The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As compared with text spam, the image spam is a variant which is invented to escape from traditional text-based spam classification and filtering. Various approaches to image spam filtering have been proposed with respective advantages and drawbacks in terms of time cost and efficiency. In this paper, we propose a new approach based on Base64 encoding of image files and n-gram technique for feature...
A formal facial image compression algorithm is proposed in this paper. Object segmentation techniques is used to locate the facial region firstly. An adapted version of the original Viola-Jones face detector is used to locate eyes and mouth. The position of chin is estimated and then checked according to the curve in the edge image. Secondly, the background is reassigned to decrease unvaluable information...
A typical consumer digital camera uses a Color Filter Array (CFA) to sense only one color component per image pixel. The original three-color image is reconstructed by interpolating the missing color components. This interpolation process (known as demosaicing) corresponds to solving an under-determined system of linear equations. In this paper, we show that by replacing the traditional CFA with a...
Based on the image edges non-changing characteristic in image format transformation, a new digital watermarking algorithm for huge index image is proposed. The watermarking information was embedded in edges by adjusting the edge pixels; therefore, the algorithm is robust against the lossless image format transformation. The experimental results show that the proposed algorithm has perfect Robustness...
Video is an important medium for the observation of a variety of phenomena in the physical world such as for water conservancy engineering. Video sensor networks (VSN) consists of a large number of sensor nodes with cheap CMOS cameras, therefore, it has the ability of large scale visual monitoring. However, a kind of powerful and scalable platform is urgent for simulation and development of VSN. This...
In this paper, an efficient watermarking algorithm for color image is proposed based on HSI color space and Discrete Wavelet Transform (DWT). The color image is firstly converted from RGB to HSI format to obtain the intensity component. Then sub-blocks of intensity are divided and sorted according to the human visual system (HVS) characteristic. Finally, the scrambled binary watermark, which is achieved...
At present, screen image compression techniques are mostly designed for computer desktop, and there is still much room for improvement of the image compression quality and compression ratio, etc. when applied to scientific instruments workstation screen image. In order to solve such problems, this paper puts forward a kind of compression method applicable to scientific instruments workstation screen...
The goal of anti-forensic technique is to hide manipulation traces. We present a scheme of Color Filter Array (CFA) synthesis in digital images via dictionary re-demosaicing. This is an anti-forensic technique to be against a plurality of forensic methods based on CFA structure detection in images. First, through sparse representation on a manipulated image, a dictionary is obtained. Then, arbitrary...
To reduce the storage and transmission requirements in image applications, images are compressed while maintaining acceptable visual quality. In this paper, image retrieval using Vector Quantization (VQ) is explored. The VQ technique is tested on uncompressed images (UCID) as well as compressed images (JPG). In order to reduce the retrieval time, the images are converted into thumbnails and the retrieval...
To reduce the storage and transmission requirements in image applications, images are compressed while maintaining acceptable visual quality. In this paper, image retrieval using vector quantization (VQ) is explored. The VQ technique is tested on uncompressed images (UCID) as well as compressed images (JPG). In order to reduce the retrieval time, the images are converted into thumbnails and the retrieval...
The dynamic response of chaotic system is unpredictable and highly sensitive to the variation of initial values of a system. Therefore, the distinguished elements of variables applied to produce encryption codes for the color-image encryption can increase the communication security. This paper proposed a hybrid encryption technique for the color image based on the multi-chaotic-system which combines...
The traditional JPEG compression standard, unlike JPEG2000, does not prescribe a means for spatially-variable quantization of transform coefficients. This prevents useful features such as region-of-interest (ROI) coding, where, for example, the subject in a photograph may be lightly compressed while the background is heavily compressed to hide irrelevant details. In this paper, we show how the quantization...
Ownership authentication of image attended a careful attention due to global availability of internet services. Illegal copying and misappropriation of digital image leads cyber crime in an epidemic form. In aforesaid regard we've already proposed different fragile color image authentication schemes which guarantees ownership of an image through embedding color watermarks into color host images. In...
Recently, as the fast development of the computer network communication technology, itpsilas more and more convenient for the digital information storage and transmission. Therefore, more and more attention is focused on the copyright protection of digital information. An algorithm that gray image as watermark is embedded in original color-image is introduced. This algorithm thinks over both unobtrusiveness...
This paper proposes a novel spatial domain color digital watermarking scheme based on chaotic maps, and the host image is color RGB image. Using Lorenz map and the Arnold cat map encrypt the watermark signal and the embedding position of the host image each other. The color space of the color host image is first converted from RGB to YCbCr. In order to resist JPEG compression, all three watermark...
JPEG 2000 is a new image coding system that delivers superior compression performance and provides many advanced features in scalability, flexibility, and system functionalities that outperform all previous standards. It brings exciting possibilities to many imaging applications such as the Internet, wireless, security, and digital cinema. This paper gives an overview of this triumph in innovations...
The easiness of data-flow in digital media, seriously claims the ownership of intellectual material. To solve this problem, researchers have worked on different watermarking methods to embed ownership data into original signals. Unfortunately, none of the available techniques have been able to assure an acceptable level of security. Though, recently some senior members of the image processing community...
News, magazines, Web pages, etc. in modern life always contain much text information. In this paper, we propose a novel approach to detect text in images with very low false alarm rate. First of all, neural network color quantization is used to compact text color. Second, 3D histogram analysis chooses several color candidates, and then extracts each of these color candidates to obtain several bi-level...
The paper proposes a new steganographic model for secret data communication. A stack of four modules is used. The "compression module" gives the benefit of entropy coding. The "cryptographic module" provides confidentiality in the communication. To preserve integrity of data, the "hash module" is used with a shared secret key. A technique is proposed in which it is not...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.