背带 发表于 2025-3-28 16:32:27
Comparative Study of Wavelets for Image Compression with Embedded Zerotree Algorithm,tion of image compression. The EZW is specially designed algorithm which uses zero tree property of wavelet transformed image to arrange the coefficients. These coefficients gives the progressively improved image information in order to pre-determined threshold. We have used Haar, Daubechies, Bi-ort抛弃的货物 发表于 2025-3-28 20:03:17
http://reply.papertrans.cn/24/2305/230489/230489_42.pngmedium 发表于 2025-3-29 00:29:53
,DCT-Based Gray Image Watermarking Scheme,secured digital data transfer. There exist several techniques for digital image watermarking to provide the security but standardization has not been done yet. In this paper, a DCT-based robust digital image watermarking scheme has been proposed. The scheme selects each block for DCT randomly. The s值得赞赏 发表于 2025-3-29 05:35:04
Five-Input Majority Gate Design with Single Electron Nano-Device, gates are important part of the decision-making circuits based on voting. Being one of the nano-electronics devices single electron devices reduces the size of the complete circuit. The function of the five-input majority gate is tested by simulating the proposed circuit in SIMON simulator and analADORE 发表于 2025-3-29 09:06:21
http://reply.papertrans.cn/24/2305/230489/230489_45.pngcravat 发表于 2025-3-29 12:04:41
Extended Directional IPVO for Reversible Data Hiding Scheme,imum value modification and smallest, second smallest, and so on for minimum value modification. The data embedding capacity has been improved than previous data hiding schemes while keeping visual quality unaltered. Experimental results are compared with existing state-of-the-art methods and achievdeclamation 发表于 2025-3-29 15:52:36
http://reply.papertrans.cn/24/2305/230489/230489_47.png固定某物 发表于 2025-3-29 22:27:33
http://reply.papertrans.cn/24/2305/230489/230489_48.pngAVID 发表于 2025-3-30 02:01:59
Esteban Robles Luna,M. J. Escalona,G. Rossind server end from intermediate OTP using user-defined digit repositioning scheme chosen by user. Random generation of numeric and image OTP, distribution of encrypted image OTP and formation of final numeric OTP using digit repositioning scheme impose a great security to the system.encyclopedia 发表于 2025-3-30 07:09:52
http://reply.papertrans.cn/24/2305/230489/230489_50.png