Journal articles on the topic 'Transformée en cosinus discrète (DCT)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Transformée en cosinus discrète (DCT).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Gharbi, Mohamed, and Mohamed Aymen Labiod. "Une application comparative pour l’enseignement des méthodes de compression d’images par transformées orthogonales." J3eA 21 (2022): 2039. http://dx.doi.org/10.1051/j3ea/20222039.
Full textSmigiel, E., A. Knoll, N. Broll, and A. Cornet. "Modèles direct et inverse de la réflectométrie non spéculaire par transformée en cosinus discrète." Le Journal de Physique IV 10, PR10 (September 2000): Pr10–237—Pr10–243. http://dx.doi.org/10.1051/jp4:20001026.
Full textJang, Ju-wook, Chang-hyeon Lim, Ronald Scrofano, and Viktor K. Prasanna. "Energy-Efficient Discrete Cosine Transform on FPGAs." KIPS Transactions:PartA 12A, no. 4 (August 1, 2005): 313–20. http://dx.doi.org/10.3745/kipsta.2005.12a.4.313.
Full textHayati, Raisah, and Rahmadi Kurnia. "Simulasi Unjuk Kerja Discrete Wavelet Transform (DWT) dan Discrete Cosine Transform (DCT) untuk Pengolahan Sinyal Radar di Daerah yang Ber-Noise Tinggi." Jurnal Nasional Teknik Elektro 3, no. 1 (March 1, 2014): 32–43. http://dx.doi.org/10.20449/jnte.v3i1.53.
Full textPark, Jaehun, and Kwangsu Kim. "Image Perturbation-Based Deep Learning for Face Recognition Utilizing Discrete Cosine Transform." Electronics 11, no. 1 (December 22, 2021): 25. http://dx.doi.org/10.3390/electronics11010025.
Full textA. AlZain, Mohammed. "Efficient Scrambling-Substitution Image Security Scheme using Chaotic Arnold-Logistic Maps in the Discrete Cosine Transform." International journal of Computer Networks & Communications 14, no. 6 (November 30, 2022): 67–79. http://dx.doi.org/10.5121/ijcnc.2022.14605.
Full textIto, Izumi. "A New Pseudo-Spectral Method Using the Discrete Cosine Transform." Journal of Imaging 6, no. 4 (March 28, 2020): 15. http://dx.doi.org/10.3390/jimaging6040015.
Full textZadeh, Pooneh Bagheri, Akbar Sheikh Akbari, and Tom Buggy. "DCT image codec using variance of sub-regions." Open Computer Science 5, no. 1 (August 11, 2015): 13–21. http://dx.doi.org/10.1515/comp-2015-0003.
Full textAsriani, Euis, Intan Muchtadi-Alamsyah, and Ayu Purwarianti. "On Block g-Circulant Matrices with Discrete Cosine and Sine Transforms for Transformer-Based Translation Machine." Mathematics 12, no. 11 (May 29, 2024): 1697. http://dx.doi.org/10.3390/math12111697.
Full textFu, Yong Gang. "A Print-Scan Resilient Image Watermarking Scheme Based on Radon Transform." Applied Mechanics and Materials 687-691 (November 2014): 3812–17. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.3812.
Full textNovamizanti, Ledya, Ida Wahidah, and Ni Wardana. "A Robust Medical Images Watermarking Using FDCuT-DCT-SVD." International Journal of Intelligent Engineering and Systems 13, no. 6 (December 31, 2020): 266–78. http://dx.doi.org/10.22266/ijies2020.1231.24.
Full textHEGDE, VEENA N., RAVISHANKAR DEEKSHIT, and P. S. SATYANARAYANA. "DCT-BASED VARIABLE STEP SIZE GRIFFITHS' LMS ALGORITHM FOR RANDOM NOISE CANCELLATION IN ECGs." Journal of Mechanics in Medicine and Biology 12, no. 05 (December 2012): 1250025. http://dx.doi.org/10.1142/s021951941250025x.
Full textKhan, Zirak, Farrukh Arslan, Faseeha Munir, Mubashir Ali, and Shahrukh . "Extracting the most important Discrete Cosine Transform (DCT) Coefficients for Image Compression using Deep Learning." VFAST Transactions on Software Engineering 10, no. 4 (November 27, 2022): 56–63. http://dx.doi.org/10.21015/vtse.v10i4.1145.
Full textBelilita, Sarra, Nourredine Amardjia, Tewfik Bekkouche, and Imen Nouioua. "Combining SVD-DCT Image Watermarking Scheme Based on Perona-Malik Diffusion." Elektronika ir Elektrotechnika 25, no. 4 (August 7, 2019): 68–74. http://dx.doi.org/10.5755/j01.eie.25.4.23973.
Full textAbdul-Amir, Saied O., and Khamies K. Hasan. "DCT/DPCM Hybrid Coding for Interlaced Image Compression." Tikrit Journal of Engineering Sciences 16, no. 1 (March 31, 2009): 121–32. http://dx.doi.org/10.25130/tjes.16.1.09.
Full textBirvinskas, Darius, Vacius Jusas, Ignas Martisius, and Robertas Damasevicius. "Fast DCT algorithms for EEG data compression in embedded systems." Computer Science and Information Systems 12, no. 1 (2015): 49–62. http://dx.doi.org/10.2298/csis140101083b.
Full textAggarwal, Vibha, and Manjeet Singh Patterh. "PERFORMANCE ANALYSIS OF NONLINEAR TRANSFORMATIONAL ECG COMPRESSION METHOD." Biomedical Engineering: Applications, Basis and Communications 21, no. 04 (August 2009): 245–51. http://dx.doi.org/10.4015/s1016237209001350.
Full textBazine, Razika, Huayi Wu, and Kamel Boukhechba. "Spatial Filtering in DCT Domain-Based Frameworks for Hyperspectral Imagery Classification." Remote Sensing 11, no. 12 (June 13, 2019): 1405. http://dx.doi.org/10.3390/rs11121405.
Full textDUAN, FABING, DEREK ABBOTT, and FRANÇOIS CHAPEAU-BLONDEAU. "EVALUATION OF THE SIGN DETECTOR FOR DCT DOMAIN WATERMARK DETECTION." Fluctuation and Noise Letters 10, no. 04 (December 2011): 337–58. http://dx.doi.org/10.1142/s0219477511000612.
Full textZear, Aditi, Amit Kumar Singh, and Pardeep Kumar. "Multiple Watermarking for Healthcare Applications." Journal of Intelligent Systems 27, no. 1 (January 26, 2018): 5–18. http://dx.doi.org/10.1515/jisys-2016-0036.
Full textRENDRAGRAHA, RENDY DWI, GELAR BUDIMAN, and IRMA SAFITRI. "QIM - Based Audio Watermarking with Combination Technique of DCT-QR-CPT." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 7, no. 1 (January 24, 2019): 112. http://dx.doi.org/10.26760/elkomika.v7i1.112.
Full textZhang, Shun, Tie-gang Gao, and Fu-sheng Yang. "A High Capacity Reversible Data Hiding Scheme Based on Multi-Level Integer DWT and Histogram Modification." International Journal of Digital Crime and Forensics 6, no. 1 (January 2014): 51–64. http://dx.doi.org/10.4018/ijdcf.2014010104.
Full textTsai, Tienwei, Te-Wei Chiang, and Yo-Ping Huang. "An Efficient DCT-Based Image Retrieval Approach Using Distance Threshold Pruning." Journal of Advanced Computational Intelligence and Intelligent Informatics 12, no. 3 (May 20, 2008): 268–76. http://dx.doi.org/10.20965/jaciii.2008.p0268.
Full textRoy, Soumitra, and Arup Kumar Pal. "An indirect watermark hiding in discrete cosine transform–singular value decomposition domain for copyright protection." Royal Society Open Science 4, no. 6 (June 2017): 170326. http://dx.doi.org/10.1098/rsos.170326.
Full textMokashi, Bhargavi, Vandana S. Bhat, Jagadeesh D. Pujari, S. Roopashree, T. R. Mahesh, and D. Stalin Alex. "Efficient Hybrid Blind Watermarking in DWT-DCT-SVD with Dual Biometric Features for Images." Contrast Media & Molecular Imaging 2022 (September 8, 2022): 1–14. http://dx.doi.org/10.1155/2022/2918126.
Full textKim, Sungil, Baehyun Min, Kyungbook Lee, and Hoonyoung Jeong. "Integration of an Iterative Update of Sparse Geologic Dictionaries with ES-MDA for History Matching of Channelized Reservoirs." Geofluids 2018 (July 29, 2018): 1–21. http://dx.doi.org/10.1155/2018/1532868.
Full textD HARIKA and SYED NOORULLAH. "IMPLEMENTATION OF IMAGE AUTHENTICATION USING DIGITAL WATERMARKING WITH BIOMETRIC." international journal of engineering technology and management sciences 7, no. 1 (2023): 154–67. http://dx.doi.org/10.46647/ijetms.2023.v07i01.023.
Full textIwut, Iwan, Gelar Budiman, and Ledya Novamizanti. "Optimization of Discrete Cosine Transform-Based Image Watermarking by Genetics Algorithm." Indonesian Journal of Electrical Engineering and Computer Science 4, no. 1 (October 1, 2016): 91. http://dx.doi.org/10.11591/ijeecs.v4.i1.pp91-103.
Full textMoussa, Mourad, Maha Hmila, and Ali Douik. "Face recognition using fractional coefficients and discrete cosine transform tool." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 1 (February 1, 2021): 892. http://dx.doi.org/10.11591/ijece.v11i1.pp892-899.
Full textJafarpour, Behnam, Vivek K. Goyal, Dennis B. McLaughlin, and William T. Freeman. "Transform-domain sparsity regularization for inverse problems in geosciences." GEOPHYSICS 74, no. 5 (September 2009): R69—R83. http://dx.doi.org/10.1190/1.3157250.
Full textChang, Ko Chin. "Multi-Focus Image Fusion Using Local Energy Pattern." Applied Mechanics and Materials 145 (December 2011): 119–23. http://dx.doi.org/10.4028/www.scientific.net/amm.145.119.
Full textNevart A. Minas and Faten H. Al-Qadhee. "Digital Video Compression Using DCT-Based Iterated Function System (IFS)." Tikrit Journal of Pure Science 22, no. 6 (January 30, 2023): 125–30. http://dx.doi.org/10.25130/tjps.v22i6.800.
Full textHu, Xin Ying, and Xiu Ping Zhao. "A Robust Digital Watermarking Algorithm Based on Digital Image Security." Advanced Materials Research 174 (December 2010): 144–47. http://dx.doi.org/10.4028/www.scientific.net/amr.174.144.
Full textKhalifa, Isamadeen A., Subhi R. M. Zeebaree, Musa Ataş, and Farhad M. Khalifa. "Image Steganalysis in Frequency Domain Using Co-Occurrence Matrix and Bpnn." Science Journal of University of Zakho 7, no. 1 (March 30, 2019): 27–32. http://dx.doi.org/10.25271/sjuoz.2019.7.1.574.
Full textMohammed Mustafa Siddeq. "Image Compression using Fourier Transformation with Genetic Algorithm." Journal of Wasit for Science and Medicine 4, no. 1 (November 8, 2022): 1–11. http://dx.doi.org/10.31185/jwsm.129.
Full textRafea, S., and Dr N. H. Salman. "Hybrid DWT-DCT compression algorithm & a new flipping block with an adaptive RLE method for high medical image compression ratio." International Journal of Engineering & Technology 7, no. 4 (August 14, 2018): 4602. http://dx.doi.org/10.14419/ijet.v7i4.25904.
Full textZhao, Yang, Yigang Wang, Hoi-Kyung Jung, Yongqiang Jin, Dan Hua, and Sen Xu. "Lightweight Smoke Recognition Based on Deep Convolution and Self-Attention." Mathematical Problems in Engineering 2022 (August 21, 2022): 1–12. http://dx.doi.org/10.1155/2022/1218713.
Full textJittawiriyanukoon, Chanintorn, and Vilasinee Srisarkun. "Evaluation of graphic effects embedded image compression." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 6 (December 1, 2020): 6606. http://dx.doi.org/10.11591/ijece.v10i6.pp6606-6617.
Full textEl Banhawy, Magy, Walaa Saber, and Fathy Amer. "A native enhanced elastic extension tables multi-tenant database." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 6 (December 1, 2020): 6618. http://dx.doi.org/10.11591/ijece.v10i6.pp6618-6628.
Full textShaheen, Imad, Abdelhalim Zekry, Fatma Newagy, and Reem Ibrahim. "PAPR reduction for FBMC/OQAM using hybrid scheme of different Precoding transform and mu-law companding." International Journal of Engineering & Technology 6, no. 4 (November 14, 2017): 154. http://dx.doi.org/10.14419/ijet.v6i4.8326.
Full textSaif, Waddah S., Amr M. Ragheb, Bernd Nebendahl, Tariq Alshawi, Mohamed Marey, and Saleh A. Alshebeili. "Machine Learning-Based Optical Performance Monitoring for Super-Channel Optical Networks." Photonics 9, no. 5 (April 28, 2022): 299. http://dx.doi.org/10.3390/photonics9050299.
Full textZhang, Jun, Xiaoyi Zhou, Jilin Yang, Chunjie Cao, and Jixin Ma. "Adaptive Robust Blind Watermarking Scheme Improved by Entropy-Based SVM and Optimized Quantum Genetic Algorithm." Mathematical Problems in Engineering 2019 (October 28, 2019): 1–16. http://dx.doi.org/10.1155/2019/7817809.
Full textDeng, Tianpeng, Xuan Li, Biao Jin, Lei Chen, and Jie Lin. "Achieving Lightweight Privacy-Preserving Image Sharing and Illegal Distributor Detection in Social IoT." Security and Communication Networks 2021 (June 5, 2021): 1–13. http://dx.doi.org/10.1155/2021/5519558.
Full textShi, Shanshan, Ting Luo, Jiangtao Huang, and Meng Du. "A Novel HDR Image Zero-Watermarking Based on Shift-Invariant Shearlet Transform." Security and Communication Networks 2021 (March 26, 2021): 1–12. http://dx.doi.org/10.1155/2021/6662700.
Full textMoreno-Alvarado, Rodolfo, Eduardo Rivera-Jaramillo, Mariko Nakano, and Hector Perez-Meana. "Simultaneous Audio Encryption and Compression Using Compressive Sensing Techniques." Electronics 9, no. 5 (May 22, 2020): 863. http://dx.doi.org/10.3390/electronics9050863.
Full textThakre, Nitin, Sakshi Junghare, Pranali Sakhre, and Dipti Khawse. "Steganography a Technique to Hide Information within an Image." Journal of Cyber Security, Privacy Issues and Challenges 2, no. 1 (April 15, 2023): 14–19. http://dx.doi.org/10.46610/jcspic.2023.v02i01.003.
Full textChoudhury, Bismita, Patrick Then, Biju Issac, Valliappan Raman, and Manas Kumar Haldar. "A Survey on Biometrics and Cancelable Biometrics Systems." International Journal of Image and Graphics 18, no. 01 (January 2018): 1850006. http://dx.doi.org/10.1142/s0219467818500067.
Full textSae-Tang, Wannida, and Adisorn Sirikham. "Image Steganography-based Copyright and Privacy-Protected Image Trading Systems." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 17, no. 3 (August 12, 2023): 358–75. http://dx.doi.org/10.37936/ecti-cit.2023173.252500.
Full textDISHABI, MOHAMMAD REZA EBRAHIMI, MOHAMMAD ABDOLLAHI AZGOMI, and AMIR MASOUD RAHMANI. "AN IMPROVED TECHNIQUE FOR PRIVACY PRESERVING CLUSTERING BASED ON DAUBECHIES-2 WAVELET TRANSFORM." International Journal of Wavelets, Multiresolution and Information Processing 11, no. 05 (September 2013): 1350039. http://dx.doi.org/10.1142/s0219691313500392.
Full textZhao, Huihuang, Jianzhen Chen, Shibiao Xu, Ying Wang, and Zhijun Qiao. "Compressive sensing for noisy solder joint imagery based on convex optimization." Soldering & Surface Mount Technology 28, no. 2 (April 4, 2016): 114–22. http://dx.doi.org/10.1108/ssmt-09-2014-0017.
Full text