The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this study, a novel split method was proposed to enlarge low resolution image. Instead of maintaining the grey levels of original pixels and estimating the grey levels for newly added pixels, the proposed approach split the original pixel, into new pixels. Two approaches are proposed to estimate grey levels for the new pixels, namely zero order split approach and 2nd order split approach. Degraded...
The relevance of the spatial domain is mainly eliminated by intra-prediction encoding. First, the traditional intra-prediction algorithms are introduced. And then, according to the correlation between the most likely mode and the best mode, a mode matrix is arrived at, the use of this mode matrix for early termination. The experimental results show that when we use this matrix in the proposed algorithm,...
Following the rapid advances in digital technologies, more and more consumer electronic devices, such as cell phones and PDAs, are equipped with built-in camera modules. In order to be cost-effective, optoelectronics components used in such devices are usually not sophisticated enough to support professional photographing. Pictures taken by such devices tend to be of unsatisfiable quality under poor...
Image segmentation denotes a process by which an image is partitioned into non-intersecting regions and each region is homogeneous. Many approaches have been proposed for the color image segmentation. Among these approaches, the clustering methods have been extensively investigated and used. Fuzzy C-Means has been used in image segmentation widely. However, it is not good for the image with noise...
Steganography, a technique of data hiding, is becoming more and more significant with expansion of the Internet communication. As a result, various steganographic algorithms have been proposed in recent years, for example, Ni et al. have carried out a lossless data-hiding algorithm based on the histogram modification. In order to reinforce more security and more data embedding capacity, this paper...
Scalable Video Coding (SVC) technique, a new research area in the image and video processing, was intensively researched in recent years. This paper mainly introduced the relevant concepts, and then proposed an efficient frame rate control (temporal scalability) method on the basis of these concepts. Experimental result showed hierarchical Motion Compensation Temporal Filter (MCTF) structure can provide...
For image compression, the properties of wavelet transform like multiresolution representation, scalability, and progressive transmission plays a vital role. There is a significant quantity of information in audio, video and image signals that is irrelevant and need to be compressed. Image compression reduces the number of bits required to represent an image. The storage requirements or transmission...
In this work, we propose a new frame rate conversion algorithm (FRCA) based on adaptive motion estimation and compensation. In the proposed algorithm, an adaptive diamond strategy is firstly used to find out all the motion vectors for each block by adaptively applying diamond algorithm in the current frame. Secondly, the motion vector for each block is further refined by full search algorithm to reduce...
In this paper, we propose a new lossy image compression algorithm for DICOM ( Digital Imaging and Communications in Medicine) images using Bilinear interpolation. This method presents a technique for classification of the image blocks on the basis of threshold value of variance. The image is divided into [m×n] blocks. Depending on the variance, the block is classified as significant or insignificant...
In this paper we propose a novel fragile watermarking scheme that uses very little bit budget to detect tamper in medical images, based on hamming codes. Unlike other papers that used hamming codes in a robust watermarking context, we use this code to detect errors in received watermarked image. The host image is decomposed into blocks and verification is performed block-wise in a way that we can...
The performance evaluation of watermarking scheme is done by two performance metrics: perceptual transparency and robustness. Perceptual transparency refers quality of image which is measured by `Peak Signal to Noise Ratio' (PSNR). Robustness is measured in terms of `Correlation Factor' (ρ). A good quality watermarking scheme should have maximum PSNR, ideally Correlation Factor equals to...
In the presented research on codebook optimization for vector quantization, an associative memory architecture is applied, which searches the most similar data among previously stored reference data. For realizing the learning function of new codebook data, a learning algorithm is implemented, which is based on this associative memory and which imitates the concept of the human short/long-term memory...
An improve method of the block wise non-local means (BNL - means) is proposed for removing noise in the digital image. This method consists of the spectral decomposition of the Gaussian weighted matrix, the pseudo filter constructions, computations of the pseudo weighted coefficients and image denoising using the weighted sum of Gaussian. Experimental results show that this method is simpler, more...
H-DIBCO 2010 is the International Document Image Binarization Contest which is dedicated to handwritten document images organized in conjunction with ICFHR 2010 conference. The general objective of the contest is to identify current advances in handwritten document image binarization using meaningful evaluation performance measures. This paper reports on the contest details including the evaluation...
This paper presents a new human visual system (HVS) based adaptive digital watermarking scheme using discrete cosine transformation (DCT) and singular value decomposition (SVD) for copyright protection. For watermark embedding mask of the original image is computed using HVS model and original image is transformed into frequency domain using DCT. We embed watermark by modifying the singular values...
An image compressing technique for High Dynamic Range (HDR) image sensors is introduced. Compression is performed in two steps: Pixel value coding optimization followed by DCT-based (Discrete Cosine Transform) compression. A floating point coding technique is first used with a common exponent shared between pixels of the same block, and then a DCT is applied to each group of pixels. This new concept,...
In this paper, we present a novel method to embedding secret message in the cover-image. The basic concept of the proposed method is by simple Least Significant Bit (LSB) substitution. We propose a steganography method that applies a technique to embedding a wavelet compressed secret message within the Least Significant Bit (LSB) of the cover image pixels in a specific pattern. The proposed method...
Data/image compression is a significant application of linear algebra. The need to minimize the amount of digital information stored and transmitted is an ever growing concern in the modern world. Singular Value Decomposition (SVD) is an effective tool for minimizing data storage and data transfer. The proposed work explores image compression through the use of SVD on image matrices. The performance...
As an important field in information security, image encryption algorithm has been a research focus. At the same time there are few works on fractal set as the encryption key among various encryption algorithms. In the paper, Mandelbrot set (abbreviated as M set) and the Hilbert transformation are utilized to generate the random key. Since M set can be iterated from only a few parameters, it can reduce...
This paper proposes a distortionless image data hiding algorithm based on integer wavelet transform that can hide data into the original image .The data can be retrieved and the original image can be recovered without any distortion after the hidden data are extracted. This algorithm hides data into one or more middle bitplane(s) of the integer wavelet transform coefficients in the LH, HL and HH frequency...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.