Results 161 to 170 of about 2,122,188 (202)
Some of the next articles are maybe not open access.

TranLogs: Lossless Failure Recovery Empowered by Training Logs

2024 International Conference on Networking, Architecture and Storage (NAS)
When running deep learning training jobs, in order to prevent training loss due to softwarelhardware failures, a checkpointing mechanism is usually used to periodically store snapshots of the training model in non-volatile memory to facilitate recovery ...
Xiaoyu Liu, Lingfang Zeng
semanticscholar   +2 more sources

Polynomial-Based Secret Image Sharing Scheme with Fully Lossless Recovery

International Journal of Digital Crime and Forensics, 2018
Lossless recovery is important for the transmission and storage of image data. In polynomial-based secret image sharing, despite many previous researchers attempted to achieve lossless recovery, none of the proposed work can simultaneously satisfy an efficiency execution and at no cost of some storage capacity.
Wanmeng Ding   +3 more
semanticscholar   +2 more sources

On distributed successive refinement with lossless recovery

2014 IEEE International Symposium on Information Theory, 2014
The problem of successive refinement in distributed source coding and in joint source-channel coding is considered. The emphasis is placed on the case where the sources have to be recovered losslessly in the second stage. In distributed source coding, it is shown that all sources are successively refinable in sum rate, with respect to any (joint ...
Chien-Yi Wang, M. Gastpar
semanticscholar   +2 more sources

Protecting Tampered Images with Lossless Auto Recovery using improved INN

2024 2nd International Conference on Artificial Intelligence and Machine Learning Applications Theme: Healthcare and Internet of Things (AIMLA)
The Image Immunizer project presents a novel strategy to address the risk of manipulation associated with digital photos. It uses Vaccinator and Invertible Neural Network technologies to provide a complete solution that guarantees tamper resistance and ...
R. Bharathi   +4 more
semanticscholar   +2 more sources

Perceptually Lossless Image Compression with Error Recovery

Proceedings of the 2nd International Conference on Vision, Image and Signal Processing, 2018
In many bandwidth constrained applications, lossless compression may be unnecessary, as only two to three times of compression can be achieved. An alternative way to save bandwidth is to adopt perceptually lossless compression, which can attain eight ...
C. Kwan, Eric Shang, T. Tran
semanticscholar   +2 more sources

Perceptually lossless compression of Mastcam images with error recovery

Signal Processing, Sensor/Information Fusion, and Target Recognition XXVIII, 2019
We present a high performance image compression framework for Mastcam images in the Mars rover Curiosity. First, we aim at achieving perceptually lossless compression. Four well-known image codecs in the literature have been evaluated and the performance
C. Kwan, Jude Larkin, Bryan Chou
semanticscholar   +2 more sources

Robust Image Steganography Against General Downsampling Operations With Lossless Secret Recovery

IEEE Transactions on Dependable and Secure Computing
Resisting the operations in lossy channels is a challenge for image steganography. In this article, we propose a novel robust steganographic method to resist the image downsampling operation.
Sheng Li   +3 more
semanticscholar   +2 more sources

Tamper Localization and Lossless Recovery Watermarking Scheme

International Conference on Software Engineering and Computer Systems, 2011
Tamper localization and recovery watermarking scheme can be used to protect the integrity and authenticity of medical images. In this paper, a simple tamper localization and recovery scheme that uses lossless compression was proposed. Lossy compression may also be applied when necessary.
Siau-Chuin Liew, J. Zain
semanticscholar   +2 more sources

DSIS: A Novel (K,N) Threshold Deniable Secret Image Sharing Scheme with Lossless Recovery

ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
Secret image sharing (SIS) schemes have undergone significant development. However, to the best of our knowledge, none of the existing schemes has considered the deniable property during secret sharing.
Zikai Xu   +4 more
semanticscholar   +2 more sources

A Lossless Turn-on Snubber for Reducing Diode Reverse Recovery Losses in Bidirectional Buck/Boost Converter

IEEE Transactions on Industrial Electronics, 2020
In this letter, we introduce a simple turn-on snubber for the conventional bidirectional converter. This snubber notably reduces the current reduction rate of the converter main diodes at turn-off.
M. Mohammadi
semanticscholar   +3 more sources

Home - About - Disclaimer - Privacy