The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We demonstrated a single-shot high-resolution color-imaging technique through scattering media using a monochromatic camera. This novel approach is enabled by the spectral-decorrelation property and the optical memory-effect of the scattering media. We used deconvolution for imaging, which bypasses cumbersome iterative refocusing, scanning or phase-retrieval procedures.
In this paper, an image steganography approach is presented dividing the cover image into 2×2 non-overlapping pixel blocks. The upper-left pixel of that block embeds a certain number of bits of the secret bit stream. Whereas, the remaining pixels of the same block embed the secret data using a modified version of the pixel-value-differencing (PVD) method that considers embedding secret data into both...
The incredible progress of technology has made the use of communication and information technologies indispensable because of the possibilities it offers. These possibilities increased the security issues on personal information and communication security problems such as phone calls, retrieving e-mail contents, copying private information on computers. Encryption algorithms used in classical security...
QR code is a very popular type of 2D barcode. In practice, QR code is an image which consists of black and white patterns. QR code is capable of carrying alphanumerical message embedded using Reed-Solomon error correction algorithm. The coded content carries messages aimed for various purposes. When scanned with today omnipresent smart devices, with camera and software, the message is processed and...
In this article we analyze the prediction of image interestingness, a domain that is gaining importance in the fields such as recommendation systems, social media and advertising. We investigate the contribution of early and late fusion techniques, while using a set of image descriptors and analyze the best combinations that predict interestingness. Experimental validation is carried out on the MediaEval...
Image-based information hiding technology has been extensively studied in recent years. In order to ensure the security of information transmission, image information hiding technology must have the characteristics of transparency, security and robustness. In this paper, an improved image-based information hiding method is proposed, which utilizes the imperceptibility of the human eye to the change...
Aesthetic patterns are formed into different systems due to different regional customs, and the language of the contemporary presented by a work could be understood by aesthetics analysis. Poster is a printed media that massively passes messages to the public, it works like a barometer to reflect politics, economics, cultural and arts events of each period in timely manner, and this is particularly...
Steganography is the science of embedding the secret messages inside other medium files in a way that hides the existence of the secret message at all. Steganography can be applied to text, audio, image, and video file types. In this study, we propose a new steganography approach for digital images in which the RGB coloring model was used. The efficiency of the proposed approach has been tested and...
Image based steganography utilize the images as cover media to hide secret data. So far several methods have been presented in image steganography. Many of these methods use embedding in least significant bits of pixels. Steganography should be strong enough to hide confidential data and does not cause major changes in the image. The use of least significant bits will not lead to major changes in...
A catheterization laboratory or Cath lab is room in a hospital equipped with facilities to visualize the diseased arteries and chambers of the heart. It's also a facility to treat any stenosis or abnormalities found. This is done by inserting a catheter in to the artery and injecting a dye or a contrast material into it. The work of the dye is to highlight the path flow of the blood and any obstacles...
In this paper a novel technique of fragment visible mosaic image is proposed. It is a unique and novel kind of computer art called Mosaic tile image steganography technique, which transforms a color secret image into a so called secret fragment visible mosaic image of the same size. Initially choose randomly any color cover image from the existing database, which looks similar to secret color image...
Applications analytics are growing at a rapid pace. Techniques for image processing, extraction, compression, and recognition are established and are in use. However, the presence of large data sets of images on the web is increasing exponentially. In this paper, we propose a mechanism that retrieves images from a large data set and arrive at a cluster for analysing behavioural trends. The proposed...
In this paper we propose to face the problem of event detection from single images, by exploiting both background information often containing revealing contextual clues and details, which are salient for recognizing the event. Such details are visual objects critical to understand the underlying event depicted in the image and were recently defined in the literature as “event-saliency”. Adopting...
Automatic summarization of streaming news images is critical for efficient news browsing. Although image duplicates are redundant for news reading, the number of duplicates of a news image is a good indicator for its importance. We describe the architecture used in a news aggregation system for online streaming news image summarization. Given a sequence of images for a news topic, we first cluster...
Steganography is a science of hiding information. Steganography hides message in certain media such image, text, audio, and video. One of the media is animated GIF. Animated GIF is an image that has a simple animation. Animated GIF can hides message in its frame. Hiding message in animated GIF needs a specific method to embed the message such multibit assignment. Multibit assignment is method to embed...
We consider online predictions of vote results, where regions across a country vote on an issue under discussion. Such online predictions before and during the day of the vote are useful to media agencies, polling institutes, and political parties, e.g., to identify regions that are crucial in determining the national outcome of a vote. We analyze a unique dataset from Switzerland. The dataset contains...
Today, mobile users are struggling with accessing overloading and unstructured social media feeds on the severely constrained mobile display. To overcome the challenges associated with browsing social media feeds on mobile devices, we are developing an innovative scheme to automatically create and synthesize the mixed social media digest (pictures, texts and videos) into a magazine-page-like social...
The lack of representation of diversity in media has been a long-standing and documented problem. Different types of media suffer from different problems with regard to representation. The games industry has been under fire for portrayals of women and underrepresented minorities for many years. Looking at the game industry as part of the larger technology and computing industry, which also has problems...
Contemporary devices for playing of video and audio signal from DVB bitstreams use complex hardware structure due to high requirements specified by standards like Hybrid Broadcast Broadband TV (HbbTV). The main focus of this paper is the proposal of a software that runs on set-top boxes (STBs). Instructions and attributes for STBs are contained in Extensible Markup Language (XML) and therefore XML...
Learning is human activities as the necessities of life that will add insight, knowledge, change behavior, and leads man to maturation. Therefore, humans known as homo educandum or educated man. The learning process requires media as a tool to understand the science that is being studied, for example in Natural Science subject, especially in the world of plants that teaches human to interact directly...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.