Performance superiority of hybrid DKT-DCT wavelet compared to DKT, DCT individual transforms and their wavelets in image compression
ناشر:
سال
: 2014شناسه الکترونیک: 10.1109/ICICICT.2014.6781300
کلیدواژه(گان): cryptography,n image coding,n steganography,n VCS,n cheating prevention,n cover image,n decoding scheme,n encoding scheme,n hardware based practical approach,n hardware module,n hardware-based system,n information hiding technique,n message embedding,n secret sharing,n share authentication,n software module,n steganography,n stego share,n visual cryptographic schemes,n Airplanes,n Biological information theory,n Computer architecture
کالکشن
:
-
آمار بازدید
Performance superiority of hybrid DKT-DCT wavelet compared to DKT, DCT individual transforms and their wavelets in image compression
Show full item record
| contributor author | Kekre, H.B. | |
| contributor author | Sarode, T. | |
| contributor author | Natu, P. | |
| date accessioned | 2020-03-12T21:36:25Z | |
| date available | 2020-03-12T21:36:25Z | |
| date issued | 2014 | |
| identifier other | 6949245.pdf | |
| identifier uri | https://libsearch.um.ac.ir:443/fum/handle/fum/1054319?locale-attribute=fa | |
| format | general | |
| language | English | |
| publisher | IEEE | |
| title | Performance superiority of hybrid DKT-DCT wavelet compared to DKT, DCT individual transforms and their wavelets in image compression | |
| type | Conference Paper | |
| contenttype | Metadata Only | |
| identifier padid | 8184884 | |
| subject keywords | cryptography | |
| subject keywords | n image coding | |
| subject keywords | n steganography | |
| subject keywords | n VCS | |
| subject keywords | n cheating prevention | |
| subject keywords | n cover image | |
| subject keywords | n decoding scheme | |
| subject keywords | n encoding scheme | |
| subject keywords | n hardware based practical approach | |
| subject keywords | n hardware module | |
| subject keywords | n hardware-based system | |
| subject keywords | n information hiding technique | |
| subject keywords | n message embedding | |
| subject keywords | n secret sharing | |
| subject keywords | n share authentication | |
| subject keywords | n software module | |
| subject keywords | n steganography | |
| subject keywords | n stego share | |
| subject keywords | n visual cryptographic schemes | |
| subject keywords | n Airplanes | |
| subject keywords | n Biological information theory | |
| subject keywords | n Computer architecture | |
| identifier doi | 10.1109/ICICICT.2014.6781300 | |
| journal title | onfluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Con | |
| filesize | 6430738 | |
| citations | 0 |


