The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Video watermarking is must for data security in today's developing world. It is a big challenge as it has too much of data handling and also many compression techniques that may hamper the watermark due to their compression strategies. Thus, in real situations, watermark extraction and providing video security becomes very difficult. Hence, it is essential to have a simple and elegant method of video...
E-healthcare is emerging as a new technology for monitoring vital body parameters of patient having chronic disease or during disaster. Wireless Body Area Network (WBAN) is one such technology that is improving the quality of health care. WBAN has personal patient data. Attackers can access this data from Wireless Sensor Nodes (WSNs) or from the wireless channel between nodes and server; this requires...
Microwave energy has the ability to heat the area of diseased tissue and it can be used for the local hyperthermia. Now a days hyperthermia is used to treat the cancer tumor and it is verified by several clinical trials. Depending upon the size and position of the target tumor several types of antennas are proposed by researchers. In this paper, we have designed coaxial slot antenna with operating...
In this paper, an highly effective algorithm for copyright protection is proposed using a simple and efficient embedding technique for DWT-based video watermarking for indoor video watermarking applications. Discrete Wavelet Transform (DWT) is applied on the video frame to achieve frequency domain representation of video sequences. The frequency domain representations of DWT are low pass and high...
In this paper, an effective algorithm for providing copyright protection is proposed by using a new embedding strategy for Discrete Wavelet Transform-based video watermarking. Discrete Wavelet Transform (DWT) is applied on the video, to convert the spatial data into frequency domain, having low pass and high pass components. The low frequency component is used for generating the key, by using the...
This papers deals with an efficient image compression technique for images having low dynamic range. The images with low dynamic range generally have low intensity variations. By considering this fundamental characteristic into account we can go for image compression at higher ratio with small modifications to the existing block based EZW algorithm. To achieve the improvement in compression ratio,...
This papers deals with improved image compression technique for images having low dynamic range. It is a well known fact that the dynamic range of the images having low intensity variations is less. So by considering this fundamental characteristic into account we can go for image compression at higher ratio with small modifications to the existing algorithms. To achieve the higher compression ratio,...
Sign language is the language of the people with hearing and speaking disabilities. In it mostly hands are moved in a particular way which along with some facial expression produces a meaningful thought which the speaker would like to convey to others. Using the sign language people with speaking and hearing disabilities can communicate with others who know the language very easily but it becomes...
In this digital era medical image security is important as they carry highly personal data, which should be kept away from the hackers and unauthorized persons, as these images are transmitted/stored among hospitals and also by health insurance companies. Chaos based cryptography/security has been increased in recent years. In this paper we proposed an algorithm, in which security can be given along...
Moving object detection is very important in modern world for fast video surveillance. There are various methods used for detecting moving objects out of which frame differencing method is widely used and is most efficient method. In this paper we focus on the surveillance at the most secured areas such as airports, defense establishments, power stations etc. Similarly, the area where no human is...
In this paper, two compression mechanisms based on 3D-Discrete Wavelet Transform (DWT) and 2D Embedded Zero Wavelet (EZW) are compared depending on the mathematical parameters Peak Signal-to-Noise Ratio (PSNR) and compression ratio(CR). In this paper, we are using Haar wavelet decomposition for compression, as it has shown improved compression in recent years when used with the techniques like EZW,...
In this paper, two video compression mechanisms based on 3D-Discrete Wavelet Transform (DWT) and 2D Embedded Zero Wavelet (EZW) are compared depending on the mathematical parameters i.e., Peak Signal-to-Noise Ratio (PSNR) and compression ratio(CR)to that of the standard mechanism. In this paper, we are using Haar wavelet decomposition along with standard EZW for compression, as it has shown improved...
Moving object detection is very important in modern world for fast video surveillance. There are various methods used for detecting moving objects out of which frame differencing method is widely used and is most efficient method. In this paper we focus on the surveillance at the most secured areas such as airports, defense establishments, power stations etc. Similarly, the area where no human is...
Moving object detection is very important in modern world for fast video surveillance. There are various methods used for detecting moving objects out of which frame differencing method is widely used and is most efficient method. In this paper we focus on the surveillance at the most secured areas such as airports, defense establishments, power stations etc. Similarly, the area where no human is...
In this paper, an analysis of the elapsed time and PSNR for encoding and decoding the videos in different sampling formats of YCBCR i.e. 4:4:4, 4:2:2 and 4:2:0 is proposed. The main algorithm of codec's is Motion-JPEG. The experimental result of comparison shows that the 4:2:0 format take less time for encoding as well as decoding and has comparable signal to noise ratio with that of 4:2:2 and 4:4:4...
This paper deals with the image security along with compression. Here we have proposed an algorithm using chaos on EZW compression technique to provide security along with image compression. We had chosen chaos for image security due to its robustness to initial condition and mixing property. Our process of providing image security starts with compressing the image using EZW. The output sequence of...
This paper deals with the application of Spatial and Temporal DWT (Discrete Wavelet transform) on the videos. Here we will discuss about three mechanisms and their performance on videos at increased DWT level. In any video processing algorithm, memory is the major criteria. In these three mechanisms dynamic (automatic) DWT level selection and manual level selection is implemented. Here we will also...
Moving object detection is fundamental step for automated surveillance system. Generally object detection is performed by some detectors or background subtraction technique. Ultimate aim to detect an object is to detect its edges from the background. There are different methods available for the edge detection of the object. In this paper we propose an idea to detect the edges of the moving object...
In the modern era of the coal fired boilers combustion optimization plays a vital role for increasing the boiler efficiency and reducing the production of hazardous waste gases like NOX, SOX etc. Hence to optimize the combustion there are different ways to control the parameters of boiler combustion like 3T method, which includes Time, Temperature and Turbulence. Each of them can be controlled by...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.