image-forgery-with-siftand-ransac
所属分类:matlab编程
开发工具:matlab
文件大小:11075KB
下载次数:154
上传日期:2014-03-11 13:18:42
上 传 者:
padmapriyaskpa89
说明: the folder gives information about the image forgery detection. detection is made by examining the sift and ransac features of the image. color processing is done as a preprocessing step.
文件列表:
image forgery with siftand ransac\image forgery\1.jpg (741072, 2000-01-01)
image forgery with siftand ransac\image forgery\3.jpg (703685, 2002-01-23)
image forgery with siftand ransac\image forgery\ADABOOST_te.m (2916, 2008-09-03)
image forgery with siftand ransac\image forgery\ADABOOST_tr.m (4452, 2008-09-03)
image forgery with siftand ransac\image forgery\adaptivethreshold.m (415, 2013-12-01)
image forgery with siftand ransac\image forgery\appendimages.m (461, 2011-01-25)
image forgery with siftand ransac\image forgery\colImgSeg.m (2314, 2009-09-08)
image forgery with siftand ransac\image forgery\CreateDatabase.m (800, 2013-12-01)
image forgery with siftand ransac\image forgery\demo.m (1848, 2011-11-01)
image forgery with siftand ransac\image forgery\erode.jpg (30673, 2011-10-20)
image forgery with siftand ransac\image forgery\example.asv (4696, 2013-01-25)
image forgery with siftand ransac\image forgery\example.m (4698, 2013-01-25)
image forgery with siftand ransac\image forgery\Exposing Digital Image Forgeries by Illumination.pdf (2057049, 2013-11-01)
image forgery with siftand ransac\image forgery\face.jpg (188440, 2001-09-17)
image forgery with siftand ransac\image forgery\face_detection.asv (794, 2011-11-01)
image forgery with siftand ransac\image forgery\face_detection.m (7411, 2013-08-11)
image forgery with siftand ransac\image forgery\findHomography.m (460, 2014-02-27)
image forgery with siftand ransac\image forgery\hall1.JPG (103647, 2011-01-16)
image forgery with siftand ransac\image forgery\hall2.JPG (102984, 2011-01-16)
image forgery with siftand ransac\image forgery\imMosaic.m (1934, 2014-02-27)
image forgery with siftand ransac\image forgery\Input.JPG (14227, 2009-09-08)
image forgery with siftand ransac\image forgery\knn.m (342, 2013-12-01)
image forgery with siftand ransac\image forgery\license.txt (1334, 2011-03-24)
image forgery with siftand ransac\image forgery\likelihood2class.m (241, 2014-02-27)
image forgery with siftand ransac\image forgery\main.m (3537, 2013-10-15)
image forgery with siftand ransac\image forgery\mainproject.m (7050, 2013-12-02)
image forgery with siftand ransac\image forgery\mosaicTest.asv (260, 2014-02-08)
image forgery with siftand ransac\image forgery\mosaicTest.m (318, 2014-02-08)
image forgery with siftand ransac\image forgery\mosaic_a.jpg (14530, 2014-02-27)
image forgery with siftand ransac\image forgery\mosaic_hall.jpg (50481, 2011-01-25)
image forgery with siftand ransac\image forgery\my_regioncoordinates.mat (672, 2010-01-13)
image forgery with siftand ransac\image forgery\New folder\10.jpg (186041, 2001-09-13)
image forgery with siftand ransac\image forgery\New folder\11.jpg (186616, 2001-09-13)
image forgery with siftand ransac\image forgery\New folder\13.jpg (188440, 2001-09-17)
image forgery with siftand ransac\image forgery\New folder\2.jpg (189841, 2001-09-13)
image forgery with siftand ransac\image forgery\New folder\3.jpg (186893, 2001-09-13)
image forgery with siftand ransac\image forgery\New folder\5.jpg (187729, 2001-09-17)
image forgery with siftand ransac\image forgery\New folder\6.jpg (781315, 2002-01-23)
image forgery with siftand ransac\image forgery\New folder\7.jpg (741300, 2000-01-01)
image forgery with siftand ransac\image forgery\New folder\8.jpg (757381, 2000-01-01)
... ...
README
--------
Directory contains the following files.
1. ADABOOST_te.m
2. ADABOOST_tr.m
3. demo.m
4. likelihood2class.m
5. threshold_te.m
6. threshold_tr.m
The aim of the project is to provide a source of the
meta-learning algorithm known as AdaBoost to improve
the performance of the user-defined classifiers.
To make use of adaboost, first two functions must be
run with the appropriate parameters. The explanation
of each source file is available with "help" command.
To see how they work, run demo.m as
>> demo
First three lines in demo.m specifies the training and
testing set size and the number of weak (threshold)
classifiers.
For bug reporting and for comments do not hesitate to
send e-mail to the author.
Cuneyt Mertayak
email: cuneyt.mertayak@gmail.com
version: 1.0
date: 03/09/2008
近期下载者:
相关文件:
收藏者: