-
C#开发的OCR实例,用Tesseract实现
OCR之Tesseract
- 2013-01-23下载
- 积分:1
-
HillClimbingSegment.1.0
程序实现Matlab下爬山法(hill-climbing)方法,用于彩色图像分割。(mage is first converted to CIE lab color space and the 3d color histogram is generated. Hill-climbing algorithm is used to find the local maximums in lab histogram, which is used to automatically decide the cluster number K as well as initial seeds for
)
- 2009-06-09 18:27:49下载
- 积分:1
-
Hyperspectralterrain-classfic
高光谱图像的地物分类技术,对光谱分析并对比检测出地景的算法(Fifth hyperspectral image classification techniques, algorithms for spectral analysis and contrast detect landscapes)
- 2013-11-29 11:06:20下载
- 积分:1
-
MATLABPICTUREPROCESSING
本程序用于数字水印,可以输入一副图像,嵌入水印信息,然后防止各种各样的攻击,最后可以提取水印信息,恢复原图像(This procedure for digital watermarks, can enter a pair of images, embedded watermark information, and then to prevent the various attacks, the watermark information can be extracted Finally, restore the original image)
- 2009-03-23 15:06:10下载
- 积分:1
-
computer_vision-master
图像特征提取,有SIFT、BOW、VLAD、LBP、HOG、FishVector、gist、Metric、colorhist。(Image feature extraction, including SIFT, BOW, VLAD, LBP, HOG, FishVector, gist, Metric, colorhist.)
- 2019-07-20 20:53:34下载
- 积分:1
-
noise genre
用matlab产生高斯,椒盐,泊松噪声图像的完整代码(poisson, gossip,noise,salt&pepper)
- 2018-05-01 09:59:07下载
- 积分:1
-
石川公式MATLAB
说明: 利用石川啮合公式编写的程序,适用范围较广,好用,推荐(The program compiled by Ishikawa meshing formula is easy to use and recommended)
- 2020-11-09 16:29:46下载
- 积分:1
-
sift
说明: 适用于SIFT检测缺陷,检测方法还行,可以调试调试就使用了(Template matching defect detection)
- 2020-09-05 13:50:16下载
- 积分:1
-
KMP
图像处理的KMP算法源程序,KMP算法是一种基本的、实用的字符串比较算法,广泛应用于图像处理和模式识别。(Image processing algorithms source KMP, KMP algorithm is a basic, practical string comparison algorithm, widely used in image processing and pattern recognition.)
- 2011-09-23 19:46:43下载
- 积分:1
-
基于MATLAB的图像信息隐藏算法研究与实现_陈小娥
采用 MATLAB 开发环 境,提出了一种图像信息隐藏算法,实现了图像信息隐藏的两大基本功能,即信息的嵌入和信息的提取.同 时,模拟常见的攻击方法,验证了添加隐藏信息后的图像的抗攻击能力(Using MATLAB to develop the environment, an image information hiding algorithm is proposed, which realizes two basic functions of image information hiding, i.e. information embedding and information extraction. At the same time, common attack methods are simulated to verify the anti-attack capability of the image added with hidden informati)
- 2021-03-13 14:49:24下载
- 积分:1