Welcome![Sign In][Sign Up]
Location:
Search - MATLAB AUTHENTICATION

Search list

[Graph Recognizeplam

Description: 基于掌纹识别的在线身份验证 识别算法本科毕设 采集本科毕设 供毕设参考-based biometric authentication of online undergraduate recognition algorithm based Bi Bi-based undergraduate collection for BI-based reference
Platform: | Size: 12587008 | Author: 许冉 | Hits:

[Bio-RecognizeFingerprint_Recognition_Toolbox

Description: finger print toolboox based on matlab,-finger print toolboox based on Matlab.
Platform: | Size: 1527808 | Author: kk | Hits:

[Graph programimageAuthentication0_1

Description: 一种图像认证的代码,是别人的论文里实现的一种算法,提供大家作参考研究-an image authentication code, is the thesis of others to achieve an algorithm, we provide reference for research
Platform: | Size: 311296 | Author: 潇潇 | Hits:

[Audio programSpeakerRecognitionsystem

Description: 本程序是用MATLAB设计并实现一个简单的说话人识别系统,其主要功能模块包括语音信号的输入管理模块 ,语音的鉴别即特征提取块,语音的认证模块,程序很全. -this procedure is used MATLAB design and implement a simple speech recognition system, Its main function modules including voice signal input management module, voice identification or feature extraction block, Voice authentication module, the whole process is.
Platform: | Size: 398336 | Author: 张磊 | Hits:

[Graph programD542F922

Description: 彩色图像的篡改检测及自恢复算法赵春晖,孙建军,朱海峰(哈尔滨工程大学信息与通信工程学院,黑龙江哈尔滨150001)摘要:数字水印是图像认证的有效手段之一.利用小波变换提出一种计算简单的彩色图像水印算法,将一个图像的主要内容嵌入该图像自身之中,用均值量化的方法在亮度信号中嵌入水印,实现篡改检测和定位篡改区域;用多余的色度空间嵌入亮度信号和色度信号,用于恢复被篡改的图像内容.该算法可以获取较高的峰值信噪比,具有很好的鲁棒性.实验结果表明,该算法对删除、替换等恶意图像篡改具有良好的检测、定位和自修复能力.-color image tamper detection and self-recovery algorithm Zhao Chunhui, Sun Jianjun, Zhu Haifeng (Harbin Engineering University, Information and Communication Engineering Institute, Harbin, Heilongjiang 150001) Abstract : digital watermark image authentication is one of the effective means. Using wavelet transform A simple calculation of the color image watermarking algorithm, an image of the main elements embedded in the image itself, and use of quantitative methods mean the luminance signal embedded watermark, achieve tamper detection and localization tampering with the region; use of surplus space embedded color luminance signals and chrominance signals, for the restoration of tampering with the image content. The algorithm can generate a higher signal-to-noise ratio of the peak value, h
Platform: | Size: 237568 | Author: ghostsx | Hits:

[Special Effectsfinger_all_System_pcode

Description: 一种基于纹理分类的数字指纹授权认证系统,matlab实现,在傅立叶域中嵌入数字指纹-texture classification based on the number of authorized fingerprint authentication system, the realization of Matlab, Fourier domain embedded in digital fingerprints
Platform: | Size: 461824 | Author: 刘波 | Hits:

[Special Effectsharisuciciwatermark

Description: 于内容的图像认证技术是一种新颖的图像信息安全技术,用来验证数字图像内容的完整性与真实 性。本文介绍了基于内容的图像认证技术的分类、发展历史和研究现状,并针对其现有算法的缺陷,对未来的发 展趋势和应用进行了展望。 -content in the image authentication technology is a novel image information security technology, used to verify digital image content authenticity and integrity. This paper introduces the content-based image authentication techniques classification, history and current status of research and against its existing algorithm, the future trends and applications of Outlook.
Platform: | Size: 758784 | Author: cici | Hits:

[Post-TeleCom sofeware systemsMAP

Description: 卷积码的最大后验概率译码算法的一个验证matlab算法,必有注释。-Convolutional codes of maximum a posteriori probability decoding algorithm matlab an authentication algorithm, there is the Notes.
Platform: | Size: 1024 | Author: blackdeath | Hits:

[matlabviterbi

Description: viterbi译码matlab程序。通过验证,里面附文件-viterbi decoding matlab procedures. Through authentication, which is attached documents
Platform: | Size: 5120 | Author: 张凯斌 | Hits:

[Speech/Voice recognition/combineshibie

Description: 语音识别.用于完成说话人辨认及认证功能.安全性高-Speech recognition. For the completion of speaker identification and authentication functions. Safe
Platform: | Size: 1024 | Author: liujie | Hits:

[Otherinterleaver

Description: 交织代码,很好的交织验证,可以使用在很多通信场合 -Intertwined code, good interwoven authentication, you can use communication in many occasions
Platform: | Size: 1024 | Author: water206 | Hits:

[Program doccdma2000qianquan

Description: cdma2000下的鉴权算法分析研究,为广大cdma2000的研究学者提供一定的参考。-cdma2000 authentication algorithm under analysis, for the vast number of cdma2000 researchers to provide a reference.
Platform: | Size: 111616 | Author: zhongsheng | Hits:

[Graph Recognizezhiwenshibie

Description: 指纹识别技术是基于生物识别的认证技术,由于每个人的指纹具有唯一性, 终身不变,因此指纹识别是代替传统身份识别手段的最安全、最可靠、最方便的 方法之一。而指纹的预处理的好坏是指纹识别能否正确识别的关键。-Fingerprint recognition technology is based on biometric authentication technology, as each person
Platform: | Size: 2663424 | Author: 张杰 | Hits:

[Graph RecognizeAutomatic_Fingerprint_Authentication_System

Description: A novel texture-based Automatic Fingerprint Authentication System (AFAS) is proposed. A fingerprint image is preprocessed to enhance the image by Short Time Fourier Transform (STFT) analysis. Then, three sets of invariant moment features, as a kind of texture features, are extracted from three different sizes of Region of Interest (ROI) areas based on the reference point from the enhanced fingerprint image. Each set of invariant moments contain seven invariant moments. Fingerprint verification is realized by Euclidean distance between the two corresponding features of the test fingerprint image and template fingerprint image in the database. -A novel texture-based Automatic Fingerprint Authentication System (AFAS) is proposed. A fingerprint image is preprocessed to enhance the image by Short Time Fourier Transform (STFT) analysis. Then, three sets of invariant moment features, as a kind of texture features, are extracted from three different sizes of Region of Interest (ROI) areas based on the reference point from the enhanced fingerprint image. Each set of invariant moments contain seven invariant moments. Fingerprint verification is realized by Euclidean distance between the two corresponding features of the test fingerprint image and template fingerprint image in the database.
Platform: | Size: 421888 | Author: ruan | Hits:

[matlabfloyd

Description: floyd求解最短路,并将路径还原。经过验证,程序中有清楚注释-floyd Solving the shortest path, and path restoration. After authentication, the Notes program has clearly
Platform: | Size: 1024 | Author: steawen | Hits:

[Special Effectslsydwt2

Description: 文本水印,基于小波的零水印,实现是文本文档的版权认证,鲁棒性好。-Text watermark, wavelet-based zero-watermark, the realization of a text document is copyright authentication, better robustness.
Platform: | Size: 1024 | Author: 廖家亮 | Hits:

[matlabFuzzyClusteringToolbox

Description: 四种聚类算法源代码及示例代码,本程序的最终目的是形成一套标准的用于聚类、可扩展的工具。包括的内容有1. 聚类算法:Kmeans和Kmedoid算法、FCMclust, GKclust, GGclust算法 2. 评估分类原型:程序可以在二维图像上绘制出聚类的结果 3. 验证:程序给每一个算法提供验证机制,每个聚类算法会统计Partition Coefficient (PC), Classification Entropy (CE), Partition Index (SC), Separation Index (S), Xie and Beni s Index (XB), Dunn s Index (DI) and Alternative Dunn Index (DII)几种衡量指标。-Four clustering algorithm source code and sample code, the ultimate goal of this process is the formation of a set of criteria for clustering, scalable tool. Including the contents of 1. Clustering Algorithm: Kmeans and Kmedoid algorithm, FCMclust, GKclust, GGclust algorithm 2. Assess the classification of a prototype: The procedure can be two-dimensional images to map out the results of clustering 3. Verify: Program to provide every algorithm authentication mechanism, each clustering algorithm statistics Partition Coefficient (PC), Classification Entropy (CE), Partition Index (SC), Separation Index (S), Xie and Beni s Index (XB), Dunn s Index (DI) and Alternative Dunn Index (DII) of several indicators.
Platform: | Size: 2136064 | Author: 王梦萍 | Hits:

[Graph programSemi_fragilewatermarking

Description: 内容认证半脆弱水印算法的研究与实现,本程序实现图像的半脆弱水印,是基于DCT的算法,特别适合研究半脆弱水印的同志-Content authentication semi-fragile watermarking algorithm for Research and Implementation of, the procedures for the realization of the semi-fragile watermarking images is based on the DCT algorithm, especially appropriate to study the semi-fragile watermarking comrades
Platform: | Size: 303104 | Author: byleimin | Hits:

[Special EffectsAudioWatermarkingforContentAuthentication

Description: 该水印算法具有以下特点:1)结合音频自身的特性,不仅能够自适应划分音频数据段,而且能够智能调节水印嵌入强度,增强了数字音频水印的鲁棒性;2)能够同时进行数字音频的版权保护与内容认证,并可大致确定篡改发生区域,仿真实验表明,文中算法不仅具有较好的不可感知性,而且对常规处理具有较好的鲁棒性,同时能够对替换等而已篡改做出报警并确定被篡改位置。-The watermarking algorithm has the following characteristics: 1) combined with the audio of its own characteristics, not only adaptive division of the audio data segment, but also can adjust watermark embedding intelligent strength, enhanced digital audio watermark robustness 2) can at the same time digital audio copyright protection and content authentication, and can generally determine the tampering occurred in the region, simulation experiments show that the algorithm not only has better not be perceived, but also on conventional treatment has good robustness, at the same time be able to tamper with it to make replacement alarm and to determine the location has been tampered with.
Platform: | Size: 2048 | Author: byleimin | Hits:

[VHDL-FPGA-Verilogfir_hdl

Description: 一个 FIR 滤波器的 verilog 实现, 与 matlab 产生的 reference code 相互验证。-Verilog a FIR filter to achieve, with the reference code generated by matlab mutual authentication.
Platform: | Size: 97280 | Author: wei | Hits:
« 12 3 4 »

CodeBus www.codebus.net