The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
HVS theory plays important role in the application of digital image watermarking technique. When inserting watermarking, the visual masking feature of HVS could be fully used to design digital watermarking algorithm with good perceived performance. When extracting watermarking from the damaged image, human's visual feature could be combined to recover the damaged image so as to obtain better effect...
In recent years digital cameras have seen a revolution in digital image collection and thousands of quality images can be collected quickly and easily. The connoisseur image annotation is an effective approach for making image organization and browsing simple and quick, even for very large collections. The design and implementation of text base query system is particular concern with the management...
A novel search cheat image encryption algorithm based on hyper-chaotic Chen-system is proposed. Through mapping plain image and cheat image into hyper-chaos variables, the search and iteration algorithm is employed to encrypt plaint image to cheat image that is transferred to receiver in network. Security and performance analysis shows that this method can cheat attackers and has the same confidentiality...
The new image encryption algorithm based on Logistic chaotic map is designed. First, after two initial values of Logistic chaotic map are pretreated, two of the modified initial values are obtained based on which two chaotic sequences are generated. Next, taking the first n-gray value of the original image in turn, pixel gray value (n is odd and even) is respectively encrypted by the chaotic sequence...
Based on the image edges non-changing characteristic in image format transformation, a new digital watermarking algorithm for huge index image is proposed. The watermarking information was embedded in edges by adjusting the edge pixels; therefore, the algorithm is robust against the lossless image format transformation. The experimental results show that the proposed algorithm has perfect Robustness...
In this paper, a PCA (Principal Component Analysis) based fast vector quantization coding method for spectral imagery has been proposed. Firstly, PCA is used to concentrate effective information of image into a few PCs (Principal Components). Then a PC selected method based on the eigenvalues is used to extract the PCs that contain the main information. Furthermore, an improved fast vector quantization...
Video is an important medium for the observation of a variety of phenomena in the physical world such as for water conservancy engineering. Video sensor networks (VSN) consists of a large number of sensor nodes with cheap CMOS cameras, therefore, it has the ability of large scale visual monitoring. However, a kind of powerful and scalable platform is urgent for simulation and development of VSN. This...
Digital watermarking is an important means for copyright protection. This paper presents a fragile watermarking algorithm for copyright protection based on chaotic system. The algorithm first generates a location matrix. Then it generates the mapping image and identify the embedding location of watermarking in image blocks according to the location matrix generated first. Finally it embeds the watermarking...
The recovery can be achieved from the undersampling signal in compressed sensing theory relying on the sparsity and incoherent characteristics of the signal. A data compression algorithm is advanced in this article, based on compressed sensing and wavelet transform. Firstly the framework of the compressed sensing theory is introduced, and then a one-dimension and a two-dimension wavelet transform...
Considering traditional watershed segmentation has a serious over-segmentation problem and marker-based watershed segmentation has a great difficulty in marker extraction, we proposed the improved watershed segmentation with optimal scale based on ordered dither halftone and mutual information. We made some improvements on marker-based watershed segmentation. Firstly, according to vision characteristics...
Fractal image compression is a relatively recent image compression method. Its basic idea is to represent images as a fixed point of a contractive Iterated Function System. Spiral Architecture is a novel image structure on which images are displayed as a collection of hexagonal pixels. But till date there are no available image capture or display devices to support this structure. Hence in order to...
In this paper, an efficient watermarking algorithm for color image is proposed based on HSI color space and Discrete Wavelet Transform (DWT). The color image is firstly converted from RGB to HSI format to obtain the intensity component. Then sub-blocks of intensity are divided and sorted according to the human visual system (HVS) characteristic. Finally, the scrambled binary watermark, which is achieved...
In this paper, a novel fuzzy support vector machine based image watermarking scheme is proposed.Since the application of support vector machine in the process of watermarking technology is only a simple classification of the image. However,the fuzzy support vector machines by selecting the appropriate degree of membership to reflect the different importance of the different sample points. In this...
Digital video segmentation is an active area of research. Generally, the significances of this segmentation mask can be explained as follows: Firstly, the mask can be used for image examining, editing, compression, analysis and understanding. Secondly, the virtual reality system can use the panorama and mask to appear the virtual 3-D environment. So the research of such an efficient video segmentation...
At present, screen image compression techniques are mostly designed for computer desktop, and there is still much room for improvement of the image compression quality and compression ratio, etc. when applied to scientific instruments workstation screen image. In order to solve such problems, this paper puts forward a kind of compression method applicable to scientific instruments workstation screen...
A new blind geometric robust watermarking scheme is presented based on singular value decomposition (SVD) and discrete wavelet transform (DWT). In the scheme, the host image is decomposed with n-level DWT and the low frequency sub-band is divided into nonoverlapping blocks. SVD is applied to every block. The watermark is embedded into the low frequency DWT coefficients by modifying the largest singular...
Image scrambling is one important method in image encryption field. By using some characteristics of chaos system, e.g. the sensitivity to initial conditions, the sensitivity to parameter and the pseudo-randomicity, this paper presents one image scrambling algorithm based on chaotic mapping. In order to achieve an effect of image scrambling, each pair of pixel points is exchanged for all the possible...
In this paper, we have proposed a modified version of image compression/decompression algorithm using block optimization and byte compression method (BOBC). After BOBC, it is followed by run-length encoding and its block is optimised by varying block size. The proposed algorithm is very simple in implementation, fast in encoding time. Experimental results show that compression ratio of this algorithm...
The properties of average short-term entropy of audio sequence are discussed in this paper. It is discovered that the changes of average short-term entropy on different scales depict the audio's statistical features well, which can be used to generate zero-watermark of an audio clip. A method of calculating normalized entropy vectors is presented in this paper. To generate the zero-watermark of an...
With coding stream layered structure and progressive Transmission characteristics in JPEG2000, the paper presents a method research of the hiding fingerprint information. By means of the ranked bit-stream according to the fingerprint feature importance in space bit Planes, the method may adaptively embed hidden fingerprint data into wavelet coefficients from low to high frequency sub-band based on...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.