登录
首页 » matlab » 语音加密

语音加密

于 2020-10-26 发布 文件大小:499KB
0 304
下载积分: 1 下载次数: 13

代码说明:

  语音加密,利用M序列将语音信号乱序,并在收端进行还原。(Speech encryption, using M sequence to disorderly speech signal, and restore at the receiving end.)

文件列表:

Matlab程序, 0 , 2016-12-19
Matlab程序\Project6_1.m, 647 , 2016-12-15
Matlab程序\Project6_2.m, 1047 , 2016-12-15
Matlab程序\Project6_3.m, 1057 , 2016-12-15
Matlab程序\Project6_4.m, 1941 , 2016-12-15
Matlab程序\Project6_5.m, 1169 , 2016-12-14
Matlab程序\Project6_M.m, 4265 , 2016-12-19
Matlab程序\Project6_M_correct.m, 1522 , 2016-12-19
Matlab程序\bandp.m, 882 , 2016-11-23
Matlab程序\bands.m, 888 , 2016-11-27
Matlab程序\highp.m, 674 , 2016-11-19
Matlab程序\lowp.m, 673 , 2016-11-19
Matlab程序\m_sequence.m, 427 , 2016-12-18
Matlab程序\project6_hilbert.m, 5234 , 2016-12-15
Matlab程序\recorder.m, 334 , 2016-12-09
Matlab程序\录音.wav, 705644 , 2016-12-05

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • ECCMatlab实现
    Matlab实现ECC加密的源码,可供ECC加密签名学习(The source code of ECC encryption implemented by MATLAB can be used for ECC encryption signature learning.)
    2021-01-17 16:48:49下载
    积分:1
  • The Cryptography API: Next Generation (CNG) is a new and agile framework in Wind...
    The Cryptography API: Next Generation(CNG) is a new and agile framework in Windows Vista, which implements an extensible provider model that allows you to load a provider by specifying the required cryptographic algorithm rather than having to hardcode a specific provider. -The Cryptography API: Next Generation (CNG) is a new and agile framework in Windows Vista, which implements an extensible provider model that allows you to load a provider by specifying the required cryptographic algorithm rather than having to hardcode a specific provider.
    2022-04-29 00:05:09下载
    积分:1
  • x264编码一个可执行程序的x264.exe,因为我只修改X264算法…
    一个x264编码的可执行程序 x264.exe,因为我只修改了 x264 的算法,未加入任何汇编,也没有修改x264的接口和功能,所以原版 x264 能运行的平台,此程序也应当能运行,且功能及调用方式不变。 执行命令方式为: -o 输出文件 输入文件 宽x高 -B 目标码率-X264 encoding an executable program x264.exe, because I only modified x264 algorithms, not to join any compilation, there is no modification of the interface and functionality of x264, the x264 can run the original platform, this procedure should also be able to run, and function and calls the same way. For the implementation of the order:-o output file input file width x high-B target rate
    2022-05-21 01:18:22下载
    积分:1
  • AES encryption algorithm of the VB implementation, both the string and file encr...
    AES加密算法的VB实现,对字符串和文件都能加密。-AES encryption algorithm of the VB implementation, both the string and file encryption.
    2022-02-20 19:28:10下载
    积分:1
  • 程序使用C++展示相当强的XOR。 当它unencrypting文件时,包括EOF验错和自动侦查。程序很好被提供并且做在串类建立的好用法。...
    程序使用C++展示相当强的XOR加密。 当它unencrypting文件时,包括EOF验错和自动侦查。程序很好被提供并且做在串类建立的好用法。-Program Uses C++ to Demonstrate A Fairly Strong XOR Encryption. Includes EOF error checking and automatic detection of when it is unencrypting a file. Program Is Documented Well And Also Makes Good Use of the Built In String Class.
    2022-12-20 10:10:03下载
    积分:1
  • 此程序为3栏栅算法程序,可对一段明文字符 作者:万艳良 单位:武汉理工大学...
    此程序为3栏栅加密算法程序,可对一段明文字符加密 作者:万艳良 单位:武汉理工大学-this procedure for three fencing encryption algorithm procedures, the section expressly characters encryption Author : 10000-Yan units : Wuhan Polytechnic University
    2022-08-12 12:11:34下载
    积分:1
  • 在原作者Jim Gillogly代码的基础上修改优化,并实现C++改写。实现了DES。当然,钥可在源文件中修改,或提供修改的接口函数。...
    在原作者Jim Gillogly代码的基础上修改优化,并实现C++改写。实现了DES加密。当然,密钥可在源文件中修改,或提供修改的接口函数。-the originator Jim Gillogly code revision on the basis of optimization, and to achieve C rewritten. Implementation of DES encryption. Of course, the key in the source documents changes, or amendments to provide the interface function.
    2022-05-09 10:36:46下载
    积分:1
  • turecrypt6.0版本的源码,关于这款软件毫无疑问是顶尖之作
    turecrypt6.0版本的源码,关于这款加密软件毫无疑问是顶尖之作-turecrypt6.0 version of the source, with regard to this there is no doubt that encryption software for the top
    2022-01-26 14:19:03下载
    积分:1
  • xinhundun
    这是一个自治的三维混沌系统的彩色图像加密程序,该混沌系统具有优良的动力学特性,加密效果明显有效,且抗干扰能力强,是很好的加密系统。(This is an autonomous chaotic system color image encryption procedures, the chaotic system has excellent dynamic characteristics, the effect is obvious encryption effective, and anti-interference ability, is a good encryption system.)
    2013-05-28 09:04:31下载
    积分:1
  • sha1
    SHA-1 algorithm implemented in C.
    2008-06-03 15:15:58下载
    积分:1
  • 696516资源总数
  • 106783会员总数
  • 25今日下载