Loading...
  • Home
  • Search Results
2413-2414 of 4327 Papers

HYBRID ALGORITHMIC APPROACH FOR MEDICAL IMAGE COMPRESSION BASED ON DISCRETE WAVELET TRANSFORM (DWT) AND HUFFMAN TECHNIQUES FOR CLOUD COMPUTING

Published In: 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, CONTROL AND NETWORKING
Author(s): ASHWIN DHIVAKAR M R , D. RAVICHANDRAN , VIJAY DAKHA

Abstract: As medical imaging facilities move towards complete filmless imaging and also generate a large volume of image data through various advance medical modalities, the ability to store, share and transfer images on a cloud-based system is essential for maximizing efficiencies. The major issue that arises in teleradiology is the difficulty of transmitting large volume of medical data with relatively low bandwidth. Image compression techniques have increased the viability by reducing the bandwidth requirement and cost-effective delivery of medical images for primary diagnosis.Wavelet transformation is widely used in the fields of image compression because they allow analysis of images at various levels of resolution and good characteristics. The algorithm what is discussed in this paper employs wavelet toolbox of MATLAB. Multilevel decomposition of the original image is performed by using Haar wavelet transform and then image is quantified and coded based on Huffman technique. The wavelet pa

  • Publication Date: 29-Aug-2015
  • DOI: 10.15224/978-1-63248-073-6-07
  • Views: 0
  • Downloads: 0

APPLICATIONS OF VISUAL CRYPTOGRAPHIC SCHEME

Published In: 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, CONTROL AND NETWORKING
Author(s): JYOTI RAO , VIKRAM PATIL

Abstract: Visual Cryptography is a special kind of cryptographic scheme where the decryption of the encrypted secret is done by the human vision and not by complex mathematical calculations. Visual Cryptography deals with any secrets such as printed or pictures, etc. These secrets are fed into the system in a digital (image) form. The digital form of the secrets is then divided into different parts based on the pixel of the digital secret. These parts are called shares. The shares are then overlapped correctly to visualize the secret. Visual Cryptography is a very creative technique of sharing secrets. It is generally used either for sharing any secret among individuals or is used for authentication purpose. It can be used in different fields and different area to ensure security. This paper is a compilation some of the major applicable areas of Visual Cryptography. There are still many areas which have not been coupled with Visual Cryptography which otherwise would prove beneficial.

  • Publication Date: 29-Aug-2015
  • DOI: 10.15224/978-1-63248-073-6-08
  • Views: 0
  • Downloads: 0