The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In 2010, Chen et al. proposed a data hiding scheme with high payload and good visual quality. The edge information is detected and most of the secret bits are embedded into the edge area. An index pixel is chosen to record the edge information for each block. However, the embedding space will decrease because of the index pixel. Thus, we proposed a data hiding that enhances the visual quality based...
In this paper, a simple and robust watermarking algorithm is presented by using the third and the fourth least significant bits (LSB) technique. The proposed algorithm is more robust than the traditional LSB technique in hiding the data inside the image. Using the proposed algorithm, we will embed two bits in the third and fourth LSB. Experimental results show that the quality of the watermarked image...
This paper proposes a reversible visible watermarking method which are contour style. According to the fact that it has informational redundancy in a nature images usually, it is possible to embed watermarking image in the corresponding area of original image. Based on the cryptography method, users can view the original image after remove the visible watermarking by the proposed method. The proposed...
Video compression algorithms are time consuming processes. A key part of video compression algorithms which is also time consuming is motion estimation (ME) and computation of motion vectors (MVs). During this process, a series of candidate blocks should be searched to find the best motion vectors. In this paper, we propose a method for reducing the motion estimation process time. The idea of our...
The traditional 2-D MLM is often used to protecting images' details, but the algorithm is weak when it is used to suppress image noise particularly image noise with rich details. In order to prove this problem, this paper proposes an improved 2-D MMF algorithm which the number of basic sub-windows is 6 while the number of basic sub-windows is 4 in the traditional 2-D MLM, make sure every pixel can...
Filtering is an essential step to image processing, at present, a lot of filtering algorithm will damage the detail information of an image when they were used to remove noise that distribute over the image, in such circumstances, attaining an ideal effect is very difficult. The improved filtering algorithm based on gray correlation degree makes use of gray correlation analysis to find out random...
In this paper, a mathematical model is proposed to estimate the distortion caused by random packet losses for multi-view video transmission. Based on the study of multi-view video coding, the proposed model takes into account the disparity/motion compensation which relates the channel-induced distortion in the current frame with that in the previous frame or the adjacent view, and allows for any motion-compensated...
A modified orthogonal search (OS) algorithm via gradient descent is proposed for fast motion estimation (ME). Gradient descent method, a first-order optimization algorithm in machine learning, is employed in video coding to reduce the ME time for coding performance enhancement. An improved OS algorithm is created in our proposed method. Through this method, the number of search points is reduced significantly...
Image fusion quality assessment method based on Error-sensitive Model was seen as the issue of the fidelity of the image signal rather than fidelity of image information.Because they didn't consider the human visual characteristics,they are inconsistent with the subjective evaluation.In this paper,based on SSIM algorithm,considering the fidelity of image information,it will combine the structural...
Payload and imperceptibility are two important features of the information hiding system, but how to taken care of these two features is the challenge to researchers. In this paper, a new method of information hiding is proposed about visual effects and safety .It doesn't transform the information at first. Transforming the image into cover by traditional Arnold transformation, and the cover is divided...
This study presented a new algorithm for hiding information in an carrier image. It hides information by using the numerical value relation of three neighboring DCT coefficients with Zig-Zag order of block image. Firstly, each block of image is transformed by DCT. Then the DCT coefficient matrix is scanned by Zig-Zag scanning order to ensure the continuity of the neighboring coefficients. And then...
This paper proposes an improving method for the pixel-wise based image watermarking by using image averaging technique and prediction of tuned watermarked pixels. To reduce the error in the original pixel prediction process caused by the high different values of neighbor pixels in the watermarked image, the technique of image averaging is applied to host image in the embedding process, and the watermarked...
Multispectral image compression which are based on the one-, two- and three-dimensional wavelet transforms has been existed in many papers. Existing image compression algorithms have proved to be very efficient in compressing these kinds of images. We adopted the principal component analysis,clustering and spectral angle cosine to classify and compress in spectral dimension.In this article, we present...
This paper proposes an RGB-based, secure technique to maintain and authenticate the integrity of a document. The novel Steganographic algorithm that we have proposed has its strength greatly enhanced by use of hybrid cryptography on data that is to be hidden in cover image. The secret message is converted into two kinds of plaintexts by subsequent ASCII and binary conversions and suitable bit stuffing...
H.264 introduces a technology of intra-prediction to improve the coding efficiency of I frames, but also greatly increased the computational complexity of encoding. This paper proposes a fast intra- prediction mode selection algorithm. The algorithm predicted macroblock boundaries and the fast intra- prediction mode selection to speed up encoding rate. The result of experiments show that the proposed...
In order to get the best mode, H.264 computes the cost of every mode for each block by RDO (rate distortion optimization) technique, but it increases a high computational complexity .This paper combines Pan's fast algorithm and an efficient fast mode decision for intra prediction is proposed. First, the intra prediction's types are decided by whether a block is smooth. Second, the Pan's fast algorithm...
The objective of this work is to investigate the performance of a new inloop filter for video compression, which uses temporal rather than spatial information to improve the quality of reference frames used for prediction. The new filter has been integrated into the H.264/AVC baseline encoder and tested on a wide range of sequences. Experimental results show that the filter achieves a bit rate reduction...
Reversible data hiding has drawn considerable attention in recent years. In this paper, we used the tictactoemidlet predictions to achieve a histogram-based reversible data hiding. The histogram is created by exploiting all difference values between pixels and their predictive values. Experimental results show that our methods are capable of providing a great embedding capacity without making noticeable...
In this paper a novel Modified Directional Weighted Median Based (MDWM) filter has been proposed, which is based on the differences between the current pixel and its neighbors aligned with four main directions. A direction index is used for each edge aligned with a given direction. Then, the minimum of these four direction indexes is used for impulse detection. Known median-based de-noising methods...
In this paper, we develop a watermarking scheme for image authentication and verification. The watermarking scheme for tamper detection of an image is fragile and block-based. Such a scheme has good tamper localization and high tamper detection rate. The security of our scheme depends on a secret key, even though the attacker got the original watermark pattern and watermarking algorithm. The watermark...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.