Reversible data hiding in encrypted images with multi-prediction and adaptive huffman encoding [PDF]
With the rapid development of multimedia technology and the massive accumulation of user data, a huge amount of data is rapidly generated and shared over the network, while the problems of inappropriate data access and abuse persist.
Hua Ren +4 more
doaj +4 more sources
An effective lossless compression method for attitude data with implementation on FPGA [PDF]
The attitude angles of the drilling tool serve as crucial information for transmitting Measurement While Drilling (MWD) data, enabling the optimization of drilling performance and ensuring tool safety.
Fangxing Lyu +4 more
doaj +2 more sources
Multi-Party Controlled Semi-Quantum Dialogue Protocol Based on Hyperentangled Bell States [PDF]
To solve the fundamental problem of excessive consumption of classical resources and the simultaneous security vulnerabilities in semi-quantum dialogue systems, a multi-party controlled semi-quantum dialogue protocol based on hyperentangled Bell states ...
Meng-Na Zhao, Ri-Gui Zhou, Yun-Hao Feng
doaj +2 more sources
Modification of Adaptive Huffman Coding for use in encoding large alphabets [PDF]
The paper presents the modification of Adaptive Huffman Coding method – lossless data compression technique used in data transmission. The modification was related to the process of adding a new character to the coding tree, namely, the author proposes ...
Tokovarov Mikhail
doaj +2 more sources
A deep learning-driven multi-layered steganographic approach for enhanced data security [PDF]
In the digital era, ensuring data integrity, authenticity, and confidentiality is critical amid growing interconnectivity and evolving security threats.
Yousef Sanjalawe +4 more
doaj +2 more sources
Reversible data hiding in encrypted images using LWE-based secret sharing [PDF]
The technique of reversible data hiding in encrypted images (RDH-EI) has experienced significant interest as it allows for precise extraction of embedded data without compromising the confidentiality of the original image.
Zahra Saeidi, Sattar Mirzakuchaki
doaj +2 more sources
Reversible data hiding and authentication scheme for encrypted image based on prediction error compression [PDF]
In the most existing reversible data hiding schemes for encrypted images, cover images can be reversibly recovered, but the integrity of image content cannot be guaranteed.
Fang Ren +4 more
doaj +2 more sources
Networking is crucial for smart city projects nowadays, as it offers an environment where people and things are connected. This paper presents a chronology of factors on the development of smart cities, including IoT technologies as network ...
Ammar Nasif +2 more
doaj +1 more source
A lossless compression method for logging data while drilling
Mud pulse transmission technology is widely used in logging while drilling (LWD), while its low data transmission efficiency has restricted the development of LWD technology for a long time. In order to improve the equivalent data transmission efficiency
Shan Song +5 more
doaj +1 more source
Lossless Compression Algorithm Based on Hybrid Coding of Adaptive Huffman and Golomb-Rice for WSN [PDF]
Aiming at the problem that traditional Wireless Sensor Network(WSN) data compression algorithms cannot take both compression efficiency and data loss into account,a fast and efficient Lossless Adaptive Compression(LAC) algorithm based on adaptive Huffman
XIE Ruiyun,HAI Benzhai
doaj +1 more source

