ali1076

积分:246
上传文件:8
下载次数:314
注册日期:2017-04-25 11:07:33

上传列表
Gus add noise to dependency matrix function.rar - for simulate random walk model on graph function can using to add Gaussian noise to dependency matrix,2020-03-09 00:49:36,下载1次
vec2mat and mat2vec.rar - Functions do to convert matrix to vector and another convert vector to matrix,2020-03-09 00:29:01,下载4次
ZerooForcing.rar - Illustrate how to use the ZF space time code equalizer. This function simply simulate a MIMO communication with STBC encoding. Symbols are generated randomly from a specified constellation.,2018-08-04 06:11:21,下载1次
Implementing Watermarking.rar - simple example to Implementing Watermarking using discrete 2-D wavelet transform.,2018-04-16 16:50:51,下载1次
Alamouti-Encoder.rar - library IEEE use IEEE.STD_LOGIC_1164.ALL use IEEE.STD_LOGIC_ARITH.ALL use IEEE.STD_LOGIC_UNSIGNED.ALL use ieee.numeric_std.all ,2017-05-04 08:45:15,下载1次
Chromatogram-baseline-estimation-and-denoising-us - This is a MATLAB software package Chromatogram baseline estimation and denoising using sparsity (BEADS) beads.m: Implementation of BEADS example.m: Baseline correction of a noisy chromatogram,2017-05-04 07:00:57,下载5次
beamforming-using-convex-optimization.rar - The goal of this thesis is to use convex optimization for a beamformer. By using convex optimization we observed the signal in desired direction and also reduced the error in the stopband regions for Least-square norm and Innity norm. The simulation results show that convex optimization is exible to be used for narrowband beamformer with minimum error in the stopband region.,2017-05-04 02:42:49,下载28次
802.11n-BER.rar - The main goal of this project is to design and simulate a wireless communication system base on the IEEE 802.11n. A system was built and simulated in Matlab to obtain numerical result such as bit error rate plots and verify the functionality of each block in the design.,2017-05-04 02:36:51,下载2次

近期下载
lsb-MATLAB.rar - 本论文包含5个源程序,分别为LSBCut、LSBCollage、DCTCut、DCTCollage和PSNR,其中LSBCut实现了LSB水印算法的剪切篡改的检测、LSBCollage实现了LSB水印算法的拼贴篡改的检测、DCTCut实现了DCT水印算法的剪切篡改的检测、DCTCollage实现了DCT水印算法的拼贴篡改的检测、PSNR功能是计算嵌入水印嵌入的峰值信噪比,以此来说明嵌入水印后图像载体的失真大小。LSBCut、LSBCollage、DCTCut、DCTCollage是独立的程序,每个程序独立完成一种篡改检测的功能且都有一个输出参数,没有输入参数,输出的参数是漏警概率。PSNR需要LSBCut、LSBCollage、DCTCut、DCTCollage产生的嵌入水印后的图像和原始图像作为输入参数,作为LSBCut、LSBCollage、DCTCut和DCTCollage的内函数使用。
I-st-Demo-Code-with-noise-added.zip - discrete wavelet and svd based watermarking with 12 type of attack included
WaterMarking.rar - Matlab code for semi fragile lsb watermarking with 5 type of attack and vhdl code
DCT域图像.zip - 本文图像水印源代码,要是用的话请把里面的后缀为(.bmp)的图片变为自己的(.bmp)然后将源代码中在相关的代码变为对应的就可以。
Image-Watermarking-using-Tetrolet-Transform.rar - This paper proposes new watermarking technique based on Tetrolet domain. The Tetrolet transform is a new adaptive Haar-type wavelet transform based on tetrominoes. It avoids Gibbs oscillation because it applies the Haar function at the edge of the image. Our proposed watermarking algorithm embeds the watermark into the Tetrolet coefficients which are selected by considering different shapes of tetrominoes and uated the effectiveness of the watermarking approach by considering the quality metrics like RMSE, PSNR and Robustness parameters. The experimental results reveal that the proposed watermarking scheme is robust against common image processing attacks.
tamper-detection.rar - implementation this paper in matlab Dual watermark for image tamper detection and recovery http://www.sciencedirect.com/science/article/pii/S003132030800174X
MATLAB条形码二维码识别.zip - 基于MATLAB的条形码识别。带GUI可视化用户操作界面。读取条形码,经过一系列预处理,如灰度化,去噪,直方图增强,中值滤波,二值化,腐蚀,识别等。可识别20多张条形码图片,另外可定制二维码的识别,二维码可自定义生成内容,生成二维码,然后嵌入数字水印进行加密传输,接收方提取水印的二维码,识别。
proiect.rar - In this paper we present the usefulness of the algorithm DCT (Discrete cosine Transform) blocks applied level image compression JPEG (Joint Photographic Experts Goup). It has been shown that this algorithm is the most efficient in the case of compression because it has very good properties for compaction energy related values. As a basic principle we eliminate high frequencies and keep the low and medium without visibly affecting image. DCT in JPEG compression algorithm is encountered in practical applications such as face detection, skin color, facial recognition, iris, fingerprints
Amnprt-kaur..cmfd-using--DCT-and-SIFT.rar - Digital images are the most prevalent way to spread a message. So the authenticity of images is very essential. But due to advancement of the technology the editing of images has become very effortless. Copy-move forgery is most basic technique to alter an image. In this one part of image is copied, called as snippet, and pasted within same image and most likely post-processing it. Considerable number of algorithms is proposed to detect different post-processing on snippet of image. In this paper novel approach is proposed to detect combination of different post-processing operations by single method. It is analyzed that block-based features method DCT is robust to Gaussian noise and JPEG compression, secondly the keypoint-based feature method SIFT is robust to rotation and scaling. Thus by combining SIFT and DCT we are able to detect forgery under post-processing operations of rotation, scaling, Gaussian noise, and JPEG compression and thus the efficiency to detect forgery improves.
TCAM-master.zip - code for design transistor by using silvaco
dwtwatermarkattack.rar - 针对嵌入水印的图像,用小波变换来提取各种被攻击的水印,效果好
work.zip - 数字水印图像的嵌入与提取,载体图像是256*256大小,水印图像是64*64.
A-Image-watermark-based-on-RS-code.zip - 基于RS码的图像水印,通过对要嵌入图像的水印进行RS码加密,提高水印的抗攻击能力。程序包含对水印图像的RS码加密解密,水印的嵌入和提取和水印抗攻击鲁棒性的检测。
Watermark-image.zip - Watermark-image usin lsb algorithm
SVDWatermarking.rar - 实现图像的水印嵌入及检测,并针对图像的攻击(剪切、噪声、jpeg压缩),判断SVD算法的有效性
fwdmodifiedthesis.zip - image encryption for protection nd copy right
FULL-CODE.rar - Since the birth of digital data hiding, image authentication has been one of its most widespread applications. During the first years, aside a few numbers of works, this application was limited to verifying the integrity of the image or locating its tampered regions. Nowadays, these watermarks are designed in sophisticated ways to not only localize the image tampering, but also recover the lost content in those areas. In tampering protection and self-recovery schemes, the goal is to embed a representation of the original image into itself in a way to efficiently compromise between three design parameters the quality of the watermarked image, the quality of the content recovery in tampered areas, and the tolerable tampering rate (TTR).
mark.rar - 添加水印,在图项中添加,matlab,实现图像的保护等等
dwprotected.rar - Matlab source code for DCT-based watermarking for grayscale images. DCT-based watermark recovering without resorting to the uncorrupted original image. Digital watermarking has been proposed as a viable solution to the need of copyright protection and authentication of multimedia data in a networked environment, since it makes possible to identify the author, owner, distributor or authorized consumer of a document. A new watermarking technique to add a code to digital images is presented: the method operates in the frequency domain embedding a pseudo-random sequence of real numbers in a selected set of DCT coefficients. Watermark casting is performed by exploiting the masking characteristics of the Human Visual System, to ensure watermark invisibility. The embedded sequence is extracted without resorting to the original image, so that the proposed technique represents a major improvement to methods relying on the comparison between the watermarked and original images.
A-Watermarking-Algorithm(MATLAB)--.zip - 盲水印提取时不需要参考原始载体图像,在信息隐藏、版权保护等方面具有更广泛的应用前景。提出的盲水印算法在分块离散余弦变换(DCT)和离散小波变换(DWT)的基础上,利用关系双方DCT系数和DWT系数在受到攻击时具有相同变化趋势的特点,采用关系嵌入和量化嵌入的自适应选择嵌入策略,较大幅度地提高了盲水印提取的鲁棒性。同时在量化嵌入中采用抖动调制,实现了水印透明性和鲁棒性调节的便捷性。大量仿真实验结果表明该算法对噪声干扰、低通滤波、JPEG压缩、对比度增强等攻击有很好的鲁棒性和透明性。关键词 数字水印盲水印关系嵌入量化嵌入离散余弦变换离散小波变换 按这篇文章的算法,自己编的matlab,没有攻击时水印提取率为1,加水印后图像PSNR有45+,。有攻击后提取率也有0.9+。

收藏