Zobrazeno 1 - 10
of 5 447
pro vyhledávání: '"psnr"'
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-14 (2024)
Abstract In light of the unprecedented growth in internet usage, safeguarding data from unauthorized access has emerged as a paramount concern. Cryptography and steganography stand as pivotal methods for ensuring data security during transmission. Th
Externí odkaz:
https://doaj.org/article/65d3e4dda3614394beabdcd5c49cbc50
Publikováno v:
Vojnotehnički Glasnik, Vol 72, Iss 3, Pp 1214-1241 (2024)
Introduction/purpose: This paper presents the results of the research on visually lossless image compression which is of particular interest because it achieves a high degree of compression, while the visual quality of the image is not impaired, i.e.
Externí odkaz:
https://doaj.org/article/a7cbbe7c0703458b9d5421c1d78c20d4
Publikováno v:
Egyptian Informatics Journal, Vol 28, Iss , Pp 100541- (2024)
The Internet of Medical Things (IoMT) links medical devices and wearable, enhancing healthcare. To secure sensitive patient data over the IoMT, encryption is vital to retain confidentiality, prevent tampering, ensure authenticity, and secure data tra
Externí odkaz:
https://doaj.org/article/227d8615f836494191eee7e5abe29cb8
Autor:
Dian Liu, Yang Cao, Jing Yang, Jianyu Wei, Jili Zhang, Chenglin Rao, Banghong Wu, Dabin Zhang
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-19 (2024)
Abstract Crop disease detection and crop baking stage judgement require large image data to improve accuracy. However, the existing crop disease image datasets have high asymmetry, and the poor baking environment leads to image acquisition difficulti
Externí odkaz:
https://doaj.org/article/4ccb56bdbfb749e7ad1ca2fc6f41f3fb
Autor:
Wenjun Si
Publikováno v:
Intelligent Systems with Applications, Vol 23, Iss , Pp 200396- (2024)
In the digital age, image data security and privacy issues are critical challenges for society, commerce, and technology. By dividing images into multiple copies and distributing them among participants, highly secure sharing of secret information is
Externí odkaz:
https://doaj.org/article/d36755529081412695f78962b502a5c4
Publikováno v:
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Vol 18, Iss 3 (2024)
Human face detection is one of the most studied topics in computer vision. The purpose of facial detection is to find out whether or not a face is present in an image. Blur can be caused by many things, such as motion that occurs when the camera take
Externí odkaz:
https://doaj.org/article/82e0012a457848439b0978cf30e0f500
Publikováno v:
Baghdad Science Journal, Vol 21, Iss 7 (2024)
Text encryption in video is a vital tool in many industries where protecting sensitive information is of highest concern. Algorithms and automated detection methods commonly struggle to locate hidden text in video frames. This resistance increases th
Externí odkaz:
https://doaj.org/article/afa7855789fa4540bab550d944cc209c
Publikováno v:
IEEE Access, Vol 12, Pp 13729-13746 (2024)
Free Space Optics (FSO) has emerged as a viable solution to meet the growing demand for high bandwidth, secure data transmission, and high speed. However, the FSO system is highly susceptible to environmental factors, with precipitation in particular
Externí odkaz:
https://doaj.org/article/bada291437404d26a270ea2f956e6ef0
Publikováno v:
IEEE Access, Vol 12, Pp 4523-4531 (2024)
To identify the compressed power grid fault data quickly and effectively, this paper presents a spatiotemporal location fault diagnosis method for the data compressed with set partitioning in hierarchical trees (SPIHT) algorithm. Firstly, the data fr
Externí odkaz:
https://doaj.org/article/af1c414ed5e542a79aac4600632d75fa
Autor:
Baydaa-Jaffer Al-khafaji
Publikováno v:
Wasit Journal for Pure Sciences, Vol 3, Iss 2 (2024)
Encrypting image transmission has been one of the most complex challenges with communication technology ever. Millions of people utilize and share photographs via the internet for personal and professional purposes. One approach to secure picture tra
Externí odkaz:
https://doaj.org/article/d0346784c96043dea2f19067dc1e3409