The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to extract valid information from video, process video data efficiently, and reduce the transfer stress of network, more and more attention is being paid to the video processing technology. The amount of data in video processing is significantly reduced by using video segmentation and key-frame extraction. So, these two technologies have gradually become the focus of research. With the features...
A formal facial image compression algorithm is proposed in this paper. Object segmentation techniques is used to locate the facial region firstly. An adapted version of the original Viola-Jones face detector is used to locate eyes and mouth. The position of chin is estimated and then checked according to the curve in the edge image. Secondly, the background is reassigned to decrease unvaluable information...
The traditional JPEG compression standard, unlike JPEG2000, does not prescribe a means for spatially-variable quantization of transform coefficients. This prevents useful features such as region-of-interest (ROI) coding, where, for example, the subject in a photograph may be lightly compressed while the background is heavily compressed to hide irrelevant details. In this paper, we show how the quantization...
In this paper SVM algorithm is applied to classify the scenery video types in compressed domain. Firstly we extract video sequences randomly from scenery video and detect representative frames from the video sequences; secondly we extract features such as color layout, dominant color, edge histogram and face feature; then according to SVM, representative frames are classified as natural scenery, personality,...
Radio frequency identification (RFID) applications set to play an essential role in object tracking and supply chain management systems. In future RFID technologies are expected that every major retailer will use RFID systems to track the movement of products from suppliers to warehouses, transportation and distribution. The volume of information generated by such systems is enormous. Despite all...
This paper proposes a novel spatial domain color digital watermarking scheme based on chaotic maps, and the host image is color RGB image. Using Lorenz map and the Arnold cat map encrypt the watermark signal and the embedding position of the host image each other. The color space of the color host image is first converted from RGB to YCbCr. In order to resist JPEG compression, all three watermark...
JPEG 2000 is a new image coding system that delivers superior compression performance and provides many advanced features in scalability, flexibility, and system functionalities that outperform all previous standards. It brings exciting possibilities to many imaging applications such as the Internet, wireless, security, and digital cinema. This paper gives an overview of this triumph in innovations...
News, magazines, Web pages, etc. in modern life always contain much text information. In this paper, we propose a novel approach to detect text in images with very low false alarm rate. First of all, neural network color quantization is used to compact text color. Second, 3D histogram analysis chooses several color candidates, and then extracts each of these color candidates to obtain several bi-level...
The paper proposes a new steganographic model for secret data communication. A stack of four modules is used. The "compression module" gives the benefit of entropy coding. The "cryptographic module" provides confidentiality in the communication. To preserve integrity of data, the "hash module" is used with a shared secret key. A technique is proposed in which it is not...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.