Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
We propose an online robust object tracking algorithm based on a sample-based dictionary. The sample-based dictionary in our method means that the over-completely dictionary of sparse coding algorithm is formed by using the sample basis extracted from video images. Different from the other tracking methods that use the object features and a set of boosted classifiers, the proposed algorithm considers...
In this paper an ObjectCode method is presented for fast template matching. Firstly, Local Binary Patterns are adopted to get the patterns for the template and the search image, respectively. Then, a selection strategy is proposed to choose a small portion of pixels (on average 1.87%) from the template, whose patterns are concatenated to form an ObjectCode representing the characteristics of the interested...
In recent years, many studies have been carried out about information security and watermarking. The main idea of this proposed method is to implement a invisible binary watermarking application based on Discrete Cosine Transform (DCT) and skewness thresholding. Thanks to the use of skewness values, distribution properties of DCT coefficients in blocks can be identified for robust watermarking process...
An image signature approach for content authentication is proposed. In the proposal, Contour let transformation is used to extract image feature, and the statistics of Contour let transformation coefficients are used to generate image signature. Then a tampering detection and tampering localization algorithm are developed by using generated image signature. Proposed method is robust for perceptually...
This paper takes place in the field of invisible chaos-based watermarking schemes. It addresses the quality study of an already pyblished algorithm by focusing on three class of properties. Its robustness is experimentally shown against classical attacks on a large set of image instances and image transformations. It correctness and completness are formally proven. Due to this main advantages, this...
Due to its superior performance, robust loss less data hiding algorithm based on statistics shifting has become hotspot in the field of data hiding recently. In this paper, on the basis of analyzing the principle of the statistics shifting algorithm, a novel robust loss less data hiding algorithm based on region selection is proposed. The proposed scheme divides a cover image into a number of non-overlapping...
With the explosive growth of internet technology, many innovative applications requiring exchange of large amount of data have become feasible and hence security of data have become a critical issue. In this paper, a robust and secure visible image watermarking algorithm is purposed. This purposed algorithm is based on Multi Wavelets with Modified fast Haar Wavelet transform [MFHWT]. MFHWT is the...
Digital images are displayed and perceived through a wide variety of media channels: newspapers, magazines, TV, Internet etc. When they are used in a sensitive matter such as evidence in a court of law, one major problem arises: the authenticity of the images. Access to complex image-editing software applications gives way to image tampering that is visually imperceptible. A very common way of image...
In this paper, we propose a digital watermarking method for stereoscopic video frames. A stereoscopic video frame is stored as two images and combined by software while displayed. These two stored images are with high similarity. In the circumstances, it should be taken into consideration to resist coalition attacks while developing a watermarking scheme for stereoscopic videos. As shown in experimental...
Digital watermarking technology is an important means of copyright protection. This article decomposes RGB for the color image and embeds the algorithm of multiple watermarks in the grayscale image of R, G. The algorithm increases the amount of watermark embedded and solves the interference problem of embedding multiple watermarks. The experiment proves that the algorithm of embedding watermark in...
Digital watermarking has been widely used for copyright protection for multimedia data. This paper proposes a new watermarking method of image for copyright protection based on Hadamard transform. This method can embed or hide an entire image or pattern as a watermark such as a company's logo or trademark directly into original image for copyright protection. This watermarking method deals with the...
In object recognition a robust feature set is considered as an important component in almost all the approaches proposed in the literature. In facial analysis, one of the best known feature set is based in Local Binary Patterns (LBP) which extracts the information contained in the image using comparisons between pixels in a region, finally such comparisons are encoded in form of histogram. We argue...
This paper presents a spread spectrum based image watermarking model that utilizes the Discrete Shearlet Transform (DST). The method employs the multiresolution representation characteristics of the DST to facilitate the modeling of the texture structure of the given image. The effectiveness of the proposed method in dealing with well-known attacks such as noise addition, blurring, compression and...
This paper deals with teleoperation technique of mobile robots. Communication characteristics are evaluated regarding remote control via wireless LAN. Three robust operation methods are proposed and applied to prototype system. Experiments revealed that the proposed methods have successfully guided the prototype mobile robot avoiding stuck within intermittent circumstances.
This paper proposes a watermarking method that can be applied to DICOM images to strengthen its security and privacy. A robust watermark is used to improve the identification/authentication of the image, even if it has been seriously modified, semifragile watermarks are used to embed information intended to vanish if the image losses its clinical/research value, and fragile watermarks are used to...
Magnetic Resonance Imaging (MRI) super-resolution image reconstruction algorithm, is presented in the paper. It is shown that the approach improves MRI spatial resolution in cases Compressed Sensing (CS) sequences are used. Compressed sensing (CS) aims at signal and images reconstructing from significantly fewer measurements than were traditionally thought necessary. Magnetic Resonance Imaging (MRI)...
In this work, a blind binary watermarking technique has been proposed. The present method is spatial domain technique and a binary watermark is embedded in compressed domain. BTC-PF based technique has been employed to embed the watermark. In the present method, a secret key ‘K’ has been used to enhance the security level. The proposed method is robust against different image processing attacks. The...
The large variety of signal processing tools available today permits to anyone to easily modify digital multimedia objects like images without leaving any perceptible trace of the modifications. Therefore the digital image authentication becomes a very important issue. In this paper we propose a semi-fragile image watermarking scheme for image authentication and tamper localization. The watermark...
Light-Field enables us to observe scenes from free viewpoints. However, it generally consists of 4-D enormous data, that are not suitable for storing or transmitting without effective compression. 4-D Light-Field is very redundant because essentially it includes just 3-D scene information. Actually, although robust 3-D scene estimation such as depth recovery from Light-Field is not so easy, a method...
A rotation resistant image watermarking algorithm is proposed to solve digital image watermarking extracting difficultly when rotating with any angle. The algorithm firstly deal watermarking with binary serialization, and then divide the source image into several circle area with the center point of the image, segment the circle area according to length of the binary watermarking sequences with certain...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.