Results 1 to 10 of about 112,998 (172)
Secured Medical Image Hashing Based on Frequency Domain with Chaotic Map [PDF]
Recently, online-medicine got increased global interest, particularly during COVID19 pandemic. Data protection is important in the medical field since when promoting telemedicine applications, it is necessary to protect the patient data and personal ...
Amira Jabbar +2 more
doaj +1 more source
Este estudo foca-se na utilização de pequenas histórias com História da Matemática por futuros professores do 1.º Ciclo do Ensino Básico (1.º CEB) e do modo como estes propõem incluí-las em sala de aula.
João Eiras de Matos +2 more
doaj +1 more source
A Novel Hybrid Watermarking scheme with Image authentication based on frequency domain, 2- Level SVD using chaotic map [PDF]
INTRODUCTION: In order to protect the owner’s visual multimedia data, various watermarking methods have introducedin the last few years. In image watermarking techniques, a secret watermark image inserted into another image.OBJECTIVES: The main aim of ...
Shahzad Alam, Tanvir Ahmad, M. Doja
doaj +1 more source
ORFEO, THE PLEIADES ACCOMPANIMENT PROGRAM AND ITS USERS THEMATIC COMMISSIONING [PDF]
ORFEO, the PLEIADES Accompaniment Program, was set up by CNES, the French Space Agency, to prepare, accompany and promote the use and the exploitation of the images acquired by this Very High Resolution optical sensor. It was initiated in 2004 and will
C. Tinel +4 more
doaj +1 more source
Fast DCT-I, DCT-III, and DCT-IV via Moments [PDF]
Summary: This paper presents a novel approach to compute DCT-I, DCT-III, and DCT-IV. By using a modular mapping and truncating, DCTs are approximated by linear sums of discrete moments computed fast only through additions. This enables us to use computational techniques developed for computing moments to compute DCTs efficiently. We demonstrate this by
G. Y. Wang, Y. Z. Liu, J. G. Liu
openaire +2 more sources
Hybrid intelligent watermark System [PDF]
As a result of the development in data transfer technology a cross multimedia and internet, it has became possible to access and copy these information in unauthentical manner . This leads to penetrate digital multimedia security problem.
Fardos Abdalkader +2 more
doaj +1 more source
Use the Frequency Domain to Hide in Some Audio Files [PDF]
In this work, anew hiding algorithm is proposed that depends on using two deferent domain (spatial and frequency) to achieve and provide security and protection for transformed data, which is represented in a text message encrypted using a key of direct ...
Zahraa Tarik +3 more
doaj +1 more source
ViSTORY: Effective Video Storyboard Generation with Visual Keyframes using Discrete Cosine Transform
Nowadays, multimedia content utility is increasing rapidly. Multimedia search engines like Google, Yahoo, Bing, etc., are available just a click away to all users. There are around 500-600 hours of video uploads per unit of time to the Internet.
Ashvini Tonge, Sudeep Thepade
doaj +1 more source
Image Watermarking Using DWT_DCT [PDF]
Digital watermarking has been developed to protect digital images fromillegal manipulation. Discrete wavelet Transform (DWT) and Discrete Cosine Transform (DCT) are techniques used for digital watermarking.
Bassim Abdulbaki Jumaa, Arwa Aladdin
doaj +1 more source
The hardware implementations of fixed-point DCT blocks, known as IntDCT [1] and BinDCT [2], require some solutions. One of the main issues is the choice between the implementation of the conversion on FPGA, or the implementation on a digital signal ...
V. V. Kliuchenia
doaj +1 more source

