Results 101 to 110 of about 51,497 (156)

(k, n) secret base64 data sharing scheme using simple modular arithmetic

open access: yesJournal of King Saud University: Computer and Information Sciences
A (k, n) secret sharing (SS) is a threshold scheme that shares secret multimedia data into n sub-secrets (called shares). When any k or more shares are collected, the secret is recovered.
Ching-Nung Yang   +4 more
doaj   +1 more source

Lossless Compression of Malaria-Infected Erythrocyte Images Using Vision Transformer and Deep Autoencoders

open access: yesComputers
Lossless compression of medical images allows for rapid image data exchange and faithful recovery of the compressed data for medical image assessment. There are many useful telemedicine applications, for example in diagnosing conditions such as malaria ...
Md Firoz Mahmud   +2 more
doaj   +1 more source

Empirical and Statistical Evaluation of the Effectiveness of Four Lossless Data Compression Algorithms

open access: yesNigerian Journal of Technological Development, 2016
Data compression is the process of reducing the size of a file to effectively reduce storage space and communication cost. The evolvement in technology and digital age has led to an unparalleled usage of digital files in this current decade.
N. A. Azeez, A. A. Lasisi
doaj  

Huffman source coding

open access: yes, 2021
Abstract. In this work, A Huffman source coding system is studied and implemented. The work will go through the basics of the source coding theorem, standard Huffman code is introduced, its weaknesses in a practical system are presented, and finally, methods and algorithms are introduced to overcome these weaknesses.
openaire   +1 more source

Retraction Note: A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image

open access: yesScientific Reports
Shahid Rahman   +7 more
doaj   +1 more source

On breaking a Huffman code

IEEE Transactions on Information Theory, 1996
Summary: We examine the problem of deciphering a file that has been Huffman coded, but not otherwise encrypted. We find that a Huffman code can be surprisingly difficult to cryptanalyze. We present a detailed analysis of the situation for a three-symbol source alphabet and present some results for general finite alphabets.
David W. Gillman   +2 more
exaly   +3 more sources

Huffman Coding

ACM Computing Surveys, 2014
Huffman’s algorithm for computing minimum-redundancy prefix-free codes has almost legendary status in the computing disciplines. Its elegant blend of simplicity and applicability has made it a favorite example in algorithms courses, and as a result it is perhaps one of the most commonly implemented algorithmic techniques.
openaire   +2 more sources

Dynamic huffman coding

Journal of Algorithms, 1985
This note shows how to maintain a prefix code that remains optimum as the weights change. A Huffman tree with nonnegative integer weights can be represented in such a way that any weight w at level l can be increased or decreased by unity in O(l) steps, preserving minimality of the weighted path length.
openaire   +1 more source

Performance comparison of Huffman Coding and Double Huffman Coding

2016 Sixth International Conference on Innovative Computing Technology (INTECH), 2016
Huffman coding [11] is a most popular technique for generating prefix-free codes [7, 10]. It is an efficient algorithm in the field of source coding. It produces the lowest possible number of code symbols of a single source symbol [1]. Huffman coding is a most widely used lossless compression technique [2].
Rabia Arshad, Adeel Saleem, Danista Khan
openaire   +1 more source

Forward Looking Huffman Coding

Theory of Computing Systems, 2019
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Shmuel T. Klein   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy