Welcome![Sign In][Sign Up]
Location:
Search - secure matlab

Search list

[Crack HackSHA_MatLab

Description: SHA (安全Hash算法)是一种单向散列算法,可用于数字加密或数字签名,是比MD5更加安全的单向散列算法,与MD5算法一起时被应用最广泛的两种算法。-SHA (secure Hash algorithm) is a one-way hash algorithm, can be used for digital encryption or digital signature is more secure than the MD5 one-way hash algorithm, in conjunction with the MD5 algorithm was the most widely used two algorithms.
Platform: | Size: 5120 | Author: 张汉江 | Hits:

[matlabcommunication_model

Description: 一个混沌保密通信的simulink模型,效果很好-A chaotic secure communication of the simulink model, the effect of good
Platform: | Size: 8192 | Author: 张毅 | Hits:

[matlabSpread_Spectrum

Description: Spread-spectrum techniques are methods by which electromagnetic energy generated in a particular bandwidth is deliberately spread in the frequency domain, resulting in a signal with a wider bandwidth. These techniques are used for a variety of reasons, including the establishment of secure communications, increasing resistance to natural interference and jamming, and to prevent detec
Platform: | Size: 11264 | Author: Mathis | Hits:

[matlabhow2across_the_river_safely

Description: 用MATLAB实现“商人怎样安全过河”模型求解-Using MATLAB to solve“how to secure traders to cross the river” model
Platform: | Size: 12288 | Author: Lizzer Wee | Hits:

[matlabdcsk3

Description: 混沌保密通信SIMULINK建模。自己作的很好的东西。-SIMULINK modeling of chaotic secure communication. Themselves for the good things.
Platform: | Size: 7168 | Author: ukey | Hits:

[Software Engineeringamorph

Description: Owing to the broad application value of audio watermarking in remote transmission and mobile extraction, it is very important to study watermarking approaches against A/D and D/A conversion. Based on wavelet decomposition and cepstrum technology, an audio watermarking algorithm is proposed where the low-frequency wavelet coefficients are chosen for cepstrum transforming. Then, the obtained cepstrum data shows stable for watermark hiding by the methods of edging data cutting and statistical mean modification. The synchronization is not required in the algorithm. Experimental results show that the proposed algorithm can resist on the attack of A/D and D/A successfully with features of large capacity and zero bit error. It will be helpful for the mobile audio in secure broadcast and management in the
Platform: | Size: 199680 | Author: vinay | Hits:

[Software Engineeringvm2

Description: Owing to the broad application value of audio watermarking in remote transmission and mobile extraction, it is very important to study watermarking approaches against A/D and D/A conversion. Based on wavelet decomposition and cepstrum technology, an audio watermarking algorithm is proposed where the low-frequency wavelet coefficients are chosen for cepstrum transforming. Then, the obtained cepstrum data shows stable for watermark hiding by the methods of edging data cutting and statistical mean modification. The synchronization is not required in the algorithm. Experimental results show that the proposed algorithm can resist on the attack of A/D and D/A successfully with features of large capacity and zero bit error. It will be helpful for the mobile audio in secure broadcast and management in the
Platform: | Size: 346112 | Author: vinay | Hits:

[matlabVC.MATLAB

Description: VC和matlab的教程,好用,放心下载,希望对大家有帮助-VC, and matlab tutorial, easy to use, secure download, we want to help
Platform: | Size: 14195712 | Author: 王涛 | Hits:

[Applicationspee

Description: 高压直流输电线路电磁场的计算,指导高压直流输电线路的铺设。计算安全上线-HVDC transmission line calculation of electromagnetic fields to guide the laying of high voltage direct current transmission lines. Computationally secure on-line
Platform: | Size: 2048 | Author: llc | Hits:

[Windows DevelopSHA

Description: A code for Secure Hashing
Platform: | Size: 2048 | Author: Avijit | Hits:

[Crack Hackchaos_communication1

Description: 在两个混沌系统实现单变量驱动耦合同步情况下,采用混沌遮掩的加密方式,实现混沌保密通信,-Two chaotic systems synchronize single variable drive coupling case, the use of chaos cover of encryption, Secure Communication,
Platform: | Size: 2048 | Author: 高建明 | Hits:

[Crack Hackkong1

Description: special AES key generation algorithm for using secure transformation of the data from one user to another
Platform: | Size: 1024 | Author: Madhuram | Hits:

[matlabhyper-chaos-synchronzation

Description: 实现了一种基于实际信道的超混沌保密通信方案的混沌同步,参考文献《一种基于实际信道的超混沌保密通信方案》-Achieve a channel based on the actual secure communication hyperchaotic synchronization program, references, " based on the actual channel ultra-secure communication solutions."
Platform: | Size: 1024 | Author: 胡燕 | Hits:

[matlabBidirectional-quadtree-in-matlab

Description: matlab 中实现一个四叉树的结构,使用递归过程,整合成一次二向遍历-secure yourself with a simple quadtree in matlab
Platform: | Size: 5120 | Author: 许军 | Hits:

[OtherMATLAB

Description: 通过混沌算法对图像和单一信号进行加密和解密,混沌算法在保密通信中应用-By chaos algorithm for encryption and decryption of the image and a single signal, chaos algorithm application in secure communication
Platform: | Size: 4096 | Author: yy | Hits:

[Video CaptureMotion-Detection-in-MATLAB

Description: motion detection pcoded files are not encrypted, they are just obfuscated by being pre-parsed into the format which is directly used by the MATLAB execution engine, which is not human-readable. They are not a secure way of protecting your source code (though it will likely stop most people who aren t very determined). R2015b includes a new execution engine which does not work with the old pcode format - this future change was preannounced in the release notes for R2011a
Platform: | Size: 20480 | Author: akshaylakade | Hits:

[matlabSecure Audio Based Unclocking System

Description: Secure Audio Based Unlocking System
Platform: | Size: 2430976 | Author: Yeemon | Hits:

[Special EffectsWOW_matlab

Description: 信息隐藏代码,,采用内容自适应的方法,用于图像隐写的最安全的算法。(The most secure algorithm for image steganography, content adaptation)
Platform: | Size: 222208 | Author: 村民1号 | Hits:

[OtherNEW SECURE IMAGE TRANSACTION TECHNIQUE-GUI

Description: Secure image data hiding using mosaic method
Platform: | Size: 692224 | Author: Shintacz | Hits:

[Crack Hack量子密钥分发密钥率仿真MATLAB代码

Description: 量子密钥分发是安全分发密钥的一种方式,文件包含其密钥率和传输距离的仿真代码,包含各类协议的比较,直接运行即可,非常有用的资料。。。。(Quantum key distribution (QKD) is a way of secure key distribution. The file contains the simulation code of key rate and transmission distance, and the comparison of various protocols. It can be run directly and is very useful information.)
Platform: | Size: 4096 | Author: TonyWang92 | Hits:
« 12 »

CodeBus www.codebus.net