The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Image coding for high resolution representation, with projection edge smoothening with less computation time is been proposed in this work. This paper considers the main factors that affect the image projection, speed and accuracy respectively. In this paper a new hybrid system was proposed for image projection. It incorporates the bi cubic interpolation for efficient image projection, an adaptive...
Data transmission through the internet is popular in contemporary world. What is of utmost importance is secrecy as well as data privacy in the communication channels of the internet. Steganography consists of by far the best techniques for data hiding and ensuring secrecy. This paper focuses on audio steganography, where a message audio file is embedded within another cover audio file.
Steganography is the practice of hiding information and is well known for concealing the existence of the communication. This technique deals with the insertion of the secret message in an appropriate carrier like image, audio or video. Out of these carriers digital images are mostly preferred because of their wide usage on the Internet. LabVIEW software has been used for execution of steganography...
In this paper, a Fast and Efficient Variable Block Size Motion Estimation algorithm is proposed for high computational video compression. Variable block size Motion Estimation algorithm decomposes each 16×16 block into 16×16, 16×8, 8×16, 8×8, 8×4, 4×8, 4×4 subsequent blocks and searches for optimum Motion Vector. Without searching for optimum motion vector in these all 7 blocks, here the proposed...
Watermarking is a technology that complements cryptography by embedding imperceptible signals in work. Information hiding techniques have recently become important in a number of application areas. Digital audio, video and images are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice that helps to prevent unauthorized copying directly. One...
An accurate Image segmentation is very important in image processing. The main purpose of the image segmentation is to partition the original image into uniform regions. Image segmentation can be applied as the pre-processing stage for the other image processing techniques. There are several techniques for segmentation MR image in image processing. Image segmentation for bio-medical images has become...
Image security is a relatively very young and fast growing. Security of data or information is very important now a day in this world. In this paper proposed to advantages and that working functionalities. This algorithm is verified on different watermarking images. And it's provide robust and secure results. To measure the effectiveness of this algorithm is provide embedding and extracting images...
Selective encryption approaches for efficient multimedia content protection is proposed in wireless multimedia sensor networks (WMSNs) by many authors. Apart from these methodologies, the other important aspect which is discussed in some literatures is the combined optimization of multimedia quality, content protection and energy issues pertaining to communication. However in these joint optimization...
This paper proposes an algorithm that explores the space of possible architectural implementation of 2D Gabor filters. The characteristics performance of the Gabor filter is analyzed by filtering the Gaussian noise, salt and pepper noise and also compared with the performance of median filter. A zero-degree kernel is generated for the Gabor function and it is convolved with the image to be filtered...
This paper describes a steganography technique in which text is concealed in an image. The lower nibble of each image byte is modified so as to contain each nibble of the input text. The steganography algorithm used in this implementation maximises on data capacity and also ensures security. The Java programming language is used for its comprehensive libraries and ease of use. A simple GUI has been...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.