Results 1 to 10 of about 60,075 (226)

Распознавание оттенка цветовой метки на основе нечёткой кластеризации

open access: yesИнформатика и автоматизация, 2021
Рассматривается задача определения текущего положения пневматических исполнительных механизмов. Решение поставленной задачи достигается введением системы технического зрения, позволяющей на основе метода нечеткой кластеризации определять в режиме ...
Maxim Bobyr   +2 more
doaj   +1 more source

High PSNR Using Fibonacci Sequences in Classical Cryptography and Steganography Using LSB

open access: yesInternational Journal of Intelligent Engineering and Systems, 2023
: The exchange of confidential information should be done in a secure environment. Therefore, security is needed if the exchange of information is carried out using Internet media.
Christy Atika   +4 more
semanticscholar   +1 more source

Information Hiding in Color Image based on LSB and FA [PDF]

open access: yesKirkuk Journal of Science, 2017
In this research was to hide information in color images of the type of Joint Photographic Experts Group (JPEG) using hiding technique Least Significant Bit (LSB) with Firefly algorithm.
Dr. Ahmed Sami Nori, Jasim Ibrahim Jasim
doaj   +1 more source

Multimedia Multilevel Security by Integrating Steganography and Cryptography Techniques [PDF]

open access: yesITM Web of Conferences, 2023
Multimedia-based Steganography is famous for its security purpose, These steganography techniques were used by our ancestors and it is still carried out now with better and vast technology. The aim is to provide better security in an effective and secure
Satish E.G.   +4 more
doaj   +1 more source

3D chaotic map-cosine transformation based approach to video encryption and decryption

open access: yesOpen Computer Science, 2022
Data security is vital for multimedia communication. A number of cryptographic algorithms have been developed for the secure transmission of text and image data.
Dua Mohit   +3 more
doaj   +1 more source

Data hiding to the image with bit plane slicing and double XOR

open access: yesMANAS: Journal of Engineering, 2022
Data hiding is done in different environments and with different techniques, and applications in this area attract a lot of attention. In data hiding, the method of securing the data in the image by hiding data is one of the steganography methods.
Bilgi Özdemir, Nurettin Doğan
doaj   +1 more source

Weighted Fuzzy-Based PSNR for Watermarking

open access: yes, 2021
One of the problems of conventional visual quality evaluation criteria such as PSNR and MSE is the lack of appropriate standards based on the human visual system (HVS). They are calculated based on the difference of the corresponding pixels in the original and manipulated image.
Jamali, Maedeh   +2 more
openaire   +2 more sources

Wavefront control through multi-layer scattering media using single-pixel detector for high-PSNR optical transmission

open access: yes, 2021
We propose a new approach for optical analog-signal transmission through multi-layer scattering media using single-pixel detector to achieve high peak signal-to-noise ratio (PSNR), and analog signals can be experimentally received with high PSNR through ...
Yin Xiao, Lina Zhou, Wen Chen
semanticscholar   +1 more source

A Recursive Algorithm to Hide Three Secret Images In One Image Using Wavelet Transform [PDF]

open access: yesEngineering and Technology Journal, 2012
This paper presents an algorithm based on wavelet transform to hide three secret colored or gray-scale images with different sizes in one colored cover image.
Yasmin Muwafaq kassim
doaj   +1 more source

Technical Assessment of Various Image Enhancement Techniques using Finger Vein for personal Authentication [PDF]

open access: yesJournal of Information Technology Management, 2022
The most important aspects of image processing are image enhancement. The visual form of an image can be enhanced by using image enhancement techniques for better human interpretation.
Sapna Sharma   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy