The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present a subsampling method for color video sequences using feedforward artificial neural networks. In our method, subsampling of the high detail and smooth regions of the video chrominance frames is performed using pattern matching, by extracting different geometrical information for each region. Experimental results show that our method outperforms spatial subsampling obtained...
In computer graphics it often required to interface various display devices in the system. Each display device should provide high resolutionary image quality. The proposed method enhances the display performance of the graphic device interface. Wepropose anovel application for image fusion methods whichworks on different raster operations to improve the quality of picture for higher or lower resolution...
In the digital watermarking with DCT method, the watermark is located within a range of DCT coefficients of the cover image. In this paper a new method is proposed by using a combination of the DCT and PCA transform in order to use the low-frequency band for the color image. First, the digital color image is transformed into YCbCr from RGB color space and the luminance (Y) component is divided into...
Compression is a serious problem in capsule endoscopy applications. It dictates the power consumption characteristics and the capsule life. In this paper a hybrid DCT and DWT compression method is employed to capitalise the advantages of both the techniques. The method involves in generating color data of the white band and narrow band images in an intermediate format and then generating the decompressed...
This paper proposes a new backlight dimming algorithm based on color distortion-aware error control. Conventional backlight dimming based on an error control algorithm simply determines a clipping point by considering the clipping error where the gray levels of pixels are saturated at the highest displayable gray level, thereby producing an image with color distortion. In contrast, the proposed algorithm...
This paper presents a new approach to single-image super resolution by a simple and fast image interpolation method based on the combination of three different procedures. In the first phase of five phase algorithm, determination, marking and interpolation of the edges of the image is done. In second phase, the interpolated values are modified using a refinement procedure that reduces the zigzag and...
We propose a quality enhancement algorithm for linear adaptive compression using bit plane reduction. Compression is based on the observation that least significant bit(LSB) planes can be removed without affecting the perceptual quality of the image. It also makes use of the fact that the bits in a bit plane repeat and hence can be compressed losslessly by encoding. At the receiver end, the quality...
Watermarking technique is used for protecting copyright of digital images. In this paper, we propose a novel technique for watermarking using DWT and SVD. DWT ensures imperceptibility of the watermark and SVD ensures its robustness against attacks. To address the issue of watermark security, we make use of Arnold transform. Watermark extraction is semi-blind, which avoids the need for original image...
Haze is one of the most common atmospheric phenomena. In hazy weather, smoke, dust and other dry particles obscure the clarity of the scenery objects severely degrading the quality of the outdoor images taken by camera. Moreover, most outdoor vision applications such as video-surveillance systems and traffic monitoring systems fail to work normally in this condition. Therefore, improving the technique...
This paper presents a new grassy effect generation approach. The grassy effect changes original image as the one behind the grass. A random number generation function is employed to decide the same of block and location of the pixel. Obtained various block size and pixel location yield unexpected grassy execution to the original image. The subjective and the objective image performances are compared...
An average healthy person does not perceive the world in just black and white. Moreover, the perceived world is not composed of pixels and through vision humans perceive structures. However, the acquisition and display systems discretize the world. Therefore, we need to consider pixels, structures and colors to model the quality of experience. Quality assessment methods use the pixel-wise and structural...
In this paper, we presents a fuzzy concept based histogram equalization approach. We use Kaufmann's metric of fuzziness concept for histogram equalization. The principal idea of this article is to utilize and evaluate degree of fuzziness. The presented histogram equalization approach is processed to Y component of YUV color space, which is transformed information from RGB image. The improved Y channel...
Plenoptic images are obtained from cameras with internal microlens arrays. Nearby pixels in a plenoptic image are representing the real world from different spatial and angular position and the general assumption of spatial correlation exploited for the development of former image coding algorithms loses most of its foundations. In this work, the problem of coding plenoptic images is analyzed in order...
Interpolation of the CFA images is used to produce full color images by using Demosaicking Process. Denoising is a technique which is used to remove the noise from a noisy image. The noise will be introduced during acquisition, Transmission and reception & storage phases. Some sensors are using Color Filter Array (CFA) to capture images and reproduce those images into full color images with...
Steganography in multimedia object improves the information security during communication. An analysis approach with effective frame selection, partial information storage per frame and referenced mask based embedding is suggested to improve the steganograhy process in video objects. Three step process is espoused to amend the security of video object which is as under mentioned. In first stage, the...
This paper proposed the reversible image watermarking based on histogram modification and virtual border to protect the digital image originality. The color histogram was used to embed the digital signature of image. The histogram was modified based on the payload, thus the changes can be minimized. The reversibility was obtained from the storing of changes in the LSB of virtual border. Finally, the...
This paper focuses on the inpainting of damaged digital images. It uses relevant image and speeded-up robust features (SURF) for this purpose. A concept wherein, the missing information is restored using relevant image is presented. The relevant image may be a snapshot of the same location with different viewpoint or geometrical transformation. The proposed algorithm is divided into three main stages:...
Edge detection is an elementary step used in various image processing applications. The main problems in existing edge detection algorithms are poor edge localization, less noise removal capacity, unable to detect edges in complex background images and inability to properly detect the color edges in images. In this paper a sequential hybrid approach is proposed to overcome all the limitations of existing...
The validation of images taken by digital cameras has become a great concern as the digital photography is gaining rapid popularity. So, due to lack of protection of digital content as they can be easily duplicated and disseminated without the owner's consent, publishers, artists, and photographers, however, are unwilling to distribute images or other data over the Internet. Therefore, to protect...
Due to the high growth of Internet and its applications over the network, there is a need of high level of security for the data to transfer between the networks. Steganography is a technique of hiding the data over the medium so that no one knows that there is any communication going on except the sender and receiver. This paper gives an approach for Image Steganography to enhance the level of security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.