Implementation of Image compression using DCT
☆66Oct 5, 2018Updated 7 years ago
Alternatives and similar repositories for compression-DCT
Users that are interested in compression-DCT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A recurrent neural network model to analyze how travelers expressed their feelings on Twitter☆12Jun 30, 2019Updated 6 years ago
- IMAGE ANONYMIZATION DETECTION WITH DEEP HANDCRAFTED FEATURES (ICIP 2019)☆10Sep 10, 2019Updated 6 years ago
- My Multimedia Signal Processing & VOIP Course Projects & Assignments☆21May 12, 2013Updated 12 years ago
- An implementation of AutoScale regression-based method☆12Oct 27, 2020Updated 5 years ago
- [CVPR'24] Once for Both: Single Stage of Importance and Sparsity Search for Vision Transformer Compression☆15Jul 1, 2024Updated last year
- Finding Gender/Age of Authors based on written text☆13Apr 21, 2019Updated 6 years ago
- Official Implementation of paper https://arxiv.org/abs/1801.02612☆13Jun 16, 2020Updated 5 years ago
- Context-based adaptive binary arithmetic coding for informed source separation☆20Mar 1, 2019Updated 7 years ago
- Copy-Move Image Forgery Detection☆11Oct 2, 2019Updated 6 years ago
- extract the dct coefficient of jpeg images. Provide c and python interface.☆16May 8, 2020Updated 5 years ago
- Learned Image Compression Using Autoencoder Architecture☆21Oct 7, 2022Updated 3 years ago
- Source Code of Project Image Classification with PyTorch☆23Nov 15, 2018Updated 7 years ago
- Digital camera identification tool☆20Mar 15, 2015Updated 11 years ago
- Copy–Move forgery or Cloning is a type of Image tampering where a part of the image is copied and pasted on another part of same image…☆18Oct 23, 2021Updated 4 years ago
- Official code for paper 'Learning Continuous Implicit Representation for Near-Periodic Patterns' (ECCV 2022)☆14Mar 2, 2024Updated 2 years ago
- End-to-End Learnt Image Compression Codec☆55Feb 17, 2023Updated 3 years ago
- Multiple Anchor Learning for Visual Object Detection (CVPR,2020)☆14Mar 18, 2021Updated 5 years ago
- A brief understanding of ffmpeg cli through pseudocode☆11Dec 20, 2020Updated 5 years ago
- GB 开发资源列表☆14Dec 14, 2022Updated 3 years ago
- Implementation of Boundary Attributions for Normal (Vector) Explanations☆11Aug 13, 2021Updated 4 years ago
- Code for Semantic Adversarial Attacks☆11Oct 12, 2021Updated 4 years ago
- Implement ResNet family from scratch and train them on CIFAR-10, Tiny ImageNet, and ImageNet datasets☆16May 21, 2019Updated 6 years ago
- Материалы к серии роликов “Цифровая обработка сигналов”. Live-скрипты и файлы с данными для примеров, рассматриваемых в курсе.☆19Apr 11, 2019Updated 6 years ago
- 这是朴素贝叶斯的代码实现 包括三种模型 高斯模型 多项式模型 伯努利模型☆10Mar 7, 2018Updated 8 years ago
- (IJCV 2023) Offical implementation of "SCT: A Simple Baseline for Parameter-Efficient Fine-Tuning via Salient Channels"☆13Mar 20, 2025Updated last year
- JPEG Grid Detection based on the Number of DCT Zeros and its Application to Automatic and Localized Forgery Detection☆22Oct 25, 2022Updated 3 years ago
- Translate pic to JPEG☆11Mar 6, 2019Updated 7 years ago
- Code for DNN feature map compression paper☆11Nov 21, 2018Updated 7 years ago
- Is Neuron Coverage a Meaningful Measure for Testing Deep Neural Networks? (FSE 2020)☆10Sep 23, 2021Updated 4 years ago
- ☆10Oct 17, 2023Updated 2 years ago
- ☆13Nov 29, 2021Updated 4 years ago
- The application demonstrates the Image Semantic Segmentation considering the input image in portrait mode and changes the background to g…☆18Sep 17, 2019Updated 6 years ago
- [ECCV 2024] Isomorphic Pruning for Vision Models☆82Jul 23, 2024Updated last year
- The code of 《HAM: Hidden Anchor Mechanism for Scene Text Detection》☆11Sep 22, 2020Updated 5 years ago
- ☆16Jan 30, 2022Updated 4 years ago
- C++ implementation of Bjontegaard Delta SNR and Delta Rate metric☆11Nov 16, 2022Updated 3 years ago
- Very simple frequency domain(FFT based) image steganography/waterprint/signature. https://www.zhihu.com/question/50735753/answer/12259327…☆24Jun 9, 2020Updated 5 years ago
- python program to detect Portable_Executable files as either malicious or legitimate by trying out 5 different classification algorithms …☆11Feb 15, 2017Updated 9 years ago
- ☆15Nov 23, 2020Updated 5 years ago