Results 41 to 50 of about 2,122,188 (202)

Data Hiding and Authentication Scheme for Medical Images Using Double POB

open access: yesApplied Sciences
To protect the security of medical images and to improve the embedding ability of data in encrypted medical images, this paper proposes a permutation ordered binary (POB) number system-based hiding and authentication scheme for medical images, which ...
Fang Ren   +3 more
doaj   +1 more source

Digital forensics formats: seeking a digital preservation storage format for web archiving [PDF]

open access: yes, 2011
In this paper we discuss archival storage formats from the point of view of digital curation and preservation. Considering established approaches to data management as our jumping off point, we selected seven format attributes which are core to the ...
Kim, Y., Ross, S.
core   +4 more sources

Tamper Detection and Recovery for Medical Images Using Near-lossless Information Hiding Technique [PDF]

open access: yesJournal of Digital Imaging, 2007
Digital medical images are very easy to be modified for illegal purposes. For example, microcalcification in mammography is an important diagnostic clue, and it can be wiped off intentionally for insurance purposes or added intentionally into a normal mammography.
Wu, JHK   +6 more
openaire   +3 more sources

Recovering Physical Parameters from Galaxy Spectra Using MOPED [PDF]

open access: yes, 2001
We derive physical parameters of galaxies from their observed spectrum, using MOPED, the optimized data compression algorithm of Heavens, Jimenez & Lahav 2000.
Heavens, Alan   +2 more
core   +3 more sources

Compression-Assisted Adaptive ECC and RAID Scattering for NAND Flash Storage Devices

open access: yesSensors, 2020
NAND flash memory-based storage devices are vulnerable to errors induced by NAND flash memory cells. Error-correction codes (ECCs) are integrated into the flash memory controller to correct errors in flash memory. However, since ECCs show inherent limits
Seung-Ho Lim, Ki-Woong Park
doaj   +1 more source

Almost Lossless Analog Signal Separation

open access: yes, 2013
We propose an information-theoretic framework for analog signal separation. Specifically, we consider the problem of recovering two analog signals from a noiseless sum of linear measurements of the signals. Our framework is inspired by the groundbreaking
Bölcskei, Helmut   +2 more
core   +2 more sources

Efficient and Robust Compressed Sensing Using Optimized Expander Graphs [PDF]

open access: yes, 2009
Expander graphs have been recently proposed to construct efficient compressed sensing algorithms. In particular, it has been shown that any n-dimensional vector that is k-sparse can be fully recovered using O(klog n) measurements and only O(klog n ...
Calderbank, Robert   +3 more
core   +2 more sources

Secure and Reversible Thumbnail-Preserving Encryption for Point Clouds via Spatial Subdivision and Chaotic Perturbation

open access: yesMathematics
Thumbnail-preserving encryption (TPE) aims to balance data security and usability by allowing encrypted content to retain a coarse visual preview while protecting sensitive details.
Tz-Yi You   +5 more
doaj   +1 more source

Analysis of properties of reversible steganography methods

open access: yesJournal of Computer Sciences Institute, 2018
Steganography is a science that deals with hiding information in other information, and it's becoming increasingly popular with rapid growth of Internet utilization.
Piotr Zimnicki, Grzegorz Kozieł
doaj   +1 more source

Universal Compressed Sensing

open access: yes, 2016
In this paper, the problem of developing universal algorithms for compressed sensing of stochastic processes is studied. First, R\'enyi's notion of information dimension (ID) is generalized to analog stationary processes.
Jalali, Shirin, Poor, H. Vincent
core   +1 more source

Home - About - Disclaimer - Privacy