Results 41 to 50 of about 56,033 (246)

A Multiple Criteria-Based Cost Function Using Wavelet and Edge Transformation for Medical Image Steganography

open access: yesJournal of Intelligent Systems, 2018
With the ever-increasing need for concealing messages within cover media like image, video, and audio, numerous attempts have been developed for steganography.
Nipanikar S.I., Hima Deepthi V.
doaj   +1 more source

Chaotic Watermarking for Authentication [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2013
This research concerns with generating and hiding invisible chaotic watermarking, in a manner different from that used in the rest of the known watermarks, has been presented.
Melad Saeed
doaj   +1 more source

Poisson noise reduction with non-local PCA

open access: yes, 2013
Photon-limited imaging arises when the number of photons collected by a sensor array is small relative to the number of detector elements. Photon limitations are an important concern for many applications such as spectral imaging, night vision, nuclear ...
Deledalle, Charles-Alban   +3 more
core   +3 more sources

Steganografi Video Digital dengan Algoritma LSB (Least Significant Bit) dan Rijndael

open access: yesJournal of Innovation Information Technology and Application, 2020
Steganography is the science and art of hiding information so that confidential information cannot be known by others, except the sender and receiver. This research is designed to create a steganography system on video with mp4 format.
Imam Riadi, Sunardi Sunardi, Dwi Aryanto
doaj   +1 more source

Improving Image Restoration with Soft-Rounding

open access: yes, 2015
Several important classes of images such as text, barcode and pattern images have the property that pixels can only take a distinct subset of values.
Hu, Bao-Gang   +3 more
core   +1 more source

An Efficient Mode Decision Algorithm Based on Dynamic Grouping and Adaptive Adjustment for H.264/AVC [PDF]

open access: yes, 2007
“This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders.
Hou, B., Sotudeh, R., Zhan, B.
core   +1 more source

Compression Artifacts Reduction by a Deep Convolutional Network

open access: yes, 2015
Lossy compression introduces complex compression artifacts, particularly the blocking artifacts, ringing effects and blurring. Existing algorithms either focus on removing blocking artifacts and produce blurred output, or restores sharpened images that ...
Deng, Yubin   +3 more
core   +1 more source

Development of control algorithm for a new 12s-6p single phase field excited flux switching motor [PDF]

open access: yes, 2020
Flux switching motor (FSM) fall into a special category of switch reluctance motors (SRM). One of the key features of FSM is its rotor structure. Generally, it is free from any magnet and winding.
Amin, Faisal
core  

Comparison of Noise Using Reduction Method for Repairing Digital Image

open access: yesJOIV: International Journal on Informatics Visualization
Digital images are used to become a visual bridge of information. The information data must be precise so that the information can be adequately conveyed, but in the process, digital images sometimes experience a change in quality.
Amin Padmo Azam Masa   +3 more
doaj   +1 more source

A Coding-Based Steganography Using Multiple Frequency Domains [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2009
:In this paper, a new technique for hiding text in a bitmap images will be present. The technique based on using an index of the dictionary representing the characters of the secret messages instead of the characters themselves.
Omed Salim Khalind   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy