The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose an algorithm for video signature using music videos and news video for our study. The algorithm was developed based on our earlier work with an improvement (reducing the steps) on the process of generating video signature. Thus, revised process reduces the amount of processing time needed tremendously. In addition, besides color as a feature, we introduce the addition of...
In this paper, we propose a new real transform (rCS-SCHT) derived from the conjugate symmetric sequency-ordered complex Hadamard transform (CS-SCHT) for document image compression. Like the CS-SCHT, the proposed transform is also an orthogonal transform. The transform computation is very simple and it requires only addition/subtractions with the use of a fast algorithm. This transform possesses good...
In recent years, digital watermarking technologies are considered to be important means to protect digital image copyrights. In this paper, we combine a non-invertible watermark scheme with an HVS model adaptive watermark. The application of adaptive watermarks improves visual imperceptibility. However, we find that an adversary is able to apply ambiguity attacks on the non-invertible watermark scheme...
In the paper, a new sharing secret algorithm in stego images with authentication is presented. The proposed approach employs a novel secret image sharing scheme based on set partitioning in hierarchical trees (SPIHT) algorithm, uses two stego blocks instead of a single block for authentication, and designs the check bits by effectively combining existing authentication ideas with Hamming codes. As...
A high-performance JPEG steganography should be secure enough to resist modern steganalysis. In this paper, we propose a high-performance JPEG steganographic method. The proposed method adopts the complementary embedding strategy to avoid the detections of several statistical attacks. To show the effectiveness of the proposed method, several statistical attacks are simulated and used to detect the...
To reduce the storage and transmission requirements in image applications, images are compressed while maintaining acceptable visual quality. In this paper, image retrieval using vector quantization (VQ) is explored. The VQ technique is tested on uncompressed images (UCID) as well as compressed images (JPG). In order to reduce the retrieval time, the images are converted into thumbnails and the retrieval...
In this paper, we proposed an efficient dual watermark scheme for image tamper detection and recovery. In the proposed watermarking algorithm each block in the image contains watermark of other two blocks, i.e. two copies of watermark of the whole image is maintained and second chance for block recovery is provided in case one copy is destroyed. The algorithm proposed by Lee and Shinfeng is unable...
This paper presents an efficient fuzzy possibilistic code book design for vector quantization in the wavelet packet domain. Wavelet packet tree (WPT) methodology is applied to the whole image. The sub blocks of the input image are decomposed into two level WPT where all coefficients of LL band and the approximation coefficients of LH, HL & HH bands are quantized using the proposed vector quantizer...
The wireless extension of the JPEG 2000 standard formally known as JPWL is the newest international standard for still image compression. Different from all previous standards, this new standard was created specifically for wireless imaging applications. This paper examines the error resilience performance of the JPEG, JPEG 2000 and JPWL standards in combating multi-path and fading impairments in...
Recently, the opportunity to treat still images has increased, and a lot of devices such as laptop displays and digital cameras have been developed, therefore, a large amount of data is stored and is transmitted after a compression. One of the most famous international standards for still image compression is JPEG, in which the DCT (Discrete Cosine Transform) is processed and the DCT coefficients...
Previous proposed steganographic schemes based on tolerable error range (TER) can restrict the distortion caused by data hiding within an acceptable range, but both the stego-image and the original image are necessary for extracting the secret message. This paper presents a novel TER-based steganographic scheme, in which JPEG compression under a certain quality factor is regarded as TER, and the modification...
The dynamic response of chaotic system is unpredictable and highly sensitive to the variation of initial values of a system. Therefore, the distinguished elements of variables applied to produce encryption codes for the color-image encryption can increase the communication security. This paper proposed a hybrid encryption technique for the color image based on the multi-chaotic-system which combines...
This paper presents a novel memory architecture for implementing quad port memories in radiation tolerant FPGAs. The hardware solution proposed here uses only dual port memories and ensures that appropriate memory speed can be achieved while working as quad port memory. Efficient memory architecture has been used to transform dual port memory into quad port memory without using any redundant memory...
In this paper we propose a Lossless data compressor in high level throughput using re programable FPGA technology. Real time data compression is expected to play a crucial role in high rate data communication applications. Most available approaches have largely overlooked the impact of mixed pixels and subpixel targets, which can be accurately modeled and uncovered by resorting to the wealth of spectral...
Blocking artifacts exist in the block-based discrete cosine transform (DCT) compressed images and video sequences in low bit rate compression. Based on the minimum mean-square-error (MMSE) criterion, we have developed a dual adaptive FIR Wiener (DAW) filter previously. In this paper, the DAW filter is then extended to form the overcomplete dual adaptive Wiener (OCDAW) filter by applying to the overcomplete...
The use of neural networks as a nonlinear predictor in many applications including predictive image coding has been successfully presented by many researchers. However, almost all of the research papers have focused on the architecture of the neural network and very little attention has been given to the design of the training and testing data. This paper demonstrates how the choice of the training...
Copyright protection is an important aspect of the management of resources in any eBusiness dealing with digital multimedia distribution. Two of its main aims are to guarantee that any use of the media is in accordance to its license and to assert the ownership of the media. The solution to copyright protection consists of many technologies, one of which is watermarking. In the case of copyright protection,...
A hybrid lossy image compression technique using classified vector quantiser and singular value decomposition is presented for the efficient representation of medical magnetic resonance-brain images. The proposed method is called hybrid classified vector quantisation. It involves a simple yet efficient classifier based gradient method in the spatial domain which employs only one threshold to determine...
In this paper, a new image compression scheme by introducing visual patterns to interpolative vector quantization (IVQ) is proposed. The goal is to introduce visual patterns on designing the codebook, where only removed details that contain visual patterns and their original counterparts as pairs are trained. In the proposed scheme first input images are down-sampled by ideal filter. Then, the down...
Tone-mapping operators are used to produce low dynamic range versions of the high dynamic range images, while preserving as much details as possible. We have proposed a tone-mapping operator which is built on an existing histogram adjustment technique. It incorporates certain characteristics of the human visual system, to restrain the problem of extreme contrast enhancement of certain segments and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.