نتایج جستجو برای: rdh

تعداد نتایج: 176  

2015
S G Hiremath

Recently, more and more importance is given to reversible data hiding (RDH) technique in images, since it has the capability of recovering the original image which is used for embedding data, without loss protecting the image content’s confidentiality. All previous methods embed data by reversibly vacating room from the images, which may be subject to some errors on data extraction and/or image...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2018

Journal: :Information Sciences 2022

Code mapping (CM) is an efficient technique for reversible data hiding (RDH) in JPEG images, which embeds by constructing a relationship between the used and unused codes bitstream. This study presents new framework designing CM-based RDH method. First, code strategy proposed to suppress file size expansion improve applicability. Based on our strategy, mapped are redefined creating Huffman tabl...

Journal: :Chemico-biological interactions 2001
D Dalfó C Cañestro R Albalat R Gonzàlez-Duarte

Amphioxus, a member of the subphylum Cephalochordata, is thought to be the closest living relative to vertebrates. Although these animals have a vertebrate-like response to retinoic acid, the pathway of retinoid metabolism remains unknown. Two different enzyme systems - the short chain dehydrogenase/reductases and the cytosolic medium-chain alcohol dehydrogenases (ADHs) - have been postulated i...

2014
Syeda Asra

Reversible data hiding with image encryption (RDH), since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content’s confidentiality. In previous work vacating room after encrypted image, which subject to some errors on data extraction and/or image restoration. In this paper, a novel method by res...

2014
K. Sravani M. O. V. Pavan Kumar

Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be lossless recovered after embedded data is extracted while protecting the image content’s confidentiality. All previous methods embed data by reversibly memory space from the encrypted images, which may be subject to some errors o...

2014
Minaxi Doorwar

Today data hacking is a very big problem in networking field. There are many security techniques available to solving this problem. There are many research processing techniques related to internet security, cryptography and steganography etc. One of these is datahiding, using this concept we can provide security, authentication to the system. Data hiding cannot recover original cover. While Re...

Journal: :AJNR. American journal of neuroradiology 2009
G Chaljub R D Sullivan J T Patterson

The Triad of Nerve Root Enhancement, Thickening, and Displacement in Patients with Sciatica and Recurrent Disk Herniation in the Postoperative Lumbar Spine May Prompt Further Surgical Treatment in Patients with Failed-Back Surgical Syndrome The general consensus in the literature is that a second surgical procedure can be beneficial in cases of recurrent herniated disk or bony canal compression...

2014
Nidhi Mishra C. M. Tiwari

I. INTRODUCTION Image Authentication is used to evidence that image is really what the user deems it is. For example, during image watermarking of patient's diagnostic image may occur errors in diagnosis and treatment, which may direction to possible life-blusterous outcome. Thus, to take over the problem of happening of artefacts and to making zero distorted or noise free watermarked medical i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید