首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   19篇
  免费   0篇
工业技术   19篇
  2023年   1篇
  2022年   3篇
  2021年   3篇
  2020年   2篇
  2019年   1篇
  2018年   3篇
  2017年   3篇
  2014年   1篇
  2013年   2篇
排序方式: 共有19条查询结果,搜索用时 328 毫秒
1.
Multimedia Tools and Applications - Cryptography is the process by which a readable message is converted into cipher-text unintelligible to an eavesdropper. With the advent of the internet,...  相似文献   
2.

This paper presents an efficient data hiding technique capable of providing improved visual quality of watermarked images, besides having the ability to detect the tamper, if any. It is a spatial domain approach in which major emphasis is on improving the visual quality rather than increasing the PSNR or the embedding capacity. The medical images have been divided into Region of Interest (ROI) and Non-Region of Interest (NROI). Bringing out details that lie within the low dynamic range is very important in medical images for effective diagnosis. ROI being diagnostically critical region is enhanced using contrast stretching and subsequently, data is reversibly embedded into the peak bins of ROI. Only those peak bins are employed for reversible data embedding that have an adjacent empty bin to overcome the problem of overflow and underflow. In NROI, the uniform intensity and redundant information region, Least Significant Bit (LSB) embedding is employed for increasing the payload. For tamper detection, a fragile watermark has been embedded in the ROI. To evaluate the scheme various parameters like peak signal to noise ratio (PSNR), No-Reference Quality Metric for contrast-distorted images (NR-CDIQA) and Structural Similarity Index Matrix (SSIM) have been calculated. The experimental results show a remarkable increase in visual quality compared to state-of-art.

  相似文献   
3.
Multimedia Tools and Applications - In e-healthcare applications integrity of the received information is of prime importance for ensuring the accurate diagnosis. The integrity of electronic...  相似文献   
4.
Multimedia Tools and Applications - Multimedia communication is revolutionizing all major spheres of human life. The advent of IoT and its applications in many fields like sensing, healthcare and...  相似文献   
5.
Multimedia Tools and Applications - The information stored or shared via the internet is growing massively and includes images primarily. The images are vulnerable to attacks when transferred over...  相似文献   
6.
Multimedia Tools and Applications - The present era is paving huge expansion to the transmission of digital data in fields like health, military intelligence, scientific research, and publication...  相似文献   
7.

Underwater object detection is an essential step in image processing and it plays a vital role in several applications such as the repair and maintenance of sub-aquatic structures and marine sciences. Many computer vision-based solutions have been proposed but an optimal solution for underwater object detection and species classification does not exist. This is mainly because of the challenges presented by the underwater environment which mainly include light scattering and light absorption. The advent of deep learning has enabled researchers to solve various problems like protection of the subaquatic ecological environment, emergency rescue, reducing chances of underwater disaster and its prevention, underwater target detection, spooring, and recognition. However, the advantages and shortcomings of these deep learning algorithms are still unclear. Thus, to give a clearer view of the underwater object detection algorithms and their pros and cons, we proffer a state-of-the-art review of different computer vision-based approaches that have been developed as yet. Besides, a comparison of various state-of-the-art schemes is made based on various objective indices and future research directions in the field of underwater object detection have also been proffered.

  相似文献   
8.
Wireless Personal Communications - In this information age, high data rates and good reliability features are becoming the dominant factors for a successful deployment of commercial networks....  相似文献   
9.
Reliable and good quality of service for speech transmission over wireless network has been a major challenge for the communication engineers and researchers. In this paper a new technique of speech compression and transmission using different Daubechies wavelets in a space time block coded co-corporative MIMO–OFDM networks using time and space diversity has been proposed. The main focus has been laid on design and development of wavelet based compression of multimedia signals for cooperative MIMO–OFDM system. We tried to find out various major issues regarding the wavelet compression of a speech signal. These issues include choice of a wavelet, decomposition level and thresholding criteria suitable for speech compression and transmission in co-operative MIMO–OFDM systems. A wavelet based speech compression technique using hard and soft thresholding algorithm has been proposed. The work shows that wavelet compression with QPSK modulation is a promising compression technique in a cooperative MIMO–OFDM system which makes use of the elegant theory of wavelets. The performance has been evaluated using mean square error, peak signal to noise ratio, compression ratio, bit error rate, and retained signal energy. It has been found that the transmitted speech signal is retrieved well under noisy conditions at higher order Daubechies wavelets. From the results it is clear that proposed technique aims at a radio access technology that can provide service performance comparable to that of current fixed Line accesses. To evaluate the performance of the proposed method, various performance parameters have been compared with previously implemented techniques and it has been found that the proposed work shows better performance as compared to the already existing techniques.  相似文献   
10.
The multimedia security is becoming more and more important as the data being exchanged on the Internet is increasing exponentially. Though cryptography is one of the methods which is used to secure the data during transit, but the camouflaged appearance of the scrambled data alerts the adversary about some critical information being shared. In such a scenario, steganography has been used as an alternate solution to secure the secret information. In this paper a color image steganographic algorithm based on hybrid edge detection is proposed. The color image is partitioned into constituent Red (R), Green (G) and Blue (B) planes. Hybrid edge detection is used for finding the edge and non-edge pixels of Green and Blue planes of cover image. The Green and Blue planes are used for hiding the data while Red plane holds the pixel status (whether edge or non-edge) of these planes. The RC4 encryption algorithm is used to encrypt secret message before embedding it in the cover image to enhance security of the secret data. A fragile watermark/logo (whose size is less than 1% of total secret data) has been embedded, besides secret data in the cover image, to facilitate content authentication and early tamper detection. At the receiver, firstly logo is extracted. If it is same as one embedded at transmitter, indicating that secret data has not been altered during transit, secret data is extracted. Otherwise (if extracted logo is not same as used at input) the receiver does not waste critical time to extract compromised data but sends an automatic retransmission request. Experimental investigations reveal that the proposed scheme is capable of providing high quality of stego-images for a fairly high pay load. A comparison of the proposed technique with some state of art schemes substantiates the above arguments.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号