-
-
[
Matlab]
imagedenoising.rar
BivaShrink method, model 1, model 2, model 3 (TrivaShrink method), BayesShrink methods, LAWMLShrink methods DT_CWT realization and the realization of DWT.
Category:
matlab Upload User:
shenzhwei Size:
21K
-
[
Visual C++ (VC++)]
HIC_new.rar
Written by SPIHT image compression code, the application of DWT-based image compression, welcome to download
-
[
Visual C++ (VC++)]
Wavelet.rar
Several aspects of wavelet transform of the source. Which DWT.rar for discrete wavelet transform C++ Source IntDWT for integer discrete wavelet transform LiftDWT97 is 9/7 lifting scheme wavelet transform BinDWT97 is the binary wavelet transform ...
Category:
Wavelet Upload User:
duanyuwsb Size:
17K
-
[
Others]
zmcode.zip
DWT on digital watermark embedded in the source code, the algorithm has a certain degree of innovation, can be directly run
-
[
Visual C++ (VC++)]
DWTMATLAB.rar
DWT of MATLAB in oJPEG2000 realize n the use of discrete cosine transform DCT jpeg compression Matlab source, simple and practical, the Notes have a good time
-
[
C/C++]
MEZW.rar
MEZW, an improved version of EZW can be applied to most of the size of images, internal contains DWT
Category:
Wavelet Upload User:
yangzhong Size:
5333K
-
[
VHDL]
VHDL_2Ddwt_ALL.rar
This is a DWT of the Verilog code, its main function is between the PC and FPGA communication DWT procedures and transmission
-
[
Matlab]
erweixiaobobianhuan.rar
This indicated the procedure using two-dimensional wavelet transform DWT realize one. Transferred the original image matrix 2. To carry out two-dimensional wavelet decomposition 3. Decomposition results show that reconstruction of the source images and ...
Category:
Wavelet Upload User:
oliverok Size:
2K
-
[
Matlab]
change.rar
Application of wavelet transform matlab several procedures, including cwt, dwt, fft, fftshift use version matlab7.0
Category:
Wavelet Upload User:
dl2005128 Size:
2K
-
[
Visual C++ (VC++)]
sss_0.rar
Digital watermarking algorithm contains DCT watermark embedding algorithm, DWT watermark embedding algorithm, as well as the watermark attacks and performance testing