The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper,we propose an improved high dynamic range image compression algorithm by manipulating the gradient field of the luminance image using diffusion tensor. Specifically, we calculate diffusion tensor for each pixel to construct a new attenuation function, and interpolate and merge with each scaling factor of attenuation function in order to reliably detect all of the significant intensity...
This study presented a new algorithm for hiding information in an carrier image. It hides information by using the numerical value relation of three neighboring DCT coefficients with Zig-Zag order of block image. Firstly, each block of image is transformed by DCT. Then the DCT coefficient matrix is scanned by Zig-Zag scanning order to ensure the continuity of the neighboring coefficients. And then...
Multispectral image compression which are based on the one-, two- and three-dimensional wavelet transforms has been existed in many papers. Existing image compression algorithms have proved to be very efficient in compressing these kinds of images. We adopted the principal component analysis,clustering and spectral angle cosine to classify and compress in spectral dimension.In this article, we present...
Pattern Matching is the most conventional method of binary text image compression that has been only used in the 2-D domain of textual image signals. In this paper a pattern matching technique is proposed in the 1-D domain of chain code description signal of printed binary textual Farsi-Arabic images. In printed Farsi-Arabic scripts, contrary to latin scripts, letters usually attach to each other...
H.264 introduces a technology of intra-prediction to improve the coding efficiency of I frames, but also greatly increased the computational complexity of encoding. This paper proposes a fast intra- prediction mode selection algorithm. The algorithm predicted macroblock boundaries and the fast intra- prediction mode selection to speed up encoding rate. The result of experiments show that the proposed...
To reach the rural masses, banks are going all out in providing a user-friendly banking experience. To boost micro financing initiatives, banks are deploying biometric solutions with ATMs. Establishing the identity of a rural depositor through biometrics makes it possible for illiterate or barely literate folks to become part of the banking user community. Fingerprint recognition has been recognized...
One major obstacle for the application of multiview sequences, including 3DTV, is the extremely large amount of data associated with a multiview sequence. To enable the storage or transmission of a multiview sequence at a reasonable cost, in this paper, we present a disparity estimation method based on affine model to overcome this problem. By modeling the disparity function on each patch of the multiview...
In this paper, a novel extended visual cryptography scheme is presented. Differ from any existing visual cryptography scheme, the proposed scheme encodes one secret image into one shared image with innocent-looking. The secret image is visually revealed by copying the share, shifting the copy and superimposing the shifted copy and the original share together. The proposed scheme has the advantages...
Digital image watermarking is proposed to overcome the problems of security, capacity and cost in health care management systems. Medical images, unlike most of images, require extreme care when embedding additional data within them because the additional information must not affect the image quality and readability. In order to overcome any misdiagnose caused by embedding data into medical images,...
Halftone visual cryptography is an encryption mechanism that a secret image is encoded into halftone shares for showing meaningful images. You only need to superimpose part of these share images. Then, images can be shown the original confidential. In this paper, we propose an encoding scheme to improve the efficiency of visual secret sharing technology. We use the relative location information of...
In publishing and printing of network version field, there are enormous number of TIFF format (CMYK) images which requires too huge space for storing and enough bandwidth for transmitting. Therefore, common need to manipulate huge amount of data brought about the issue of fast lossless compression. 2D integer wavelet transform can be used for lossless compression of static image, such as, 5/3 lifting...
The reconstructed images after compression produce annoying blocking artifacts near block boundaries, particularly in low bit-rate image compression, because each block is transformed and quantized independently Detection of blocking artifact has an important role in the design of image coding systems. Increasing the bit rate to obtain better quality images is too costly. In this paper, a novel pixel-domain...
In this paper we present main parameters of the ringing artefact and demonstrate their influence on image fidelity of lossy compressed images. We apply variations of these parameters to create a specific set of test images to highlight the ringing artefact and to be able to evaluate the behaviour of ringing along edges. Therefore we introduce a new ringing metric, that analyzes image profiles of compressed...
In order to objectively and automatically evaluate the degree of digital image scrambling, introduce the grey relation analysis theory, the paper proposes a new evaluation method of image scrambling. In the method, the definition and the feature of the ideal scrambling image are analyzed first, whose histogram is summarized at the same time. And then, the scrambling image is divided into some sub-images...
This paper presents a novel data-hiding scheme based on side-match vector quantization (SMVQ). While encoding a block of an image, a traditional SMVQ data-hiding scheme only considers the neighboring pixels of the block to be encoded to produce a state codebook, and then uses the index of the closest codeword in the state codebook to represent the block. The major problem of the traditional image...
In this paper, we propose selective estimation of least square based predictor algorithm and efficient overhead management scheme for lossless compression of digital mammograms. We exploit the characteristics of mammograms that most of the mammograms contain large number of blocks with constant gray level pixels, so a block based selective least square estimation algorithm is proposed. In our proposed...
Motion compensation with quarter-pel accuracy was added to H.264/AVC to improve the coding efficiency of images exhibiting fractional-pel movement. To enlarge the reference pictures, a fixed 6-tap filter is used. However, the values of the filter coefficients are constant regardless of the characteristic of the input video. An improved interpolation filter, called the Adaptive Interpolation Filter...
Depending on the content of a video sequence and the settings used for encoding it, the amount of bits spent for the transmission of motion vector information can be enormous and in some cases even take the largest fraction of the bit rate. This is not always necessary since often wide areas, i.e. background or large foreground regions, fit the same global motion. Additionally, a global motion model...
This paper presents a multilevel reversible data hiding method based on histogram shifting which can recover the original image in lossless way after the hidden data has been extracted from the stego image. The method generates a residual image using the prediction method to explore the similarity of neighboring and residual image, which comes from the difference between central pixel and its neighboring...
Image compression techniques such as Vector Quantization(VQ), Block Truncation Coding(BTC) and their hybrid methods, are widely used in many applications. Hiding secret data in image compression codes becomes necessary and attractive. In this paper, a data hiding approach in block truncation coding is presented. The proposed method hides secret data in compressed images by modifying the bitmaps generated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.