Results 1 to 10 of about 54,446 (214)

Improving PSNR and computational efficiency in orthogonal ghost imaging

open access: yesScientific Reports
In this paper, we present an orthogonal ghost imaging (OGI) method based on two-dimensional discrete cosine transform (2D-DCT) patterns. Unlike traditional methods that are based on random or sinusoidal patterns, our method relies on structured ...
Kobra Hassanzadeh   +3 more
doaj   +3 more sources

PSNR Improvement Using Different Prediction Coding

open access: yesTikrit Journal of Engineering Sciences, 2015
Differential Pulse Code Modulation (DPCM) is one of the predictive coding techniques. The number of previous pixels employed in the estimate operation is referred to as the order of the predictor. Predictor using one pixel for estimation is called “first
Khamies Khalaf Hasan
doaj   +1 more source

PSNR Improvement using Different Prediction Coding in Image Compression

open access: yesTikrit Journal of Engineering Sciences, 2010
Differential Pulse Code Modulation (DPCM) is one of the predictive coding techniques. The number of previous pixels employed in the estimate operation is referred to as the order of the predictor. Predictor using one pixel for estimation is called “first
Khamies K. Hasan
doaj   +2 more sources

Analysis of Video CODEC Performance Using Different Softphone Applications

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2021
In a video call there are several components, such as IP phone or softphone, CODEC, and server. Selection of softphone and CODEC is a consideration in building a video communication network because it will affect the quality of video call.
Dandun Kusuma Yudha, Ahmad Ashari
doaj   +1 more source

Dual Hiding in Digital Image Files [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2011
The technique of information hiding is one of information security techniques, which works on embedding information on media in such a way that avoid bringing suspicion of discovering transmission between two ends.
Farah Mohammed
doaj   +1 more source

Распознавание оттенка цветовой метки на основе нечёткой кластеризации

open access: yesИнформатика и автоматизация, 2021
Рассматривается задача определения текущего положения пневматических исполнительных механизмов. Решение поставленной задачи достигается введением системы технического зрения, позволяющей на основе метода нечеткой кластеризации определять в режиме ...
Maxim Bobyr   +2 more
doaj   +1 more source

Information Hiding in Color Image based on LSB and FA [PDF]

open access: yesKirkuk Journal of Science, 2017
In this research was to hide information in color images of the type of Joint Photographic Experts Group (JPEG) using hiding technique Least Significant Bit (LSB) with Firefly algorithm.
Dr. Ahmed Sami Nori, Jasim Ibrahim Jasim
doaj   +1 more source

Multimedia Multilevel Security by Integrating Steganography and Cryptography Techniques [PDF]

open access: yesITM Web of Conferences, 2023
Multimedia-based Steganography is famous for its security purpose, These steganography techniques were used by our ancestors and it is still carried out now with better and vast technology. The aim is to provide better security in an effective and secure
Satish E.G.   +4 more
doaj   +1 more source

A subpixel registration algorithm for low PSNR images [PDF]

open access: yes2012 IEEE Fifth International Conference on Advanced Computational Intelligence (ICACI), 2012
This paper presents a fast algorithm for obtaining high-accuracy subpixel translation of low PSNR images. Instead of locating the maximum point on the upsampled images or fitting the peak of correlation surface, the proposed algorithm is based on the measurement of centroid on the cross correlation surface by Modified Moment method.
Feng, Song   +5 more
openaire   +2 more sources

3D chaotic map-cosine transformation based approach to video encryption and decryption

open access: yesOpen Computer Science, 2022
Data security is vital for multimedia communication. A number of cryptographic algorithms have been developed for the secure transmission of text and image data.
Dua Mohit   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy