ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Education
Social Sciences
Communication
Literature
Languages
Research
Architecture and Urbanism
Computing
Economy
Technology
all records (74)

Languages
English
Portuguese
Spanish
French
German

Countries
Brazil
Indonesia
USA
Spain
Ukraine
Chile
Switzerland
Argentina
Italy
South Africa
all records (74)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
45.326  Articles
1 of 4.534 pages  |  10  records  |  more records»
Purpose: Steganography is the science of writing hidden or hiding messages so that apart from the sender and the recipient, no one can know or realize that a message is hidden. This paper aims to analyze the method of advanced LSB to increase message capa... see more

A technique for face detection in the image is proposed, which is based on binarization, scaling, and segmentation of the image, followed by the determination of the largest connected component that matches the image of the face.Modern methods of bin... see more

The length of ballistic target is one of the most important features for target recognition. It can be extracted from ISAR Images. Unlike from the optical image, the length extraction from ISAR image has two difficulties. The first one is that it is hard ... see more

This article aims to test FOS (first-order statistical) in extracting features of embryonated eggs. This test uses the initial step of image processing to get the best input image in feature extraction. The image processing method starts from the image ac... see more

The digital image processing technique is a product of computing technology development. Medical image data processing based on a computer is a product of computing technology development that can help a doctor to diagnose and observe a patient. This stud... see more

A number of algorithms have been reported to process and remove geometric distortions in satellite images. Ortho-correction, geometric error correction, radiometric error removal, etc are a few important examples. These algorithm require supplementary me... see more

Cross Stitch is one kind of embroidery that makes stitching forming a cross sign (X). To begin a cross stitch, we need a pattern. Although cross stitch stores have already provided so many cross stitch patterns, sometimes consumer wants another pattern wh... see more

Blind/no-reference image quality assessment is performed to accurately evaluate the perceptual quality of a distorted image without prior information from a reference image. In this paper, an effective blind image quality assessment approach based on entr... see more

Robustness and discriminability are the two most important features of perceptual image hashing (PIH) schemes. In order to achieve a good balance between perceptual robustness and discriminability, a novel PIH algorithm is proposed by combining latent low... see more

1 of 4.534 pages  |  10  records  |  more records»