The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The incredible progress of technology has made the use of communication and information technologies indispensable because of the possibilities it offers. These possibilities increased the security issues on personal information and communication security problems such as phone calls, retrieving e-mail contents, copying private information on computers. Encryption algorithms used in classical security...
As the Quality of Experience of video streaming can be greatly affected by parameters such as jitter, throughput, packet loss and delay, it is of great importance to assess the consequences low Quality of Service. Video artifacts are errors that can be displayed when multimedia streaming faces transmission difficulties. Blocking, ringing, motion compensation mismatch or false borders are some of the...
Steganography is one of the most important information hiding mechanism, which can be used along with cryptography for providing adequate data security. The common Steganographic mediums used are text, image, audio and video for hiding secret information. In the case of image medium, mostly least significant bits of pixels of a cover image are used for hiding secret information. In this paper, a new...
In video coding, quality evaluation is important for improving the coding efficiency. Usually Peak Signal-to-Noise Ratio (PSNR) is utilized to measure the performance of different coding techniques. During the video coding process in YCbCr color space, there are three PSNRs, one for each color component. Sometimes they may contradict to each other, which poses a problem for evaluating the coding performance...
In this paper a novel data hiding method has been proposed which is based on Non-Linear Feedback Shift Register and Tinkerbell 2D chaotic map. So far, the major work in Steganography using chaotic map has been confined to image steganography where significant restrictions are there to increase payload. In our work, 2D chaotic map and NLFSR are used to developed a video steganography mechanism where...
In this research, presented an underwater image enhancement (IE) making use of discrete wavelet ransform (DWT) with dynamic contrast limited adaptive histogram equalization (DCLAHE) algorithm. The principle issue in IE underwater pictures is that non-uniform illumination, low-brighntness, blur impact in view of turbulence in the stream of water. In underwater images, it impacts the diffusing of light...
In this paper, we propose two relatively simplistic and efficient methods for depth reconstruction from very sparsely sampled random depth data. Both the proposed approaches exploit the segmentation cue from a registered colour image of the same scene. The first approach which we term as plane fitting depth reconstruction (PFitDR), involves cost computations on plane-fitted depth values over local...
Secret image is converted into meaningful shares using a technique called visual sharing. Information is not disclosed by any single share except for all shares. Printing the encrypted secret on transparencies and stacking them will reveal the secret. More than one secret is encrypted by the visual sharing of multiple secrets and thus encryption capacity is increased when compared to a single secret...
Visual Cryptography is a technique, which is used to conceal the secret image into transparencies and these transparencies are distributed to the intended recipients. They demonstrated a visual secret sharing scheme, where an image was broken up into n shares so that only someone with all n shares could decrypt the image, while any n−1 shares revealed no information about the original image. In this...
Color correction is an important problem in image stitching. There is a color inconsistency issue between the images (good quality as a reference image and bad quality as a test image) to be stitched. This paper presents a color correction approach with histogram specification and global mapping. The proposed algorithm can make images share the same color style and obtain color consistency. There...
The Video Electronics Standards Association (VESA) Display Stream Compression (DSC) standard is widely accepted as a low-cost, visually lossless codec for use in display links. However, as high dynamic range (HDR) and wide color gamut (WCG) technologies become more prevalent, several new features are needed to address television and cinema applications, including support for greater bit depths and...
Steganography is a science of hiding information. Steganography hides message in certain media such image, text, audio, and video. One of the media is animated GIF. Animated GIF is an image that has a simple animation. Animated GIF can hides message in its frame. Hiding message in animated GIF needs a specific method to embed the message such multibit assignment. Multibit assignment is method to embed...
One step in the image processing is filtering that located in the preprocessing. In the context of fetal analysis on the ultrasound image, filtering is really needed to enhance the quality of ultrasound image. This study conducted analysis of performance between Gaussian and bilateral filter in the fetal length. Peak signal to noise ratio (PSNR) was used to measure the quality of reconstruction the...
Digital Steganography is the art of science that involves secret information within the associated acceptable multimedia system carrier, e.g., image, audio, and video files. If the secret information is visible, the aim of the attack is obvious, therefore, the goal is to hide the existence of the embedded information. This paper discusses economical implementation of a low-complexity steganography...
A high security data hiding approach using image cropping and Least Significant Bit (LSB) steganography is proposed. The predefined certain secret coordinate crops are extracted from the cover image. The secret text message is divided into parts with the same image crops. Each part of the secret text message is embedded into an image crop with secret sequence using LSB approach. The embedding is done...
In this research, presented an enhanced image security using improved RSA cryptography and Spatial Orientation Tree Wavelet compression (STW) method for color or grayscale image. Steganography is the science of hiding secret messages so that you can be sent to target without mistrust. It is the most famous type of carrier to grip data. Firstly, input the secret message, then encrypt the message using...
Image enhancement (IE) methods present as a preprocessing step in object detection and recognition in computer vision applications. The excellence of underwater images is negative in view that of precise propagation residences of light in water. So, underwater image enhancement is crucial to increase visual pleasant. In this research, presented an underwater IE using dark channel prior (DCP) with...
In this digital era, protecting sensitive data, such as military and financial data, has been an important factor for preventing attackers from illegally disclosing them. This protection can be done by hiding the secret into digital data (e.g., image, audio) which act as a cover. So, the secret messages cannot be seen easily. It is intended that the attacker is not able to detect the presence of the...
Image enhancement processes consist of a collection of techniques that inquire about to improve the visual appearance of degraded image. This paper introduces a multimodal enhancement technique for dense foggy images. The present available techniques don't work in low visibility like dense fog. The proposed methods changes the intensity component among the converted HIS components from the RGB components...
Selective attention is a part of cognition process. An object in an image gets attention only if human eye attracts towards it. The brain relies on attention to detect salient part of an Image and filter out background details. The salient object detection problem is formulated as segmentation of Image to separate salient object from background. The proposed method is based on the feature used to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.