-
241
HVS-based rate-control scheme for object-based embedded image coding
Published 2012-04-01“…A new rate control algorithm for object-based embedded coding was proposed by incorporating the characteristics of human visual systems (HVS).Firstly,the importance and coding priority of each visual object were estimated.Then,bit-plane modeling and entropy coding were implemented for each object based on the coding priority and its corresponding bit stream was outputted.Finally,bit streams of visual objects were truncated and reassembled based on the rate-distortion optimization principle under the given bit rate.Experimental results reveal that the proposed algorithm can encode and transmit different important objects with different strategies.Compared with the PCRD algorithm,the proposed algorithm can improve the overall visual quality of the reconstructed image.…”
Get full text
Article -
242
An improved particle swarm optimization for multilevel thresholding medical image segmentation.
Published 2024-01-01“…In the part of experiments, this paper used nine high-bit depth benchmark images to test the CIWP-PSO effectiveness. …”
Get full text
Article -
243
Approximate CNN Hardware Accelerators for Resource Constrained Devices
Published 2025-01-01“…Our proposed architectures are validated for functionality through an image classification application, utilising the popular MNIST dataset for 8-bit, 16-bit and 32-bit operational word size. Performance analysis of our proposed architectures show that the 32-bit FHA consumes 307.04pJ of energy while achieving acceleration of 76.91x. …”
Get full text
Article -
244
RFSoC Modulation Classification With Streaming CNN: Data Set Generation & Quantized-Aware Training
Published 2025-01-01“…Furthermore, we explore quantised-aware training, producing three modulation classification models with different fixed-point weight precisions (16-bit, 8-bit, and 4-bit). We interface with the implemented hardware through the open-source PYNQ project, which combines Python with programmable logic interaction, enabling real-time modulation prediction via a PYNQ-enabled Jupyter app. …”
Get full text
Article -
245
Block Markov superposition transmission over turbulence channels in outdoor optical wireless communication
Published 2017-07-01“…Based on the equivalent genie-aided system,the bit-error rate of the block Markov superposition transmission system was analyzed and the union bound of the bit-error rate of the genie-aided system was derived.When the bit-error rate was extremely low at which the Monte Carlo simulation was time-consuming,the union bound could be adopted to evaluate the performance of the block Markov superposition transmission system.Simulations under turbulence conditions from weak to strong are performed which show that,in the low bit-error rate region,performance of the block Markov superposition transmission system matches well with the lower bound.It is also illustrated that the derived union bound matches well with Monte Carlo simulation result.At the BER of 10<sup>-5</sup>,block Markov superposition transmission system with transmission memory 2 performs within 1 dB away from the Shannon limit.…”
Get full text
Article -
246
Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited
Published 2022-01-01“…The implementation shows that the sizes of the hash‐and‐sign signature scheme can be reduced to 3.67 kB for an estimation of 81.67‐bit security, and 9.97 kB for an estimation of 168.81‐bit security. …”
Get full text
Article -
247
Pengamanan Citra Digital Menggunakan Kriptografi DnaDan Modified LSB
Published 2024-12-01“…Setelah enkripsi, ciphertext disembunyikan dalam citra sampul menggunakan teknik steganografi Modified Least Significant Bit (MLSB), yang mengoptimalkan penyisipan bit di saluran RGB dengan pemilihan piksel acak menggunakan generator modulo. …”
Get full text
Article -
248
Evading Antivirus Detection Using Fountain Code-Based Techniques for Executing Shellcodes
Published 2025-01-01“…The Meterpreter framework for Microsoft Windows 32-bit and 64-bit architectures was used to produce the shellcode used in this investigation. …”
Get full text
Article -
249
Optimal Design Parameters of a Percussive Drilling System for Efficiency Improvement
Published 2018-01-01“…This paper aims to determine the optimal design parameters for percussive drilling systems considering the bit-rock interaction. First, the motion dynamics of a bit impacted by a dropped piston are modeled by impact stress propagation and a rock-breaking mechanism representing the penetration resistance coefficient and unloading constant. …”
Get full text
Article -
250
Confidential communication scheme based on uncertainty of underwater noisy channels
Published 2019-04-01“…Aiming at the influence of the uncertainty of underwater noise on information transmission and the security problem of the communication over noisy channels,a confidential communication scheme based on the uncertainty of underwater noisy channels was proposed.The proposed scheme was composed of an interactive key extraction protocol based on Godel’s code and a privacy amplification protocol based on r-circulant Toeplitz matrix.During the process of key extraction,the key sequence comparing number was reduced through the Godel’s code.When calculating the key length after privacy amplification,the uncertainty of underwater noise was considered to make the proposed scheme more practical.Experimental results show that under the condition of satisfying protocol security,it takes 11.99 s to transmit 119 940 bit string where the lower bound of the generated secret key length is 117 331 bit after privacy amplification and the upper bound of the adversary’s information about the secret key is 2 609 bit.Moreover,the proposed scheme (nt+s)×(nt+s)-order r-circulant Toeplitz matrix decreases(nt+s)-1 bit memory space compared to the traditional Toeplitz matrix with the same order.…”
Get full text
Article -
251
Implemetasi Komputasi Akar Kuadrat Resolusi Tinggi pada Field Programmable Gate Array (FPGA)
Published 2022-12-01“…Sistem tersebut diimplementasikan menggunakan 32-bit input dan 16-bit output. Proses perhitungan melibatkan Finite State machine (FSM) untuk menghemat resource yang diperlukan. …”
Get full text
Article -
252
Prediction Model of Drilling Performance for Percussive Rock Drilling Tool
Published 2020-01-01“…A pneumatic dynamic model of the DTH hammer was developed that considers the mass flow rate relations representing the orifice opening areas of the air tube, the piston, and bit flushing channels. A drill bit motion model was developed to represent the dynamics of a drill bit impacted by a dropped piston and explain the impact stress propagation and rock-crushing mechanism. …”
Get full text
Article -
253
Reversible data hiding in encrypted images based on additive homomorphic encryption and multi-MSB embedding
Published 2023-08-01“…Reversible Data Hiding in Encrypted Images (RDHEI) combines image encryption and reversible data hiding to improve the security and information transmission efficiency for the network transmission of images.In RDHEI, the conventional bit-by-bit encryption destroys the spatial correlation in an original image and has side effects on the preservation of embedding spaces.An approach for RHDEI was proposed, which utilized additive homomorphic encryption and a multi-MSB (Most Significant Bit) embedding strategy to create room within the encryption process.The original image was divided into non-overlapped blocks, and each block was subjected to the same key for additive homomorphic encryption.This helped transfer the pixel correlation within an original block to the encrypted image block as much as possible.To enhance security, the encrypted image was further subjected to an Arnold transformation on a block-by-block basis.The decision of whether data will be embedded in a block and the embedding capacity were determined by the pixel differences within the block and the predicted values.When a block was selected for embedding, a small number of LSBs (Least Significant Bits) were used to store the prediction differences, ensuring reversibility.The redundant multi-MSBs were embedded with secret information by bit replacement.For the possible errors caused by multi-MSBs prediction, an embedding position selection strategy was designed by vacating MSBs in terms of the values of prediction errors, then more MSBs were reserved for those pixels with less prediction errors.During decryption, the secret information can be accurately extracted from the multiple MSBs of the pixels in a block, and the image content can be losslessly recovered using the number of embedded multi-MSBs, predicted values, and prediction differences.Experimental results on the BOWS-2 image dataset demonstrate that the average embedding capacity is improved to 2.58 bit/pixel, surpassing existing methods.…”
Get full text
Article -
254
Two-Party Quantum Private Comparison Protocol for Direct Secret Comparison
Published 2025-01-01“…Compared with existing QPC protocols that employ bit-to-bit comparison methods, our approach offers improved practicality and scalability. …”
Get full text
Article -
255
The Security Weakness of Block Cipher Piccolo against Fault Analysis
Published 2014-03-01“…Piccolo is a 64-bit lightweight block cipher which is able to be implemented in constrained hardware environments such as a wireless sensor network. …”
Get full text
Article -
256
Rate control algorithm for no-feedback distributed video coding
Published 2014-06-01“…In order to address the high requirement of accuracy on rate estimation in the existed bit-plane-level encoder rate control (ERC) methods, a frame-level ERC algorithm was proposed. …”
Get full text
Article -
257
A Novel FM-DCSK Secure Communication System
Published 2015-01-01“…The bit energy of chaotic signals in DCSK system is not stable,which will cause the estimation interference and the bit error rate decline. …”
Get full text
Article -
258
A Jointly Optimized Variable M-QAM and Power Allocation Scheme for Image Transmission
Published 2012-01-01“…In this optimization process, the significance of bits with regard to the overall quality of the image is exploited. …”
Get full text
Article -
259
Design and evaluation of clock-gating-based approximate multiplier for error-tolerant applications
Published 2025-04-01“…In this study, approximate multipliers (AMs) are designed using both conventional and approximate half adders (A-HAs) and full adders (A-FAs), which are strategically placed to add partial products at the most significant bit (MSB) positions, and OR gates are used to add partial products at the lower significant bit (LSB). …”
Get full text
Article -
260