Results 21 to 30 of about 10,977 (213)

A New Zero-Watermarking Algorithm Resisting Attacks Based on Differences Hashing

open access: yesCybernetics and Information Technologies, 2016
Medical volume data containing patient information is often faced with various attacks in the transmission process. In order to enhance the medical information system security, and effectively solve the problem of medical volume data protection, a new ...
Han Baoru, Li Jingbing
doaj   +1 more source

Color image steganalysis based on quaternion discrete cosine transform

open access: yesElectronic Research Archive, 2023
With the rapid development and application of Internet technology in recent years, the issue of information security has received more and more attention.
Meng Xu   +3 more
doaj   +1 more source

Pengamanan Pesan pada Steganografi Citra dengan Teknik Penyisipan Spread Spectrum

open access: yesJurnal Elkomika, 2019
ABSTRAK Pada studi ini, dilakukan penggabungan metode - metode untuk memperkuat dan meningkatkan sisi keamanan proses pertukaran informasi atau pesan digital.
SOFIA SAIDAH   +2 more
doaj   +1 more source

METHOD OF REFERENCE SIGNALS CREATING IN NON-DESTRUCTIVE TESTING BASED ON LOW-SPEED IMPACT

open access: yesТехнічна електродинаміка, 2021
The article describes the approach to the formation of a simulation model of information signals, which are typical for objects with different types of defects.
В.С. Еременко   +2 more
doaj   +1 more source

DISCRETE COSINE TRANSFORM UNTUK IDENTIFIKASI CITRA HYLOCEREUS COSTARICENSIS

open access: yesSimetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer, 2015
ABSTRAK Pengolahan citra digital memiliki peranan sangat luas terhadap kehidupan sehari- hari. Salah satunya dapat digunakan untuk mengidentifikasi citra buah untuk mengetahui tingkat kematangan buah tersebut.
Resty Wulanningrum   +1 more
doaj   +1 more source

Three-dimensional nonrigid reconstruction based on probability model

open access: yesInternational Journal of Advanced Robotic Systems, 2020
Most nonrigid motions use shape-based methods to solve the problem; however, the use of discrete cosine transform trajectory-based methods to solve the nonrigid motion problem is also very prominent.
Yaming Wang   +3 more
doaj   +1 more source

CHARACTERIZATION OF BREAST TISSUES IN COMBINED TRANSFORMS DOMAIN USING SUPPORT VECTOR MACHINES [PDF]

open access: yesICTACT Journal on Image and Video Processing, 2011
Mammography is a well established imaging technique for showing tissue abnormalities of breast and has been proven to reduce death rate due to breast cancer in screened populations of women.
B.N. Prathibha, V. Sadasivam
doaj  

Discrete cosine transforms on quantum computers [PDF]

open access: yesISPA 2001. Proceedings of the 2nd International Symposium on Image and Signal Processing and Analysis. In conjunction with 23rd International Conference on Information Technology Interfaces (IEEE Cat. No.01EX480), 2002
A classical computer does not allow to calculate a discrete cosine transform on N points in less than linear time. This trivial lower bound is no longer valid for a computer that takes advantage of quantum mechanical superposition, entanglement, and interference principles.
Klappenecker, Andreas, Roetteler, Martin
openaire   +2 more sources

Directional Analytic Discrete Cosine Frames

open access: yesIEEE Access, 2022
Block frames called directional analytic discrete cosine frames (DADCFs) are proposed for sparse image representation. In contrast to conventional overlapped frames, the proposed DADCFs require a reduced amount of 1) computational complexity, 2) memory ...
Seisuke Kyochi   +2 more
doaj   +1 more source

ECG synthesis via discrete cosine transform [PDF]

open access: yesImages of the Twenty-First Century. Proceedings of the Annual International Engineering in Medicine and Biology Society, 2003
Results on the modeling and synthesis of the electrocardiogram (ECG) from its component waves after a suitable transformation are presented. The transformed components add up to the transform of the complete beat and thus allow synthesis of the ECG. Pole-zero modeling of the transformed signals by the Shanks method proved very successful. >
Murthy, ISN, Reddy, MRS
openaire   +2 more sources

Home - About - Disclaimer - Privacy