期刊文献+
共找到4,814篇文章
< 1 2 241 >
每页显示 20 50 100
Dual Image Cryptosystem Using Henon Map and Discrete Fourier Transform 被引量:1
1
作者 Hesham Alhumyani 《Intelligent Automation & Soft Computing》 SCIE 2023年第6期2933-2945,共13页
This paper introduces an efficient image cryptography system.The pro-posed image cryptography system is based on employing the two-dimensional(2D)chaotic henon map(CHM)in the Discrete Fourier Transform(DFT).The propos... This paper introduces an efficient image cryptography system.The pro-posed image cryptography system is based on employing the two-dimensional(2D)chaotic henon map(CHM)in the Discrete Fourier Transform(DFT).The proposed DFT-based CHM image cryptography has two procedures which are the encryption and decryption procedures.In the proposed DFT-based CHM image cryptography,the confusion is employed using the CHM while the diffu-sion is realized using the DFT.So,the proposed DFT-based CHM image crypto-graphy achieves both confusion and diffusion characteristics.The encryption procedure starts by applying the DFT on the image then the DFT transformed image is scrambled using the CHM and the inverse DFT is applied to get the final-ly encrypted image.The decryption procedure follows the inverse procedure of encryption.The proposed DFT-based CHM image cryptography system is exam-ined using a set of security tests like statistical tests,entropy tests,differential tests,and sensitivity tests.The obtained results confirm and ensure the superiority of the proposed DFT-based CHM image cryptography system.These outcomes encourage the employment of the proposed DFT-based CHM image cryptography system in real-time image and video applications. 展开更多
关键词 discrete Fourier transform(DFT) chaotic henon map(CHM) CONFUSION diffusion CRYPTOGRAPHY
下载PDF
Anomaly Detection Based on Discrete Wavelet Transformation for Insider Threat Classification
2
作者 Dong-Wook Kim Gun-Yoon Shin Myung-Mook Han 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期153-164,共12页
Unlike external attacks,insider threats arise from legitimate users who belong to the organization.These individuals may be a potential threat for hostile behavior depending on their motives.For insider detection,many... Unlike external attacks,insider threats arise from legitimate users who belong to the organization.These individuals may be a potential threat for hostile behavior depending on their motives.For insider detection,many intrusion detection systems learn and prevent known scenarios,but because malicious behavior has similar patterns to normal behavior,in reality,these systems can be evaded.Furthermore,because insider threats share a feature space similar to normal behavior,identifying them by detecting anomalies has limitations.This study proposes an improved anomaly detection methodology for insider threats that occur in cybersecurity in which a discrete wavelet transformation technique is applied to classify normal vs.malicious users.The discrete wavelet transformation technique easily discovers new patterns or decomposes synthesized data,making it possible to distinguish between shared characteristics.To verify the efficacy of the proposed methodology,experiments were conducted in which normal users and malicious users were classified based on insider threat scenarios provided in Carnegie Mellon University’s Computer Emergency Response Team(CERT)dataset.The experimental results indicate that the proposed methodology with discrete wavelet transformation reduced the false-positive rate by 82%to 98%compared to the case with no wavelet applied.Thus,the proposed methodology has high potential for application to similar feature spaces. 展开更多
关键词 Anomaly detection CYBERSECURITY discrete wavelet transformation insider threat classification
下载PDF
ASTER Data Processing by Discrete Wavelets Transform and Band Ratio Techniques for the Identification of Lineaments and Hydrothermal Alteration Zones in Poli, North Cameroon
3
作者 Mohamadou Ahamadou May Nome Stella Meying Arsène 《Journal of Geoscience and Environment Protection》 2023年第9期216-232,共17页
The aim of this study is to carry out hydrothermal alteration mapping and structural mapping using ASTER images in order to identify indices that could guide mining exploration work in the Poli area and its surroundin... The aim of this study is to carry out hydrothermal alteration mapping and structural mapping using ASTER images in order to identify indices that could guide mining exploration work in the Poli area and its surroundings. To achieve this, the ASTER images were first preprocessed to correct atmospheric effects and remove vegetation influence. Secondly, a lineament mapping was conducted by applying Discrete Wavelet Transform (DWT) algorithms to the First Principal Component Analysis (PCA1) of Visible Near-Infrared (VNIR) and Shortwave Infrared (SWIR) bands. Lastly, band ratio methods were applied to the VNIR, SWIR, and Thermal Infrared (TIR) bands to determine indices of iron oxides/hydroxides (hematite and limonite), hydroxyl-bearing minerals (chlorite, epidote, and muscovite), and the quartz index. The results obtained showed that the lineaments were mainly oriented NE-SW, ENE-WSW, and E-W, with NE-SW being the most predominant direction. Concerning hydrothermal alteration, the identified indices covered almost the entire study area and showed a strong correlation with lithological data. Overlaying the obtained lineaments with the hydrothermal alteration indices revealed a significant correlation between existing mining indices and those observed in the field. Mineralized zones generally coincided with areas of high lineament density exhibiting significant hydrothermal alteration. Based on the correlation between existing mining indices and the results of hydrothermal and structural mapping, the results obtained can then be used as a reference document for any mining exploration in the study area. 展开更多
关键词 discrete Wavelets transform Band Ratio LINEAMENTS Hydrothermal Alteration
下载PDF
A New Image Watermarking Scheme Using Genetic Algorithm and Residual Numbers with Discrete Wavelet Transform
4
作者 Peter Awonnatemi Agbedemnab Mohammed Akolgo Moses Apambila Agebure 《Journal of Information Security》 2023年第4期422-436,共15页
Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presen... Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presents a new digital watermarking scheme that combines some operators of the Genetic Algorithm (GA) and the Residue Number (RN) System (RNS) to perform encryption on an image, which is embedded into a cover image for the purposes of watermarking. Thus, an image watermarking scheme uses an encrypted image. The secret image is embedded in decomposed frames of the cover image achieved by applying a three-level Discrete Wavelet Transform (DWT). This is to ensure that the secret information is not exposed even when there is a successful attack on the cover information. Content creators can prove ownership of the multimedia content by unveiling the secret information in a court of law. The proposed scheme was tested with sample data using MATLAB2022 and the results of the simulation show a great deal of imperceptibility and robustness as compared to similar existing schemes. 展开更多
关键词 discrete Wavelet transform (DWT) Digital Watermarking ENCRYPTION Genetic Algorithm (GA) Residue Number System (RNS) GARN
下载PDF
ASIC Design of DA-Based 2-D Inverse Discrete Cosine Transform
5
作者 陈禾 韩月秋 《Journal of Beijing Institute of Technology》 EI CAS 1999年第2期56-63,共8页
目的给出基于DA算法的二维离散余弦逆变换(2DIDCT)的ASIC设计.方法设计中一维IDCT算法采用基于Chen的快速1DIDCT算法.为了减少面积、加快速度,设计中乘法累加电路是采用基于DA算法而实现的.结果... 目的给出基于DA算法的二维离散余弦逆变换(2DIDCT)的ASIC设计.方法设计中一维IDCT算法采用基于Chen的快速1DIDCT算法.为了减少面积、加快速度,设计中乘法累加电路是采用基于DA算法而实现的.结果与结论完成了整个系统的VHDL仿真、综合及版图设计.与目前国际上较优秀的设计相比,本设计拥有最好的时序特性,设计总体结果较优. 展开更多
关键词 离散余弦变换 DA算法 VHSIC硬件描述语言
下载PDF
Interpolation of Images Using Discrete Wavelet Transform to Simulate Image Resizing as in Human Vision 被引量:5
6
作者 Rohini S. Asamwar Kishor M. Bhurchandi Abhay S. Gandhi 《International Journal of Automation and computing》 EI 2010年第1期9-16,共8页
This paper presents discrete wavelet transform (DWT) and its inverse (IDWT) with Haar wavelets as tools to compute the variable size interpolated versions of an image at optimum computational load. As a human obse... This paper presents discrete wavelet transform (DWT) and its inverse (IDWT) with Haar wavelets as tools to compute the variable size interpolated versions of an image at optimum computational load. As a human observer moves closer to or farther from a scene, the retinal image of the scene zooms in or out, respectively. This zooming in or out can be modeled using variable scale interpolation. The paper proposes a novel way of applying DWT and IDWT in a piecewise manner by non-uniform down- or up-sampling of the images to achieve partially sampled versions of the images. The partially sampled versions are then aggregated to achieve the final variable scale interpolated images. The non-uniform down- or up-sampling here is a function of the required scale of interpolation. Appropriate zero padding is used to make the images suitable for the required non-uniform sampling and the subsequent interpolation to the required scale. The concept of zeroeth level DWT is introduced here, which works as the basis for interpolating the images to achieve bigger size than the original one. The main emphasis here is on the computation of variable size images at less computational load, without compromise of quality of images. The interpolated images to different sizes and the reconstructed images are benchmarked using the statistical parameters and visual comparison. It has been found that the proposed approach performs better as compared to bilinear and bicubic interpolation techniques. 展开更多
关键词 discrete wavelet transform nomuniform sampling zeroeth level discrete wavelet transform (DWT) INTERPOLATION human vision.
下载PDF
Classification of human emotion from EEG using discrete wavelet transform 被引量:9
7
作者 Murugappan Murugappan Nagarajan Ramachandran Yaacob Sazali 《Journal of Biomedical Science and Engineering》 2010年第4期390-396,共7页
In this paper, we summarize the human emotion recognition using different set of electroencephalogram (EEG) channels using discrete wavelet transform. An audio-visual induction based protocol has been designed with mo... In this paper, we summarize the human emotion recognition using different set of electroencephalogram (EEG) channels using discrete wavelet transform. An audio-visual induction based protocol has been designed with more dynamic emotional content for inducing discrete emotions (disgust, happy, surprise, fear and neutral). EEG signals are collected using 64 electrodes from 20 subjects and are placed over the entire scalp using International 10-10 system. The raw EEG signals are preprocessed using Surface Laplacian (SL) filtering method and decomposed into three different frequency bands (alpha, beta and gamma) using Discrete Wavelet Transform (DWT). We have used “db4” wavelet function for deriving a set of conventional and modified energy based features from the EEG signals for classifying emotions. Two simple pattern classification methods, K Nearest Neighbor (KNN) and Linear Discriminant Analysis (LDA) methods are used and their performances are compared for emotional states classification. The experimental results indicate that, one of the proposed features (ALREE) gives the maximum average classification rate of 83.26% using KNN and 75.21% using LDA compared to those of conventional features. Finally, we present the average classification rate and subsets of emotions classification rate of these two different classifiers for justifying the performance of our emotion recognition system. 展开更多
关键词 EEG Human Emotions discrete WAVELET transform KNN LDA
下载PDF
Digital watermarking for still image based on discrete fractional fourier transform 被引量:3
8
作者 牛夏牧 孙圣和 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2001年第3期309-311,共3页
Presents a digital watermarking technique based on discrete fractional Fourier transform (DFRFT), discusses the transformation of the original image by DFRFT, and the modification of DFRFT coefficients of the original... Presents a digital watermarking technique based on discrete fractional Fourier transform (DFRFT), discusses the transformation of the original image by DFRFT, and the modification of DFRFT coefficients of the original image by the information of watermark, and concludes from experimental results that the proposed technique is robust to lossy compression attack. 展开更多
关键词 WATERMARKING discrete fractional fourier transform lossy compression attack
下载PDF
Fractal Surface Synthesis Based on Two Dimensional Discrete Fourier Transform 被引量:2
9
作者 ZHOU Chao GAO Chenghui HUANG Jianmeng 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2013年第6期1101-1108,共8页
The discrete Fourier transform(DFT) is used for fractional Brownian motion(FBM) surface synthesis in tribology(i.e., contact, sliding, and sealing, etc). However, the relationship between fractal parameters(fra... The discrete Fourier transform(DFT) is used for fractional Brownian motion(FBM) surface synthesis in tribology(i.e., contact, sliding, and sealing, etc). However, the relationship between fractal parameters(fractal dimension and scale factor) and traditional parameters, the influence of fractal parameters on surface appearance, have not been deeply discussed yet. These lead to some kind of difficulty to ensure the synthesized surfaces with ideal fractal characteristic, required traditional parameters and geometric appearance. A quantitative relationship between fractal parameters and the root mean square deviation of surface (Sq) is derived based on the energy conservation property between the space and frequency domain of DFT. Under the stability assumption, the power spectrum of a FBM surface is composed of concentric circles strictly, a series of FBM surfaces with prescribed Sq could be synthesized with given fractal dimension, scale factor, and sampling numbers, but the ten-point height(Sz), the skewness(Ssk) and the kurtosis(Sku) are still in random, where the probability distributions of Sz and Ssk are approximately normal distribution. Furthermore, by iterative searching, a surface with desired Abbott-Firestone curve could be obtained among those surfaces. An intuitive explanation for the influence of fractal dimension and scale factor on surface appearance is obtained by discussing the effects on the ratio of energy between high and low frequency components. Based on the relationship between Sq and surface energy, a filtering method of surface with controllable Sq is proposed. The proposed research ensures the synthesized surfaces possess ideal FBM properties with prescribed Sq, offers a method for selecting desired Abbott-Firestone curve of synthesized fractal surfaces, and makes it possible to control the Sq of surfaces after filtering. 展开更多
关键词 fractional Brownian motion discrete Fourier transform fractal surface power spectrum
下载PDF
Denoising of an Image Using Discrete Stationary Wavelet Transform and Various Thresholding Techniques 被引量:8
10
作者 Abdullah Al Jumah 《Journal of Signal and Information Processing》 2013年第1期33-41,共9页
Image denoising has remained a fundamental problem in the field of image processing. With Wavelet transforms, various algorithms for denoising in wavelet domain were introduced. Wavelets gave a superior performance in... Image denoising has remained a fundamental problem in the field of image processing. With Wavelet transforms, various algorithms for denoising in wavelet domain were introduced. Wavelets gave a superior performance in image denoising due to its properties such as multi-resolution. The problem of estimating an image that is corrupted by Additive White Gaussian Noise has been of interest for practical and theoretical reasons. Non-linear methods especially those based on wavelets have become popular due to its advantages over linear methods. Here I applied non-linear thresholding techniques in wavelet domain such as hard and soft thresholding, wavelet shrinkages such as Visu-shrink (non-adaptive) and SURE, Bayes and Normal Shrink (adaptive), using Discrete Stationary Wavelet Transform (DSWT) for different wavelets, at different levels, to denoise an image and determine the best one out of them. Performance of denoising algorithm is measured using quantitative performance measures such as Signal-to-Noise Ratio (SNR) and Mean Square Error (MSE) for various thresholding techniques. 展开更多
关键词 WAVELET discrete WAVELET transform WAVELET Packet transform STATIONARY WAVELET transform THRESHOLDING Visu Shrink SURE Shrink Normal Shrink Mean Square Error Peak SIGNAL-TO-NOISE Ratio
下载PDF
Diverse soliton solutions and dynamical analysis of the discrete coupled mKdV equation with 4×4 Lax pair
11
作者 刘雪珂 闻小永 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第12期179-191,共13页
Under consideration in this study is the discrete coupled modified Korteweg-de Vries(mKdV)equation with 4×4 Lax pair.Firstly,through using continuous limit technique,this discrete equation can be mapped to the co... Under consideration in this study is the discrete coupled modified Korteweg-de Vries(mKdV)equation with 4×4 Lax pair.Firstly,through using continuous limit technique,this discrete equation can be mapped to the coupled KdV and mKdV equations,which may depict the development of shallow water waves,the optical soliton propagation in cubic nonlinear media and the Alfven wave in a cold collision-free plasma.Secondly,the discrete generalized(r,N-r)-fold Darboux transformation is constructed and extended to solve this discrete coupled equation with the fourth-order linear spectral problem,from which diverse exact solutions including usual multi-soliton and semi-rational soliton solutions on the vanishing background,higher-order rational soliton and mixed hyperbolic-rational soliton solutions on the non-vanishing background are derived,and the limit states of some soliton and rational soliton solutions are analyzed by the asymptotic analysis technique.Finally,the numerical simulations are used to explore the dynamical behaviors of some exact soliton solutions.These results may be helpful for understanding some physical phenomena in fields of shallow water wave,optics,and plasma physics. 展开更多
关键词 discrete coupled mKdV equation continuous limit discrete generalized(r N-r)-fold Darboux transformation multi-soliton solutions rational soliton solutions
下载PDF
Audio Zero-Watermark Scheme Based on Discrete Cosine Transform-Discrete Wavelet TransformSingular Value Decomposition 被引量:7
12
作者 Min Lei Yu Yang +2 位作者 XiaoMing Liu MingZhi Cheng Rui Wang 《China Communications》 SCIE CSCD 2016年第7期117-121,共5页
Traditional watermark embedding schemes inevitably modify the data in a host audio signal and lead to the degradation of the host signal.In this paper,a novel audio zero-watermarking algorithm based on discrete wavele... Traditional watermark embedding schemes inevitably modify the data in a host audio signal and lead to the degradation of the host signal.In this paper,a novel audio zero-watermarking algorithm based on discrete wavelet transform(DWT),discrete cosine transform(DCT),and singular value decomposition(SVD) is presented.The watermark is registered by performing SVD on the coefficients generated through DWT and DCT to avoid data modification and host signal degradation.Simulation results show that the proposed zero-watermarking algorithm is strongly robust to common signal processing methods such as requantization,MP3 compression,resampling,addition of white Gaussian noise,and low-pass filtering. 展开更多
关键词 离散余弦变换 离散小波变换 奇异值分解 音频信号 零水印 r值 信号处理方法 水印算法
下载PDF
A Dual Tree Complex Discrete Cosine Harmonic Wavelet Transform (ADCHWT) and Its Application to Signal/Image Denoising 被引量:3
13
作者 M. Shivamurti S. V. Narasimhan 《Journal of Signal and Information Processing》 2011年第3期218-226,共9页
A new simple and efficient dual tree analytic wavelet transform based on Discrete Cosine Harmonic Wavelet Transform DCHWT (ADCHWT) has been proposed and is applied for signal and image denoising. The analytic DCHWT ha... A new simple and efficient dual tree analytic wavelet transform based on Discrete Cosine Harmonic Wavelet Transform DCHWT (ADCHWT) has been proposed and is applied for signal and image denoising. The analytic DCHWT has been realized by applying DCHWT to the original signal and its Hilbert transform. The shift invariance and the envelope extraction properties of the ADCHWT have been found to be very effective in denoising speech and image signals, compared to that of DCHWT. 展开更多
关键词 ANALYTIC discrete COSINE Harmonic WAVELET transform ANALYTIC WAVELET transform Dual TREE Complex WAVELET transform DCT Shift Invariant WAVELET transform WAVELET transform Denoising
下载PDF
Theory and algorithms for two-dimensional warped discrete Fourier transform 被引量:1
14
作者 Xichun ZHANG Gang WEI 《控制理论与应用(英文版)》 EI 2006年第3期281-285,共5页
In this paper, the two-dimensional Warped Discrete Fourier Transform (2-D WDFT) is developed based on the concept of the 1-D WDFT. An exact computation algorithm is developed for 2-D WDFT based on matrix factorizing... In this paper, the two-dimensional Warped Discrete Fourier Transform (2-D WDFT) is developed based on the concept of the 1-D WDFT. An exact computation algorithm is developed for 2-D WDFT based on matrix factorizing with special structure. A fast algorithm is then proposed to reduce greatly the computational complexity of the inverse 2-D WDFT. Finally, numerical examples are given to show the efficiency of the proposed approach. 展开更多
关键词 discrete Fourier transform Non-uniform DFT Warped DFT
下载PDF
A Matrix Formulation of Discrete Chirp Fourier Transform Algorithms 被引量:1
15
作者 Juan Pablo Soto Quiros Domingo Rodriguez 《Journal of Electronic Science and Technology》 CAS 2014年第2期206-210,共5页
This work presents a computational matrix framework in terms of tensor signal algebra for the formulation of discrete chirp Fourier transform algorithms. These algorithms are used in this work to estimate the point ta... This work presents a computational matrix framework in terms of tensor signal algebra for the formulation of discrete chirp Fourier transform algorithms. These algorithms are used in this work to estimate the point target functions (impulse response functions) of multiple-input multiple-output (MIMO) synthetic aperture radar (SAR) systems. This estimation technique is being studied as an alternative to the estimation of point target functions using the discrete cross-ambiguity function for certain types of environmental surveillance applications. The tensor signal algebra is presented as a mathematics environment composed of signal spaces, finite dimensional linear operators, and special matrices where algebraic methods are used to generate these signal transforms as computational estimators. Also, the tensor signal algebra contributes to analysis, design, and implementation of parallel algorithms. An instantiation of the framework was performed by using the MATLAB Parallel Computing Toolbox, where all the algorithms presented in this paper were implemented. 展开更多
关键词 discrete chirp Fourier transform MATLAB parallel computing tensor signal algebra
下载PDF
A Robust Image Watermarking Scheme Using Z-Transform, Discrete Wavelet Transform and Bidiagonal Singular Value Decomposition 被引量:2
16
作者 N.Jayashree R.S.Bhuvaneswaran 《Computers, Materials & Continua》 SCIE EI 2019年第1期263-285,共23页
Watermarking is a widely used solution to the problems of authentication and copyright protection of digital media especially for images,videos,and audio data.Chaos is one of the emerging techniques adopted in image w... Watermarking is a widely used solution to the problems of authentication and copyright protection of digital media especially for images,videos,and audio data.Chaos is one of the emerging techniques adopted in image watermarking schemes due to its intrinsic cryptographic properties.This paper proposes a new chaotic hybrid watermarking method combining Discrete Wavelet Transform(DWT),Z-transform(ZT)and Bidiagonal Singular Value Decomposition(BSVD).The original image is decomposed into 3-level DWT,and then,ZT is applied on the HH3 and HL3 sub-bands.The watermark image is encrypted using Arnold Cat Map.BSVD for the watermark and transformed original image were computed,and the watermark was embedded by modifying singular values of the host image with the singular values of the watermark image.Robustness of the proposed scheme was examined using standard test images and assessed against common signal processing and geometric attacks.Experiments indicated that the proposed method is transparent and highly robust. 展开更多
关键词 Digital WATERMARKING chaotic mapping Z-transform ARNOLD cat map discrete wavelet transform(DWT) bidiagonal SINGULAR value decomposition(BSVD)
下载PDF
Peak-to-Average Power Ratio Performance Analysis for Orthogonal Chirp Division Multiplexing Multicarrier Systems Based on Discrete Fractional Cosine Transform 被引量:2
17
作者 Hani Attar 《International Journal of Communications, Network and System Sciences》 2016年第12期545-562,共18页
In doubly selective fading channels, the orthogonal frequency division multiplexing (OFDM) multicarrier system may fail. Chirp like basis (fractional Fourier transform-fractional cosine transform) may be used instead ... In doubly selective fading channels, the orthogonal frequency division multiplexing (OFDM) multicarrier system may fail. Chirp like basis (fractional Fourier transform-fractional cosine transform) may be used instead of complex exponential basis in this case to improve the system performance. However, in multicarrier transmission, the high peak to average power ratio (PAPR) of the transmitted signal is one of the difficult problems that face both the chirp and the exponential basis. In this paper, an evaluation for the PAPR performance of a multicarrier system based on the fractional cosine transform (FrCT) is introduced and then compared with DFrFT and FFT. Moreover, applying the SLAM technique over these systems is provided to understand the behaviour of these systems when applying SLAM. Simulations verify that this system obtains a better PAPR performance. Moreover, further PAPR reduction can be gained using the well-known PAPR reduction methods. Moreover, applying SLAM technique improves the performance of (dB) by 4 dB to 5 dB and all systems become as competitive to each other when SLAM is applied. Finally, BER performance comparison among OFDM, Discrete Cosine Transform MCM (DCT- MCM), Discrete Hartley Transform MCM (DHT-MCM), DFrFT-OCDM and DFrCT- OCDM MCM systems was done by means of simulation over 100,000 multicarrier blocks for each one and showed that our proposed scenario gave the best performance. 展开更多
关键词 PAPR discrete Fourier transform discrete Fractional Cosine transform Mobile Digital Video Doubly Selective Channels
下载PDF
AN EFFICIENT 3-DIMENSIONAL DISCRETE WAVELET TRANSFORM ARCHITECTURE FOR VIDEO PROCESSING APPLICATION 被引量:1
18
作者 Ganapathi Hegde Pukhraj Vaya 《Journal of Electronics(China)》 2012年第6期534-540,共7页
This paper presents an optimized 3-D Discrete Wavelet Transform (3-DDWT) architecture. 1-DDWT employed for the design of 3-DDWT architecture uses reduced lifting scheme approach. Further the architecture is optimized ... This paper presents an optimized 3-D Discrete Wavelet Transform (3-DDWT) architecture. 1-DDWT employed for the design of 3-DDWT architecture uses reduced lifting scheme approach. Further the architecture is optimized by applying block enabling technique, scaling, and rounding of the filter coefficients. The proposed architecture uses biorthogonal (9/7) wavelet filter. The architecture is modeled using Verilog HDL, simulated using ModelSim, synthesized using Xilinx ISE and finally implemented on Virtex-5 FPGA. The proposed 3-DDWT architecture has slice register utilization of 5%, operating frequency of 396 MHz and a power consumption of 0.45 W. 展开更多
关键词 3-D discrete Wavelet transform (3-DDWT) Lifting scheme PIPELINING Video coding Low power
下载PDF
Multiple Image Watermarking with Discrete Cosine Transform 被引量:1
19
作者 Mahbuba Begum Mohammad Shorif Uddin 《Journal of Computer and Communications》 2021年第3期88-94,共7页
Multiple image watermarking is an advanced concept of singular watermarking techniques. The existing singular digital image watermarking techniques cannot obtain all the design goals, such as imperceptibility, robustn... Multiple image watermarking is an advanced concept of singular watermarking techniques. The existing singular digital image watermarking techniques cannot obtain all the design goals, such as imperceptibility, robustness, security, and capacity simultaneously with perfection. Hence, the multiple image watermarking technique is designed that embeds several watermarks into the same host image for conveying multiple information. This paper proposed a multiple image watermarking technique with Discrete Cosine Transform (DCT) for ensuring the low computational time for embedding, encryption, decryption as well as extraction of the watermark images. Here, DCT is used to ensure the visual quality of the host image, and a random binary matrix is used to improve the security of the digital image. We have given a basic framework for multiple image watermarking. Our experimental results show satisfactory performance. 展开更多
关键词 Multiple Watermarking discrete Cosine transform discrete Wavelet transform Arnold transform
下载PDF
Implementation of Variable Tone Variable Bits Gray-Scale Image Stegnography Using Discrete Cosine Transform 被引量:2
20
作者 Sahib Khan Muhammad Nawaz Khan +2 位作者 Somia Iqbal Syed Yaqoob Shah Nasir Ahmad 《Journal of Signal and Information Processing》 2013年第4期343-350,共8页
Secure exchange of information is the basic need of modern digital world of e-communication which is achieved either by encrypting information or by hiding information in other information called cover media. Conceali... Secure exchange of information is the basic need of modern digital world of e-communication which is achieved either by encrypting information or by hiding information in other information called cover media. Concealing information requires a well designed technique of Stegnography. This work presents a technique, variable tone variable bits (VTVB) Stegnography, to hide information in a cover image. The VTVB Stegnography hides variable data in discrete cosine transform (DCT) coefficients of the cover image. VTVB Stegnography provides variable data hiding capacity and variable distortion. Additional large data hiding this technique provide extra security due to the large key size making VTVB Stegnography technique much more immune to steganalysis. The hiding makes the existence of information imperceptible for steganalysis and the key of keeping a secret makes the recovering of information difficult for an intruder. The key size is depending on cover image and numbers of bits of discrete cosine transform (DCT) coefficients used for information embedding. This is a very flexible technique and can be used for low payload applications, e.g. watermarking to high payload applications, e.g. network Stegnography. 展开更多
关键词 Information Security Image Processing Stegnography STEGANALYSIS discrete COSINE transform (DCT)
下载PDF
上一页 1 2 241 下一页 到第
使用帮助 返回顶部