نتایج جستجو برای: key image

تعداد نتایج: 909039  

Journal: :International Journal for Research in Applied Science and Engineering Technology 2020

Journal: :INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL 2020

Journal: :Computer systems science and engineering 2022

In existing methods for segmented images, either edge point extraction or preservation of edges, compromising contrast images is so sensitive to noise. The Degeneration Threshold Image Detection (DTID) framework has been proposed improve the filtered images. Initially, DTID uses a Rapid Bilateral Filtering process filtering edges This filter decomposes input into base layers in framework. With ...

2010
Suresh Joseph

----------------------------------------------------------------------ABSTRACT-------------------------------------------------------------------This paper presents a novel approach in face digital image searching and matching. The given key image is converted into gray scale image and after that a matrix is computed with gray scale values of the key image. Then we are collecting the diagonal k...

On of the key components of brand equity is associations that the consumers have about the brand and these associations will guide them to choose the brand. These associations usually are considered as an organized network involves models of gathering the networks in minds and determine the brand value for consumers as a brand image. The aim of doing this research is eliciting and mapping the n...

2014
Neha Gandhi

It is very important to provide security to voting system and mostly which is online one. In this paper we provide security to online voting system with secure user authentication by providing biometric as well as password security to voter accounts. Basic idea behind this is to combine secret key with cover image on the basis of key image. As a result such new image is produced by system calle...

2013
Zhenxing Qian Xiyu Han Xinpeng Zhang

This work proposes a novel scheme of separable reversible data hiding for encrypted image using histogram modification. After the original image is encrypted by the sender, the data-hider embeds the secret message into the encrypted image by a histogram modification and n-nary data hiding scheme. On the receiver side, the secret message can be extracted by the embedding key, and the original im...

Journal: :مهندسی بیوسیستم ایران 0
نیما تیموری دانشجوی دکتری گروه مهندسی ماشین‏های کشاورزی، دانشگاه تهران محمود امید استاد گروه مهندسی ماشین‏های کشاورزی، دانشگاه تهران کاوه ملازاده استادیار گروه مهندسی بیوسیستم، دانشگاه کردستان علی رجبی پور استاد گروه مهندسی ماشین‏های کشاورزی، دانشگاه تهران

the quality evaluation of agricultural products is one of the key factors in promoting their quality. in this study, a method based on combined image processing technique and artificial neural network was presented. separation of touching almonds under different positions is a very important step in design of grading devices. in this study, an image processing algorithm based on extracting crit...

2015
D. Venugopal

Secured image compression is the key issue in image transmission applications. This paper proposes the idea of combining both compression and security of an image. In the existing methods to encrypt images, the key size is too large since the whole matrix is considered as the key. To solve this problem, encryption through key controlled matrix is constructed using the logistic map in this propo...

Journal: :CoRR 2014
Dmitri E. Nikonov Ian A. Young George Bourianoff

A coupled oscillator array is shown to approximate convolutions with Gabor filters for image processing tasks. Pixelated image fragments and filter functions are converted to voltages, differenced, and input into a corresponding array of weakly coupled Voltage Controlled Oscillators (VCOs). This is referred to as Frequency Shift Keying (FSK). Upon synchronization of the array, the common node a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید