Search Results - ((data proceeding) OR (data processing)) digital (techniques OR technique)
Search alternatives:
- data proceeding »
-
1
Comparative data compression techniques and multi-compression results
Published 2013“…It is a method or system for transmitting a digital image (i.e., an array of pixels) from a digital data source to a digital data receiver. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
FPGA implementation of MCPFSK modulation for HF data communication
Published 2009Subjects: Get full text
Working Paper -
3
Estimating missing values of skylines in incomplete database
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
4
Towards model checking product lines in the digital humanities: an application to historical data
Published 2019“…Rapid development in computing techniques and databases’ systems have aided in the digitization of, and access to, various historical (big) data, with significant challenges of analysis and interoperability. …”
Get full text
Get full text
Get full text
Get full text
Book Chapter -
5
Multilevel Wavelet Decomposition Watermarking Techniques
Published 2006“…It is a process which embeds some characteristics data in a image in advance which later can be extracted that can be used for authentication or proof of ownership. …”
Get full text
Get full text
Conference or Workshop Item -
6
State-of-the-art digital watermarking attacks
Published 2012“…Broadly it can be classified as Intentional Attacks and Non-Intentional Attacks. The processed watermarked data is then called “attacked data”. …”
Get full text
Get full text
Proceeding Paper -
7
2D upper human body pose modelling using windowing and template matching techniques
Published 2009Subjects: Get full text
Working Paper -
8
Circumference determination and data extraction of two-dimensional circle / Siti Sarah Raseli ... [et al.]
Published 2019“…This technique of circumference determination and data extraction can help the researchers for other processes involving the curve fitting and surface fitting in CAGD. …”
Get full text
Get full text
Get full text
Article -
9
Design of digital electricity meter
Published 2010“…With a data storage capability and some form of processing, it can provide the consumers with vital information on the trend of their energy consumption. …”
Get full text
Get full text
Proceeding Paper -
10
Comparative analysis of digital filters for received signal strength indicator
Published 2018“…Based on the criteria, the choice of digital signal processing filter can be determined in accordance with its implementations. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Classification of piper nigrum samples using machine learning techniques: A comparison
Published 2013Get full text
Get full text
Proceeding -
12
Data Hiding Techniques In Digital Images
Published 2003“…Depending on what information in which form is hidden in the digital images, one can distinguish two types of data hiding techniques, spatial domain techniques, and frequency domain techniques. …”
Get full text
Get full text
Thesis -
13
-
14
DCT domain stegasvm-shifted LSB model for highly imperceptible and robust cover-image
Published 2015“…The importance of information security in protecting and hiding information has increased due to the increased use of computers and Internet.Information hiding technology such as Digital Image steganography embeds secret messages inside other files.Least Square Bit (LSB) is the most popular technique used in image steganography that hides data behind a cover-image in a spatial and discrete cosine transform (DCT) domain.Support Vector Machine (SVM) is another technique that is used to strengthen the embedding algorithm.The main aim of image steganography is to keep the secret-message remain secret regardless of the techniques used.But many of the previously proposed techniques failed to attain this aim.The main concerns to this problem are the non-random changes of a cover-image that constantly occurred after the embedding process and the non-robustness of the embedding algorithm to image processing operation.This study therefore proposes a new model that utilises Human Visual System (HVS) and embedding technique through shifted LSB called StegaSVM-Shifted LSB in DCT domain to preserve the imperseptibility and increase the robustness of stego-images.The proposed technique shows better performances compared to other existing techniques.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Unsupervised learning of image data using generative adversarial network
Published 2020“…Over the past few years, with the introduction of deep learning techniques such as convolution neural network (CNN), supervised learning with CNN had achieved a huge success in the computer vision area such as classifying digital images. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
16
Digital image watermarking, analysis of current methods
Published 2012Get full text
Get full text
Get full text
Proceeding Paper -
17
A novel watermarking technique in data transmission between QR codes and database
Published 2013“…To confirm the effectiveness of this protection technique, percentage of data loss and processing time for data transmissions are measured. …”
Get full text
Conference or Workshop Item -
18
Assessment of digital camera in mapping meandering flume using close range photogremmetric technique
Published 2014“…In processing the digital images, digital photogrammetric software was used for processes such as aerial triangulation, stereo compilation, generation of digital elevation model (DEM) and generation of orthophoto. …”
Get full text
Non-Indexed Article -
19
-
20
Digital watermarking for mammogram authentication
Published 2010Get full text
Get full text
Get full text
Proceeding Paper
