Results 1 to 10 of about 54,446 (214)
Improving PSNR and computational efficiency in orthogonal ghost imaging
In this paper, we present an orthogonal ghost imaging (OGI) method based on two-dimensional discrete cosine transform (2D-DCT) patterns. Unlike traditional methods that are based on random or sinusoidal patterns, our method relies on structured ...
Kobra Hassanzadeh +3 more
doaj +3 more sources
PSNR Improvement Using Different Prediction Coding
Differential Pulse Code Modulation (DPCM) is one of the predictive coding techniques. The number of previous pixels employed in the estimate operation is referred to as the order of the predictor. Predictor using one pixel for estimation is called “first
Khamies Khalaf Hasan
doaj +1 more source
PSNR Improvement using Different Prediction Coding in Image Compression
Differential Pulse Code Modulation (DPCM) is one of the predictive coding techniques. The number of previous pixels employed in the estimate operation is referred to as the order of the predictor. Predictor using one pixel for estimation is called “first
Khamies K. Hasan
doaj +2 more sources
Analysis of Video CODEC Performance Using Different Softphone Applications
In a video call there are several components, such as IP phone or softphone, CODEC, and server. Selection of softphone and CODEC is a consideration in building a video communication network because it will affect the quality of video call.
Dandun Kusuma Yudha, Ahmad Ashari
doaj +1 more source
Dual Hiding in Digital Image Files [PDF]
The technique of information hiding is one of information security techniques, which works on embedding information on media in such a way that avoid bringing suspicion of discovering transmission between two ends.
Farah Mohammed
doaj +1 more source
Распознавание оттенка цветовой метки на основе нечёткой кластеризации
Рассматривается задача определения текущего положения пневматических исполнительных механизмов. Решение поставленной задачи достигается введением системы технического зрения, позволяющей на основе метода нечеткой кластеризации определять в режиме ...
Maxim Bobyr +2 more
doaj +1 more source
Information Hiding in Color Image based on LSB and FA [PDF]
In this research was to hide information in color images of the type of Joint Photographic Experts Group (JPEG) using hiding technique Least Significant Bit (LSB) with Firefly algorithm.
Dr. Ahmed Sami Nori, Jasim Ibrahim Jasim
doaj +1 more source
Multimedia Multilevel Security by Integrating Steganography and Cryptography Techniques [PDF]
Multimedia-based Steganography is famous for its security purpose, These steganography techniques were used by our ancestors and it is still carried out now with better and vast technology. The aim is to provide better security in an effective and secure
Satish E.G. +4 more
doaj +1 more source
A subpixel registration algorithm for low PSNR images [PDF]
This paper presents a fast algorithm for obtaining high-accuracy subpixel translation of low PSNR images. Instead of locating the maximum point on the upsampled images or fitting the peak of correlation surface, the proposed algorithm is based on the measurement of centroid on the cross correlation surface by Modified Moment method.
Feng, Song +5 more
openaire +2 more sources
3D chaotic map-cosine transformation based approach to video encryption and decryption
Data security is vital for multimedia communication. A number of cryptographic algorithms have been developed for the secure transmission of text and image data.
Dua Mohit +3 more
doaj +1 more source

