搜索资源列表
MATLAB
- 将图像作为水印嵌入到音频中,作为防伪标志-Image as a watermark embedded in the audio, as a security mark
Availability
- To Calculate QOS and how it affects Security
Eigenface
- 人脸识别具有广泛的应用前景,诸如公安系统的罪犯身份识别,驾驶执照及护照与实际持证人的核对、行及海关的监控系统及自动门卫系统等-Face recognition has wide application prospects, such as the Public Security system offender identification, driving license and passport and the actual holder of the check, the Customs a
SDES
- This program applies Simplified DES (S-DES) Ciphering Algorithm Developed by Maimouna Al-ammar 5th Year, Computer Engineering Department, University of Damascus Information and Network Security Material
RSA
- This program applies Message Digest MD5 Algorithm Developed by Maimouna Al-ammar 5th Year, Computer Engineering Department, University of Damascus Information and Network Security Material
MD5
- This program applies Message Digest (MD5) Algorithm Developed by Maimouna Al-ammar 5th Year, Computer Engineering Department, University of Damascus Information and Network Security Material -This program applies Message Digest (MD5) Algorit
project_code
- The main objective behind this project is using speaker recognition for security purposes. By security we mean identification of the speaker and thus granting permission to access details of very high confidentiality
SHA1
- security encryption algorithm sha-1
gf28
- MATLAB实现的伽罗华域乘法,在AES的安全算法中应用到-MATLAB implementation Galois field multiplication, in the AES security algorithm applied to the
proj_code01210
- watermarking is the art of hiding data to provide authenticity and security.
matlab_prog
- Airforce security codes by Matlab and network
kkkkk
- 使用补偿法对电力系统进行静态安全分析的MATLAB编程语言-Static security analysis
Prospects_on_Blind_Digital_Image_Forensics_Technol
- 数字图像盲取证技术作为一种不依赖任何预签名提取或预嵌入信息来鉴别图像真伪和来源的技术, 正逐步成为多媒 体安全领域新的研究热点,基于真实性鉴别的数字图像盲取证技术综述-Digital image forensics technology as a signature does not depend on any pre-extracted or pre-embedded information to identify the source of the image authenticity
OFDM_Security
- This a Simulink model that demonstrates an algorithm that applies wireless security on physical layer. The demonstration is based on 802.11a (simplified) and receiver is implemented on Xilinx Virtex 4 FPGA. The RAR file inlcudes 2 files: 1. Simul
patternclassification(2ED)byDuda-Chineseversion-ad
- Duda 模式分类第二版-中文版,已去除文档安全限制并为每章加了书签,方便阅读-pattern classification- second edition by Duda- the Chinese version, has been removed for the document security restrictions and added bookmarks, convenient read
SPG
- 希尔伯特黄变换方法的安全评估matlab源程序-Hilbert-Huang Transformation security assessment
matlab_watermark
- 本文算法是将24 位真彩图的亮度分量分块 DCT ,然后利用DCT 量化系数的奇偶特性嵌入8 位灰度水印图,并通过PN 序列加密来保证水印的 安全性。算法中,将灰度图像转换为二进制数据 流,置乱后扩频调制,隐藏在宿主DCT 系数量化值 中,提取时不需要宿主信号,实现水印信号的盲提 取。-This algorithm is 24-bit true color pictures of the luminance component of block DCT, quantiza
New-folder-(3)
- mobileipv6 for security
Speech-signal-short-time-analysis
- 详细说明:语音信号的短时分析,主要包括:分帧、短时能量、短时平均幅度、短时过零率、短时自相关函数、短时幅度差、倒谱、复倒谱、lpc系数、lpc谱估计等 绝对保证质量,是保研后导师布置的一些基础程序-Details: short-time speech signal analysis, including: framing, short-term energy, short-term average rate, short-time zero crossing rate, short-time a
emdwt
- 基于小波变换的扩频图象数字水印,将水印嵌入到小波中。以保证信息的安全-Spread spectrum based on wavelet transform image watermarking, the watermark is embedded into the wavelet. To ensure information security