To see the other types of publications on this topic, follow the link: DCT TECHNIQUE.

Journal articles on the topic 'DCT TECHNIQUE'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'DCT TECHNIQUE.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Behl, Nipun, and Shivangi Katiyar. "Diagonally Assisted DCT Technique for Face Recognition: DA-DCT." International Journal of Computer Applications 141, no. 11 (2016): 11–15. http://dx.doi.org/10.5120/ijca2016909848.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Baithoon, Nushwan Yousif. "Zeros Removal with DCT Image Compression Technique." Journal of Kufa for Mathematics and Computer 1, no. 3 (2011): 38–46. http://dx.doi.org/10.31642/jokmc/2018/010305.

Full text
Abstract:
The discrete cosine transform (DCT) is a method for converting a signal into plain frequency components. It is extensively used in image compression. In this paper a new technique is proposed, namely ZRDCT (Zeros Removal with DCT) which is based on a lossy compression, and used to enhance image data compression.Image quality is measured impartially, using peak signal-to-noise ratio (PSNR) or picture quality scale, and individually using perceived image quality with compression factor (CF) being the main theme of this paper, taking into consideration the preservation of well PSNR outputs. The
APA, Harvard, Vancouver, ISO, and other styles
3

Jyoti, Raghav, and Kumar Atul. "An Empirical Study of Coalescing a Bracketed Sequence of Images for High Resolution Image Acquisition." International Journal of Computer Science Issues 17, no. 5 (2020): 34–42. https://doi.org/10.5281/zenodo.4418888.

Full text
Abstract:
A technique for coalescing a bracketed sequence of images into a high-quality image is proposed using DCT and luminance, chrominance techniques. DCT involves dividing the images to be coalesced into non-overlapping blocks of size NxN. DCT coefficients are computed for each block and coalesced rules are applied to get coalesced DCT coefficients. IDCT is then applied on the coalesced coefficients to produce the coalesced image/block. The procedure is repeated for each block. The second technique is based on blending the acclivated luminance components of the input images using the maximum inclin
APA, Harvard, Vancouver, ISO, and other styles
4

Bansal, Deepika, and Rita Chhikara. "An Improved DCT based Steganography Technique." International Journal of Computer Applications 102, no. 14 (2014): 46–49. http://dx.doi.org/10.5120/17887-8861.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

said, Shaimaa A. El. "Efficient DCT-based image compression technique." International Journal of Signal and Imaging Systems Engineering 6, no. 4 (2013): 259. http://dx.doi.org/10.1504/ijsise.2013.056637.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sudrajat, Ari, and Ayu Hendrati Rahayu. "Watermarking using DCT and DWT on Pneumonia images." Journal of Applied Intelligent System 8, no. 3 (2023): 273–86. http://dx.doi.org/10.33633/jais.v8i3.8914.

Full text
Abstract:
Watermarking is a branch of the data hiding technique. Watermarking is a technique used to insert a copyright label on an image, so that the copyright of the image can be protected. Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) are techniques that can be used to watermark. In this study, the Discrete Cosine Transform and Discrete Wavelet Transform methods will be used to watermark images to 5 different host images. In the tests carried out, watermarking techniques will be compared using DCT, DWT, DCT-DWT combination and DWT-DCT combination. The results obtained in this s
APA, Harvard, Vancouver, ISO, and other styles
7

Budiman, Donny, Andriyan B. Suksmono, and Donny Danudirdjo. "Fibonacci Sequence – based FFT and DCT Performance Comparison in Audio Watermarking." International Journal of Engineering & Technology 8, no. 1.9 (2019): 209–14. http://dx.doi.org/10.14419/ijet.v8i1.9.26401.

Full text
Abstract:
Audio watermarking is a manner to hide watermark into the audio for copyright protection. Recently, there are many techniques based on audio watermarking. Frequency domain based audio watermarking is one of audio watermarking technique that has good watermark robustness against many attacks, good watermarked audio quality, and also high watermark payload. In this paper, FFT and DCT performance will be compared as transform technique for data hiding in audio. Host audio is first transformed into frequency domain in frame-based by FFT or DCT, then watermark is embedded into the frequency domain
APA, Harvard, Vancouver, ISO, and other styles
8

Shirakol, Shrikanth, and Kerur S S. "ARCHITECTURAL DESIGN AND OPTIMIZATION OF DISTRIBUTED ARITHMETIC BASED 2-D DISCRETE COSINE TRANSFORM." ICTACT Journal on Microelectronics 8, no. 1 (2022): 1275–82. http://dx.doi.org/10.21917/ijme.2022.0220.

Full text
Abstract:
DCT is immensely used in Multimedia applications because it provides high energy compaction. The proposed architectural design of 1D-DCT employs an efficient computational technique, Distributed arithmetic and is synthesized using front end VLSI technique. The motive of utilising Distributed arithmetic is to have multiplier-less architecture that reduces the Area-delay product in comparison to the multiplier-based design by retaining the same structural regularities. The symmetric property of the DCT kernel matrix is applied to develop the proposed architecture which reduces the requirements o
APA, Harvard, Vancouver, ISO, and other styles
9

Saraiva, Aratã Andrade, Felipe Castro, Marcos Soares de Oliveira, and José Vigno Moura Sousa. "Identification of exonic regions in dna sequences an approach using cross-correlation and noise suppression by discrete cosine transform." Research, Society and Development 9, no. 9 (2020): e883998173. http://dx.doi.org/10.33448/rsd-v9i9.8173.

Full text
Abstract:
To identify the exonic regions in the DNA sequence of Chromosome 23, filtering techniques are used. DCT is a technique with the ability to remove noise from signals as shown in [Saraiva et al., 2018], in addition, noise suppression with DCT is not enough in itself, so in this work a new method of identifying exonic regions using cross correlation with DCT together with an FFT-based bandpass filter to decrease signal noise and find exonic regions.
APA, Harvard, Vancouver, ISO, and other styles
10

Kaur, Randeep, and Kamaljit Kaur Dhillon. "GRAYSCALE IMAGE WATERMARK DETECTION." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (2012): 100–105. http://dx.doi.org/10.24297/ijct.v3i1b.2748.

Full text
Abstract:
A Digital watermarking is a technique that provides a solution to the longstanding problems faced with copyrighting digital data. Digital watermarks are pieces of information added to digital data (audio, video, or still images) that can be detected or extracted later to make an assertion about the data. This information can be textual data about the author, its copyright, etc; or it can be an image itself. Watermarking Based on DCT Coefficient Modulation technique embeds the watermark in the DCT domain to increase the robustness of the watermarking scheme.DCT based watermarking is an example
APA, Harvard, Vancouver, ISO, and other styles
11

RENDRAGRAHA, RENDY DWI, GELAR BUDIMAN, and IRMA SAFITRI. "QIM - Based Audio Watermarking with Combination Technique of DCT-QR-CPT." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 7, no. 1 (2019): 112. http://dx.doi.org/10.26760/elkomika.v7i1.112.

Full text
Abstract:
ABSTRAKAudio watermarking adalah teknik memasukkan informasi ke dalam file audio dan untuk melindungi hak cipta data digital dari distribusi ilegal. Makalah ini memperkenalkan audio stereo watermarking berdasarkan Quantization Index Modulation (QIM) dengan teknik gabungan Discrete Cosine Transform (DCT) - QRCartesian Polar Transform (CPT). Host audio dibagi menjadi beberapa frame, selanjutnya setiap frame ditransformasi oleh DCT, kemudian output DCT diuraikan menjadi matriks orthogonal dan matriks segitiga menggunakan metode QR. Selanjutnya, CPT mengubah dua koefisien kartesian dari matriks se
APA, Harvard, Vancouver, ISO, and other styles
12

Pal, Suryakanta, Sudhakar Sahoo, and Birendra Kumar Nayak. "Deterministic Computing Techniques for Perfect Density Classification." International Journal of Bifurcation and Chaos 29, no. 05 (2019): 1950064. http://dx.doi.org/10.1142/s0218127419500640.

Full text
Abstract:
The aim of this paper is to solve the density classification task (DCT), an extensively studied classical problem, using one-dimensional nonuniform Cellular Automata (CA) rules. A perfect solution of DCT requires searching for CA rules for binary strings of all possible lengths. But the generic problem is still open though the solution exists only for a specific fixed length CA. This paper provides two fundamental ideas to solve this problem in a better way. The first technique solves this problem using deterministic Turing machines which ultimately leads to generation of different CA rules un
APA, Harvard, Vancouver, ISO, and other styles
13

Kong, Hui Fang, and Yu Ning Qiu. "Analysis of the Solenoid Driving Technique for DCT." Advanced Materials Research 466-467 (February 2012): 1162–66. http://dx.doi.org/10.4028/www.scientific.net/amr.466-467.1162.

Full text
Abstract:
The control principle of DCT hydraulic system and the working principle of solenoid were described. The solenoid driving circuits based on TLE6220GP and TLE7242-2G of Infineon were designed. The principle of TLE7242-2G control the proportional solenoid and the calculation formula of Kp, Ki were analyzed. The current control waveforms of proportional solenoid in different Kp, Ki were given according to MATLAB simulation.
APA, Harvard, Vancouver, ISO, and other styles
14

Gupta, Mukta, Prem Shanker Yadav, and Anubhav Bewerwal. "Blue Channel Replacement Technique for DCT-Compressed Image." International Journal of Applied Information Systems 4, no. 10 (2012): 20–23. http://dx.doi.org/10.5120/ijais12-450796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Miss., Nilam V. Kundlik*1 &. Mr. Manoj Kumar Singh2. "OSCILLATION AND DCT BASED BIOMEDICAL IMAGE COMPRESSION." OSCILLATION AND DCT BASED BIOMEDICAL IMAGE COMPRESSION 7, no. 6 (2018): 353–59. https://doi.org/10.5281/zenodo.1290477.

Full text
Abstract:
Image compression technique for  biomedical  image  analysis has importance as because of time consuming process and also its storage .   It   becomes   necessary   to compress  the  image  to  reduce     processing   time   required   to retrieve  target  components from biomedical  images. Also biomedical images requires more space for storage and also management of these images is very difficult.  To compress the image, there are different techniqu
APA, Harvard, Vancouver, ISO, and other styles
16

Savale, Vaishali, and Tarunendra Bhadauria. "Different Techniques of Steganography in Images." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–7. http://dx.doi.org/10.55041/ijsrem39153.

Full text
Abstract:
Abstract—Steganography is a vital technique in information security that conceals data within other non-secret data, primarily images. This paper explores four prominent image steganography techniques: Least Significant Bit (LSB), Pixel Value Differencing (PVD), Discrete Cosine Transform (DCT), and Masking & Filtering. Each method is examined in terms of its operational principles, advantages, and limitations. LSB is straightforward but vulnerable, while PVD offers higher capacity and robustness. DCT enhances resistance against compression, and Masking & Filtering maintains high image
APA, Harvard, Vancouver, ISO, and other styles
17

Pratarshi, Saha, Gurung Sandeep, and Krishanu Ghose Kunal. "HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS." International Journal of Network Security & Its Applications (IJNSA) 5, no. 4 (2013): 163–79. https://doi.org/10.5281/zenodo.4724281.

Full text
Abstract:
With the increasing popularity of information technology in communication network, security has become an inseparable but vital issue for providing for confidentiality, data security, entity authentication and data origin authentication. Steganography is the scheme of hiding data into a cover media to provide confidentiality and secrecy without risking suspicion of an intruder. Visual cryptography is a new technique which provides information security using simple algorithm unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography. This tec
APA, Harvard, Vancouver, ISO, and other styles
18

Franco Steier, Volker, Edgar Sobral Ashiuchi, Lutz Reißig, and José Alexander Araújo. "Effect of a Deep Cryogenic Treatment on Wear and Microstructure of a 6101 Aluminum Alloy." Advances in Materials Science and Engineering 2016 (2016): 1–12. http://dx.doi.org/10.1155/2016/1582490.

Full text
Abstract:
The aim of this work is to evaluate the effect of a deep cryogenic treatment (DCT) on the wear behavior and on the microstructure of an aluminum alloy. In order to compare the level of improvement on the wear resistance provided by the DCT with a more traditional technique, a test matrix which included DCT, CrN coated specimens, and combinations of both modification methods was conducted. The wear behavior was investigated using microabrasive wear tests. The cryogenic treated specimens proved to have similar low wear rates as the specimens coated with CrN. The most distinct improvement was rea
APA, Harvard, Vancouver, ISO, and other styles
19

Journal, Baghdad Science. "Combined DWT and DCT Image Compression Using Sliding RLE Technique." Baghdad Science Journal 8, no. 3 (2011): 832–39. http://dx.doi.org/10.21123/bsj.8.3.832-839.

Full text
Abstract:
A number of compression schemes were put forward to achieve high compression factors with high image quality at a low computational time. In this paper, a combined transform coding scheme is proposed which is based on discrete wavelet (DWT) and discrete cosine (DCT) transforms with an added new enhancement method, which is the sliding run length encoding (SRLE) technique, to further improve compression. The advantages of the wavelet and the discrete cosine transforms were utilized to encode the image. This first step involves transforming the color components of the image from RGB to YUV plane
APA, Harvard, Vancouver, ISO, and other styles
20

Baithoon, Nushwan Y. "Combined DWT and DCT Image Compression Using Sliding RLE Technique." Baghdad Science Journal 8, no. 3 (2011): 832–39. http://dx.doi.org/10.21123/bsj.2011.8.3.832-839.

Full text
Abstract:
A number of compression schemes were put forward to achieve high compression factors with high image quality at a low computational time. In this paper, a combined transform coding scheme is proposed which is based on discrete wavelet (DWT) and discrete cosine (DCT) transforms with an added new enhancement method, which is the sliding run length encoding (SRLE) technique, to further improve compression. The advantages of the wavelet and the discrete cosine transforms were utilized to encode the image. This first step involves transforming the color components of the image from RGB to YUV plane
APA, Harvard, Vancouver, ISO, and other styles
21

Pooja S. Mali and Dr. Mahesh S. Chavan. "Evaluation of Image Forgery Detection Techniques using DCT, DWT and QCD." International Journal for Modern Trends in Science and Technology 11, no. 06 (2025): 221–25. https://doi.org/10.46501/ijmtst.26.v11.i06.

Full text
Abstract:
Digital photographs are easily manipulated due to advancements in image processing tools, making it difficult to verify their authenticity. Copy and move type forgery, where a part of an image is duplicated and pasted in another location, reduces the image's dependability. A hybrid algorithm based on DWT and DCT is proposed to detect such cloned forgeries. In the proposed work we have used and hybrid algorithm which is based on DWT and DCT that is used to detect such kind of cloned forgery. The suggested technique reduces the dimensional representation of the image by first compressing it usin
APA, Harvard, Vancouver, ISO, and other styles
22

Gupta, Shilpi, Upena Dalal, and Vishnu Narayan Mishra. "Performance on ICI Self-Cancellation in FFT-OFDM and DCT-OFDM System." Journal of Function Spaces 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/854753.

Full text
Abstract:
In orthogonal frequency division multiplexing (OFDM) system, the existence of frequency offset in AWGN channel affects the orthogonality among the subcarriers and consequently introduces the intercarrier interference (ICI). The paper investigates new ICI self-cancellation technique to mitigate the effect of ICI in FFT-OFDM and compares it to DCT based OFDM system in terms of bit error rate (BER) and carrier to interference ratio (CIR). The proposed method for group size three results in a significant 20 dB improved CIR in FFT-OFDM. In terms of BER, proposed ICI self-cancellation technique outp
APA, Harvard, Vancouver, ISO, and other styles
23

Falahi, Mr Moayad Al, and Dr Janaki Sivakumar. "Comparitive Analysis and Findings on Dct & Lbg Compression Techniques." International Journal of Engineering and Computer Science 9, no. 06 (2020): 25075–84. http://dx.doi.org/10.18535/ijecs/v9i06.4463.

Full text
Abstract:
The main objective of this project is to develop an application to find the best compression technique to store Muscat College students' photographs in less storage. MATLAB software will be used to develop a Graphical User Interface GUI application and implement two image compression techniques which are lossless compression using the DCT algorithm and lossy compression using the LBG algorithm. The application shall allow the user to select and test a sample image by applying both these techniques for any student image he\she selects in order to compare the results by display the image after c
APA, Harvard, Vancouver, ISO, and other styles
24

Mechouek, Khaoula, Nasreddine Kouadria, Noureddine Doghmane, and Nadia Kaddeche. "Low Complexity DCT Approximation for Image Compression in Wireless Image Sensor Networks." Journal of Circuits, Systems and Computers 25, no. 08 (2016): 1650088. http://dx.doi.org/10.1142/s0218126616500882.

Full text
Abstract:
Energy consumption is a critical problem affecting the lifetime of wireless image sensor networks (WISNs). In such systems, images are usually compressed using JPEG standard to save energy during transmission. And since DCT transformation is the most computationally intensive part in the JPEG technique, several approximation techniques have been proposed to further decrease the energy consumption. In this paper, we propose a low-complexity DCT approximation method which is based on the combination of the rounded DCT with a pruned approach. Experimental comparison with recently proposed schemes
APA, Harvard, Vancouver, ISO, and other styles
25

Lenthe, William C., McLean P. Echlin, Andreas Trenkle, Melanie Syha, Peter Gumbsch, and Tresa M. Pollock. "Quantitative voxel-to-voxel comparison of TriBeam and DCT strontium titanate three-dimensional data sets." Journal of Applied Crystallography 48, no. 4 (2015): 1034–46. http://dx.doi.org/10.1107/s1600576715009231.

Full text
Abstract:
Recently, techniques for the acquisition of three-dimensional tomographic and four-dimensional time-resolved data sets have emerged, allowing for the analysis of mm3volumes of material with nm-scale resolution. The ability to merge multi-modal data sets acquiredviamultiple techniques for the quantitative analysis of structure, chemistry and phase information is still a significant challenge. Large three-dimensional data sets have been acquired by time-resolved diffraction contrast tomography (DCT) and a new TriBeam tomography technique with high spatial resolution to address grain growth in st
APA, Harvard, Vancouver, ISO, and other styles
26

Muhammad, Fuad, and Ernawan Ferda. "Video steganography based on DCT psychovisual and object motion." Bulletin of Electrical Engineering and Informatics 9, no. 3 (2020): 1015–23. https://doi.org/10.11591/eei.v9i3.1859.

Full text
Abstract:
Steganography is a technique of concealing the message in multimedia data. Multimedia data, such as videos are often compressed to reduce the storage for limited bandwidth. The video provides additional hidden-space in the object motion of image sequences. This research proposes a video steganography scheme based on object motion and DCT-psychovisual for concealing the message. The proposed hiding technique embeds a secret message along the object motion of the video frames. Motion analysis is used to determine the embedding regions. The proposed scheme selects six DCT coefficients in the midd
APA, Harvard, Vancouver, ISO, and other styles
27

Dr Fadhil Salman Abed, and Nada Abdul Aziz Mustafa. "A proposed Technique for Information Hiding Based on DCT." International Journal of Advancements in Computing Technology 2, no. 5 (2010): 140–52. http://dx.doi.org/10.4156/ijact.vol2.issue5.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Huang, Junqi, T. Nandha Kumar, and Haider Abbas. "Zigzag low-complexity approximate DCT using frequency upscaling technique." Journal of Physics: Conference Series 1962, no. 1 (2021): 012050. http://dx.doi.org/10.1088/1742-6596/1962/1/012050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

., Priya Porwal. "DIGITAL VIDEO WATERMARKING USING MODIFIED LSB AND DCT TECHNIQUE." International Journal of Research in Engineering and Technology 03, no. 04 (2014): 630–34. http://dx.doi.org/10.15623/ijret.2014.0304112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Amhammed, Aesha A. "A HYBRID IMAGE COMRESSION TECHNIQUE USING DFT AND DCT." International Journal of Science and Applied Information Technology 8, no. 6 (2019): 104–9. http://dx.doi.org/10.30534/ijsait/2019/158620198.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Lebcir, Mohamed, Suryanti Awang, and Ali Benziane. "Reversible Watermarking Technique for Fingerprint authentication based on DCT." IOP Conference Series: Materials Science and Engineering 769 (June 9, 2020): 012070. http://dx.doi.org/10.1088/1757-899x/769/1/012070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Zhao, Y., G. Cheng, and S. Yu. "Postprocessing technique for blocking artifacts reduction in DCT domain." Electronics Letters 40, no. 19 (2004): 1175. http://dx.doi.org/10.1049/el:20046044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Asatryan, D. G., and J. Patera. "Edge-detection algorithm based on DCT continuous extension technique." Physics of Atomic Nuclei 71, no. 5 (2008): 795–99. http://dx.doi.org/10.1134/s1063778808050049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Sherlock, B. G., and Y. P. Kakad. "Transform domain technique for windowing the DCT and DST." Journal of the Franklin Institute 339, no. 1 (2002): 111–20. http://dx.doi.org/10.1016/s0016-0032(01)00058-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Choi, Yoonki, and Kiyoharu Aizawa. "Digital watermarking technique using block correlation of DCT coefficients." Electronics and Communications in Japan (Part II: Electronics) 85, no. 9 (2002): 23–31. http://dx.doi.org/10.1002/ecjb.10069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Reddy, KVSV Trinadh, and S. Narayana Reddy. "An Improved Medical Image Watermarking Technique Based on Weber’s Law Descriptors." Traitement du Signal 38, no. 6 (2021): 1637–46. http://dx.doi.org/10.18280/ts.380607.

Full text
Abstract:
In distributed m-health communication, it is a major challenge to develop an efficient blind watermarking method to protect the confidential medical data of patients. This paper proposes an efficient blind watermarking for medical images, which boasts a very high embedding capacity, a good robustness, and a strong imperceptibility. Three techniques, namely, discrete cosine transform (DCT), Weber’s descriptors (WDs), and Arnold chaotic map, were integrated to our method. Specifically, the Arnold chaotic map was used to scramble the watermark image. Then, the medical image was partitioned into n
APA, Harvard, Vancouver, ISO, and other styles
37

Rostam, Affendi Hamzah, Md Roslan Muttaqin, Fauzan bin Kadmin Ahmad, Fakhar bin Abd Gani Shamsul, and Azha A. Aziz Khairul. "JPG, PNG and BMP image compression using discrete cosine transform." TELKOMNIKA (Telecommunication, Computing, Electronics and Control) 19, no. 3 (2021): 1010–16. https://doi.org/10.12928/telkomnika.v19i3.14758.

Full text
Abstract:
This paper proposes image compression using discrete cosine transform (DCT) for the format of joint photographic expert groups (JPEG) or JPG, portable network graphic (PNG) and bitmap (BMP). These three extensions are the most popular types used in current image processing storage. The purpose of image compression is to produce lower memory usage or to reduce memory file. This process removes redundant information of each pixel. The challenge for image compression process is to maintain the quality of images after the compression process. Hence, this article utilizes the DCT technique to susta
APA, Harvard, Vancouver, ISO, and other styles
38

ELSHARKAWY, R. R., M. HINDY, S. EL-RABAIE, and M. I. DESSOUKY. "FET SMALL-SIGNAL MODELING USING MEL-FREQUENCY CEPSTRAL COEFFICIENTS AND THE DISCRETE COSINE TRANSFORM." Journal of Circuits, Systems and Computers 19, no. 08 (2010): 1835–46. http://dx.doi.org/10.1142/s0218126610007158.

Full text
Abstract:
In this paper, a novel neural technique is proposed for FET small-signal modeling. This technique is based on the discrete cosine transform (DCT) and the Mel-frequency cepstral coefficients (MFCCs). The input data to traditional neural systems for FET small-signal modeling are the scattering parameters and the corresponding frequencies in a certain band, and the outputs are the circuit elements. In the proposed technique, the input data are considered random, and the MFCCs are calculated from these inputs and their DCT. The MFCCs are used to give a few features from the input random data seque
APA, Harvard, Vancouver, ISO, and other styles
39

Alex Rajju Balan, J. A., and S. Edward Rajan. "A novel embedding technique for lossless data hiding in medical images employing histogram shifting method." International Journal of Wavelets, Multiresolution and Information Processing 12, no. 03 (2014): 1450026. http://dx.doi.org/10.1142/s021969131450026x.

Full text
Abstract:
In this paper, a lossless data hiding method based on histogram shifting for MR images using Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) are presented. In this method, the algorithms are validated to hide the data in wavelet coefficients of high frequency subbands. This scheme has the advantage of comparing the DCT coefficients and the DWT coefficients which permit low distortion between the watermarked image and the original image. It also shifts a part of the histogram of high frequency subbands and embeds the data by using the created histogram zero point. To preven
APA, Harvard, Vancouver, ISO, and other styles
40

Jalil, Alyaa Jaber. "Robust Digital Images Watermarking Technique Based on Eigenvectors." Journal of Education College Wasit University 2, no. 25 (2021): 1305–24. http://dx.doi.org/10.31185/eduj.vol2.iss25.2739.

Full text
Abstract:
النمو الحالي في تكنولوجيا الصور ولدت الحاجة إلى تقنيات استخدمت لحماية حقوق الطبع للصور الرقمية. في هذا البحث, تم اقتراح منهج علامة مائية جديد ومتين معتمد على الطيف المنتشر. المنهج المقترح يعتمد على كل من التحويل المويجي المنفصل(DWT) والتحويل ألجيبي المنفصل (DCT). أولا, قمنا بتحليل الصورة إلى مستوى واحد باستخدام (DWT). بعد ذلك تم تقسيم جزء التقريب إلى كتل. التضمين تم بطريقة متكيفة وذلك بالاعتماد على القيم الذاتية للكتلة. سلسلة مشوشة جدا من الأرقام الحقيقية, المولدة بالاعتماد على مفتاح سري, تم اعتبارها علامة مائية سيتم تضمينها في معاملات DCT من الكتل المختارة. مرحلة اكتشاف العلامة المائية تولد ع
APA, Harvard, Vancouver, ISO, and other styles
41

Cedillo Hernández, Manuel, Mariko Nakano Miyatake, and Héctor Pérez Meana. "A robust watermarking technique based on image normalization." Revista Facultad de Ingeniería Universidad de Antioquia, no. 52 (March 7, 2013): 147–60. http://dx.doi.org/10.17533/udea.redin.14812.

Full text
Abstract:
This paper presents a robust watermarking method against geometric distortions and several other signal processing schemes. In the proposed watermarking method, image normalization is used to get geometric invariant features. The watermark embedding and detection process are carried out in the Discrete Cosine Transform (DCT) domain. A DCT based texture classification is used to classify each image block to embed a stronger as possible watermark, while maintaining watermark imperceptibility. The proposed watermarking scheme is a public watermarking, where the original image is not available for
APA, Harvard, Vancouver, ISO, and other styles
42

Kaustubh, Toro, Kambali Avvaneppa, Hiremath Shrigouri, and B.Hebbale Sunil. "A Laplacian Pyramid based Image Fusion Technique." Advancement in Image Processing and Pattern Recognition 3, no. 2 (2020): 1–5. https://doi.org/10.5281/zenodo.3884162.

Full text
Abstract:
<em>An image fusion technique using discrete Cosine transform (DCT) based on Laplacian pyramid is presented and studied. Through some testing and experiments it is found that the fused output image with higher level of pyramid gives better resolution quality and also quality in terms of human visibility. As we specify to get a greater number of pyramid level data, the execution increases accordingly because it is proportional to the number of pyramid levels. This method or technique can be used to fuse images in departments like medical science, crime and military organizations to get a clear
APA, Harvard, Vancouver, ISO, and other styles
43

Waqas, Ghulam Jilani, Ishtiaq Ahmad, Muhammad Kashif Samee, Muhammad Nasir Khan, and Ali Raza. "A hybrid OFDM–CDMA-based robust image watermarking technique." International Journal of Wavelets, Multiresolution and Information Processing 18, no. 06 (2020): 2050043. http://dx.doi.org/10.1142/s0219691320500435.

Full text
Abstract:
Digital watermarking is a process of embedding hidden information called watermark into different kinds of media objects. It uses basic modulation, multiplexing and transform techniques of communication for hiding information. Traditional techniques used are least significant bit (LSB) modification, discrete cosine transform (DCT), discrete wavelet transform (DWT), discrete Fourier transform (DFT), code division multiple access (CDMA) or a combination of these. Among these, CDMA is the most robust against different attacks except geometric attacks. This paper proposes a blind and highly robust
APA, Harvard, Vancouver, ISO, and other styles
44

Krishna Kumar Bohra and Vinod Kumar Soni. "Invisible watermarking using Discrete Cosine Transform (DCT): A comprehensive exploration." World Journal of Advanced Research and Reviews 24, no. 2 (2024): 2639–45. https://doi.org/10.30574/wjarr.2024.24.2.3623.

Full text
Abstract:
Invisible watermarking is a technique used to protect digital media, like images and videos, by adding a secret mark (watermark) that cannot be seen. This helps prevent copying and ensures the content’s authenticity. One popular method for invisible watermarking is called Discrete Cosine Transform (DCT), which works by changing the image into a form where small changes can be made without affecting its quality. DCT focuses on the frequency of the image, which helps hide the watermark in a way that it’s not noticeable to the human eye. This technique is used in many areas like copyright protect
APA, Harvard, Vancouver, ISO, and other styles
45

Krishna, Kumar Bohra, and Kumar Soni Vinod. "Invisible watermarking using Discrete Cosine Transform (DCT): A comprehensive exploration." World Journal of Advanced Research and Reviews 24, no. 2 (2024): 2639–45. https://doi.org/10.5281/zenodo.15142381.

Full text
Abstract:
Invisible watermarking is a technique used to protect digital media, like images and videos, by adding a secret mark (watermark) that cannot be seen. This helps prevent copying and ensures the content&rsquo;s authenticity. One popular method for invisible watermarking is called Discrete Cosine Transform (DCT), which works by changing the image into a form where small changes can be made without affecting its quality. DCT focuses on the frequency of the image, which helps hide the watermark in a way that it&rsquo;s not noticeable to the human eye. This technique is used in many areas like copyr
APA, Harvard, Vancouver, ISO, and other styles
46

Jackson, Joshua Conrad, Michele J. Gelfand, Nailah Ayub, and Jasmine Wheeler. "Together from afar: Introducing a Diary Contact Technique for Improving Intergroup Relations." Behavioral Science & Policy 5, no. 1 (2019): 15–33. http://dx.doi.org/10.1177/237946151900500103.

Full text
Abstract:
Bringing groups into direct contact is a popular way to break down negative stereotypes but is logistically challenging when groups are geographically distant or otherwise isolated. To address this issue, we present the diary contact technique (DCT), a methodology designed to improve relations between such groups via positive contact. In the DCT., individuals read real diary entries written by a member of their own culture (the in-group) or another culture (the out-group), with the prediction that reading out-group diary entries will reduce stereotyping. In this randomized controlled study, we
APA, Harvard, Vancouver, ISO, and other styles
47

Gupta, Gaurav, Amit Mahesh Joshi, and Kanika Sharma. "AN EFFICIENT ROBUST IMAGE WATERMARKING BASED ON AC PREDICTION TECHNIQUE USING DCT TECHNIQUE." ICTACT Journal on Image and Video Processing 06, no. 01 (2015): 1055–59. http://dx.doi.org/10.21917/ijivp.2015.0154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Feng, Gui, and Yi Min Yang. "Adaptive DCT Based Digital Watermarking Scheme." Applied Mechanics and Materials 20-23 (January 2010): 1136–42. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1136.

Full text
Abstract:
The paper proposes an adaptive digital watermarking scheme based on chaos sequence and DCT transform. The scheme can choose the location for watermark inserting adaptively, and properly assign the embedding intensity in different inserting locations according to the characteristic of human visual system (HVS). On the other hand, this scheme combines chaos sequence and scrambling technique to improve the ability to withstand various attacks. The experimental results show that, the method can basically satisfy transparency and robustness requirement.
APA, Harvard, Vancouver, ISO, and other styles
49

Ejaz, Umer, F. Y. Khuhawar, I. Bari, et al. "COMPARATIVE ANALYSIS OF LOSSY IMAGE COMPRESSION ALGORITHMS." Pakistan Journal of Scientific Research 3, no. 2 (2023): 136–47. http://dx.doi.org/10.57041/pjosr.v3i2.1043.

Full text
Abstract:
The demand for efficient image storage and transmission has driven extensive research into lossy image compression algorithms. This paper presents a comprehensive comparative analysis of three prominent lossy image compression techniques: Discrete Cosine Transform (DCT), Wavelet Transform, and Vector Quantization (VQ). Using a diverse dataset and various evaluation metrics including Peak Signal-to-Noise Ratio (PSNR), Structural Similarity Index (SSIM), Mean Squared Error (MSE), Root Mean Squared Error (RMSE), Bitrate, and Computational Complexity, we assess their performance in terms of image
APA, Harvard, Vancouver, ISO, and other styles
50

Siddiqui, M. F., A. W. Reza, J. Kanesan, and H. Ramiah. "Investigation of a Novel Common Subexpression Elimination Method for Low Power and Area Efficient DCT Architecture." Scientific World Journal 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/620868.

Full text
Abstract:
A wide interest has been observed to find a low power and area efficient hardware design of discrete cosine transform (DCT) algorithm. This research work proposed a novel Common Subexpression Elimination (CSE) based pipelined architecture for DCT, aimed at reproducing the cost metrics of power and area while maintaining high speed and accuracy in DCT applications. The proposed design combines the techniques of Canonical Signed Digit (CSD) representation and CSE to implement the multiplier-less method for fixed constant multiplication of DCT coefficients. Furthermore, symmetry in the DCT coeffi
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!