Results 51 to 60 of about 54,446 (214)

WATERMARKING CITRA DIGITAL BERWARNA MENGGUNAKAN STATIONARY WAVELET TRANSFORM (SWT)

open access: yesIlkom Jurnal Ilmiah, 2019
Digital Image watermarking is widely used and studied for ownership identification, data protection, and authentication. A good watermarking scheme should achieve the watermarking requirements such as imperceptibility, robustness and capacity.
Fitriani Umar, Herdianti Darwis
doaj   +1 more source

A Multi‐Resonant Tunable Fabry‐Pérot Cavity for High Throughput Spectral Imaging

open access: yesAdvanced Optical Materials, Volume 13, Issue 8, March 13, 2025.
This study introduces a multi‐resonant tunable Fabry‐Pérot filter for high throughput spectral imaging. With a spectral resolution of 10 nm and a switching time of 23 ms, this compact and low‐cost device possesses better spectral imaging accuracy in poor light conditions while maintaining over six times higher optical throughput than standard liquid ...
Xiao Wu   +5 more
wiley   +1 more source

Seven ways to improve example-based single image super resolution

open access: yes, 2015
In this paper we present seven techniques that everybody should know to improve example-based single image super resolution (SR): 1) augmentation of data, 2) use of large dictionaries with efficient search structures, 3) cascading, 4) image self ...
Rothe, Rasmus   +2 more
core   +1 more source

vEMINR: Ultra‐Fast Isotropic Reconstruction for Volume Electron Microscopy With Implicit Neural Representation

open access: yesAdvanced Science, EarlyView.
vEMINR is an ultra‐fast isotropic reconstruction method for vEM based on implicit neural representation, achieving over tenfold faster reconstruction and higher accuracy on 11 datasets, showing strong potential for large‐scale vEM data processing.
Jibin Yang   +7 more
wiley   +1 more source

Image Interpolation Using a Rational Bi-Cubic Ball

open access: yesMathematics, 2019
: This study deals with the application of new rational bi-cubic Ball function with six parameters in image interpolation, especially for the grayscale image.
Nur Atiqah Binti Zulkifli   +5 more
doaj   +1 more source

Text File Hiding Randomly Using Secret Sharing Scheme [PDF]

open access: yesEngineering and Technology Journal, 2018
Exchange of information through the channels of communication can beunsafe. Communication media are not safe to send sensitive information so it isnecessary to provide the protection of information from disclosure to unauthorizedpersons.
Yossra Ali, Hussein Mankhi
doaj   +1 more source

Highly Secure In Vivo DNA Data Storage Driven by Genomic Dynamics

open access: yesAdvanced Science, EarlyView.
Integrated computational‐biological programming enables secure in vivo data storage by generating code tables from either genomes or gene regulatory networks, expanding the encryption key space by over 100 orders of magnitude. Storing code tables within synthetic genes, genomes, or gene regulatory networks adds an additional layer of security by ...
Jiaxin Xu   +9 more
wiley   +1 more source

Combining Haar Wavelet and Karhunen-Loeve Transform for Robust and Imperceptible Data Hiding Using Digital Images

open access: yesJournal of Intelligent Systems, 2018
In this paper, we present an introduction of digital image watermarking followed by important characteristics and potential applications of digital watermarks.
Sharma Akankasha   +2 more
doaj   +1 more source

Multi‐Dimensional Acoustic Cascaded Holographic Encryption with Instantaneous Visual Decryption via Particle Manipulation

open access: yesAdvanced Science, EarlyView.
Acoustic holograms act as key tools for information encryption, yet current schemes limit encryption dimensionality/security and require time‐consuming decryption. A compact device integrates multi‐dimensional cascaded acoustic holography with particle manipulation, employs extra secret keys, enables rapid decryption, and is validated via 1D/2D/3D ...
Qin Lin   +8 more
wiley   +1 more source

Solving Inverse Problems with Piecewise Linear Estimators: From Gaussian Mixture Models to Structured Sparsity

open access: yes, 2010
A general framework for solving image inverse problems is introduced in this paper. The approach is based on Gaussian mixture models, estimated via a computationally efficient MAP-EM algorithm. A dual mathematical interpretation of the proposed framework
Mallat, Stéphane   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy