The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is difficult to get high compression ratio and good reconstructed image by conventional methods; we give a new method of compression on medical image. It is to decompose and reconstruct the medical image by wavelet packet. Before the construction the image, use neural network in place of other coding method to code the coefficients in the wavelet packet domain. By using the Kohonen's neural network...
The objective of this paper is to implement the concept of wavelet based image compression to gray scale images using different techniques. The techniques involved in the comparison process are EZW and WDR. These techniques are more efficient and provide a better quality in the image. In compression, wavelets have shown a good adaptability to a wide range of data, while being of reasonable complexity...
Encryption is used to transmit data in open networks with security. Each type of image has its own features, therefore different techniques can be adopted to protect the image from unauthorized access. Most of the available encryption algorithms are mainly used for large devices. There is no such image encryption algorithm with smallest key for smaller devices like cell phone, smart card etc. In this...
Information Hiding is a good method to transmit important information secretly. Video sequences usually include many frames, so they have more room to hide information. In the paper, in order to increase the amount of hiding information, we choose MPEG sequences as hosts, and we present a practical method to hide information in MPEG compressed video. Generally, there are many B-frames in each GOP...
With the fast development of Internet technology and information processing technology, the image is commonly transmitted via the Internet. People enjoy the convenience and shortcut, but people have to face to the obsession that the important image information in transmission is easily intercepted by unknown persons or hackers. In order to enhance the image information security, image encryption becomes...
In this paper, a new rate adaptive control algorithm is proposed based on study of JPEG2000 rate control algorithm, in order to reduce the amount of bits sent to the arithmetic coder, without any significant changes into the standard architecture and without loosing performance. After wavelet transform, the coefficient is modeled as Gaussian distribution, but remove the offspring of the lowest frequency...
Recently, Blind Source Separate (BSS) technique has been extended to digital watermarking field. Slowly Feature Analysis (SFA)-a kind of BSS technique-is a new unsupervised learning algorithm to learn nonlinear functions that extract slowly varying signals out of the input data. It expediently can be used to extract image feature and separate the mixed signals. Making use of the advantages of SFA,...
Wavelet analysis is internationally recognized up to the minute tools for time-frequency. It gets an unprecedented development based on Fourier analysis and plays an important role in the signal processing especially in image compression. By analyzing the relations of the coefficients between each son block and the whole image, we can find the index position of the sub-band of each son block in the...
Image encryption plays a vital role in many related aspects of our daily life. In this paper, we introduced a new image encryption algorithm using the Ikeda map. This encryption method inherits the advantages of chaos-based encryption method, which has a high sensitivity to the encryption key, a large space of encryption keys, a random-like property, etc. The same encryption algorithm can be also...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.