2020 3rd International Conference on Engineering Technology and Its Applications (IICETA) 2020
DOI: 10.1109/iiceta50496.2020.9318802
|View full text |Cite
|
Sign up to set email alerts
|

A Proposed Image Compression Technique Based on DWT and Predictive Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…The principle, development history, and research status of wavelet transform theory and wavelet image coding technology are systematically discussed. Sadkhan [ 20 ] used the MATLAB wavelet toolbox function to realize the simulation of image compression based on wavelet transform. The researcher expounds the basic principle and development history of artificial neural network in detail, analyzes the network structure and working principle of improving wavelet neural network, and proposes improvement measures for the shortcomings of improving wavelet network.…”
Section: Related Workmentioning
confidence: 99%
“…The principle, development history, and research status of wavelet transform theory and wavelet image coding technology are systematically discussed. Sadkhan [ 20 ] used the MATLAB wavelet toolbox function to realize the simulation of image compression based on wavelet transform. The researcher expounds the basic principle and development history of artificial neural network in detail, analyzes the network structure and working principle of improving wavelet neural network, and proposes improvement measures for the shortcomings of improving wavelet network.…”
Section: Related Workmentioning
confidence: 99%
“…As a result, it is common to feed QKD-derived key material to traditional computationally secure cryptographic algorithms like Advanced Encryption Standard (AES). This broadens the applicability of QKD technology across many critical infrastructures (5G [24] , [25] , [26] , [27] , 6G [28] , [29] , SCADA [30] , and smart grids [31] , [32] , [33] ) and allows it to accommodate users with varying security requirements.
Figure 2 Distribution of the cryptographic key from node A to node D over the QKD network in a hop-by-hop manner.
…”
Section: Introductionmentioning
confidence: 99%
“…In this recent age, for extracting features different techniques have been employed, for example, texture features, Gabor features, co-occurrence matrix, and more [10]. Indeed, Gray Level Cooccurrence Matrix (GLCM) and Local Binary Pattern (LBP) are the most common and robust techniques of texture image description that are widely utilized for analyzing image applications [11,12,24,25,26]. The main objectives of this paper are; LBP, FD, and GLCM are the most common as well as the most efficient techniques to produce high-level features that are used in the literature.…”
Section: Introductionmentioning
confidence: 99%