Performance superiority of hybrid DKT-DCT wavelet compared to DKT, DCT individual transforms and their wavelets in image compression
ناشر:
سال
: 2014شناسه الکترونیک: 10.1109/ICICICT.2014.6781300
کلیدواژه(گان): cryptography,n image coding,n steganography,n VCS,n cheating prevention,n cover image,n decoding scheme,n encoding scheme,n hardware based practical approach,n hardware module,n hardware-based system,n information hiding technique,n message embedding,n secret sharing,n share authentication,n software module,n steganography,n stego share,n visual cryptographic schemes,n Airplanes,n Biological information theory,n Computer architecture
کالکشن
:
-
آمار بازدید
Performance superiority of hybrid DKT-DCT wavelet compared to DKT, DCT individual transforms and their wavelets in image compression
Show full item record
contributor author | Kekre, H.B. | |
contributor author | Sarode, T. | |
contributor author | Natu, P. | |
date accessioned | 2020-03-12T21:36:25Z | |
date available | 2020-03-12T21:36:25Z | |
date issued | 2014 | |
identifier other | 6949245.pdf | |
identifier uri | http://libsearch.um.ac.ir:80/fum/handle/fum/1054319 | |
format | general | |
language | English | |
publisher | IEEE | |
title | Performance superiority of hybrid DKT-DCT wavelet compared to DKT, DCT individual transforms and their wavelets in image compression | |
type | Conference Paper | |
contenttype | Metadata Only | |
identifier padid | 8184884 | |
subject keywords | cryptography | |
subject keywords | n image coding | |
subject keywords | n steganography | |
subject keywords | n VCS | |
subject keywords | n cheating prevention | |
subject keywords | n cover image | |
subject keywords | n decoding scheme | |
subject keywords | n encoding scheme | |
subject keywords | n hardware based practical approach | |
subject keywords | n hardware module | |
subject keywords | n hardware-based system | |
subject keywords | n information hiding technique | |
subject keywords | n message embedding | |
subject keywords | n secret sharing | |
subject keywords | n share authentication | |
subject keywords | n software module | |
subject keywords | n steganography | |
subject keywords | n stego share | |
subject keywords | n visual cryptographic schemes | |
subject keywords | n Airplanes | |
subject keywords | n Biological information theory | |
subject keywords | n Computer architecture | |
identifier doi | 10.1109/ICICICT.2014.6781300 | |
journal title | onfluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Con | |
filesize | 6430738 | |
citations | 0 |