Results 91 to 100 of about 2,122,188 (202)

Energy-efficient algorithms for lossless data compression schemes in wireless sensor networks

open access: yesScientific African
Wireless sensor networks (WSNs) are reliant on limited power resources, primarily provided by small batteries within sensor nodes. Inefficient energy management within these networks can lead to premature battery depletion during data transmission ...
Lucia K. Ketshabetswe   +3 more
doaj   +1 more source

Protection of Health Imagery by Region Based Lossless Reversible Watermarking Scheme

open access: yesThe Scientific World Journal, 2015
Providing authentication and integrity in medical images is a problem and this work proposes a new blind fragile region based lossless reversible watermarking technique to improve trustworthiness of medical images.
R. Lakshmi Priya, V. Sadasivam
doaj   +1 more source

Malleable Coding with Fixed Reuse [PDF]

open access: yes, 2011
In cloud computing, storage area networks, remote backup storage, and similar settings, stored data is modified with updates from new versions. Representing information and modifying the representation are both expensive.
Goyal, Vivek K   +2 more
core  

Absolute scaling of small‐ and wide‐angle X‐ray scattering images recorded with short duration X‐ray pulses on a large area fiber‐taper X‐ray detector

open access: yesJournal of Synchrotron Radiation, Volume 33, Issue 3, Page 562-579, May 2026.
An X‐ray scattering setup designed to capture small‐ and wide‐angle X‐ray scattering on a single, large area detector features a partially transmissive beamstop that facilitates non‐invasive recording of X‐ray beam position and intensity during acquisition of X‐ray scattering images.
Hyun Sun Cho   +3 more
wiley   +1 more source

A dual-mode thumbnail-preserving encryption scheme based on chaotic system and reversible data hiding

open access: yesJournal of King Saud University: Computer and Information Sciences
The widespread adoption of cloud storage has exposed user image data to privacy leakage risks. Traditional image encryption methods convert images into entirely unreadable formats, ensuring security yet severely restricting image usability (e.g ...
Dezhi An, Xin Pu, Jun Lu, Xue Xia
doaj   +1 more source

Enhanced secure lossless image steganography using invertible neural networks

open access: yesJournal of King Saud University: Computer and Information Sciences
Image steganography is a technique that embeds secret data into cover images in an imperceptible manner, ensuring that the original data can be recovered by the receiver without arousing suspicion.
Weida Chen, Weizhe Chen
doaj   +1 more source

On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection

open access: yesExpert Systems, Volume 43, Issue 5, May 2026.
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López   +3 more
wiley   +1 more source

A New High Capacity Separable Reversible Data Hiding in Encrypted Images Based on Block Selection and Block-Level Encryption

open access: yesIEEE Access, 2019
Reversible data hiding in encrypted image (RDHEI) is a technology that can simultaneously implement privacy protection and reversible information hiding. For RDHEI, the main problem is the conflict between embedding capacity and real reversibility.
Yaomin Wang, Zhanchuan Cai, Wenguang He
doaj   +1 more source

Novel High Step-Up DC–DC Converter with Three-Winding-Coupled-Inductors and Its Derivatives for a Distributed Generation System

open access: yesEnergies, 2018
A novel step-up DC-DC converter with a three-winding-coupled-inductor which integrates a coupled-inductor and voltage-boost techniques for a distributed generation system is proposed in this paper.
Yanying Gao, Hongchen Liu, Jian Ai
doaj   +1 more source

Home - About - Disclaimer - Privacy