Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,873,311 papers from all fields of science
Search
Sign In
Create Free Account
BitTorrent protocol encryption
Known as:
Bittorrent encryption
, MSE/PE
, Message Stream Encryption
Expand
Protocol encryption (PE), message stream encryption (MSE) or protocol header encrypt (PHE) are related features of some peer-to-peer file-sharing…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
BitComet
BitTorrent (software)
Confidentiality
Disintermediation
Expand
Broader (1)
BitTorrent
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Effects of Hybrid SVD–DCT Based Image Compression Scheme Using Variable Rank Matrix and Modified Vector Quantization
Mahendra M. Dixit
,
C. Vijaya
2019
Corpus ID: 125613509
The advent of modern image processing concepts and cutting edge solutions, various architectures of image compression have…
Expand
2017
2017
An Improved JPEG Image Compression Algorithm by Modifying Luminance Quantization Table
Pranab Lamia Alam1
,
Kumar Dhar1
,
Mirza A. F. M. Rashidul Hasan2
,
Mohammed Golam
,
Sarwar Bhuyan3
,
Golam Moktader Daiyan4
2017
Corpus ID: 212455937
Summary JPEG has been widely used for lossy image compression. In this paper, we introduce an improved JPEG compression algorithm…
Expand
2017
2017
IMPROVEMENT OF IMAGE APPLYING FUZZY LOGIC
Dr. Akanksha Mishra
,
Aadrika Gupta
,
Ankita Mahaver
2017
Corpus ID: 212486419
This paper presents an idea for improvement of image through super resoluting it, by using a set of Fuzzy Logic Rules. The logic…
Expand
2015
2015
Denoising EEG Signal Using Wavelet Transform
R. Princy
,
P. Thamarai
2015
Corpus ID: 30936540
Electroencephalogram (EEG) signal is the recording of spontaneous electrical activity of the brain over a small interval of time…
Expand
2015
2015
Color image steganography technique using daubechies discrete wavelet transform
A. Shrestha
,
Arun Timalsina
International Conference on Software, Knowledge…
2015
Corpus ID: 10728752
The world in modern days is being more and more tied up to the use of technology for facilitating day to day tasks. In this…
Expand
2014
2014
Noise Reduction in Computed Tomography Image Using WB – Filter
Dr S.Senthilraja
,
Dr P.Suresh
,
M.Suganthi
2014
Corpus ID: 212441137
: Image processing concept play a important role in the field of Medical to diagnosis of diseases. Noise is introduced in the…
Expand
2013
2013
DCT Based Digital Image Watermarking, De- watermarking & Authentication
Pravin M. Pithiya
2013
Corpus ID: 6199116
This paper introduces an algorithm of digital image watermarking based on Discrete Wavelet Transform (DWT). In this technique the…
Expand
2013
2013
SkypeMorph: Protocol Obfuscation for Censorship Resistance
H. M. Moghaddam
2013
Corpus ID: 38376305
The Tor network is designed to provide users with low-latency anonymous communication. Tor clients build circuits with publicly…
Expand
2012
2012
Edge detection of color image using vector morphological operators
Lei Wang
,
Lingbo Yan
Proceedings of 2nd International Conference on…
2012
Corpus ID: 14803112
In order to overcome the drawback which the traditional edge detection methods have high sensitivities to noise, a new edge…
Expand
2011
2011
Performance Analysis of Distributed Incremental LMS Algorithm with Noisy Links
A. Khalili
,
M. Tinati
,
A. Rastegarnia
Int. J. Distributed Sens. Networks
2011
Corpus ID: 30922684
Recently proposed distributed adaptive estimation algorithms for wireless sensor networks (WSNs) do not consider errors due to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required