-
MatlabCommand
MATLAB命令大全,包含绝大部分的命令、各种操作符的应用说明。(MATLAB command Daquan, including most of the commands, the application of a variety of operator instructions.)
- 2010-08-25 22:31:29下载
- 积分:1
-
shape
对图片中的各种几何图形进行识别,包括圆形,正方形,矩形,六边形,菱形等(On the picture to identify the various geometric shapes, including round, square, rectangular, hexagonal, diamond, etc.)
- 2009-05-08 21:32:50下载
- 积分:1
-
code-matlab
ocr system for Identification number by moment invariant
- 2012-12-29 16:54:43下载
- 积分:1
-
HEU_KMSActtivator
说明: 本文提出了一种基于混沌加密的DCT域二值图像数字水印算法.该算法首先利用混沌序列将含有版权信息的有意义二值图像水印进行加密,然后利用人眼视觉系统(HVS)的特性将原始载体图像进行块分类,最后将不同强度的水印分量嵌入到不同类的图像块DCT中频系数中去.利用混沌序列对水印进行加密,使水印本身具有安全性,对数字作品进行双重保障.通过高斯噪声,椒盐噪声以及JPEG压缩和剪切等攻击试验,表明了该算法具有较好的鲁棒性.(Encryption in DCT domain is proposed. Firstly, the meaningful binary image watermark containing copyright information is encrypted by using chaotic sequence, and then the original image is classified by using the characteristics of human visual system (HVS), Finally, the watermark components with different intensities are embedded into the DCT intermediate frequency coefficients of different types of image blocks. Chaotic sequences are used to encrypt the watermark, so that the watermark itself has security and double protection for digital works. Experiments on Gaussian noise, salt and pepper noise, JPEG compression and clipping show that the algorithm has good robustness)
- 2021-04-15 12:12:28下载
- 积分:1
-
ACSTSP
Ant colony optimization for TSP
- 2010-11-25 14:53:53下载
- 积分:1
-
GUI
运用MATLAB工具箱实现图像处理的GUI程序设计(Image processing using MATLAB toolbox of GUI programming)
- 2011-04-25 16:38:59下载
- 积分:1
-
prim
Prim algorithm greedy technique
- 2012-04-02 18:50:13下载
- 积分:1
-
yasuo
采用离散余弦变换和霍夫曼编码,对图像进行压缩存储,并且完成解压缩(Discrete cosine transform and Huffman coding, the image compression and storage, and complete decompression)
- 2011-05-19 20:42:18下载
- 积分:1
-
ctrllab3.1
ctrllab3.1
(ctrllab3.1
)
- 2012-10-23 22:30:26下载
- 积分:1
-
DPsearch
This code implements the search algorithms described in [1]. The code only contains the Dirichlet/Multinomial case, but the Gaussian case can be hacked in in about 5 minutes.
[1] Fast search for Dirichlet process mixture models Conference on AI and Statistics (2007)
- 2010-06-20 20:08:51下载
- 积分:1