The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The quality of images often is affected adversely by illumination and contrast,leading to the need for illumination compensation in image enhancement. The main objective of this paper is to describe how to correct the local contrast in different area of the image so that the invisible features in the dark and bright areas are brought out and made visible to the human eye. Considering the fact that...
Recently, protecting information that is shared or transmitted over the Internet has become a critical issue. Several ways to transfer secret data have been proposed, including visual secret sharing (VSS), which is an efficient technique because the secret data are kept by a group of participants, rather than one person, so that they cannot be lost. In this paper, we proposed a new, visual, secret-sharing...
In this paper, a nucleus and cytoplast contour detector (NCC detector) is presented to automatically detect the cytoplast and nucleus contours of a cell in a cervical smear image. The NCC detector uses the adaptable threshold decision (ATD) method to separate the cell from the cervical smear image, and then uses the maximal gray-level-gradient-difference (MGLGD) method, proposed in this paper, to...
The segmented blood vessel in retinal images is an important indicator in medical treatment. In 2007, Ricci and Perfetti proposed a simple and efficient blood vessel segmentation method based on line operator. However, this scheme makes some false segmentation when it is used to process the pixels which are close to a thick blood vessel. To overcome the above problem, a novel retinal blood vessel...
The wet paper codes method provides a good data embedding technique for secret data delivery. The WPC method applies matrix multiplications to determine modification locations in order to conceal secret data into a cover image. However, the WPC method is not suitable for low power computation environments. The proposed method applies pixel segmentation and exclusive-OR operation to achieve the goal...
In this paper, a good data hiding scheme has been proposed. This scheme embeds messages into a still image based on (Fridrich, et.al; 2005; Dumitrescu, et.al; 2003) Hamming codes oriented wet paper codes . It embeds a segment of three secret bits into a group of seven cover pixels at a time. The experimental results show that the proposed scheme achieves high embedding efficiency and acceptable capacity.
This paper proposes an information hiding method based on block-segmentation strategy. The proposed scheme divides a grayscale image into several 4 times 4 blocks and further segment each block into four small blocks sized 2 times 2. Each small block chooses one reference point to be proceeded with outer embedding process. The chosen points then formed an inner block to be proceeded with inner embedding...
In this paper, we propose a classification mechanism for retinal images so that the retinal images can be successfully distinguished from nonretinal images, egg yolk images for example. The proposed classification mechanism consists of two procedures: training and classification. The image features of retinal images and nonretinal images are extracted at the beginning of the training procedure to...
Protecting data transmitted over the Internet has become a critical issue driven by the progress in data digitalization and communications networking over the past decade. The content being transmitted can be in the form of images, text and voice. To ensure that transmitted data are secure and cannot be tampered with or noticed by malicious attackers, several approaches have been proposed. Steganography...
In this paper, we share and embed secrets with images using secret expansion in such a way that secrets are easily reconstructable from the two shares, but getting any one share reveals no information about the secrets. After the reconstruction scheme, the original image can be completely recovered. The proposed scheme is simple without using any data compression and without any extra information.
High payload information hiding schemes with the good visual quality of stego images are suitable for steganographic applications such as online content distribution systems. This paper proposes a novel steganographic scheme based on the (7, 4) Hamming code for digital images.The proposed scheme embeds a segment of seven secret bits into a group of seven cover pixels at a time. The experimental results...
Demosaicking interpolation and digital zooming are two significant techniques for the quality of enlarged full-color image in resource-constrained single chip devices. This paper proposes an effective demosaicking and zooming algorithm by referencing to the neighboring information. In addition to considering one direction neighboring information to estimate the missing value, the EDZ algorithm develops...
In this paper, we propose a color-based segmentation method that uses the K-means clustering technique to track tumor objects in magnetic resonance (MR) brain images. The key concept in this color-based segmentation algorithm with K-means is to convert a given gray-level MR image into a color space image and then separate the position of tumor objects from other items of an MR image by using K-means...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.