Academic literature on the topic 'Walsh-Hadamard transformation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Walsh-Hadamard transformation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Walsh-Hadamard transformation"

1

Peceli, G., and B. Feher. "Digital filters based on recursive Walsh-Hadamard transformation." IEEE Transactions on Circuits and Systems 37, no. 1 (1990): 150–52. http://dx.doi.org/10.1109/31.45706.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Boules, R. N. "Adaptive filtering using the fast Walsh-Hadamard transformation." IEEE Transactions on Electromagnetic Compatibility 31, no. 2 (1989): 125–28. http://dx.doi.org/10.1109/15.18779.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Berend, Daniel, Shlomi Dolev, Sergey Frenkel, and Ariel Hanemann. "Towards holographic “brain” memory based on randomization and Walsh–Hadamard transformation." Neural Networks 77 (May 2016): 87–94. http://dx.doi.org/10.1016/j.neunet.2016.02.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gupta, Manish Kumar, and Dibakar Raj Pant. "An Approach for Image Copyright Protection by using Walsh Hadamard Method." Journal of the Institute of Engineering 12, no. 1 (2017): 142–68. http://dx.doi.org/10.3126/jie.v12i1.16890.

Full text
Abstract:
Protecting copyrighted image from abuse, misuse and piracy is being critical day by day. Digital image Copyright Protection is considered as a solution to prevent the piracy of original image data. In this article, the authors propose copyright protection method using the well-known Walsh Hadamard transformation along with discrete wavelet transformation and singular value decomposition to achieve robust and imperceptible copyrighted image. The optimum scaling factor which decides the strength of signature image to be embedded is obtained at 0.3. The proposed article ensures imperceptibility o
APA, Harvard, Vancouver, ISO, and other styles
5

Korvel, Grazina, Bozena Kostek, and Olga Kurasova. "Comparative Analysis of Various Transformation Techniques for Voiceless Consonants Modeling." International Journal of Computers Communications & Control 13, no. 5 (2018): 853–64. http://dx.doi.org/10.15837/ijccc.2018.5.3310.

Full text
Abstract:
In this paper, a comparison of various transformation techniques, namely Discrete Fourier Transform (DFT), Discrete Cosine Transform (DCT) and Discrete Walsh Hadamard Transform (DWHT) is performed in the context of their application to voiceless consonant modeling. Speech features based on these transformation techniques are extracted. These features are mean and derivative values of cepstrum coefficients, derived from each transformation. Fea-ture extraction is performed on the speech signal divided into short-time seg-ments. The kNN and Naive Bayes methods are used for phoneme classification
APA, Harvard, Vancouver, ISO, and other styles
6

Nazarov, L. E., and V. M. Smolyaninov. "Use of fast Walsh-Hadamard transformation for optimal symbol-by-symbol binary block-code decoding." Electronics Letters 34, no. 3 (1998): 261. http://dx.doi.org/10.1049/el:19980186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hostetter, Gene H. "Recursive computation of Walsh-Hadamard transformations." Signal Processing 8, no. 1 (1985): 41–49. http://dx.doi.org/10.1016/0165-1684(85)90087-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Balsa, Jose. "Comparison of Image Compressions: Analog Transformations." Proceedings 54, no. 1 (2020): 37. http://dx.doi.org/10.3390/proceedings2020054037.

Full text
Abstract:
A comparison between the four most used transforms, the discrete Fourier transform (DFT), discrete cosine transform (DCT), the Walsh–Hadamard transform (WHT) and the Haar-wavelet transform (DWT), for the transmission of analog images, varying their compression and comparing their quality, is presented. Additionally, performance tests are done for different levels of white Gaussian additive noise.
APA, Harvard, Vancouver, ISO, and other styles
9

Ďuriš, Pavol, Ondrej Sýkora, Imrich Vrt'o, and Clark D. Thompson. "Tight chip area lower bounds for discrete Fourier and Walsh-Hadamard transformations." Information Processing Letters 21, no. 5 (1985): 245–47. http://dx.doi.org/10.1016/0020-0190(85)90092-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Assini, Imane, Abdelmajid Badri, Aicha Sahel, and Abdennaceur Baghdad. "Hybrid multiple watermarking technique for securing medical images of modalities MRI, CT scan, and X-ray." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 2349. http://dx.doi.org/10.11591/ijece.v10i3.pp2349-2356.

Full text
Abstract:
In order to contribute to the security of sharing and transferring medical images, we had presented a multiple watermarking technique for multiple protections; it was based on the combination of three transformations: the discrete wavelet transform (DWT), the fast Walsh-Hadamard transform (FWHT) and, the singular value decomposition (SVD). In this paper, three watermark images of sizes 512x 512 were inserted into a single medical image of various modalities such as magnetic resonance imaging (MRI), computed tomography (CT), and X-Radiation (X-ray). After applying DWT up to the third level on t
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Walsh-Hadamard transformation"

1

Kurnaz, Guzin. "Covering Sequences And T,k Bentness Criteria." Phd thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12610504/index.pdf.

Full text
Abstract:
This dissertation deals with some crucial building blocks of cryptosystems in symmetric cryptography<br>namely the Boolean functions that produce a single-bit result for each possible value of the m-bit input vector, where m&gt<br>1. Objectives in this study are two-fold<br>the first objective is to develop relations between cryptographic properties of Boolean functions, and the second one is to form new concepts that associate coding theory with cryptology. For the first objective, we concentrate on the cryptographic properties of Boolean functions such as balancedness, correlation immunity,
APA, Harvard, Vancouver, ISO, and other styles
2

Sulak, Fatih. "Constructions Of Bent Functions." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607035/index.pdf.

Full text
Abstract:
In cryptography especially in block cipher design, Boolean functions are the basic elements. A cryptographic function should have high nonlinearity as it can be attacked by linear attack. In this thesis the highest possible nonlinear boolean functions in the even dimension, that is bent functions, basic properties and construction methods of bent functions are studied. Also normal bent functions and generalized bent functions are presented.
APA, Harvard, Vancouver, ISO, and other styles
3

Sertkaya, Isa. "Nonlinearity Preserving Post-transformations." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/12605183/index.pdf.

Full text
Abstract:
Boolean functions are accepted to be cryptographically strong if they satisfy some common pre-determined criteria. It is expected that any design criteria should remain invariant under a large group of transformations due to the theory of similarity of secrecy systems proposed by Shannon. One of the most important design criteria for cryptographically strong Boolean functions is the nonlinearity criterion. Meier and Staffelbach studied nonlinearity preserving transformations, by considering the invertible transformations acting on the arguments of Boolean functions, namely the pre-transformati
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Walsh-Hadamard transformation"

1

Fattouche, Michel Tawfik. Walsh-Hadamard representation of finite memory transformations. 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Walsh-Hadamard transformation"

1

Devi, Dharmavaram Asha, Yeshala Siri Chandana, and Manda Akshitha. "Analysis of Walsh-Hadamard Transformation with CFBMC Communication." In 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS). IEEE, 2021. http://dx.doi.org/10.1109/icais50930.2021.9395842.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dolev, S., S. Frenkel, and A. Hanemann. "Towards holographic "brain" memory based on randomization and Walsh-Hadamard transformation." In PHYSICS, COMPUTATION, AND THE MIND - ADVANCES AND CHALLENGES AT INTERFACES: Proceedings of the 12th Granada Seminar on Computational and Statistical Physics. AIP, 2013. http://dx.doi.org/10.1063/1.4776518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bronnikov, Andrey V., Alexander N. Malov, and Aleksandr N. Onackiy. "Digital Foucault knife as a phase manipulation in the Walsh-Hadamard image transformations." In SPIE Proceedings, edited by Yuri N. Kulchin, Jinping Ou, Oleg B. Vitrik, and Zhi Zhou. SPIE, 2007. http://dx.doi.org/10.1117/12.725796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!