-
shift
实现shift算法,进行精确的图像识别,可以抵抗各种旋转、平移、缩放等仿射变换的攻击(Realize shift algorithm, an accurate image recognition, you can resist all kinds of rotation, translation, scaling affine transformation attack)
- 2007-09-26 14:19:07下载
- 积分:1
-
Zemax+DDE+toolbox+for+Matlab
该工具箱可实现matlab编程和zemax通信,同时借助于matlab 强大的编程能力以及zemax的光学设计能力,为光学领域工作的科研人员提供了新的途径。(This program can realize the communication between the matlab and zemax, very helpful for optical engineer and student whose major in optical science.)
- 2020-11-11 16:49:45下载
- 积分:1
-
ffszgun
MATLAB程序附图像,利用灰度AGV对路径进行识别,,(MATLAB image attached, using gray AGV right path for identification,,)
- 2017-08-03 06:28:52下载
- 积分:1
-
C# GDI+绘图实例
GDI 绘图实例
- 2013-02-09下载
- 积分:1
-
Lip
用Matlab写的投影法提取嘴唇
输入图像必须是规定大小的人脸(Written using Matlab projection extraction lips input image must be provided for the size of face)
- 2008-04-04 15:39:11下载
- 积分:1
-
book
数字图像处理常见问题及编程技巧汇编。希望对这方面的学习者有所帮助(Data, the software architect exam is a comprehensive commo)
- 2013-09-11 15:46:31下载
- 积分:1
-
contrast enhancement
采用ESIHE算法增强图像对比度,适用于夜间道路拍摄的图像(ESIHE algorithm is used to enhance image contrast, which is suitable for night road images.)
- 2021-04-29 12:18:43下载
- 积分:1
-
FileRecv
基于小波变换的图像融合程序,低频采用加权平均,高频采用能量最大准则。(Based on wavelet transform image fusion program, low-weighted average, using high-frequency energy is the biggest criteria.)
- 2021-04-29 11:38:43下载
- 积分:1
-
hui
包括回归分析和概率统计,实现了图像的灰度化并进一步用于视频监视控,汽车课设货车Matlab驱动力图程序。( Including regression analysis and probability and statistics, Achieve a grayscale image and further control for video surveillance, Car class-based truck driver trying to Matlab program.)
- 2017-03-10 22:06:27下载
- 积分:1
-
DCT,DWT,DFT,LSB数字水印MATLAB+GUI界面
说明: 本课题为基于MATLAB的小波变换dwt和离散余弦dct的多方法对比数字水印系统。带GUI交互界面。有一个主界面GUI,可以调用dwt方法的子界面和dct方法的子界面。流程包括,读取宿主图像和水印图像,嵌入,多种方法的攻击(剪切,加噪,旋转等),提取,最后利用psnr峰值信噪比进行评价不同攻击下,鲁棒性的好坏。(This project is based on MATLAB wavelet transform DWT and discrete cosine DCT multi method contrast digital watermarking system. With GUI interactive interface. There is a main interface GUI, which can call the sub interfaces of DWT method and DCT method. The process includes: reading host image and watermark image, embedding, attacks of various methods (cutting, adding noise, rotation, etc.), extracting. Finally, PSNR peak signal-to-noise ratio is used to evaluate the robustness of different attacks.)
- 2021-04-04 23:29:04下载
- 积分:1