نتایج جستجو برای: rdh
تعداد نتایج: 176 فیلتر نتایج به سال:
Recently, more and more importance is given to reversible data hiding (RDH) technique in images, since it has the capability of recovering the original image which is used for embedding data, without loss protecting the image content’s confidentiality. All previous methods embed data by reversibly vacating room from the images, which may be subject to some errors on data extraction and/or image...
Code mapping (CM) is an efficient technique for reversible data hiding (RDH) in JPEG images, which embeds by constructing a relationship between the used and unused codes bitstream. This study presents new framework designing CM-based RDH method. First, code strategy proposed to suppress file size expansion improve applicability. Based on our strategy, mapped are redefined creating Huffman tabl...
Amphioxus, a member of the subphylum Cephalochordata, is thought to be the closest living relative to vertebrates. Although these animals have a vertebrate-like response to retinoic acid, the pathway of retinoid metabolism remains unknown. Two different enzyme systems - the short chain dehydrogenase/reductases and the cytosolic medium-chain alcohol dehydrogenases (ADHs) - have been postulated i...
Reversible data hiding with image encryption (RDH), since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content’s confidentiality. In previous work vacating room after encrypted image, which subject to some errors on data extraction and/or image restoration. In this paper, a novel method by res...
Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be lossless recovered after embedded data is extracted while protecting the image content’s confidentiality. All previous methods embed data by reversibly memory space from the encrypted images, which may be subject to some errors o...
Today data hacking is a very big problem in networking field. There are many security techniques available to solving this problem. There are many research processing techniques related to internet security, cryptography and steganography etc. One of these is datahiding, using this concept we can provide security, authentication to the system. Data hiding cannot recover original cover. While Re...
The Triad of Nerve Root Enhancement, Thickening, and Displacement in Patients with Sciatica and Recurrent Disk Herniation in the Postoperative Lumbar Spine May Prompt Further Surgical Treatment in Patients with Failed-Back Surgical Syndrome The general consensus in the literature is that a second surgical procedure can be beneficial in cases of recurrent herniated disk or bony canal compression...
I. INTRODUCTION Image Authentication is used to evidence that image is really what the user deems it is. For example, during image watermarking of patient's diagnostic image may occur errors in diagnosis and treatment, which may direction to possible life-blusterous outcome. Thus, to take over the problem of happening of artefacts and to making zero distorted or noise free watermarked medical i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید