Results 11 to 20 of about 54,446 (214)

Data hiding to the image with bit plane slicing and double XOR

open access: yesMANAS: Journal of Engineering, 2022
Data hiding is done in different environments and with different techniques, and applications in this area attract a lot of attention. In data hiding, the method of securing the data in the image by hiding data is one of the steganography methods.
Bilgi Özdemir, Nurettin Doğan
doaj   +1 more source

Weighted Fuzzy-Based PSNR for Watermarking

open access: yes, 2021
One of the problems of conventional visual quality evaluation criteria such as PSNR and MSE is the lack of appropriate standards based on the human visual system (HVS). They are calculated based on the difference of the corresponding pixels in the original and manipulated image.
Jamali, Maedeh   +2 more
openaire   +2 more sources

A Recursive Algorithm to Hide Three Secret Images In One Image Using Wavelet Transform [PDF]

open access: yesEngineering and Technology Journal, 2012
This paper presents an algorithm based on wavelet transform to hide three secret colored or gray-scale images with different sizes in one colored cover image.
Yasmin Muwafaq kassim
doaj   +1 more source

Fixed-PSNR Lossy Compression for Scientific Data [PDF]

open access: yes2018 IEEE International Conference on Cluster Computing (CLUSTER), 2018
Error-controlled lossy compression has been studied for years because of extremely large volumes of data being produced by today's scientific simulations. None of existing lossy compressors, however, allow users to fix the peak signal-to-noise ratio (PSNR) during compression, although PSNR has been considered as one of the most significant indicators ...
Tao, Dingwen   +4 more
openaire   +2 more sources

Q-AIMD: A Congestion Aware Video Quality Control Mechanism [PDF]

open access: yes, 2013
Following the constant increase of the multimedia traffic, it seems necessary to allow transport protocols to be aware of the video quality of the transmitted flows rather than the throughput.
Changuel, Nesrine   +5 more
core   +1 more source

Technical Assessment of Various Image Enhancement Techniques using Finger Vein for personal Authentication [PDF]

open access: yesJournal of Information Technology Management, 2022
The most important aspects of image processing are image enhancement. The visual form of an image can be enhanced by using image enhancement techniques for better human interpretation.
Sapna Sharma   +2 more
doaj   +1 more source

Analisis Histogram Steganografi Least Significant Bit Pada Citra Grayscale

open access: yesDigital Zone: Jurnal Teknologi Informasi dan Komunikasi, 2020
Kesadaran pentingnya keamanan data pada era digital saat ini ditandai dengan berkembangnya aplikasi keamanan data. Pada penelitian ini akan dilakukan analisis histogram terhadap suatu aplikasi keamanan data.
Nur Fitrianingsih Hasan   +2 more
doaj   +1 more source

Network Degradation Effects on Different Codec Types and Characteristics of Video Streaming

open access: yesAdvances in Electrical and Electronic Engineering, 2014
Nowadays, there is a quickly growing demand for the transmission of voice, video and data over an IP based network. Multimedia, whether we are talking about broadcast, audio and video transmission and others, from a global perspective is growing ...
Jaroslav Frnda   +3 more
doaj   +1 more source

AN EXPERIMENTAL SET-UP OF A GRAPHICAL USER INTERFACE FOR IMAGE ENHANCEMENT USING CNN [PDF]

open access: yesProceedings on Engineering Sciences, 2023
MATLAB GUI provides a friendly graphical user interface. We know that deep learning is very in demand in today’s life. It is used when talking about a large number of data, deep learning is used to learn features of a data set, or we can say that an ...
Rajni Mehra , Prachi Chaudhary
doaj   +1 more source

CAS-CNN: A Deep Convolutional Neural Network for Image Compression Artifact Suppression [PDF]

open access: yes, 2016
Lossy image compression algorithms are pervasively used to reduce the size of images transmitted over the web and recorded on data storage media. However, we pay for their high compression rate with visual artifacts degrading the user experience.
Benini, Luca   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy