Contents
Academic literature on the topic 'Hashing algorithm used in LZSS compression'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hashing algorithm used in LZSS compression.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Hashing algorithm used in LZSS compression"
Hodovychenko, Mykola A., Svitlana G. Antoshchuk, and Varvara I. Kuvaieva. "Methodology for image retrieval based on binary space partitioning and perceptual image hashing." Applied Aspects of Information Technology 5, no. 2 (July 4, 2022): 136–46. http://dx.doi.org/10.15276/aait.05.2022.10.
Full textSakan, Kairat, Saule Nyssanbayeva, Nursulu Kapalova, Kunbolat Algazy, Ardabek Khompysh, and Dilmukhanbet Dyusenbayev. "Development and analysis of the new hashing algorithm based on block cipher." Eastern-European Journal of Enterprise Technologies 2, no. 9 (116) (April 30, 2022): 60–73. http://dx.doi.org/10.15587/1729-4061.2022.252060.
Full textAlgazy, Kunbolat, Kairat Sakan, and Nursulu Kapalova. "Evaluation of the strength and performance of a new hashing algorithm based on a block cipher." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (June 1, 2023): 3124. http://dx.doi.org/10.11591/ijece.v13i3.pp3124-3130.
Full textZhang, LiMing, and XinGang Zhang. "New Authentication Method for Vector Geographic Data Based on Perceptual Hash." Abstracts of the ICA 1 (July 15, 2019): 1–2. http://dx.doi.org/10.5194/ica-abs-1-431-2019.
Full textChandra, M. Edo. "IMPEMENTASI ALGORITMA LEMPEL ZIV STORER SZYMANSKI (LZSS) PADA APLIKASI BACAAN SHALAT BERBASIS ANDROID." KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) 3, no. 1 (November 25, 2019). http://dx.doi.org/10.30865/komik.v3i1.1624.
Full textMohan, Prakash, Manikandan Sundaram, Sambit Satpathy, and Sanchali Das. "An efficient technique for cloud storage using secured de-duplication algorithm." Journal of Intelligent & Fuzzy Systems, July 27, 2021, 1–12. http://dx.doi.org/10.3233/jifs-210038.
Full textChaitanya, Kakarla, M. Prasanth, Saisrinivasreddy V. Saisrinivasreddy, and Senthil Kumar V. Kumar. "Securing of aes based on secure hash algorithm for image steganography." International journal of health sciences, March 26, 2022, 1489–99. http://dx.doi.org/10.53730/ijhs.v6ns2.5107.
Full textDissertations / Theses on the topic "Hashing algorithm used in LZSS compression"
Mathur, Milind. "ANALYSIS OF PARALLEL LEMPEL-ZIV COMPRESSION USING CUDA." Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/14425.
Full text