Lossy compression algorithms

Sort By:
Page 3 of 4 - About 38 essays
  • Better Essays

    Strengths Of Steganography

    • 3830 Words
    • 16 Pages

    Abstract— Steganography is a technique of hiding the secret information. Steganography hides the existence of the secret data and make the communication undetectable. Secret data can be communicated in an appropriate multimedia carrier such as image, audio or video. Image steganography is extensively used technique. In this technique secret data is embedded within the image. Steganography techniques can be categorized into two groups - adaptive and non-adaptive. Each of these have its strengths

    • 3830 Words
    • 16 Pages
    Better Essays
  • Decent Essays

    histogram would increase as the peak value of this histogram could decrease. By applying the re-normalized histogram as features, the experimental results show that the proposed method has the ability to detect a wide range of tamper operations, including single type and multiple types of tampering operations without the prior knowledge of tampering operation order, type and parameter. [24] Vinayak S. Dhole (2015) et al present that FW is discovered for authentication and content integrity verification

    • 1590 Words
    • 7 Pages
    Decent Essays
  • Better Essays

    Abstract— This paper presents the design of an optimized Compressive Sensing (CS) based image compression technique for data transmission over mobile wireless noisy channel. The proposed technique is more robust to channel noise. It uses individual measurement driven coding scheme, which facilitates simpler encoder design. The shift of computational burden from encoder to decoder is more suitable for mobile devices applications where computational power and battery life are limited. This paper also

    • 991 Words
    • 4 Pages
    Better Essays
  • Better Essays

    SURVEY ON DIGITAL IMAGE WATERMARKING TECHNIQUES V.Belmer Gladson1Y.Sam Josuva2, Dr.R.Balasubramanian3 1Research Scholar, 2 Assistant Professor 3Professor, Department of Computer Science&Engg, Manonmaniam Sundaranar University, Tamilnadu, 1vbgclassic1984@gmail.com 2sam.joejaki@gmail.com,3rbalus662002@yahoo.com ABSTRACT- In recent years, digital media are widely popular, their security related issues are becoming greater importance. Watermarking is the process of hiding digital data in a carrier

    • 1516 Words
    • 7 Pages
    Better Essays
  • Good Essays

    detect steganography in digital images. In this paper we will be looking at many tools comprising from various digital domains but we fund that almost all of the tools had support for image files. With the increasing number of new steganographic algorithms and methods for detecting steganography, the issue of comparing security of steganographic schemes in a fair manner is of the most importance. A fair benchmark for steganography should only

    • 1384 Words
    • 6 Pages
    Good Essays
  • Decent Essays

    Notes On N + N

    • 1392 Words
    • 6 Pages

    y_(j+1)=(y_j+k sin (x_(j+1) N)/2π)mod N [█(x_(j+1)@y_(J+1) )]=[█(1 u@v uv+1)][█(x_j@y_J )](mod N) (5) {█(x_(j+1)=N/k_i (x_j-N_i ) 〖+ y〗_j mod N/k_i @y_(j+1)=k_i/N (y_j-y_j mod N/k_i )+N_i )┤ with {█(k_1+k_2+k_3+⋯=N@N_i=k_1+k_2+⋯+k_(i-1)@N_i≤x_j≤N_i+k_i@0≤y_j≤N)┤ (6) Key Generator: Many chaotic key generators exist but the one used in this research involves 1-D cubic map [16]. It takes 64-bit random key Key = [Key1, Key2, Key3, Key4] to calculate

    • 1392 Words
    • 6 Pages
    Decent Essays
  • Better Essays

    Application of graphics Backgrounds A good background should have a consistent colour scheme which is eye-catching without being overpowering to your eyes. So depending on the style of site should use block colours this will give the website a sleek but simple look. But depending on the purpose of a site the background colours etc. can vary e.g. if a background was for a childrens sight it may be colourful or a car site may be a steely grey if it was intended to sell sports cars e.g. an Aston Martin

    • 1876 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Image Processing is a technique to enhance raw images received from cameras/sensors placed on satellites, space probes and aircrafts or pictures taken in normal day-today life for various applications. Various techniques have been developed in Image Processing during the last four to five decades. Most of the techniques are developed for enhancing images obtained from unmanned spacecrafts, space probes and military reconnaissance flights. Image Processing systems are becoming popular due to easy

    • 3018 Words
    • 12 Pages
    Good Essays
  • Decent Essays

    Currently there are various types of file format emerged and it is used for preserve the digital information. The main problems of these files format are not preserved digitally. The products of digital information’s are produce in word processing, spread sheet, data base, formula, chat, multimedia, etc. Heterogeneous way the information are store in these files and it is required pacific software for access these files. The specification of file format is play very important role in digital preservation

    • 5570 Words
    • 23 Pages
    Decent Essays
  • Better Essays

    Word Documents (DOC) DOC is a document file format used by Microsoft Word, also used with most word processing software, including Open Office. DOC stands for DOCument file. A DOC file can contain formatted text, images, tables, graphs, charts, page formatting, and print settings. With each version of Microsoft Word, the standards for the DOC format change slightly which can cause some compatibility issues. The Word Document (DOC) file format has the .doc extension. This file type originates from

    • 2125 Words
    • 9 Pages
    Better Essays