar transmitting and receiving device

    本文首先綜述了國內外現代武器系統身技方法;重點對巡航導彈導引頭罩和飛機雷達艙罩等特殊部位的身問題進行了研究,研究了金屬網柵用於導彈頭罩和飛機雷達艙罩身的相關理論,推導了金屬網柵結構參數對雷達波屏蔽效率和透紅外關系式;用激光直工藝,在玻璃表面上製作了一塊面積為70mm 70mm ,線寬為5 m ,線周期為350 m的金屬網柵;在實驗室里用雷達發射和接收裝置測試了網柵對雷達波的屏蔽實驗;認為利用金屬網柵技對雷達波具有一定的屏蔽作用,而且不影響精確制導的紅外線高效透過。
  6. After breakfast, hidden cameras filmed the pupils as they got on with reading, writing and arithmetic

    早餐過后,事先藏好的攝像機拍下了孩子們閱讀,作及算的表現。
  7. Ease of use : the contribution of o - o tools to modern interactive systems and especially their user interfaces is well known, to the point that it sometimes obscures other aspects ( ad copy writers are not the only people who call “ object - oriented ” any system that uses icons, windows and mouse - driven input )

    移植性:藉由強調抽象化和信息藏,對象技鼓勵設計者區別規格特性和實現特性,並使連接效果更容易.要編系統以自動地適應硬體-軟體機器上各種不同的組件,多態技和動態綁定將會使之可能,舉例來說不同的窗囗系統或不同的數據庫管理系統
  8. The magic pen : when you have any secret and don t want let the other people know, can make use of that to write down, as long as make use of to check once the bill light shine on, can let him reveal his true colors, let you of intention, knows for her

    型筆魔型筆:當你有任何秘密不想讓別人知道,可利用該筆下,只要利用驗鈔燈一照,就可讓他原形畢露,讓你的心意,只給她知道。
  9. An important technique that java developers can employ to increase encapsulation, and to support information hiding, is the appropriate use of accessor methods

    Java開發人員用來增強封裝性和支持信息藏的一種重要技就是恰當地使用讀方法。
  10. 3. 4 each member represents, warrants and agrees that it has obtained all necessary third party copyright or trademark licenses and permissions and shall be solely responsible for ensuring that any material or information it posts on the site or provides to egate2china or authorizes egate2china to display does not violate the copyright, trademark, trade secret or any other personal or proprietary rights of any third party or is posted with the permission of the owner of such rights

    您授予本公司獨家的、全球通用的、永久的、免費的許可使用權利(並有權在多個曾面對該權利進行再授權) ,使本公司有權(全部或部份地)使用、復制、修訂、改、發布、翻譯、分發、執行和展示"您的資料"或製作其派生作品,和/或以現在已知或日後開發的任何形式、媒體或技,將"您的資料"納入其他作品內。 7 .私。
分享友人