Search Results - (( image compression modified algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Modified Contrast Limited Adaptive Histogram Equalization for high dynamic range images by Tung, Li Qian

    Published 2012
    “…The tone mapping algorithm was first compressed using global tone mapping method. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Review of wavelet theory and its application to image data compression by Khalifa, Othman Omran

    Published 2003
    “…Advantages over Fourier transform is investigated and several results are derived. The pyramid algorithm is also presented and some features of wavelets in image data compression are given. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Wavelets image data compression by Khalifa, Othman Omran, Dlay, Satnam Singh

    Published 1998
    “…The Wavelet transform is used to obtain a set of different frequency subbands of imagte; the image is decomposed using a pyramidal algorithm architecture. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4
  5. 5

    Enhanced Steganography Framework Based On Lossless Compression And Histogram by Kasasbeh, Dima Suliman Mohammad

    Published 2024
    “…The compression model was modified to include a hybrid lossless text compression algorithm to reduce redundant secret information and boost embedding capacity. …”
    Get full text
    Get full text
    Thesis
  6. 6

    New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique by Hamid, Nurul 'Atiqah

    Published 2016
    “…There are 6 main designs that the algorithms proposed namely the Orthogonal-Diamond Search Algorithm with Small Diamond Search Pattern (ODS-SDSP), the Orthogonal-Diamond Search Algorithm with Large Diamond Search Pattern (ODS-LDSP), the Diamond-Orthogonal Search Algorithm with Small Diamond Pattern (DOS-SDSP), the Diamond-Orthogonal Search Algorithm with Large Diamond Pattern (DOS-LDSP), the Modified Diamond-Orthogonal Search Algorithm with Small Diamond Pattern (MDOS-SDSP), and the Modified Diamond-Orthogonal Search Algorithm with Large Diamond Pattern (MDOS-LDSP). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets by Pradhan, Biswajeet

    Published 2006
    “…Thus image compression is a key factor to improve transmission speed and storage, but it risks losing relevant terrain information. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Evaluation of spiral pattern watermarking scheme for common attacks to social media images by Tiew, Boon Li, Jasni, Mohamad Zain, Syifak, Izhar Hisham, Alya Afikah, Usop

    Published 2022
    “…Image compression was also discussed as images published to social media platforms was often compressed. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform by Al-Deen, Ahmed A. Baha'a

    Published 2007
    “…On the other hand, a random key is used to choose the frames to be watermarked to increase the security level of the algorithm and discourage piracy. The aim of this research is to develop a video watermarking algorithm to embed a binary image inside the uncoded video stream that acts as a logo. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Hybrid particle swarm optimization for robust digital image watermarking by Tao, Hai, Jasni, Mohamad Zain, Abdalla, Ahmed N., Mohammad Masroor, Ahmed

    Published 2011
    “…To embed and extract the watermark, the singular values of the blocked host image are modified according to the watermark and scaling factors. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Video steganography based on DCT psychovisual and object motion by Muhammad, Fuad, Ernawan, Ferda

    Published 2020
    “…A message is embedded by modifying middle DCT coefficients using the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Video steganography based on DCT psychovisual and object motion by Muhammad, Fuad, Ernawan, Ferda

    Published 2020
    “…A message is embedded by modifying middle DCT coefficients using the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Image watermarking optimization algorithms in transform domains and feature regions by Tao, Hai

    Published 2012
    “…The achieved tradeoffs from these techniques between imperceptibility and robustness are controversial.To solve this problem,this study proposes the application of artificial intelligent techniques into digital watermarking by using discrete wavelet transform (DWT) and singular value decomposition (SVD).To protect the copyright information of digital images,the original image is decomposed according to two-dimensional discrete wavelet transform.Subsequently the preprocessed watermark with an affined scrambling transform is embedded into the vertical subband (HLm) coefficients in wavelet domain without compromising the quality of the image.The scaling factors are trained with the assistance of Particle Swarm Optimization (PSO).A new algorithmic framework is used to forecast feasibility of hypothesized watermarked images.In addition,the novelty is to associate the Hybrid Particle Swarm Optimization (HPSO),instead of a single optimization,as a model with SVD.To embed and extract the watermark,the singular values of the blocked host image are modified according to the watermark and scaling factors. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Handwriting recognition using webcam for data entry by Wong , Yoong Xiang

    Published 2014
    “…However, the testing were later enhanced with another feature extraction module, which consists of the combination of Character Vector Module, Kirsch Edge Detection Module, Alphabet Profile Feature Extraction Module, Modified Character Module and Image Compression Module. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Handwriting recognition using webcam for data entry by Xiang, W.Y., Sebastian, P.

    Published 2015
    “…However, the testing were later enhanced with another feature extraction module, which consists of the combination of Character Vector Module, Kirsch Edge Detection Module, Alphabet Profile Feature Extraction Module, Modified Character Module and Image Compression Module. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20