Results 91 to 100 of about 2,122,188 (202)
Energy-efficient algorithms for lossless data compression schemes in wireless sensor networks
Wireless sensor networks (WSNs) are reliant on limited power resources, primarily provided by small batteries within sensor nodes. Inefficient energy management within these networks can lead to premature battery depletion during data transmission ...
Lucia K. Ketshabetswe +3 more
doaj +1 more source
Protection of Health Imagery by Region Based Lossless Reversible Watermarking Scheme
Providing authentication and integrity in medical images is a problem and this work proposes a new blind fragile region based lossless reversible watermarking technique to improve trustworthiness of medical images.
R. Lakshmi Priya, V. Sadasivam
doaj +1 more source
Malleable Coding with Fixed Reuse [PDF]
In cloud computing, storage area networks, remote backup storage, and similar settings, stored data is modified with updates from new versions. Representing information and modifying the representation are both expensive.
Goyal, Vivek K +2 more
core
An X‐ray scattering setup designed to capture small‐ and wide‐angle X‐ray scattering on a single, large area detector features a partially transmissive beamstop that facilitates non‐invasive recording of X‐ray beam position and intensity during acquisition of X‐ray scattering images.
Hyun Sun Cho +3 more
wiley +1 more source
The widespread adoption of cloud storage has exposed user image data to privacy leakage risks. Traditional image encryption methods convert images into entirely unreadable formats, ensuring security yet severely restricting image usability (e.g ...
Dezhi An, Xin Pu, Jun Lu, Xue Xia
doaj +1 more source
Enhanced secure lossless image steganography using invertible neural networks
Image steganography is a technique that embeds secret data into cover images in an imperceptible manner, ensuring that the original data can be recovered by the receiver without arousing suspicion.
Weida Chen, Weizhe Chen
doaj +1 more source
On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López +3 more
wiley +1 more source
Reversible data hiding in encrypted image (RDHEI) is a technology that can simultaneously implement privacy protection and reversible information hiding. For RDHEI, the main problem is the conflict between embedding capacity and real reversibility.
Yaomin Wang, Zhanchuan Cai, Wenguang He
doaj +1 more source
A novel step-up DC-DC converter with a three-winding-coupled-inductor which integrates a coupled-inductor and voltage-boost techniques for a distributed generation system is proposed in this paper.
Yanying Gao, Hongchen Liu, Jian Ai
doaj +1 more source
A secure lossless recovery for medical images based on image encoding and data self-embedding
Hang Gao, Tiegang Gao
semanticscholar +1 more source

