Location:
![](/images/right.gif)
Search - secure matlab
Search list
Description: SHA (安全Hash算法)是一种单向散列算法,可用于数字加密或数字签名,是比MD5更加安全的单向散列算法,与MD5算法一起时被应用最广泛的两种算法。-SHA (secure Hash algorithm) is a one-way hash algorithm, can be used for digital encryption or digital signature is more secure than the MD5 one-way hash algorithm, in conjunction with the MD5 algorithm was the most widely used two algorithms.
Platform: |
Size: 5120 |
Author: 张汉江 |
Hits:
Description: 一个混沌保密通信的simulink模型,效果很好-A chaotic secure communication of the simulink model, the effect of good
Platform: |
Size: 8192 |
Author: 张毅 |
Hits:
Description: Spread-spectrum techniques are methods by which electromagnetic energy generated in a particular bandwidth is deliberately spread in the frequency domain, resulting in a signal with a wider bandwidth. These techniques are used for a variety of reasons, including the establishment of secure communications, increasing resistance to natural interference and jamming, and to prevent detec
Platform: |
Size: 11264 |
Author: Mathis |
Hits:
Description: 用MATLAB实现“商人怎样安全过河”模型求解-Using MATLAB to solve“how to secure traders to cross the river” model
Platform: |
Size: 12288 |
Author: Lizzer Wee |
Hits:
Description: 混沌保密通信SIMULINK建模。自己作的很好的东西。-SIMULINK modeling of chaotic secure communication. Themselves for the good things.
Platform: |
Size: 7168 |
Author: ukey |
Hits:
Description: Owing to the broad application value of audio
watermarking in remote transmission and mobile
extraction, it is very important to study watermarking
approaches against A/D and D/A conversion. Based
on wavelet decomposition and cepstrum technology,
an audio watermarking algorithm is proposed where
the low-frequency wavelet coefficients are chosen for
cepstrum transforming. Then, the obtained cepstrum
data shows stable for watermark hiding by the
methods of edging data cutting and statistical mean
modification. The synchronization is not required in
the algorithm. Experimental results show that the
proposed algorithm can resist on the attack of A/D
and D/A successfully with features of large capacity
and zero bit error. It will be helpful for the mobile
audio in secure broadcast and management in the
Platform: |
Size: 199680 |
Author: vinay |
Hits:
Description: Owing to the broad application value of audio
watermarking in remote transmission and mobile
extraction, it is very important to study watermarking
approaches against A/D and D/A conversion. Based
on wavelet decomposition and cepstrum technology,
an audio watermarking algorithm is proposed where
the low-frequency wavelet coefficients are chosen for
cepstrum transforming. Then, the obtained cepstrum
data shows stable for watermark hiding by the
methods of edging data cutting and statistical mean
modification. The synchronization is not required in
the algorithm. Experimental results show that the
proposed algorithm can resist on the attack of A/D
and D/A successfully with features of large capacity
and zero bit error. It will be helpful for the mobile
audio in secure broadcast and management in the
Platform: |
Size: 346112 |
Author: vinay |
Hits:
Description: VC和matlab的教程,好用,放心下载,希望对大家有帮助-VC, and matlab tutorial, easy to use, secure download, we want to help
Platform: |
Size: 14195712 |
Author: 王涛 |
Hits:
Description: 高压直流输电线路电磁场的计算,指导高压直流输电线路的铺设。计算安全上线-HVDC transmission line calculation of electromagnetic fields to guide the laying of high voltage direct current transmission lines. Computationally secure on-line
Platform: |
Size: 2048 |
Author: llc |
Hits:
Description: A code for Secure Hashing
Platform: |
Size: 2048 |
Author: Avijit |
Hits:
Description: 在两个混沌系统实现单变量驱动耦合同步情况下,采用混沌遮掩的加密方式,实现混沌保密通信,-Two chaotic systems synchronize single variable drive coupling case, the use of chaos cover of encryption, Secure Communication,
Platform: |
Size: 2048 |
Author: 高建明 |
Hits:
Description: special AES key generation algorithm for using secure transformation of the data from one user to another
Platform: |
Size: 1024 |
Author: Madhuram |
Hits:
Description: 实现了一种基于实际信道的超混沌保密通信方案的混沌同步,参考文献《一种基于实际信道的超混沌保密通信方案》-Achieve a channel based on the actual secure communication hyperchaotic synchronization program, references, " based on the actual channel ultra-secure communication solutions."
Platform: |
Size: 1024 |
Author: 胡燕 |
Hits:
Description: matlab 中实现一个四叉树的结构,使用递归过程,整合成一次二向遍历-secure yourself with a simple quadtree in matlab
Platform: |
Size: 5120 |
Author: 许军 |
Hits:
Description: 通过混沌算法对图像和单一信号进行加密和解密,混沌算法在保密通信中应用-By chaos algorithm for encryption and decryption of the image and a single signal, chaos algorithm application in secure communication
Platform: |
Size: 4096 |
Author: yy |
Hits:
Description: motion detection pcoded files are not encrypted, they are just obfuscated by being pre-parsed into the format which is directly used by the MATLAB execution engine, which is not human-readable. They are not a secure way of protecting your source code (though it will likely stop most people who aren t very determined). R2015b includes a new execution engine which does not work with the old pcode format - this future change was preannounced in the release notes for R2011a
Platform: |
Size: 20480 |
Author: akshaylakade |
Hits:
Description: Secure Audio Based Unlocking System
Platform: |
Size: 2430976 |
Author: Yeemon
|
Hits:
Description: 信息隐藏代码,,采用内容自适应的方法,用于图像隐写的最安全的算法。(The most secure algorithm for image steganography, content adaptation)
Platform: |
Size: 222208 |
Author: 村民1号
|
Hits:
Description: Secure image data hiding using mosaic method
Platform: |
Size: 692224 |
Author: Shintacz |
Hits:
Description: 量子密钥分发是安全分发密钥的一种方式,文件包含其密钥率和传输距离的仿真代码,包含各类协议的比较,直接运行即可,非常有用的资料。。。。(Quantum key distribution (QKD) is a way of secure key distribution. The file contains the simulation code of key rate and transmission distance, and the comparison of various protocols. It can be run directly and is very useful information.)
Platform: |
Size: 4096 |
Author: TonyWang92 |
Hits: