Results 171 to 180 of about 2,122,188 (202)
Some of the next articles are maybe not open access.

Image Vaccinator and Image Tamper Resilient and Lossless Auto-Recovery Using Invertible Neural Network

2024 International Conference on Science Technology Engineering and Management (ICSTEM)
Aim: The aim of this endeavor attempts to identify tampering, provide lossless recovery, and improve picture data resilience against illegal adjustments. Materials and Methods: The current undertaking engages four distinct groups. Group 1, which includes
P. Kalyanasundaram   +4 more
semanticscholar   +2 more sources

Secret image sharing using (t,n) threshold scheme with lossless recovery

2012 5th International Congress on Image and Signal Processing, 2012
Secret image sharing is a means of hiding an image within another image to generate similar images. In 1979, Shamir proposed a method of secret image sharing known as the (t, n) threshold scheme. (t, n) threshold schemes can generate n shadow images and any t of n shadow images can be used to reconstruct the secret image and cover image.
Ming-Chun Chien, J. G. Hwang
semanticscholar   +2 more sources

Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery

Multimedia Tools and Applications, 2013
In this paper, a visual secret image sharing threshold scheme based on random grids and Boolean operations with the abilities of AND and XOR decryptions is proposed. When no light-weight computation device the secret could be revealed by human visual system with no cryptographic computation based on Boolean AND operation (stacking).
Xuehu Yan   +3 more
semanticscholar   +2 more sources

U-TPE: A universal approximate thumbnail-preserving encryption method for lossless recovery

Journal of Visual Communication and Image Representation
Haiju Fan, Shaowei Shi, Ming Li
semanticscholar   +2 more sources

Reversible Visible Watermarking and Lossless Recovery of Original Images

IEEE Transactions on Circuits and Systems for Video Technology, 2006
In this paper, we propose a reversible visible watermarking algorithm to satisfy a new application scenario where the visible watermark serves as a tag or ownership identifier, but can be completely removed to resume the original image data. It includes two procedures: data hiding and visible watermark embedding. In order to losslessly recover both the
null Yongjian Hu, null Byeungwoo Jeon
openaire   +1 more source

Spectrum-estimation based lossless information recovery for sparse array patterns

Telecommunication Systems, 2010
One of the open problems in lossless information hiding research is how to get adaptively better difference image architectures for given applications. In this paper we propose a simple and efficient approach to predict high-similar interpolation image from its sparse pattern and spectral expansion. After difference operator, peak value of the spike is
Guorui Feng   +2 more
openaire   +1 more source

Lossless recovery of a VQ index table with embedded secret data

Journal of Visual Communication and Image Representation, 2007
This paper proposes a reversible data embedding scheme based on a VQ image compression technique which emphasizes that the original VQ compressed codes can be recovered after data extraction. In this proposed scheme, a VQ codebook, which had already been clustered into three groups, was adopted to achieve secret concealment and data recovery.
Chin-Chen Chang   +2 more
openaire   +1 more source

Extended Secret Image Sharing with Lossless Recovery Based on Chinese Remainder Theorem and Quick Response Code

International Conference on Image, Vision and Computing, 2018
Extended secret image sharing (SIS) has meaningful shadow, the meaningful shadow will decrease encryption suspiciousness when we transfer secret image via public channels.
Yue Jiang   +3 more
semanticscholar   +1 more source

Lossless hidden data recovery using bit depth data embedding- a new concept

2009 International Conference on Emerging Trends in Electronic and Photonic Devices & Systems, 2009
This paper presents a new concept of exploiting bit depth data embedding using second level biorthogonal wavelet horizontal coefficients of a JPEG2000 compressed greyscale image as cover media. Based on the performance comparisons of the potential wavelets and discrete wavelet transform (DWT) based data hiding techniques it is expected that the bit ...
Rajeev Nayan Tripathi   +2 more
openaire   +1 more source

Lossless snubber circuits for current doubler rectifiers to reduce reverse-recovery losses

IECON'03. 29th Annual Conference of the IEEE Industrial Electronics Society (IEEE Cat. No.03CH37468), 2004
Current doubler rectifier (CDR) is one of the best candidates for high output current DC-DC converters. In this paper, several conventional CDR snubber circuits are evaluated, and two passive lossless snubber circuits for the CDR are proposed to reduce the reverse-recovery-related losses and clamp the voltage spikes across the rectifiers.
null Hong Mao   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy