登录
首页 » matlab » 检测

检测

于 2020-03-17 发布
0 152
下载积分: 1 下载次数: 10

代码说明:

说明:  该代码的主要功能是图像边缘检测,利用霍夫变换确定圆的位置,并进行缺陷定位着色等操作(The main function of the code is image edge detection, using HOF transform to determine the location of the circle, and the location of defects such as coloring operations)

文件列表:

检测\BoundaryTrack.m, 5231 , 2018-05-14
检测\ConnectivityMark.m, 2180 , 2018-06-13
检测\EndFaceDetection.m, 28067 , 2020-03-16
检测\QQ.jpg, 13017 , 2018-07-26
检测\connect.m, 514 , 2018-07-02
检测\fillsmallholes.m, 388 , 2018-06-13
检测, 0 , 2020-03-16

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • Circle-detection
    hough和randon函数求图像中圆,对于水中气泡检测效果很不错(Circle detection based on random Hough transform)
    2021-05-08 02:16:35下载
    积分:1
  • readpic
    说明:  VC bmp图像数据读取和输出代码程序,经过编译可行(compiled vc program in reading image )
    2010-04-07 11:02:37下载
    积分:1
  • GaborTextureSegment
    Texture Segmentation using Gabor Filters 纹理图像分割 包括一个pdf文件,几个m文件(Texture Segmentation using Gabor Filters texture image segmentation include a pdf document, several m files)
    2008-05-11 15:20:33下载
    积分:1
  • ica_example
    说明:  ICA人脸识别算法实例matlab源码,已测试过,程序能运行,且识别率较高(ICA face recognition algorithm matlab source code examples have been tested, the program will be able to run, and a higher recognition rate)
    2008-10-14 18:25:50下载
    积分:1
  • LaplacianPyramid
    说明:  图像的Laplace金字塔分解与重构算法。(Laplacian pyramid decomposition and reconstruction of image. )
    2009-09-01 10:35:08下载
    积分:1
  • YUV_DCT
    YUV Quantization using VS2010
    2013-07-14 19:12:13下载
    积分:1
  • binary-video
    学习使用OpenCV,对输入的一段彩色视频,用OpenCV实现以下功能或要求: 1. 对输入视频的每一帧图像都用同一个阈值进行二值化; 2.在每帧二值化图像上叠加上含自己学号与姓名等信息的版权字幕; 3. 在处理的过程中,实时显示每帧图片处理之后的效果; 4.将所有这些二值化图像按视频原来顺序合成输出一个视频文件,按原输入视频播放速度的两倍合成; 5. 做成如下的命令行格式,xxx.exe 输入视频文件名 二值化阈值 输出视频文件名(例如 MyBiVideo.exe input.avi 50 output.avi ) 这里的二值化有两种选择,可以手动收入阈值,也可以直接用OTSU算法的较优阈值直接二值化。(Learn to use OpenCV, for some color video input, with the OpenCV following functions or requirements: 1. Each frame of the input video images are binarized using the same threshold value 2. superposed on the binarized image of each frame containing the copyright on the number and the name of their own learning subtitles other information 3. During processing, real-time display after processing each frame 4. All of these binarized image by synthesizing the video output of a video sequence of the original document, the original input composite video playback speed twice 5. made the following command line format, xxx.exe input video file name binary threshold value of the output video file name (eg MyBiVideo.exe input.avi 50 output.avi) Here there are two binary choice, you can manually income thresholds, you can directly use the optimum direct binarization threshold through OTSU algorithm.)
    2015-01-30 16:15:09下载
    积分:1
  • gradientMag
    求灰度图像的梯度特征向量,以便用于目标检测(The grad feature of gray image can be achieved by the code.)
    2017-04-20 10:54:44下载
    积分:1
  • KSVD_Matlab_ToolBox
    数字图像处理,K-SVD字典学习方法,信号的稀疏与冗余表示理论,图像压缩,图像去噪(Digital image processing, K-SVD dictionary learning methods, sparse and redundant signal representation theory, image compression, image denoising)
    2020-10-07 17:27:36下载
    积分:1
  • A-Watermarking-Algorithm(MATLAB)--
    盲水印提取时不需要参考原始载体图像,在信息隐藏、版权保护等方面具有更广泛的应用前景。提出的盲水印算法在分块离散余弦变换(DCT)和离散小波变换(DWT)的基础上,利用关系双方DCT系数和DWT系数在受到攻击时具有相同变化趋势的特点,采用关系嵌入和量化嵌入的自适应选择嵌入策略,较大幅度地提高了盲水印提取的鲁棒性。同时在量化嵌入中采用抖动调制,实现了水印透明性和鲁棒性调节的便捷性。大量仿真实验结果表明该算法对噪声干扰、低通滤波、JPEG压缩、对比度增强等攻击有很好的鲁棒性和透明性。关键词 数字水印盲水印关系嵌入量化嵌入离散余弦变换离散小波变换 按这篇文章的算法,自己编的matlab,没有攻击时水印提取率为1,加水印后图像PSNR有45+,。有攻击后提取率也有0.9+。(Blind watermark extraction can be fulfilled without referring to the original host image. Therefore it hasmuch prospective applications in the fields of information hiding and copyright protection. Based on blocking Discrete Cosine Transform (DCT) and blocking DiscreteWaveletTransform (DWT), the proposed blind watermarking algorithm uses an embedding strategy of adaptively selecting either relationship embedding or quantization embedding. The relationship em- bedding comes from the observation thatboth themagnitudes of coefficients concerned in the relationship usually have thesame change trend when the image is attacked. This strategy remarkably improves the robustness ofwatermark extraction.In addition, dithermodulation is used in quantization embedding, bywhich the tradeoff between transparency and robus-tness ofwatermarking can be easily adjusted. Simulation results show that the algorithm is fairly robust against the attacks such as noise, filtering, compression, and contrast )
    2013-04-14 16:15:47下载
    积分:1
  • 696518资源总数
  • 104269会员总数
  • 31今日下载