Lossless image compression techniques: A state-of-the-art survey

MA Rahman, M Hamada - Symmetry, 2019 - mdpi.com
Modern daily life activities result in a huge amount of data, which creates a big challenge for
storing and communicating them. As an example, hospitals produce a huge amount of data …

An improved DWT-SVD domain watermarking for medical information security

A Anand, AK Singh - Computer Communications, 2020 - Elsevier
Exchange of patient record over network required a technique to guarantee security and
privacy for tele-health services. This paper presents an improved watermarking technique …

Silent data corruptions at scale

HD Dixit, S Pendharkar, M Beadon, C Mason… - arXiv preprint arXiv …, 2021 - arxiv.org
Silent Data Corruption (SDC) can have negative impact on large-scale infrastructure
services. SDCs are not captured by error reporting mechanisms within a Central Processing …

Modern lossless compression techniques: Review, comparison and analysis

A Gupta, A Bansal, V Khanduja - 2017 Second International …, 2017 - ieeexplore.ieee.org
With the world drifting more and more towards the social network, the size and amount of
data shared over the internet is increasing day by day. Since the network bandwidth is …

Nodemerge: Template based efficient data reduction for big-data causality analysis

Y Tang, D Li, Z Li, M Zhang, K Jee, X Xiao… - Proceedings of the …, 2018 - dl.acm.org
Today's enterprises are exposed to sophisticated attacks, such as Advanced Persistent
Threats~(APT) attacks, which usually consist of stealthy multiple steps. To counter these …

High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain

AH Ali, LE George, AA Zaidan, MR Mokhtar - Multimedia Tools and …, 2018 - Springer
Abstract Information hiding researchers have been exploring techniques to improve the
security of transmitting sensitive data through an unsecured channel. This paper proposes …

[PDF][PDF] Video quality assessment through PSNR estimation for different compression standards

RG Deshpande, LL Ragha… - Indonesian Journal of …, 2018 - academia.edu
There is a threefold increase in video traffic over internet. Due to this video compression has
become important. Compression of video signals is quiet an interesting task but comes at …

A fog-based application for human activity recognition using personal smart devices

F Concone, GL Re, M Morana - ACM Transactions on Internet …, 2019 - dl.acm.org
The diffusion of heterogeneous smart devices capable of capturing and analysing data
about users, and/or the environment, has encouraged the growth of novel sensing …

Energy-efficient communication using data aggregation and data compression techniques in wireless sensor networks: A survey

S Pushpalatha, KS Shivaprakasha - Advances in Communication, Signal …, 2020 - Springer
Abstract Wireless Sensor Network (WSN) has been emerging as the most promising
technology of future communication. WSNs face numerous research challenges, and one …

[图书][B] Cybercrime and information technology: The computer network infrastructure and computer security, cybersecurity laws, Internet of Things (IoT), and mobile …

A Alexandrou - 2021 - taylorfrancis.com
Cybercrime and Information Technology: Theory and Practice—The Computer Network
Infostructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and …