نتایج جستجو برای: integer wavelet transform iwt

تعداد نتایج: 184953  

2011
H S Manjunatha Reddy

------------------------------------------------------------------ABSTRACT----------------------------------------------------------------Steganography is the methods of communicating secrete information hidden in the cover object. The messages hidden in a host data are digital image, video or audio files, etc, and then transmitted secretly to the destination. In this paper we propose Wavelet b...

Journal: :journal of advances in computer research 2015
farima jafari reza javidan

this paper presents a new coding method for image compression based on jpeg2000 and contourlet transform. jpeg2000 standard is a common standard that uses discrete wavelet transform (dwt) in the compression process. the main problems of dwt are failure to detect curved edges in image and its shortage representation of the ridge and furrow patterns which cause deficiency and block artifacts rema...

Journal: :journal of sciences, islamic republic of iran 2015
n. aghazadeh y. gholizade atani

in this paper, we present an edge detection method based on wavelet transform and hessian matrix of image at each pixel. many methods which based on wavelet transform, use wavelet transform to approximate the gradient of image and detect edges by searching the modulus maximum of gradient vectors. in our scheme, we use wavelet transform to approximate hessian matrix of image at each pixel, too. ...

2015
G. Prabakaran

The Steganography is used for secure communication of information by embedding information in a cover object such as text, image, audio, video without any suspicion. An adaptive image steganography utilizing image denoising algorithm by wavelet thresholding. Adaptive steganography is a spatial case of both spatial and transform technique. Moreover it is introduced as statistics aware embedding ...

2001
Arrate Muñoz Raphaël Ertlé Michael Unser

The Continuous Wavelet Transform (CWT) is an effective way to analyze nonstationary signals and to localize and characterize singularities. Fast algorithms have already been developed to compute the CWT at integer time points and dyadic or integer scales. We propose here a new method that is based on a B-spline expansion of both the signal and the analysis wavelet and that allows the CWT comput...

1999
Thomas C. M. Lee

where f is an unknown function, and the ei's are noise. Our goal is to recover f using wavelet methods. We shall assume that n = 2 is an integer power of 2, and consider both the cases of independent and correlated noise. Let f = (f0; : : : ; fn 1) T , y = (y0; : : : ; yn 1) T and W be the discrete wavelet transform (DWT) matrix (e.g., see Donoho & Johnstone 1994). A wavelet{based estimate f̂ of...

Journal: :bulletin of the iranian mathematical society 0
a. ghaani farashahi numerical harmonic analysis group (nuhag)‎, ‎faculty of mathematics‎, ‎university of vienna‎, ‎oskar-morgenstern-platz 1‎, ‎a-1090 vienna‎, ‎austria.

‎this article presents a systematic study for structure of finite wavelet frames‎ ‎over prime fields‎. ‎let $p$ be a positive prime integer and $mathbb{w}_p$‎ ‎be the finite wavelet group over the prime field $mathbb{z}_p$‎. ‎we study theoretical frame aspects of finite wavelet systems generated by‎ ‎subgroups of the finite wavelet group $mathbb{w}_p$.

Journal: :Advances in parallel computing 2022

The spectrum used by Code Division Multiple Access (CDMA) allows for a signal with greater bandwidth spreading electromagnetic energy. Multi-Carrier CDMA (MC-CDMA) is telecommunications numerousentrée strategy that spreads each user symbol across the frequency domain distinct codes. Cognitive Radio (CR) vibrant admittance enabling technology dynamically allocating space fundamental users modify...

2008
ZHUO XUE

In this paper, we propose a bandwidth efficient error resilience scheme for wavelet based video transmission over wireless channel by introducing an additional Wyner-Ziv (WZ) stream to protect region of interest (ROI) in a frame. In the proposed architecture, the main video stream is compressed by a generic wavelet domain coding structure and passed through the error prone channel without any p...

Journal: :Mathematics 2023

Cybersecurity has been one of the interesting research fields that attract researchers to investigate new approaches. One recent trends in this field is cancelable biometric template generation, which depends on storage a cipher (cancelable) instead original template. This trend ensures confidential and secure biometrics certain individual. paper presents multi-biometric system based deep fusio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید