The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a new multi-resolution fusion algorithm for spatially registered multi-sensor images fusion. First, we use a modified watershed algorithm to produce a region map of source images. This segmentation is then used to generate region-based decision map, which is obtained based on local texture features in the dual-tree discrete wavelet transform domain. The region-based decision...
The pure SVD based watermarking scheme does not have high data payload and high security. In this paper, we proposed a new robust multi image-watermarking scheme based on framelet and SVD. It mainly addresses the multi-user problem in digital rights management. framelet transform (first level) is applied to the gray scale cover image resulting in eight-detailed band (H1L, H2L, LH1, H1H1, H2H1, LH2,...
In this paper we propose a method for combining wavelet denoising and sequential approach for detecting change points on mobile phone based on detailed call records. The Minmax method is used to estimate the thresholds of frequency and call duration for denoising. This work is useful to enhance homeland security, detecting unwanted calls (e.g., spam) and commercial purposes. For validation of our...
In order to improve the invisibility and the robustness of semi-fragile watermarking, the paper first brings up the idea which embedding watermark based on the attackspsila characteristic, brings forward the region segmentation operator and the double-step embedding method. The paper puts forward the characteristic and its representation in DWT transform domain based on visual features model, and...
This work presents a fast algorithm, namely 2-D symmetric mask-based discrete wavelet transform (SMDWT), to address some critical issues of the 2-D discrete wavelet transform (DWT). Unlike the traditional DWT involving dependent decompositions, the SMDWT itself is subband processing independent, which can significantly reduce complexity. Moreover, DWT cannot directly obtain target subbands, which...
Neural recordings from high-density microelectrode arrays implanted in the cortex require time-frequency domain processing to alleviate the data telemetry bottlenecks of bandwidth and power. Our previous work has shown that the energy compaction capability of the discrete wavelet transform (DWT) offers a practical data compression solution that faithfully preserves the information in the neural signals...
In this paper, we proposed a new non blind robust digital watermarking algorithm for embedding binary image watermark in grayscale images. For embedding procedure, three levels discrete wavelet transform of cover image is computed. Afterward the watermark image is added in the high-high (HH), low-high (LH) and high-low (HL) subbands using a threshold coefficients. The low-low (LL) subband coefficients...
The Hilbert transform (HT) can improve the resolution of motor current signature analysis (MCSA), especially at very low slip, because it converts the supply frequency into a continuous component, which can be easily removed to better detect fault harmonics. This paper proposes its application also during speed transients, with two key advantages: first, it allows an easy filtering of the transient...
Stroke, which is seen nowadays frequently, is the rapidly developing loss of brain functions due to a disturbance in the blood vessels supplying blood to the brain. The main reason for the stroke is the emboli which are particles bigger than red blood cells. Emboli can be detected by Doppler ultrasound. Embolic Doppler ultrasound signals are short duration transient like signals. These signals can...
The available fusion methods for infrared and visible image (such as: principal component analysis, contrast pyramid decomposition, wavelet transform, and so on), their fusion rules could not be adjusted according to the purpose of the following use of images. Reference of the data assimilation ideas in meteorology, it means that observation data and numerical simulation data are integrated to obtain...
A new approach by using discrete multi-wavelet transform to remote sensing image denoising is presented. The wavelet theories have given rise to the wavelet thresholding method, for extracting a signal from noisy data. Multi-wavelets can offer simultaneous orthogonality, symmetry and short support, and these properties make multi-wavelets more suitable for various image processing applications, especially...
In this study, developing of a different model estimating of alertness level has been studied by using electroencephalogram (EEG) signals recorded during transition from wakefulness to sleep. Developed model is composed of discrete wavelet transform-entropy pair (feature extractor) and multilayer perceptron neural network (classifier). This study, basically, comprises of two stages. In the first stage,...
This work is about the possible effects of protection devices and schemes during current transformer saturation. If current transformer specifications are not selected properly, saturation may occur and affect relay response or even fail to trip. Hence, the performance of the protection devices such as differential and impedance relays is mainly based on the operating condition of the current transformers...
This paper presents a new compound image watermarking method, embedding both robust watermark and fragile watermark to one image, so that it can not only convey the ownership but also justify whether the source image is tampered. Firstly, the robust watermark is embedded in the intermediate frequency of DDWT and SVD of the original image. Next, the fragile watermark is adaptively embedded into spatial...
Identification and verification of a video clip via its hash find application in broadcast monitoring. For broadcast monitoring, a novel method for computing a robust hash from video clips, being secret key based, is proposed based on the 3-D Discrete Wavelet Transform (3D-DWT) and median quantization. The proposed hash function is shown to be remarkably robust against video modifications and lossy...
In this paper, a DWT-based video watermark algorithm has been proposed to carry on three-DWT to the video frame after the scene analysis, the using of genetic algorithm to insert the watermark image that has been scrambled by Arnold scrambling algorithm ensures the hidden data visually invisibility. Blind watermark algorithm is used when it extracts watermark image. The experimental results illustrate...
In this paper, we propose a watermarking algorithm for color image based DCT and DWT. A binary image as watermark is embedded into green component or blue component of color image. The algorithm can satisfy the transparence and robustness of the watermarking system very well. The experiment based on this algorithm demonstrates that the watermarking is robust to the common signal processing techniques...
Detection, localization and quantification of voltage and current disturbances are important tasks in monitoring and protection of distribution systems. The concept of discrete wavelet transform for feature extraction of power quality disturbance signals has been incorporated as a powerful tool for detecting and classifying power quality problems. This paper presents the ability of multiresolution...
It is well known in transform coding that the Karhunen-Loeve transform (KLT) can be suboptimal for non Gaussian sources. However in many applications using JPEG2000 Part 2 codecs, the KLT is generally considered as the optimal linear transform for reducing redundancies between components of hyperspectral images. In previous works, optimal spectral transforms (OST) compatible with the JPEG2000 Part...
Steganography gained importance in the past few years due to the increasing need for providing secrecy in an open environment like the internet. With almost anyone can observe the communicated data all around, steganography attempts to hide the very existence of the message and make communication undetectable. Many techniques are used to secure information such as cryptography that aims to scramble...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.