To see the other types of publications on this topic, follow the link: Discrete cosine transformed (DCT).

Journal articles on the topic 'Discrete cosine transformed (DCT)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Discrete cosine transformed (DCT).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Park, Jaehun, and Kwangsu Kim. "Image Perturbation-Based Deep Learning for Face Recognition Utilizing Discrete Cosine Transform." Electronics 11, no. 1 (2021): 25. http://dx.doi.org/10.3390/electronics11010025.

Full text
Abstract:
Face recognition, including emotion classification and face attribute classification, has seen tremendous progress during the last decade owing to the use of deep learning. Large-scale data collected from numerous users have been the driving force in this growth. However, face images containing the identities of the owner can potentially cause severe privacy leakage if linked to other sensitive biometric information. The novel discrete cosine transform (DCT) coefficient cutting method (DCC) proposed in this study combines DCT and pixelization to protect the privacy of the image. However, priva
APA, Harvard, Vancouver, ISO, and other styles
2

A. AlZain, Mohammed. "Efficient Scrambling-Substitution Image Security Scheme using Chaotic Arnold-Logistic Maps in the Discrete Cosine Transform." International journal of Computer Networks & Communications 14, no. 6 (2022): 67–79. http://dx.doi.org/10.5121/ijcnc.2022.14605.

Full text
Abstract:
This paper introduces an efficient scrambling-substitution image security scheme using chaotic Arnold and Logistic (Arnold-Logistic) maps in the discrete cosine transform (DCT). The Arnold map is employed as a scrambling stage while the Logistic map is employed as a substitution stage. The hybrid Arnold-Logistic mapping is performed in the DCT. The encipherment phase of the introduced DCT-based Arnold-Logistic security scheme begins by applying the DCT to the plainimage and the resulted DCT coefficient of the plainimage are scrambled for m iterations using the Arnold transformation. Then, the
APA, Harvard, Vancouver, ISO, and other styles
3

Ito, Izumi. "A New Pseudo-Spectral Method Using the Discrete Cosine Transform." Journal of Imaging 6, no. 4 (2020): 15. http://dx.doi.org/10.3390/jimaging6040015.

Full text
Abstract:
The pseudo-spectral (PS) method on the basis of the Fourier transform is a numerical method for estimating derivatives. Generally, the discrete Fourier transform (DFT) is used when implementing the PS method. However, when the values on both sides of the sequences differ significantly, oscillatory approximations around both sides appear due to the periodicity resulting from the DFT. To address this problem, we propose a new PS method based on symmetric extension. We mathematically derive the proposed method using the discrete cosine transform (DCT) in the forward transform from the relation be
APA, Harvard, Vancouver, ISO, and other styles
4

Jang, Ju-wook, Chang-hyeon Lim, Ronald Scrofano, and Viktor K. Prasanna. "Energy-Efficient Discrete Cosine Transform on FPGAs." KIPS Transactions:PartA 12A, no. 4 (2005): 313–20. http://dx.doi.org/10.3745/kipsta.2005.12a.4.313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Vibha, Aggarwal, and Singh Patterh Manjeet. "ECG Signal Compression using Normalization and Thresholding." International Journal of BioSciences and Technology (IJBST) ISSN: 0974-3987 5, no. 8 (2012): 40–44. https://doi.org/10.5281/zenodo.1445407.

Full text
Abstract:
<strong>ABSTRACT</strong>:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; In this paper, ECG signal compression using normalization and thresholding of discrete cosine transform (DCT) and Wavelet Transform (WT) signal coefficients is studied. First ECG signal is transformed using Linear Transforms (DCT and WT). The transformed coefficients (TC) are then normalized by dividing the TC by &nbsp;(where, is number of samples). To reduce the range of TC, the normalized coefficients (NC) are thresholded by bisection algorithm. The thresholding is done in a way so that error between actual PRD (perce
APA, Harvard, Vancouver, ISO, and other styles
6

Fu, Yong Gang. "A Print-Scan Resilient Image Watermarking Scheme Based on Radon Transform." Applied Mechanics and Materials 687-691 (November 2014): 3812–17. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.3812.

Full text
Abstract:
In this paper, a print-scan resilient image watermarking scheme based on Radon transform and DCT(discrete cosine transform) is proposed. The watermark is preprocessed with a chaotic sequence, then the host image is transformed to frequency domain by block DCT. The preprocessed watermark is adaptively embedded into the transform domain coefficients by modulating the relationship between neighbor coefficients. The watermark detection process is accomplished without referring to the original image. Simulation results show good robustness against several attacks, such Jpeg compression, cropping, f
APA, Harvard, Vancouver, ISO, and other styles
7

Hamad, Sumaya, Ahmeed Suliman Farhan, and Doaa Yaseen Khudhur. "Content based video retrieval using discrete cosine transform." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 2 (2021): 839–45. https://doi.org/10.11591/ijeecs.v21.i2.pp839-845.

Full text
Abstract:
A content based video retrieval (CBVR) framework is built in this paper. One of the essential features of video retrieval process and CBVR is a color value. The discrete cosine transform (DCT) is used to extract a query video features to compare with the video features stored in our database. Average result of 0.6475 was obtained by using the DCT after implementing it to the database we created and collected, and on all categories. This technique was applied on our database of video, check 100 database videos, 5 videos in&nbsp;each category.
APA, Harvard, Vancouver, ISO, and other styles
8

Zadeh, Pooneh Bagheri, Akbar Sheikh Akbari, and Tom Buggy. "DCT image codec using variance of sub-regions." Open Computer Science 5, no. 1 (2015): 13–21. http://dx.doi.org/10.1515/comp-2015-0003.

Full text
Abstract:
AbstractThis paper presents a novel variance of subregions and discrete cosine transform based image-coding scheme. The proposed encoder divides the input image into a number of non-overlapping blocks. The coefficients in each block are then transformed into their spatial frequencies using a discrete cosine transform. Coefficients with the same spatial frequency index at different blocks are put together generating a number of matrices, where each matrix contains coefficients of a particular spatial frequency index. The matrix containing DC coefficients is losslessly coded to preserve its visu
APA, Harvard, Vancouver, ISO, and other styles
9

Novamizanti, Ledya, Ida Wahidah, and Ni Wardana. "A Robust Medical Images Watermarking Using FDCuT-DCT-SVD." International Journal of Intelligent Engineering and Systems 13, no. 6 (2020): 266–78. http://dx.doi.org/10.22266/ijies2020.1231.24.

Full text
Abstract:
One way to prevent image duplication is by applying watermarking techniques. In this work, the watermarking process is applied to medical images using the Fast Discrete Curvelet Transforms (FDCuT), Discrete Cosine Transform (DCT), and Singular Value Decomposition (SVD) methods. The medical image of the host is transformed using FDCuT so that three subbands are obtained. High Frequency (HF) subband selected for DCT and SVD applications. Meanwhile, SVD was also applied to the watermark image. The singular value on the host image is exchanged with the singular value on the watermark. Insertion of
APA, Harvard, Vancouver, ISO, and other styles
10

Rostam, Affendi Hamzah, Md Roslan Muttaqin, Fauzan bin Kadmin Ahmad, Fakhar bin Abd Gani Shamsul, and Azha A. Aziz Khairul. "JPG, PNG and BMP image compression using discrete cosine transform." TELKOMNIKA (Telecommunication, Computing, Electronics and Control) 19, no. 3 (2021): 1010–16. https://doi.org/10.12928/telkomnika.v19i3.14758.

Full text
Abstract:
This paper proposes image compression using discrete cosine transform (DCT) for the format of joint photographic expert groups (JPEG) or JPG, portable network graphic (PNG) and bitmap (BMP). These three extensions are the most popular types used in current image processing storage. The purpose of image compression is to produce lower memory usage or to reduce memory file. This process removes redundant information of each pixel. The challenge for image compression process is to maintain the quality of images after the compression process. Hence, this article utilizes the DCT technique to susta
APA, Harvard, Vancouver, ISO, and other styles
11

HEGDE, VEENA N., RAVISHANKAR DEEKSHIT, and P. S. SATYANARAYANA. "DCT-BASED VARIABLE STEP SIZE GRIFFITHS' LMS ALGORITHM FOR RANDOM NOISE CANCELLATION IN ECGs." Journal of Mechanics in Medicine and Biology 12, no. 05 (2012): 1250025. http://dx.doi.org/10.1142/s021951941250025x.

Full text
Abstract:
This paper presents a new random noise cancellation technique for cancelling muscle artifact effects from ECG using ALE in the transformed domain. For this a transform domain variable step size griffith least mean square (TVGLMS) algorithm is proposed. The technique is based on the adaptation of the gradient of the error surface. The method frees both the step size and the gradient from observation noise and reduces the gradient mis-adjustment error. The sluggishness introduced due to the averaging of the gradient in the time domain is overcome by the transformed domain approach. The proposed
APA, Harvard, Vancouver, ISO, and other styles
12

Khan, Zirak, Farrukh Arslan, Faseeha Munir, Mubashir Ali, and Shahrukh . "Extracting the most important Discrete Cosine Transform (DCT) Coefficients for Image Compression using Deep Learning." VFAST Transactions on Software Engineering 10, no. 4 (2022): 56–63. http://dx.doi.org/10.21015/vtse.v10i4.1145.

Full text
Abstract:
Image compression is all about reducing storage costs and making the transmission of huge image files feasible. This paper targets lossy image compression by estimating the most important Discrete Cosine Transform (DCT) coefficients through employing deep learning. DCT basically results in the transformation of an image to the frequency domain from the spatial domain. The first few coefficients, in the frequency domain of a transformed image, have great importance. They are the most informative, while the others are of the least importance. The abilities of Multi-Layer Perceptron (MLP) and Con
APA, Harvard, Vancouver, ISO, and other styles
13

Gilbert, A. Ibitola, and B. Fabeku Blessing. "Realization of Discrete Cosine Transform Using Cyclic Convolutions with Generalized Approach." CONTINENTAL J. APPLIED SCIENCES 12, no. 2 (2017): 1–12. https://doi.org/10.5281/zenodo.569369.

Full text
Abstract:
<em>A general solution is proposed to realize the discrete cosine transform of any length via cyclic convolutions in this paper. This algorithm is not optimal in minimizing any measure of computational complexity, but it involves some regular forms that are most suitable for the realization using technologies and structures which are well suited for doing convolutions, such as the distributed arithmetic and the systolic array. On the other hand, this algorithm is much more flexible than any available DCT algorithm as it can be applied to realize DCT/IDCT with any length.</em>
APA, Harvard, Vancouver, ISO, and other styles
14

K.Thamizhmaran. "Discreat Cosine Transform and Gyrator Transform for Image Encryption." Journal of Sensor Research and Technologies 5, no. 3 (2023): 17–24. https://doi.org/10.5281/zenodo.10088333.

Full text
Abstract:
<i>An image is a picture that is digitally made, duplicated, and saved. Usually, colour Images can be encrypted using hyperchaotic system using DCT and gyrator transform domains the Red, Green, Blue (RGB) components of the original colour image are encoded into two dimensional streams, respectively. In this project work, proposes a new image encryption scheme integrated with DCT and Gyrator transform simultaneously. In particular, complex sequences are synthesized by blending four chaotic sequences produced by a hyperchaotic system into streams. Subsequently we scramble the two dimensional com
APA, Harvard, Vancouver, ISO, and other styles
15

Belilita, Sarra, Nourredine Amardjia, Tewfik Bekkouche, and Imen Nouioua. "Combining SVD-DCT Image Watermarking Scheme Based on Perona-Malik Diffusion." Elektronika ir Elektrotechnika 25, no. 4 (2019): 68–74. http://dx.doi.org/10.5755/j01.eie.25.4.23973.

Full text
Abstract:
In this paper, we propose an efficient image watermarking scheme based on combining Singular Value Decomposition (SVD) and Discrete Cosine Transform (DCT) transforms. The main idea consists of exploiting results obtained by the well-known Perona-Malik diffusion applied in image de-noising in watermarking domain by selecting significant blocks to embed a binary logo watermark. After applying the DCT on the selected blocks, the SVD is performed on each of these transformed blocks to modify a few numbers of its U matrix elements according to some defined conditions. Computer simulation and experi
APA, Harvard, Vancouver, ISO, and other styles
16

Anil, ChowdaryTummala, and Nalluri Purnachand. "Reduced encoder time complexityusing enhanced adaptive multiple transform selection in versatile video coding." Reduced encoder time complexityusing enhanced adaptive multiple transform selection in versatile video coding 32, no. 2 (2023): 796–803. https://doi.org/10.11591/ijeecs.v32.i2.pp796-803.

Full text
Abstract:
When compressing a video, the architecture is provided with the width and height &nbsp;of &nbsp;the &nbsp;frame &nbsp;along &nbsp;with &nbsp;the &nbsp;video &nbsp;as &nbsp;input. &nbsp;The &nbsp;multiple &nbsp;transform selection (MTS) techniques are used to compress video. Traditional discrete cosine &nbsp; transforms (DCT)and &nbsp; other &nbsp; trigonometric &nbsp; (sine &nbsp; and &nbsp; cosine) transforms, such as DCT-8 and DST-7, are included in the pool of transforms. For the best outcomes, two additional transformsDST-2 and DCT-5were also utilized &nbsp;to &nbsp;compress &nbsp;any &nbs
APA, Harvard, Vancouver, ISO, and other styles
17

Nurmaliana, Pohan, Saragih Rusmin, and Rahim Robbi. "Invisible Watermarking Audio Digital with Discrete Cosine Transform." International Journal of Scientific Research in Science and Technology (IJSRST) 3, no. 1 (2017): 21–25. https://doi.org/10.5281/zenodo.239704.

Full text
Abstract:
Security is one of the most important parts now, related to copyright which has a royalty to the content owner, this content are an audio file, invisible watermarking is one of the types of techniques that can be used to solve this case because this technique makes watermarking invisible by the human eye and the methods used for this technique using DCT (Discrete Cosine Transform) which works on the frequency domain digital audio files
APA, Harvard, Vancouver, ISO, and other styles
18

Aggarwal, Vibha, and Manjeet Singh Patterh. "PERFORMANCE ANALYSIS OF NONLINEAR TRANSFORMATIONAL ECG COMPRESSION METHOD." Biomedical Engineering: Applications, Basis and Communications 21, no. 04 (2009): 245–51. http://dx.doi.org/10.4015/s1016237209001350.

Full text
Abstract:
This paper presents and analyzes nonlinear transform-based method electrocardiogram (ECG) compression. The procedure used is similar to that used in linear transform-based method. The ECG signal is first transformed using (i) linear transform: discrete cosine transforms (DCT), Laplacian pyramid (LP), wavelet transform (WT) and it is transformed using (ii) nonlinear transform: essentially nonoscillatory cell average (ENOCA). The transformed coefficients (TC) are thresholded using the bisection algorithm in order to match the predefined user-specified percentage root mean square difference (PRD)
APA, Harvard, Vancouver, ISO, and other styles
19

Nkuna, M.C., E. Esenogho, and R. Heymann. "Using Artificial Neural Network to Analyze Stego Images." Nigerian Research Journal of Engineering and Environmental Sciences 6, no. 2 (2021): 476–82. https://doi.org/10.5281/zenodo.5805077.

Full text
Abstract:
<em>This paper proposed a discrete cosine transform least significant Bit-2 steganography encryption method for embedding the secret data in the cover image. The method overcomes physical signs of pixel modifications while achieving a high data payload. This technique enables data to be hidden in a cover image, while the image recognition artificial neural network checks the presence of any visible alterations on the stego-image. The traditional least significant bit (LSB) and the proposed discrete cosine transform least significant bit-2 (DCT LSB-2) methods were tested for embedding efficienc
APA, Harvard, Vancouver, ISO, and other styles
20

Amina, Belalia, Belloulata Kamel, and Zhu Shiping. "Efficient histogram for region based image retrieval in the discrete cosine transform domain." International Journal of Artificial Intelligence (IJ-AI) 11, no. 2 (2022): 546–63. https://doi.org/10.11591/ijai.v11.i2.pp546-563.

Full text
Abstract:
Recently, several approaches of content based-image retrieval (CBIR), based on the characteristics of discrete cosine transform (DCT), such as decorrelation and concen-tration of energy in only a few coefficients, have been proposed. To reduce the se-mantic gap between high level search and low level patterns, a new concept based on region based search region-based image retrieval (RBIR) has been proposed. Re-cently, we proposed to use shape-adaptive (SA) DCT in a new RBIR system. In this paper, we propose an efficient histogram optimization suited to our region-based con-cept. This histogram
APA, Harvard, Vancouver, ISO, and other styles
21

Zhang, Shun, Tie-gang Gao, and Fu-sheng Yang. "A High Capacity Reversible Data Hiding Scheme Based on Multi-Level Integer DWT and Histogram Modification." International Journal of Digital Crime and Forensics 6, no. 1 (2014): 51–64. http://dx.doi.org/10.4018/ijdcf.2014010104.

Full text
Abstract:
A reversible data hiding scheme based on integer DWT and histogram modification is proposed. In the scheme, the cover media is firstly transformed by Integer DWT (Discrete Wavelet Transformation); then information is embedded through the modification of histograms of the middle and high frequency sub-bands of the DWT coefficients. In order to increase the embedding capacity, a multi-level scheme is proposed, which achieved both high embedding capacity and reversibility. Extensive experimental results have shown that the proposed scheme achieves both higher embedding capacity and lower distorti
APA, Harvard, Vancouver, ISO, and other styles
22

Bazine, Razika, Huayi Wu, and Kamel Boukhechba. "Spatial Filtering in DCT Domain-Based Frameworks for Hyperspectral Imagery Classification." Remote Sensing 11, no. 12 (2019): 1405. http://dx.doi.org/10.3390/rs11121405.

Full text
Abstract:
In this article, we propose two effective frameworks for hyperspectral imagery classification based on spatial filtering in Discrete Cosine Transform (DCT) domain. In the proposed approaches, spectral DCT is performed on the hyperspectral image to obtain a spectral profile representation, where the most significant information in the transform domain is concentrated in a few low-frequency components. The high-frequency components that generally represent noisy data are further processed using a spatial filter to extract the remaining useful information. For the spatial filtering step, both two
APA, Harvard, Vancouver, ISO, and other styles
23

Birvinskas, Darius, Vacius Jusas, Ignas Martisius, and Robertas Damasevicius. "Fast DCT algorithms for EEG data compression in embedded systems." Computer Science and Information Systems 12, no. 1 (2015): 49–62. http://dx.doi.org/10.2298/csis140101083b.

Full text
Abstract:
Electroencephalography (EEG) is widely used in clinical diagnosis, monitoring and Brain - Computer Interface systems. Usually EEG signals are recorded with several electrodes and transmitted through a communication channel for further processing. In order to decrease communication bandwidth and transmission time in portable or low cost devices, data compression is required. In this paper we consider the use of fast Discrete Cosine Transform (DCT) algorithms for lossy EEG data compression. Using this approach, the signal is partitioned into a set of 8 samples and each set is DCT-transformed. Th
APA, Harvard, Vancouver, ISO, and other styles
24

Zear, Aditi, Amit Kumar Singh, and Pardeep Kumar. "Multiple Watermarking for Healthcare Applications." Journal of Intelligent Systems 27, no. 1 (2018): 5–18. http://dx.doi.org/10.1515/jisys-2016-0036.

Full text
Abstract:
AbstractIn this paper, an algorithm for multiple digital watermarking based on discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) was proposed for healthcare applications such as tele-ophthalmology, tele-medicine, tele-diagnosis, and tele-consultancy services. Multiple watermarks were used in this algorithm to reduce the consequences of medical identity thefts. In the embedding process, the cover medical image was decomposed into third-level DWT. Low-frequency bands (LH2 and LL3) were transformed by DCT, and then SVD was applied to DCT coe
APA, Harvard, Vancouver, ISO, and other styles
25

RENDRAGRAHA, RENDY DWI, GELAR BUDIMAN, and IRMA SAFITRI. "QIM - Based Audio Watermarking with Combination Technique of DCT-QR-CPT." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 7, no. 1 (2019): 112. http://dx.doi.org/10.26760/elkomika.v7i1.112.

Full text
Abstract:
ABSTRAKAudio watermarking adalah teknik memasukkan informasi ke dalam file audio dan untuk melindungi hak cipta data digital dari distribusi ilegal. Makalah ini memperkenalkan audio stereo watermarking berdasarkan Quantization Index Modulation (QIM) dengan teknik gabungan Discrete Cosine Transform (DCT) - QRCartesian Polar Transform (CPT). Host audio dibagi menjadi beberapa frame, selanjutnya setiap frame ditransformasi oleh DCT, kemudian output DCT diuraikan menjadi matriks orthogonal dan matriks segitiga menggunakan metode QR. Selanjutnya, CPT mengubah dua koefisien kartesian dari matriks se
APA, Harvard, Vancouver, ISO, and other styles
26

Roy, Soumitra, and Arup Kumar Pal. "An indirect watermark hiding in discrete cosine transform–singular value decomposition domain for copyright protection." Royal Society Open Science 4, no. 6 (2017): 170326. http://dx.doi.org/10.1098/rsos.170326.

Full text
Abstract:
Digital image watermarking has emerged as a promising solution for copyright protection. In this paper, a discrete cosine transform (DCT) and singular value decomposition (SVD) based hybrid robust image watermarking method using Arnold scrambling is proposed and simulated to protect the copyright of natural images. In this proposed scheme, before embedding, watermark is scrambled with Arnold scrambling. Then, the greyscale cover image and encrypted watermark logo are decomposed into non-overlapping blocks and subsequently some selected image blocks are transformed into the DCT domain for inser
APA, Harvard, Vancouver, ISO, and other styles
27

Abdul-Amir, Saied O., and Khamies K. Hasan. "DCT/DPCM Hybrid Coding for Interlaced Image Compression." Tikrit Journal of Engineering Sciences 16, no. 1 (2009): 121–32. http://dx.doi.org/10.25130/tjes.16.1.09.

Full text
Abstract:
By the nature of images, picture elements in local regions are highly correlated with one another. In such cases, image compression techniques are introduced to reduce the amount of data is needed to represent the same information, either exactly or approximately. In this work DCT/DPCM hybrid approach have been designed and implemented for interlaced images. The image signal was first transformed row-wise using discrete cosine transform (DCT) and a differential pulse code modulation (DPCM) scheme then was used column-wise to get difference signal. For still images the same 3-bit quantizer was
APA, Harvard, Vancouver, ISO, and other styles
28

Tsai, Tienwei, Te-Wei Chiang, and Yo-Ping Huang. "An Efficient DCT-Based Image Retrieval Approach Using Distance Threshold Pruning." Journal of Advanced Computational Intelligence and Intelligent Informatics 12, no. 3 (2008): 268–76. http://dx.doi.org/10.20965/jaciii.2008.p0268.

Full text
Abstract:
Content-based image retrieval (CBIR) techniques would allow indexing and retrieving images based on their low-level contents, which involves a large number of image pixels and thus becomes an inherently and essentially computational intensive task. This paper proposes a distance threshold pruning (DTP) method to alleviate computational burden of CBIR without sacrificing its accuracy. In our approach, the images are converted into the YUV color space, and then transformed into discrete cosine transform (DCT) coefficients. Benefited from the energy compacting property of DCT, Only the low-freque
APA, Harvard, Vancouver, ISO, and other styles
29

DUAN, FABING, DEREK ABBOTT, and FRANÇOIS CHAPEAU-BLONDEAU. "EVALUATION OF THE SIGN DETECTOR FOR DCT DOMAIN WATERMARK DETECTION." Fluctuation and Noise Letters 10, no. 04 (2011): 337–58. http://dx.doi.org/10.1142/s0219477511000612.

Full text
Abstract:
Reordering by the rule of decreased absolute amplitudes, the discrete cosine transformation (DCT) coefficients of an image are approximately modeled as dichotomous noise. Based on this assumption, it is interesting to note that the classical multiplicative embedding method can be transformed into an additive embedding rule, which accords with the signal processing problem of detecting a known weak signal in additive non-Gaussian noise. Then, following the generalized Neyman-Pearson lemma, a locally optimum detector, named the sign detector, is introduced to distinguish the correct watermark fr
APA, Harvard, Vancouver, ISO, and other styles
30

Hayati, Raisah, and Rahmadi Kurnia. "Simulasi Unjuk Kerja Discrete Wavelet Transform (DWT) dan Discrete Cosine Transform (DCT) untuk Pengolahan Sinyal Radar di Daerah yang Ber-Noise Tinggi." Jurnal Nasional Teknik Elektro 3, no. 1 (2014): 32–43. http://dx.doi.org/10.20449/jnte.v3i1.53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Fatemeh, Hourali, and Gharravi Sorayya. "An Ear Recognition Method Based on Rotation Invariant Transformed DCT." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 5 (2017): 2895–901. https://doi.org/10.11591/ijece.v7i5.pp2895-2901.

Full text
Abstract:
Human recognition systems have gained great importance recently in a wide range of applications like access, control, criminal investigation and border security. Ear is an emerging biometric which has rich and stable structure and can potentially be implemented reliably and cost efficiently. Thus human ear recognition has been researched widely and made greatly progress. High recognition rates which are reported in most existing methods can be reached only under closely controlled conditions. Actually a slight amount of rotation and translation which is inescapable would be injurious for syste
APA, Harvard, Vancouver, ISO, and other styles
32

V., Yaswanth Varma *. T. Nalini Prasad N. V. Phani Sai Kumar. "IMAGE COMPRESSION METHODS BASED ON TRANSFORM CODING AND FRACTAL CODING." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 10 (2017): 481–87. https://doi.org/10.5281/zenodo.1036337.

Full text
Abstract:
Image compression is process to remove the redundant information from the image so that only essential information can be stored to reduce the storage size, transmission bandwidth and transmission time. The essential information is extracted by various transforms techniques such that it can be reconstructed without losing quality and information of the image. In this research comparative analysis of image compression is done by four transform method, which are Discrete Cosine Transform (DCT), Discrete Wavelet Transform( DWT) &amp; Hybrid (DCT+DWT) Transform and fractal coding. MATLAB programs
APA, Harvard, Vancouver, ISO, and other styles
33

Moussa, Mourad, Maha Hmila, and Ali Douik. "Face recognition using fractional coefficients and discrete cosine transform tool." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 1 (2021): 892. http://dx.doi.org/10.11591/ijece.v11i1.pp892-899.

Full text
Abstract:
Face recognition is a computer vision application based on biometric information for automatic person identification or verification from image sequence or a video frame. In this context DCT is the easy technique to determine significant parameters. Until now the main object is selection of the coefficients to obtain the best recognition. Many techniques rely on premasking windows to discard the high and low coefficients to enhance performance. However, the problem resides in the shape and size of premask. To improve discriminator ability in discrete cosine transform domain, we used fractional
APA, Harvard, Vancouver, ISO, and other styles
34

Mourad, Moussa, Hamila Maha, and Douik Ali. "Face recognition using fractional coefficients and discrete cosine transform tool." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 1 (2021): 892–99. https://doi.org/10.11591/ijece.v11i1.pp892-899.

Full text
Abstract:
Face recognition is a computer vision application based on biometric information for automatic person identification or verification from image sequence or a video frame. In this context DCT is the easy technique to determine significant parameters. Until now the main object is selection of the coefficients to obtain the best recognition. Many techniques rely on premasking windows to discard the high and low coefficients to enhance performance. However, the problem resides in the shape and size of premask. To improve discriminator ability in discrete cosine transform domain, we used fractional
APA, Harvard, Vancouver, ISO, and other styles
35

Su, Hang. "Image splicing detection using integrated LBP and DCT features." Applied and Computational Engineering 101, no. 1 (2024): 71–78. http://dx.doi.org/10.54254/2755-2721/101/20240976.

Full text
Abstract:
Abstract. Image splicing is one of the most common techniques used for picture manipulation and forgery. With the advent of user-friendly photo editing software, image splicing has become more prevalent and increasingly difficult to detect. This paper proposes a passive photo splicing detection approach based on Local Binary Patterns (LBP) and Discrete Cosine Transform (DCT) to identify splicing forgeries. The input RGB images are first converted to the YCbCr color space. Subsequently, the chrominance channels, Cb and Cr, are divided into overlapping blocks. Each block's LBP code is then trans
APA, Harvard, Vancouver, ISO, and other styles
36

Ledya, Novamizanti, Budiman Gelar, and Nur Fitri Astuti Elsa. "Robust audio watermarking based on transform domain and SVD with compressive sampling framework." TELKOMNIKA Telecommunication, Computing, Electronics and Control 18, no. 2 (2020): 1079–88. https://doi.org/10.12928/TELKOMNIKA.v18i2.14733.

Full text
Abstract:
The growth of the internet and digital data has resulted forgery, modification and sharing of digital data without property rights. Audio watermarking is one of a solution to protect the copyright of an audio from copyright infringement. This paper proposes an audio watermarking method which is robust against attacks and high capacity. First, a synchronization bit is added to the audio host. After the audio host is decomposed by Lifting Wavelet Transform (LWT), then choose a subband from the output of LWT to be transformed by discrete cosine transform (DCT). Next, the matrix of the signal from
APA, Harvard, Vancouver, ISO, and other styles
37

Iwut, Iwan, Gelar Budiman, and Ledya Novamizanti. "Optimization of Discrete Cosine Transform-Based Image Watermarking by Genetics Algorithm." Indonesian Journal of Electrical Engineering and Computer Science 4, no. 1 (2016): 91. http://dx.doi.org/10.11591/ijeecs.v4.i1.pp91-103.

Full text
Abstract:
&lt;p align="center"&gt;data in an image file is needed by its owner to set his ownership in a logo as a watermark embedded in the image file. Hiding the logo in the image was done in several methods. One of the method is domain transform using 2D-DCT in which data is embedded in frequency domain of the image. First, the host RGB image is converted to certain color space. The available and chosen color spaces are RGB, YCbCr or NTSC. The layer in which the watermark is embedded also can be selected. The available choices are 1&lt;sup&gt;st&lt;/sup&gt; layer, 2&lt;sup&gt;nd&lt;/sup&gt; layer, 3&
APA, Harvard, Vancouver, ISO, and other styles
38

Abodena, Omar Moftah. "LWT Based Robust Color Image Watermarking Using QR Factorization and DCT." Academy Journal For Basic and Applied Sciences 7, no. 1 (2025): 1–7. https://doi.org/10.5281/zenodo.15089089.

Full text
Abstract:
This paper proposes a novel robust blind color image watermarking technique that combines entropy analysis, lifting wavelet transform (LWT), QR factorization, and discrete cosine transform (DCT) for copyright protection. The RGB components of the color image are first separated, and the R component is then subjected to the 2-level LWT. Following DCT is applied to the 2-level LWT's high-frequency sub-band, the DCT coefficients are separated into 4x4 non-overlapping blocks. Each chosen block is then subjected to QR factorization, and the watermark is embedded in the first row and first column el
APA, Harvard, Vancouver, ISO, and other styles
39

Asriani, Euis, Intan Muchtadi-Alamsyah, and Ayu Purwarianti. "On Block g-Circulant Matrices with Discrete Cosine and Sine Transforms for Transformer-Based Translation Machine." Mathematics 12, no. 11 (2024): 1697. http://dx.doi.org/10.3390/math12111697.

Full text
Abstract:
Transformer has emerged as one of the modern neural networks that has been applied in numerous applications. However, transformers’ large and deep architecture makes them computationally and memory-intensive. In this paper, we propose the block g-circulant matrices to replace the dense weight matrices in the feedforward layers of the transformer and leverage the DCT-DST algorithm to multiply these matrices with the input vector. Our test using Portuguese-English datasets shows that the suggested method improves model memory efficiency compared to the dense transformer but at the cost of a slig
APA, Harvard, Vancouver, ISO, and other styles
40

Kim, Sungil, Baehyun Min, Kyungbook Lee, and Hoonyoung Jeong. "Integration of an Iterative Update of Sparse Geologic Dictionaries with ES-MDA for History Matching of Channelized Reservoirs." Geofluids 2018 (July 29, 2018): 1–21. http://dx.doi.org/10.1155/2018/1532868.

Full text
Abstract:
This study couples an iterative sparse coding in a transformed space with an ensemble smoother with multiple data assimilation (ES-MDA) for providing a set of geologically plausible models that preserve the non-Gaussian distribution of lithofacies in a channelized reservoir. Discrete cosine transform (DCT) of sand-shale facies is followed by the repetition of K-singular value decomposition (K-SVD) in order to construct sparse geologic dictionaries that archive geologic features of the channelized reservoir such as pattern and continuity. Integration of ES-MDA, DCT, and K-SVD is conducted in a
APA, Harvard, Vancouver, ISO, and other styles
41

R, Shivaji, R. Nataraj K, Mallikarjunaswamy S, and R. Rekha K. "Design and implementation of reconfigurable DCT based adaptive PST techniques in OFDM communication system using interleaver encoder." Indian Journal of Science and Technology 13, no. 29 (2020): 3008–20. https://doi.org/10.17485/IJST/v13i29.976.

Full text
Abstract:
Abstract <strong>Objectives:</strong>&nbsp;To propose Reconfigurable Discrete Cosine Transform (RDCT) in Orthogonal Frequency Division Multiplexing (OFDM) high speed communication system to improve efficient spectrum utilization and mitigation of jitter,selective fading effects. The adaptive PTS method reduces Inter-Carrier-Interference (ICI), Inter-Symbol-Interference (ISI), PAPR and the computational intricacy of the communication system. To analyse and compare the performance of proposed Reconfigurable method with existing conventional OFDM communication system.&nbsp;<strong>Methods:</stron
APA, Harvard, Vancouver, ISO, and other styles
42

Mokashi, Bhargavi, Vandana S. Bhat, Jagadeesh D. Pujari, S. Roopashree, T. R. Mahesh, and D. Stalin Alex. "Efficient Hybrid Blind Watermarking in DWT-DCT-SVD with Dual Biometric Features for Images." Contrast Media & Molecular Imaging 2022 (September 8, 2022): 1–14. http://dx.doi.org/10.1155/2022/2918126.

Full text
Abstract:
In the modern era of virtual computers over the notional environment of computer networks, the protection of influential documents is a major concern. To bring out this motto, digital watermarking with biometric features plays a crucial part. It utilizes advanced technology of cuffing data into digital media, i.e., text, image, video, or audio files. The strategy of cuffing an image inside another image by applying biometric features namely signature and fingerprint using watermarking techniques is the key purpose of this study. To accomplish this, a combined watermarking strategy consisting o
APA, Harvard, Vancouver, ISO, and other styles
43

D HARIKA and SYED NOORULLAH. "IMPLEMENTATION OF IMAGE AUTHENTICATION USING DIGITAL WATERMARKING WITH BIOMETRIC." international journal of engineering technology and management sciences 7, no. 1 (2023): 154–67. http://dx.doi.org/10.46647/ijetms.2023.v07i01.023.

Full text
Abstract:
The rapid global development of E-commerce in terms of digitalization and distribution of digital contents in the form of image, audio, video, increases the possibility of unrestricted duplication and broadcasting of copyrighted data and the protection of crucial documents is highly significant. Digital watermarking inserts watermark into the cover or host data by unnoticeable modification. In this work digital watermarking with biometric features is done. In this work a technique to implement the hiding of an image inside another image using biometric features namely signature and fingerprint
APA, Harvard, Vancouver, ISO, and other styles
44

Chang, Ko Chin. "Multi-Focus Image Fusion Using Local Energy Pattern." Applied Mechanics and Materials 145 (December 2011): 119–23. http://dx.doi.org/10.4028/www.scientific.net/amm.145.119.

Full text
Abstract:
For general image capture device, it is difficult to obtain an image with every object in focus. To solve the fusion issue of multiple same view point images with different focal settings, a novel image fusion algorithm based on local energy pattern (LGP) is proposed in this paper. Firstly, each focus images is decomposed using discrete wavelet transform (DWT) separately. Secondly, to calculate LGP with the corresponding pixel and its surrounding pixels, then use LGP to compute the new coefficient of the pixel from each transformed images with our proposed weighted fusing rules. The rules use
APA, Harvard, Vancouver, ISO, and other styles
45

Jafarpour, Behnam, Vivek K. Goyal, Dennis B. McLaughlin, and William T. Freeman. "Transform-domain sparsity regularization for inverse problems in geosciences." GEOPHYSICS 74, no. 5 (2009): R69—R83. http://dx.doi.org/10.1190/1.3157250.

Full text
Abstract:
We have developed a new regularization approach for estimating unknown spatial fields, such as facies distributions or porosity maps. The proposed approach is especially efficient for fields that have a sparse representation when transformed into a complementary function space (e.g., a Fourier space). Sparse transform representations provide an accurate characterization of the original field with a relatively small number of transformed variables. We use a discrete cosine transform (DCT) to obtain sparse representations of fields with distinct geologic features, such as channels or geologic fo
APA, Harvard, Vancouver, ISO, and other styles
46

Hu, Xin Ying, and Xiu Ping Zhao. "A Robust Digital Watermarking Algorithm Based on Digital Image Security." Advanced Materials Research 174 (December 2010): 144–47. http://dx.doi.org/10.4028/www.scientific.net/amr.174.144.

Full text
Abstract:
Digital watermarking has been proposed as a way to claim the ownership of the source and owner of the digital image data. In this paper, A robust algorithm based on DCT region is proposed to improve the image security. The main transforming is based on DCT (Discrete Cosine Transform). The algorithm was processed in the MATLAB software. In this paper, images of gray scale and RGB color scale were researched respectively. For color images, in order to get the best image quality, the RGB scale was transformed to YcbCr scale. Then, the Y channel (brightness channel) was separated, in which the wat
APA, Harvard, Vancouver, ISO, and other styles
47

PROF., A. S. MALI. "A IMAGE SECURITY WITH IMAGE STEGANOGRAPHY USING DCT COEFFICIENT AND ENCRYPTION." IJIERT - International Journal of Innovations in Engineering Research and Technology 3, no. 11 (2016): 1–8. https://doi.org/10.5281/zenodo.1462568.

Full text
Abstract:
<strong><strong>&nbsp;</strong>Image data security is the essential portion in communication and multi media world. During storing and sharing,avoid third party access of data is the challenge one. Providing security of data is the clever work and art also. Many protection algorithms are used in recent years. Protection may be given of a data is converting the original in to some unknown form,signals,sketch etc.,which is not understand by any one. Cryptogra phy is the best technique of image data security. In Greek,crypto refers hidden and graphy refers script</strong> <strong>https://www.ijie
APA, Harvard, Vancouver, ISO, and other styles
48

Khalifa, Isamadeen A., Subhi R. M. Zeebaree, Musa Ataş, and Farhad M. Khalifa. "Image Steganalysis in Frequency Domain Using Co-Occurrence Matrix and Bpnn." Science Journal of University of Zakho 7, no. 1 (2019): 27–32. http://dx.doi.org/10.25271/sjuoz.2019.7.1.574.

Full text
Abstract:
In the last two decades, steganalysis has become a fertile research area to minimize the security risks left behind by Misuse of data concealment in digital computer files. As the propagation of hidden writing increased, the need for the steganalysis emerged and grew to a large extent necessary to deter illicit secret communications. This paper introduces a steganalysis system to detect hidden information in images through using co-occurrence matrix, frequency domain transform, the first three moments, and back propagation neural network (BPNN). Four varieties of the system implemented. Firstl
APA, Harvard, Vancouver, ISO, and other styles
49

Sen, Eren, Ibrahim Furkan Ince, Ali Ozkurt, and Furkan Ilker Akin. "Local Binary Pattern in the Frequency Domain: Performance Comparison with Discrete Cosine Transform and Haar Wavelet Transform." Engineering, Technology & Applied Science Research 15, no. 2 (2025): 21456–61. https://doi.org/10.48084/etasr.10110.

Full text
Abstract:
This study presents a new method that aims to improve iris recognition performance by amplifying high-frequency components in the frequency domain, considering that iris images naturally contain high-frequency details. The Haar Wavelet Transform (HWT) and Discrete Cosine Transform (DCT) are used to enhance these components and an inverse transformation is applied to obtain iris images with more details. As input, the brightness values of the 8 neighboring pixels around each central pixel are used. These values are transformed into the frequency domain, the high-frequency band is amplified, and
APA, Harvard, Vancouver, ISO, and other styles
50

Avivah, Siti Nur, Ferda Ernawan, and Anis Farihan Mat Raffei. "Dual image watermarking based on NSST-LWT-DCT for color image." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 2 (2024): 907. http://dx.doi.org/10.11591/ijeecs.v35.i2.pp907-915.

Full text
Abstract:
Advanced internet technology allows unauthorized individuals to modify and distribute digital images. Image watermarking is a popular solution for copyright protection and ensuring digital security. This research presents an embedding scheme with a set of conditions using non-subsampled Shearlet transform (NSST), lifting wavelet transform (LWT), and discrete cosine transform (DCT). Red and green channels are employed for the embedding process. The red channel is converted by NSST-LWT. The low-frequency area (LL) frequency is then split into small blocks of 8×8, each partition block is then tra
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!