نتایج جستجو برای: encryption of colored images

تعداد نتایج: 21183193  

Journal: :Scientific Programming 2022

With the advancements in e-healthcare services, it is possible to provide remote medical services patients and swifter first aid. Medical images play an essential role applications for providing quick better diagnosis treatment patients. generally comprise secret details about are therefore prone various security threats during their transmission over public networks. Thus, required secure thes...

Journal: :International Journal of Computer Applications 2013

Journal: :International Journal of Computer Applications 2016

2002
Vladimir Vezhnevets

This paper is devoted to problem of face localization in color images, more particularly, to the task of grouping pixels with high skin probability to form possible face candidate regions. Using connected components analysis for pixels grouping has a significant drawback, for the noise of skin color detection and non-face skin-colored objects can form connected regions of skin pixels with vivid...

Journal: :International journal of electrical and computer engineering systems 2023

Images and video-based multimedia data are growing rapidly due to communication network technology. During image compression transmission, images inevitably corrupted by noise the influence of environment, transmission channels, other factors, resulting in damage degradation digital images. Numerous real-time applications, such as photography, traffic monitoring, obstacle detection, surveillanc...

2004
A. Ammar A. S. S. El-Kabbany M. I. Youssef

The recent secure of digital images attracts much attention, and many image encryption methods have been proposed. This paper presents a new scheme for image encryption technique, based on a residue number system (RNS) sequence and non-traditional random number generators, which are grouped as a chaotic system. An image is deteriorated according to the proposed new algorithm. This system provid...

Journal: :Australian journal of engineering and innovative technology 2022

We can see considerable growth in the field of science and technology over past few decades. This has also brought an enormous threat to data used by users. Encryption decryption play important role safeguarding data. Many authors have contributed much outstanding research on unauthorized access user In this journal, I proposed algorithm for encryption using images. My main aim is provide a new...

2010
Manish Mahajan Akashdeep Sharma S. Venkatraman A. Abraham M. Paprzycki Kathryn Hempstalk

Steganography is a process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyone else knowing that it contains a hidden message. The aim of this study was to investigate the various steganograhy methods & how they are implemented .LSB is a very well known method in this field. In binary images we...

2012
M. I. Khalil

The Fourier transforms play a critical role in a broad range of image processing applications, including enhancement, analysis, restoration, and compression. Until recently, it was common to use the conventional methods to deal with colored images. These methods are based on RGB decomposition of the colored image by separating it into three separate scalar images and computing the Fourier trans...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید