Back Propagation Network using Fractioned Cover Image and Fractioned Watermarks
نویسندگان
چکیده
منابع مشابه
Image Compression Using Back Propagation Neural Network
Image compression technique is used to reduce the number of bits required in representing image, which helps to reduce the storage space and transmission cost. In the present research work back propagation neural network training algorithm has been used. Back propagation neural network algorithm helps to increase the performance of the system and to decrease the convergence time for the trainin...
متن کاملImage Deblurring Using Back Propagation Neural Network
Image deblurring is the process of obtaining the original image by using the knowledge of the degrading factors. Degradation comes in many forms such as blur, noise, and camera misfocus. A major drawback of existing restoration methods for images is that they suffer from poor convergence properties; the algorithms converge to local minima, that they are impractical for real imaging applications...
متن کاملPerformance of Fractioned and Nonfractioned Equalizers with High-Level QAM
This paper presents a comparative study of 16-QAM, 32QAM, 64-QAM, and 128-QAM 140 Mbit / s digital radio in the presence of multipath fading. Conventional T-spaced and fractional tapspaced equalizers have been considered to compensate for the ISI-induced symbols. The performance measure used is the bit error ratio (BER); thus, upper and lower bounds on BER have been developed. Based on this cal...
متن کاملThe effect of head-fractioned teletherapy on pulp tissue.
AIM To evaluate the early and delayed effects of fractioned teletherapy (radiotherapy) on the dental pulps of rats using Co(60). METHODOLOGY In group 1 - rats (n = 15) were subjected to fractioned teletherapy by 30 daily sessions fractioned in doses of 200 cGy day(-1), totaling 60 Gy and the rats were killed immediately after the final dose of irradiation; group 2 - same protocol but killed 3...
متن کاملHandwritten Text Image Authentication using Back Propagation
Authentication is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person, tracing the origins of an artefact, ensuring that a product is what it’s packaging and labelling claims to be, or assuring that a computer program is a trusted one. The authentication of information can pose special problems (especially man-in-the-middl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology
سال: 2019
ISSN: 2321-9653
DOI: 10.22214/ijraset.2019.12142