The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The challenges associated with wireless vision sensor networks are low energy consumption, less bandwidth and limited processing capabilities. In order to meet these challenges different approaches are proposed. Research in wireless vision sensor networks has been focused on two different assumptions, first is sending all data to the central base station without local processing, second approach is...
Asymmetric stereoscopic coding can save bitrate and maintain the overall visual quality of stereoscopic perception, so it is an alternative for wireless environment in which the bandwidth is limited. In asymmetric stereoscopic coding, the right-view images are down-sampled to half resolution before coding, while the direction of sampling influences the rate-distortion performance of the asymmetric...
The high compression ratio of fractal encoding is based on the increasing of the computation complexity. In order to meet the application requirements of real-time sharing and transmission, it is becoming an important research area to advance the encoding speed by developing the parallelization algorithm based on multi-core programming. In this paper, the OpenMP program model is applied to parallelize...
An upper bound for the smallest period of the Fibonacci module sequence is obtained, which is 6N, and more accurate and convenient than the current results. Since the smallest period of the Fibonacci module sequence is twice of that of two-dimensional Arnold transformation, the upper bound for the smallest module period of Arnold transformation is naturally 3N. It is a great advance compared with...
There are several technical or technological field, which borrowed inspirations or hints from nature. This way it could be interesting to study, how a multicellular organism develops, by consecutive cell divisions, differentiations and proliferation, from a single cell. This development could be regarded as a decompression process of a highly compressed database. Following and mimicking this procedure...
It is difficult to get high compression ratio and good reconstructed image by conventional methods; we give a new method of compression on medical image. It is to decompose and reconstruct the medical image by wavelet packet. Before the construction the image, use neural network in place of other coding method to code the coefficients in the wavelet packet domain. By using the Kohonen's neural network...
With high compression ratio performance, fractal image compression technology becomes a hot topic of research of image compression techniques. However, the encoding time of traditional fractal compression technique is too long to achieve real-time image compression, so it cannot be widely used. Based on the theory of fractal image compression; this paper raised an improved algorithm form the aspect...
A new iris recognition system based on Wavelet Packet Analysis is described. The most unique phenotypic feature visible in a person's face is the detailed texture of each eye's iris. The visible texture of a person's iris is encoded into a compact sequence of 2-D wavelet packet coefficients, which generate an "iris code". Two different iris codes are compared using exclusively OR comparisons...
This paper proposed a chaotic image scrambling scheme based on sorting transformation. The algorithm calculates the permuting address codes by sorting the chaotic sequence. Therefore, the scheme does not require knowing the probability density function of the chaotic orbits in advance, thus not only facilitating the choice of chaotic systems but also reducing the complexity of the scheme. The paper...
Based on isosceles triangle segmentation, a new approach of color image compression has been proposed by using correlation among RGB components and fractal image compression algorithm in this paper. The encoding process in this paper is composed of two steps: transforming color image into gray-level image according to correlation among RGB and compressing fractal image based on isosceles triangle...
In this paper, an improved technique for evolving wavelet coefficients refined for compression and reconstruction of fingerprint images is presented. The FBI fingerprint compression standard uses the cdf 9/7 wavelet filter coefficients. Lifting scheme is an efficient way to represent classical wavelets with fewer filter coefficients. Here Genetic algorithm (GA) is used to evolve better lifting filter...
Data/image compression is a significant application of linear algebra. The need to minimize the amount of digital information stored and transmitted is an ever growing concern in the modern world. Singular Value Decomposition (SVD) is an effective tool for minimizing data storage and data transfer. The proposed work explores image compression through the use of SVD on image matrices. The performance...
A novel permutation-substitution scheme, which is based on chaotic standard map, for the image encryption is proposed. It is loss-less symmetric block cipher and specifically designed for the colour images. The initial condition & system parameter of the chaotic standard map, number of iterations and number of rounds constitute the secret key of the algorithm. Firstly we mix all three colour layers...
As an important field in information security, image encryption algorithm has been a research focus. At the same time there are few works on fractal set as the encryption key among various encryption algorithms. In the paper, Mandelbrot set (abbreviated as M set) and the Hilbert transformation are utilized to generate the random key. Since M set can be iterated from only a few parameters, it can reduce...
As compared with text spam, the image spam is a variant which is invented to escape from traditional text-based spam classification and filtering. Various approaches to image spam filtering have been proposed with respective advantages and drawbacks in terms of time cost and efficiency. In this paper, we propose a new approach based on Base64 encoding of image files and n-gram technique for feature...
The objective of this paper is to implement the concept of wavelet based image compression to gray scale images using different techniques. The techniques involved in the comparison process are EZW and WDR. These techniques are more efficient and provide a better quality in the image. In compression, wavelets have shown a good adaptability to a wide range of data, while being of reasonable complexity...
Encryption is used to transmit data in open networks with security. Each type of image has its own features, therefore different techniques can be adopted to protect the image from unauthorized access. Most of the available encryption algorithms are mainly used for large devices. There is no such image encryption algorithm with smallest key for smaller devices like cell phone, smart card etc. In this...
This paper proposes a distortionless image data hiding algorithm based on integer wavelet transform that can hide data into the original image .The data can be retrieved and the original image can be recovered without any distortion after the hidden data are extracted. This algorithm hides data into one or more middle bitplane(s) of the integer wavelet transform coefficients in the LH, HL and HH frequency...
This paper proposes an image watermarking scheme for copyright protection based on Independent Component Analysis (ICA). In the suggested scheme, we divide the original image into blocks and use the ICA to project the image into a basis with its components as statistically independent as possible. The data embedding is carried out in cumulative form in the ICA basis and also the ICA is used for watermark...
The following topics are dealt with: linear approximation; license plate recognition; color image segmentation; image quantization; wireless video transmission; congestion control; stochastic search; transmembrane helical segments; wavelet transform; semisupervised cluster algorithm; anomaly detection; data privacy; online market information processing; user behavior; particle swarm optimization;...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.