The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents two intra prediction algorithms in High Efficiency Video Coding (HEVC) encoder for reducing the computational complexity and increase the encoding speed. The first algorithm takes advantage of the high spatial correlation among neighboring pixels to substitute the reference samples as the first row or first and second rows of the current block to be predicted, while the pixels...
Satellite Image captured has a high degree of data storage and requires more time for its recovery. Multiple transmission is required while recovering the images of similar features but of large capacity. Image Embedding is one such technique that will not only reduce storage capacity but also enables steganography. The two high resolution images are first registered using registration technique....
Sparse representation is capable of modeling signals as linear combination of a few atoms from a pre-trained dictionary. It allows learning an adaptive dictionary that leads to highly sparse nature in the representation of signals. In this paper, sparse representation is deployed in a lossy hyperspectral data compression framework. Dictionaries that exploit spectral correlation, as well as both spectral...
Whole-slide images (WSIs) are high-resolution, 2D, color digital images that are becoming valuable tools for pathologists in clinical, research and formative scenarios. However, their massive size is hindering their widespread adoption. Even though lossy compression can effectively reduce compressed file sizes without affecting subsequent diagnoses, no lossy coding scheme tailored for WSIs has been...
Compressed Sensing (CS) is an innovative approach allowing to represent signals through a small number of their projections. In this paper, we address the application of CS to the scenario of 2D readings recovery from a Wireless Sensors Network (WSN) with excellent accuracy, while collecting only a small fraction of them at a data gathering point. CS requires a suitable transformation that makes the...
Image set coding improves the compression efficiency by reducing both intra- and inter-image redundancy. The key of success is to select representative image(s) to predict set of similar images. This paper proposes an inter-image redundancy measure for representative image selection in image set compression. In the proposed method, the inter-image redundancy is measured jointly by the extent of similar...
Most image compression techniques are based on de-correlating the 3 color primaries before applying monochrome encoding to each of the resultant 3 components. Recently, however, a new approach to color image compression based on exploiting the correlations between the color primaries has been introduced. This method, in several cases, outperforms the common de-correlation approach. In this work we...
Multiple description coding (MDC) combined with multiple path transport (MPT) is a new research direction for image and video transmission over unreliable networks. Using the signal decomposition and reconstruction framework that has been proven very effective for image coding, several new approaches to MDC have been developed. Instead of using hierarchical decomposition, which is aimed at maximizing...
In this paper, we propose a new image coding scheme based on fractal coding of the coefficients of a wavelet transform, in order to take into account the self-similarity observed in each subband. The original image is first decomposed into subbands containing information in different spatial directions and at different scales, using Finite Impulse Response filters. Subbands are encoded using Local...
With increase in the use of multimedia technology, the integrity of the digital images has become a major problem. The transformation between the soft and hard-copy of the image makes the problem even more complex. This paper proposes a new watermarking technique that is robust against geometrical and print-scan attacks. The method uses multiple domains to embed the message in the image, whereby watermarks...
Gyrator transform is a new tool for image encryption. In this paper, the security of image encryption based on random phase encoding in gyrator transform domains was analyzed. For image encryption with single random phase encoding and gyrator transform, the operation of random phase encoding only changes the phase angle of the original secret image instead of the amplitude of the image. So, the encryption...
This paper considers energy efficient distributed data gathering methods for correlated data field monitoring in multi-hop wireless sensor networks (WSNs) via compressed sensing (CS). This signal compression and acquisition method can be used to exploit the inherent temporal and spatial correlation of the sensor signals. Many existing CS-based data gathering methods exploit correlation structures...
In this paper, we propose a new approach based on the accordion transform that tends to exploit the both intra and inter frame correlation. The major novelty of the new approach compared to classic one is the dynamic strategy of video frames scan. The direction of the frames scan will depends on a gradient based algorithm which tries to predict the direction where minimal pixels intensities changes...
This report proposes an integer color transform for lossless coding of four color components of images. An existing color transform has a fixed set of coefficients and therefore it can't be adaptive to each image. We utilize eigen-vector of the covariance of the four components to increase data compaction performance. We also utilize fixed relation between two green components to simplify computational...
In this paper, a novel dynamic stochastic resonance (DSR)-based non-blind watermark extraction technique has been proposed for robust extraction of a grayscale watermark. The watermark embedding has been carried out using singular value decomposition (SVD). Dynamic stochastic resonance has been strategically used to improve the robustness of the extraction algorithm by utilizing the noise added during...
In order to objectively and automatically evaluate the degree of digital image scrambling, introduce the grey relation analysis theory, the paper proposes a new evaluation method of image scrambling. In the method, the definition and the feature of the ideal scrambling image are analyzed first, whose histogram is summarized at the same time. And then, the scrambling image is divided into some sub-images...
A blind watermarking method using cellular automata transform (CAT) is proposed. A binary watermark is embedded in a certain sub-band, which is further subdivided into non-overlapped blocks, of 2-level CAT transformed of a host image. Each block embeds a watermark bit with two patterns (P0, P1) only differing in sign. The detector is blind, determining the value of a watermark bit on the sign of the...
A typical consumer digital camera uses a Color Filter Array (CFA) to sense only one color component per image pixel. The original three-color image is reconstructed by interpolating the missing color components. This interpolation process (known as demosaicing) corresponds to solving an under-determined system of linear equations. In this paper, we show that by replacing the traditional CFA with a...
The advent of digital forensic techniques imposes great challenges to the security of image disguise where tampering is involved to conceal the existence of sensitive objects in the source image. As a consequence, image interpolation that is a prerequisite step in image disguise should be adapted to be forensic resistant. This paper proposes a novel and secure interpolation method to facilitate image...
In this paper, we propose an algorithm for image encryption using chaotic maps and gyrator transform. Chaotic Logistic and tent maps are used to generate the required random bit sequences. Pixels of the plain image are encrypted through gyrator transform, and then it is partitioned into 8 bit map planes. Later, the bits of each plane are substituted according to random bit matrix that is the products...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.