Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,350,554 papers from all fields of science
Search
Sign In
Create Free Account
BitTorrent protocol encryption
Known as:
Bittorrent encryption
, MSE/PE
, Message Stream Encryption
Expand
Protocol encryption (PE), message stream encryption (MSE) or protocol header encrypt (PHE) are related features of some peer-to-peer file-sharing…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
BitComet
BitTorrent (software)
Confidentiality
Disintermediation
Expand
Broader (1)
BitTorrent
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
An Improved JPEG Image Compression Algorithm by Modifying Luminance Quantization Table
Pranab Lamia Alam1
,
Kumar Dhar1
,
Mirza A. F. M. Rashidul Hasan2
,
Mohammed Golam
,
Sarwar Bhuyan3
,
Golam Moktader Daiyan4
2017
Corpus ID: 212455937
Summary JPEG has been widely used for lossy image compression. In this paper, we introduce an improved JPEG compression algorithm…
Expand
2017
2017
Color image encryption using chaotic maps, triangular scrambling, with DNA sequences
Haider M. Al-Mashhadi
,
I. Q. Abduljaleel
International Conference on Communications and…
2017
Corpus ID: 23484633
Applying security to the transmitted image is very important issues, because the transmission channel is open and can be…
Expand
2015
2015
Denoising EEG Signal Using Wavelet Transform
R. Princy
,
P. Thamarai
2015
Corpus ID: 30936540
Electroencephalogram (EEG) signal is the recording of spontaneous electrical activity of the brain over a small interval of time…
Expand
2015
2015
An Advanced Image Encryption Standard Providing Dual Security: Encryption Using Hill Cipher & RGB Image Steganography
Dipanwita Debnath
,
Sumanta K. Deb
,
Dr. Nirmalya Kar
International Conference on Computational…
2015
Corpus ID: 2876007
In this paper, a new steganography method for spatial domain has been proposed, which includes a new mapping technique for the…
Expand
2015
2015
Color image steganography technique using daubechies discrete wavelet transform
A. Shrestha
,
Arun Timalsina
International Conference on Software, Knowledge…
2015
Corpus ID: 10728752
The world in modern days is being more and more tied up to the use of technology for facilitating day to day tasks. In this…
Expand
2013
2013
DCT Based Digital Image Watermarking, De- watermarking & Authentication
Pravin M. Pithiya
2013
Corpus ID: 6199116
This paper introduces an algorithm of digital image watermarking based on Discrete Wavelet Transform (DWT). In this technique the…
Expand
2012
2012
Edge detection of color image using vector morphological operators
Lei Wang
,
Lingbo Yan
Proceedings of 2nd International Conference on…
2012
Corpus ID: 14803112
In order to overcome the drawback which the traditional edge detection methods have high sensitivities to noise, a new edge…
Expand
2012
2012
Hybrid Denoising Method for Removal of Mixed Noise in Medical Images
J. Umamaheswari
2012
Corpus ID: 13567367
Nowadays, Digital image acquisition and processing techniques plays a very important role in current day medical diagnosis…
Expand
2011
2011
Performance Analysis of Distributed Incremental LMS Algorithm with Noisy Links
A. Khalili
,
M. Tinati
,
A. Rastegarnia
Int. J. Distributed Sens. Networks
2011
Corpus ID: 30922684
Recently proposed distributed adaptive estimation algorithms for wireless sensor networks (WSNs) do not consider errors due to…
Expand
2007
2007
Performance implications of periodic key exchanges and packet integrity overhead in an 802.15.4 beacon enabled cluster
J. Misic
,
Fereshteh Amini
,
Moazzam Khan
Int. J. Sens. Networks
2007
Corpus ID: 14103979
In this paper, we describe and evaluate a secure data exchange protocol based on the Zigbee specification and built on top of 802…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE