نتایج جستجو برای: bit planes
تعداد نتایج: 76662 فیلتر نتایج به سال:
To protect the security of data outsourced to cloud, tampers detection and recovery for image have aroused concern people. A secure tampering lossless medical images (MI) using permutation ordered binary (POB) number system is proposed. In proposed scheme, region interest (ROI) MI first extracted, then, ROI divided into some no-overlapping blocks, encoding conducted on these blocks based better...
application of quantum-dot is a promising technology for implementing digital systems at nano-scale. quantum-dot cellular automata (qca) is a system with low power consumption and a potentially high density and regularity. also, qca supports the new devices with nanotechnology architecture. this technique works based on electron interactions inside quantum-dots leading to emergence of quantum ...
An adaptive modification to the two-bit transform-based low-complexity block motion estimation approach is proposed. Initially, video frames are converted into two-bit representations using the two-bit transform (2BT), and binary block-based motion estimation is performed using these two bit-planes. Modification to the original 2BT-based motion estimation scheme is introduced by conditional loc...
The change in morphology, diameter, branching pattern or tortuosity of retinal blood vessels is an important indicator of various clinical disorders of the eye and the body. This paper reports an automated method for segmentation of blood vessels in retinal images. A unique combination of techniques for vessel centerlines detection and morphological bit plane slicing is presented to extract the...
In this paper we show some results on Epipolar Geometry applying on various images using MATLAB. The Fundamental matrix is give to the depth information on the images we get the critical view of images that can be transfer in to the Grayscale image in to binary image. Matlab is an ideal tool for simulating digital communication system, its gates easy scripting language and excellent data visual...
The main task of drilling the formation by the bit is done via scraping, crushing and grinding. Discharging the fluid from the bit nozzles is done with high pressure which assists to break the rocks. Different parameters affect the bit selection and design for each drilling formation, but the most important one is drillability that depends on hardness of the formation. In this paper, the design...
Background and Aims: Optimization drilling parameters in order to temperature decrease during creation of hole in the bone is an interested issue. The aim of this study was to achieve optimum values of drilling parameters based on the creation of minimum temperature during jawbone drilling. Materials and Methods: In this study two models of mandible and maxilla was created and teeth 2, 5...
A reversible data hiding in the encrypted domain (RDH-ED) aims to hide within images, protecting its content, while allowing additional information be distributed. This paper presents a complete separable RDH-ED scheme, whose main contribution is receiver extract and restore image, either from cryptogram with hidden or directly decrypted version. With versatile bit-depth management, most signif...
Most of the image encryption schemes based on chaos have so far employed symmetric key cryptography, which leads to a situation where cannot be transmitted in public channels, thus limiting their extended application. Based elliptic curve cryptography (ECC), we proposed method hash value derived from plain was encrypted by ECC. Furthermore, during permutation, novel algorithm different-sized bl...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید