This paper presents, a wavelet based technique to compress and secure the fused images in a dependent way. The core idea behind the proposed work lies in the selection of significant and less significant information in the wavelet domain. The significant wavelet coefficients are fused using error measurements while the less significant coefficients are fused by using maximum method, the fused information of significant wavelet coefficients is compressed and encrypted using error measurement and pseudo random number sequences, while the less significant fused coefficients are compressed using a quantizing parameter, the quantized values are pseudo randomly permuted and coded using huffman coding. At receiver side, the fused image can be reco...
In this paper we address the fast and efficient compression techniques. Image detection is the compu...
The new method for combining semisoft thresholding rules during wavelet-based data compression of im...
As data is exchanged quickly in electronic way, information security plays a vital role in transmiss...
We propose a new and efficient method to develop secure image-encryption techniques. The new algorit...
We propose a new and efficient method to develop secure image-encryption techniques. The new algorit...
Images can be encrypted in many ways; several techniques have used different encryption methods. In ...
Images can be encrypted in many ways; several techniques have used different encryption methods. In ...
A single imaging sensor, depending on its features and/or viewing position, may not provide all the ...
ABSTRACT: There is rapid development in the multimedia and network technologies where the privacies ...
With the development of information technology, the rapid development of microelectronics technology...
By combining a wavelet transform with chaos scrambling, an image compression and encryption algorith...
Abstract — Nowadays there is development in the multimedia and network technologies. That’s why the ...
The main purpose of image compression is to reduce the memory space or transmission time and that of...
AbstractSteganalysis of high capacity Wavelet based fusion image steganography with encryption, usin...
Abstract: Images can be encrypted with Wavelet with Data Encryption Algorithm to compressed and get...
In this paper we address the fast and efficient compression techniques. Image detection is the compu...
The new method for combining semisoft thresholding rules during wavelet-based data compression of im...
As data is exchanged quickly in electronic way, information security plays a vital role in transmiss...
We propose a new and efficient method to develop secure image-encryption techniques. The new algorit...
We propose a new and efficient method to develop secure image-encryption techniques. The new algorit...
Images can be encrypted in many ways; several techniques have used different encryption methods. In ...
Images can be encrypted in many ways; several techniques have used different encryption methods. In ...
A single imaging sensor, depending on its features and/or viewing position, may not provide all the ...
ABSTRACT: There is rapid development in the multimedia and network technologies where the privacies ...
With the development of information technology, the rapid development of microelectronics technology...
By combining a wavelet transform with chaos scrambling, an image compression and encryption algorith...
Abstract — Nowadays there is development in the multimedia and network technologies. That’s why the ...
The main purpose of image compression is to reduce the memory space or transmission time and that of...
AbstractSteganalysis of high capacity Wavelet based fusion image steganography with encryption, usin...
Abstract: Images can be encrypted with Wavelet with Data Encryption Algorithm to compressed and get...
In this paper we address the fast and efficient compression techniques. Image detection is the compu...
The new method for combining semisoft thresholding rules during wavelet-based data compression of im...
As data is exchanged quickly in electronic way, information security plays a vital role in transmiss...