Results 1 to 10 of about 112,998 (172)

Secured Medical Image Hashing Based on Frequency Domain with Chaotic Map [PDF]

open access: yesEngineering and Technology Journal, 2021
Recently, online-medicine got increased global interest, particularly during COVID19 pandemic. Data protection is important in the medical field since when promoting telemedicine applications, it is necessary to protect the patient data and personal ...
Amira Jabbar   +2 more
doaj   +1 more source

Histórias com História da Matemática em sala de aula para o 1.º CEB: o que dizem futuros professores?

open access: yesIndagatio Didactica, 2023
Este estudo foca-se na utilização de pequenas histórias com História da Matemática por futuros professores do 1.º Ciclo do Ensino Básico (1.º CEB) e do modo como estes propõem incluí-las em sala de aula.
João Eiras de Matos   +2 more
doaj   +1 more source

A Novel Hybrid Watermarking scheme with Image authentication based on frequency domain, 2- Level SVD using chaotic map [PDF]

open access: yesEAI Endorsed Transactions on Energy Web, 2021
INTRODUCTION: In order to protect the owner’s visual multimedia data, various watermarking methods have introducedin the last few years. In image watermarking techniques, a secret watermark image inserted into another image.OBJECTIVES: The main aim of ...
Shahzad Alam, Tanvir Ahmad, M. Doja
doaj   +1 more source

ORFEO, THE PLEIADES ACCOMPANIMENT PROGRAM AND ITS USERS THEMATIC COMMISSIONING [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2012
ORFEO, the PLEIADES Accompaniment Program, was set up by CNES, the French Space Agency, to prepare, accompany and promote the use and the exploitation of the images acquired by this Very High Resolution optical sensor. It was initiated in 2004 and will
C. Tinel   +4 more
doaj   +1 more source

Fast DCT-I, DCT-III, and DCT-IV via Moments [PDF]

open access: yesEURASIP Journal on Advances in Signal Processing, 2005
Summary: This paper presents a novel approach to compute DCT-I, DCT-III, and DCT-IV. By using a modular mapping and truncating, DCTs are approximated by linear sums of discrete moments computed fast only through additions. This enables us to use computational techniques developed for computing moments to compute DCTs efficiently. We demonstrate this by
G. Y. Wang, Y. Z. Liu, J. G. Liu
openaire   +2 more sources

Hybrid intelligent watermark System [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2010
As a result of the development in data transfer technology a cross multimedia and internet, it has became possible to access and copy these information in unauthentical manner . This leads to penetrate digital multimedia security problem.
Fardos Abdalkader   +2 more
doaj   +1 more source

Use the Frequency Domain to Hide in Some Audio Files [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2013
In this work, anew hiding algorithm is proposed that depends on using two deferent domain (spatial and frequency) to achieve and provide security and protection for transformed data, which is represented in a text message encrypted using a key of direct ...
Zahraa Tarik   +3 more
doaj   +1 more source

ViSTORY: Effective Video Storyboard Generation with Visual Keyframes using Discrete Cosine Transform

open access: yesInternational Journal of Technology, 2023
Nowadays, multimedia content utility is increasing rapidly. Multimedia search engines like Google, Yahoo, Bing, etc., are available just a click away to all users. There are around 500-600 hours of video uploads per unit of time to the Internet.
Ashvini Tonge, Sudeep Thepade
doaj   +1 more source

Image Watermarking Using DWT_DCT [PDF]

open access: yesEngineering and Technology Journal, 2010
Digital watermarking has been developed to protect digital images fromillegal manipulation. Discrete wavelet Transform (DWT) and Discrete Cosine Transform (DCT) are techniques used for digital watermarking.
Bassim Abdulbaki Jumaa, Arwa Aladdin
doaj   +1 more source

Architecture of the discrete sosine transformation processor for image compression systems on the losless-to-lossy circuit

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2021
The hardware implementations of fixed-point DCT blocks, known as IntDCT [1] and BinDCT [2], require some solutions. One of the main issues is the choice between the implementation of the conversion on FPGA, or the implementation on a digital signal ...
V. V. Kliuchenia
doaj   +1 more source

Home - About - Disclaimer - Privacy