Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








6 Hits in 7.7 sec

A Comprehensive lossless modified compression in medical application on DICOM CT images

Alka sharm
2013 IOSR Journal of Computer Engineering  
They mainly worked over gray scale images of Lena and finger print images.  ...  SPIHT produces embedded bit streams of the image and works on the principle of spatial relationship among the wavelet co-efficient at different levels and frequency sub-bands in the pyramid structure of  ...  This paper proposes an algorithm to find the outliers to improve the efficiency of web search engine.  ... 
doi:10.9790/0661-1530107 fatcat:eoyyyi7vmbculctnfqnohxyhue

Secure Image Hiding Algorithm using Cryptography and Steganography

Hemlata Sharma
2013 IOSR Journal of Computer Engineering  
Now this encrypted imageis embedded with videoby using LSB Approach of steganography.  ...  steganography are the two major techniques for secret communication.In this paper,the secret image is first encrypted by using BLOWFISH algorithm which has very good performance and is a most powerful  ...  This work was supported by the National Institute of Electronics and Information Technology, Aurangabad.  ... 
doi:10.9790/0661-1350106 fatcat:ufv3vx7pd5banok7b5eh7bup7y

Design and Analysis of Johnson Counter Using Finfet Technology

Myneni Jahnavi Myneni Jahnavi
2013 IOSR Journal of VLSI and Signal processing  
Usually, the second gate of FinFET transistors is used to dynamically control the threshold voltage of the first gate in order to improve the performance and reduce leakage power.  ...  In this paper, we proposes a synchronous johnson counter by using FinFET Technology.FinFET logic implementation has significant advantages over static CMOS logic in terms of power consumption.  ...  Siva Yellampalli of UTL technologies for their support in the lab, and especially the first author is thankful to the management of Don Bosco Institute of Technology, Bangalore for their constant encouragement  ... 
doi:10.9790/4200-0160106 fatcat:hdbvjkcldbhutardkebeuqei5y

Local Binary Pattern (LBP) of Image Tampering Fragile Watermarking Algorithm

Venkata Kodavanti, Pratyush
unpublished
In view of the way of LBP combination it is required that exclusive couple of pixels of a given piece are adjusted to insert watermark.  ...  This procedure considers the prerequisites of an advanced image watermarking, for example, indistinctness and vigor to watermark evacuation assaults.  ...  Here the number of neighbourhood pixels are represented by "P" and radius of the neighbourhood is represented by "R". The LBP operator can be described as in following figure 1.  ... 
fatcat:lrntfzox5vd6rffuf3atlb566u

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks

Vinayak T Patil
2013 IOSR Journal of Computer Engineering  
Thus, it is imperative to reduce the overhead of route discovery in the design of routing protocols of MANETs.  ...  One of the fundamental challenges of MANETs is the design of dynamic routing protocols with good performance and less overhead.  ...  Sitendra Tamrakar in writing this paper and giving the valuable suggestion.  ... 
doi:10.9790/0661-1260109 fatcat:jundvgfvpjcdpmtloz2z2w6ige

Image and Video Encryption [chapter]

Advances in Information Security  
attacks) or simply replace the encrypted parts of the data by either artificial data mimicking simple nonstructured content (replacement attacks) or data minimising the perceptual impact of the incorrect  ...  These types of attacks either try to conceal the quality reduction caused by encryption by treating unbreakable data as lost and then trying to minimise the impact on quality as a result of loss (error-concealment  ...  In all experiments the images were compressed with a target bitrate of 80000 bits, this leads to a compression rate of about 6.5 for 8-bit gray-level images with 256*256 pixels.  ... 
doi:10.1007/0-387-23403-9_5 fatcat:4vyleclbyncwzb2hft6hswlcqu