Results 151 to 160 of about 83,553 (194)
A robust zero-watermarking and signcryption scheme for image copyright protection and license verification. [PDF]
Hung PT, Thanh TM.
europepmc +1 more source
Earlier prediction of Parkinson's disease using cross non-decimated wavelet transform and machine learning algorithm. [PDF]
Veena B +3 more
europepmc +1 more source
Neural Network-Based Study for Rice Leaf Disease Recognition and Classification: A Comparative Analysis Between Feature-Based Model and Direct Imaging Model. [PDF]
Prity FS +5 more
europepmc +1 more source
Correction: Enhanced DWT-OFDM communication system using wavelet domain equalizer with Co-CFO. [PDF]
Ramadan K, Hassan ES.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
DWT based Multimedia Compression
2021 2nd International Conference for Emerging Technology (INCET), 2021Current multimedia compression methods utilize techniques which are computationally resource intensive. Despite using high resources, presence of noise content is significant. To limit the unnecessary components, developing a different method which consumes comparatively lesser resources is essential.
B Rajeshwari +2 more
openaire +1 more source
ACM Transactions on Embedded Computing Systems, 2012
Many modern computing applications have been enabled through the use of real-time multimedia processing. While several hardware architectures have been proposed in the research literature to support such primitives, these fail to address applications whose performance and resource requirements have a dynamic aspect.
Amit Pande, Joseph Zambreno
openaire +1 more source
Many modern computing applications have been enabled through the use of real-time multimedia processing. While several hardware architectures have been proposed in the research literature to support such primitives, these fail to address applications whose performance and resource requirements have a dynamic aspect.
Amit Pande, Joseph Zambreno
openaire +1 more source
2L-DWTS — Steganography technique based on second level DWT
2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2016Steganography is a technique used to communicate a secret message secretly hidden in an innocuous cover. In this paper, a new image steganography technique 2L-DWTS is proposed. This technique, 2L-DWTS embeds secret message in the higher frequency components among the second level DWT components of the cover image.
Punam Bedi, Veenu Bhasin, Tarun Yadav
openaire +1 more source

