We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. ECG steganography using Base64 encoding and pixel swap** technique

    ECG signals tagged with secret information are transferred through wireless communication channel in remote health monitoring applications. To hide...

    P. Mathivanan, A. Balaji Ganesh in Multimedia Tools and Applications
    Article 18 October 2022
  2. Visual cryptography for securing medical images using a combination of hyperchaotic-based pixel, bit scrambling, and DNA encoding

    In present times, medical images get shared among doctors for fast and efficient diagnosis. Unfortunately, these images have high redundancy and...

    Richa Maurya, G. V. Eswara Rao, B. Rajitha in International Journal of Information Technology
    Article 22 July 2022
  3. Pixel encoding for unconstrained face detection

    In an uncontrolled environment, many of the face detection algorithms lack robustness due to their design. The present research on unconstrained face...

    Dattatray D. Sawat, Rajendra S. Hegadi, ... Ravindra S. Hegadi in Multimedia Tools and Applications
    Article 27 March 2020
  4. Image encryption scheme based on double permutation and DNA

    This paper mainly contributes a bit-level and pixel-level double-permutation image encryption scheme based on DNA coding technology, which can...

    Xuncai Zhang, Jiali Di, Ying Niu in Multimedia Tools and Applications
    Article 18 December 2023
  5. A learned pixel-by-pixel lossless image compression method with 59K parameters and parallel decoding

    This paper considers lossless image compression and presents a learned compression system that can achieve state-of-the-art lossless compression...

    Sinem Gümüş, Fatih Kamisli in Multimedia Tools and Applications
    Article 10 August 2023
  6. Interpolation based dual image reversible data hiding using trinary encoding

    This work proposes a Dual Image Reversible Data Hiding (DIRDH) scheme using interpolation and trinary encoding of secret data. Trinary encoding shows...

    Shounak Shastri, V. Thanikaiselvan in Multimedia Tools and Applications
    Article 16 May 2023
  7. Edge Detection and Huffman Encoding Based Image Steganography with High Data Embedding Capacity

    In the present study, an edge detector and Huffman encoding based image-steganography approach for high data embedding capacity is presented. High...
    Butta Singh, Rajwinder Kaur, ... Satveer Kour in Computational Intelligence in Data Science
    Conference paper 2023
  8. A Novel and Efficient Spatial–Temporal Saliency-Driven Integrated Video Compression

    High-definition devices require the HD-videos for their proper utilization; however, it comprises several issues while transmission such as high...

    R. D. Anitha Kumari, A. Narendranath Udupa in SN Computer Science
    Article 24 February 2024
  9. An Adaptive Convolution Auto-encoder Based on Spiking Neurons

    Neural coding is one of the central questions in neuroscience for converting visual information into spike patterns. However, the existing encoding...
    Chuanmeng Zhu, Jiaqiang Jiang, ... Rui Yan in Neural Information Processing
    Conference paper 2023
  10. A novel and Fast hybrid design of cryptosystems for Image via 5-D chaos based random keys and DNA

    The greatest issue in the age of information technology is safeguarding the real-time colour digital image. In this work, a colour image encryption...

    Sankari M, Vanathi M in Multimedia Tools and Applications
    Article 22 December 2023
  11. Machine learning techniques implementation for detection of grape leaf disease

    Grape leaf diseases like Black Rot, Eska measles, Leaf Spot and Healthy are among the most common disease types of the grape crop. Accurate detection...

    M. Shantkumari, S. V. Uma in Multimedia Tools and Applications
    Article 28 February 2023
  12. Image encryption algorithm based on DNA network and hyperchaotic system

    This paper presents a novel deoxyribonucleic acid (DNA) network encryption method combined with a hyperchaotic system for image encryption. The DNA...

    **wei Yu, Kaiyu Peng, ... Wei **e in The Visual Computer
    Article 02 January 2024
  13. Reversible data-hiding exploiting huffman encoding in dual image using weighted matrix and generalized exploiting modification direction (GEMD)

    In reversible data-hiding techniques, the quality of the steganographic image and its embedding capacity are the most crucial characteristics. The...

    Nada Hussien Abd El Salam, Shengwu **ong, Xuan Liu in The Visual Computer
    Article 05 October 2023
  14. Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing

    Image secret sharing (ISS) is gaining popularity due to the importance of digital images and its wide application to cloud-based distributed storage...

    Xuehu Yan, Longlong Li, ... Lei Sun in Frontiers of Information Technology & Electronic Engineering
    Article 23 January 2023
  15. Improvement of pattern recognition in spiking neural networks by modifying threshold parameter and using image inversion

    In recent years, spiking neural networks (SNNs) have gained popularity as a biologically plausible and energy-efficient alternative to artificial...

    Hedyeh Aghabarar, Kourosh Kiani, Parviz Keshavarzi in Multimedia Tools and Applications
    Article 25 July 2023
  16. Enhance the Performance of Directional Feature-based Palmprint Recognition by Directional Response Stability Measurement

    Palmprint recognition is an emerging biometrics technology that has attracted increasing attention in recent years. Many palmprint recognition...

    Haitao Wang, Wei Jia in Machine Intelligence Research
    Article 22 February 2024
  17. Wire rope damage detection based on a uniform-complementary binary pattern with exponentially weighted guide image filtering

    In response to the problem of unclear texture structure in steel wire rope images caused by complex and uncertain lighting conditions, resulting in...

    Qunpo Liu, Qi Tang, ... Manli Wang in The Visual Computer
    Article 18 June 2024
  18. Line-based self-referencing string prediction technique for screen content coding in AVS3

    String Prediction (SP) is a very efficient screen content coding (SCC) tool. In SP, the self-referencing string plays an important role to improve...

    Li** Zhao, Qingyang Zhou, ... Tao Lin in Multimedia Tools and Applications
    Article 28 February 2023
  19. High capacity reversible data hiding in encrypted images using prediction error encoding

    Reversible data hiding in encrypted images (RDHEI) is a popular way for embedding the information in cover images without knowing their original...

    Arun Kumar Rai, Hari Om, Satish Chand in Multimedia Tools and Applications
    Article 15 July 2022
  20. Gaze Detection Using Encoded Retinomorphic Events

    Event-based gaze detection is a modern problem having several applications and advantages over frame-based techniques. Retinomorphic Event data is...
    Abeer Banerjee, Shyam Sunder Prasad, ... Sanjay Singh in Intelligent Human Computer Interaction
    Conference paper 2023
Did you find what you were looking for? Share feedback.