|
|
|
Heri Prasetyo and Hendra Kurniawan
This paper presents an efficient and simple technique on reducing the false contour problem which often occurs in the JPEG decoded image. The false contour appears on JPEG decoded image while applying small quality factor. This problem induces unpleasant...
ver más
|
|
|
|
|
|
|
Diana Cri?an, Alexandru Irimia, Dan Gota, Liviu Miclea, Adela Puscasiu, Ovidiu Stan and Honoriu Valean
The Newcomb?Benford law states that in a set of natural numbers, the leading digit has a probability distribution that decays logarithmically. One of its major applications is the JPEG compression of images, a field of great interest for domains such as ...
ver más
|
|
|
|
|
|
|
Yin-Chen Lin, Jyun-Jie Wang, Sheng-Chih Yang and Chi-Chun Chen
This paper presents a joint source?channel image transmission model based on a modified trellis construction using variable-length and fixed-length codes. The model employs linear block trellis codes and a modified Bahl?Cocke?Jelinek?Raviv algorithm for ...
ver más
|
|
|
|
|
|
|
Urmila Pilania, Rohit Tanwar, Mazdak Zamani and Azizah Abdul Manaf
In today?s world of computers everyone is communicating their personal information through the web. So, the security of personal information is the main concern from the research point of view. Steganography can be used for the security purpose of person...
ver más
|
|
|
|
|
|
|
Walaa Khalaf, Abeer Al Gburi and Dhafer Zaghar
Image compression is one of the most important fields of image processing. Because of the rapid development of image acquisition which will increase the image size, and in turn requires bigger storage space. JPEG has been considered as the most famous an...
ver más
|
|
|
|
|
|
|
Heri Prasetyo and Hendra Kurniawan
-
|
|
|
|
|
|
|
Han Oh, Ali Bilgin and Michael Marcellin
-
|
|
|
|
|
|
|
Ehsaneddin Jalilian, Michael Linortner and Andreas Uhl
Collective cell movement is an indication of phenomena such as wound healing, embryonic morphogenesis, cancer invasion, and metastasis. Wound healing is a complicated cellular and biochemical procedure in which skin cells migrate from the wound boundarie...
ver más
|
|
|
|
|
|
|
Yan Liu, Bingxue Lv, Wei Huang, Baohua Jin and Canlin Li
Camera shaking and object movement can cause the output images to suffer from blurring, noise, and other artifacts, leading to poor image quality and low dynamic range. Raw images contain minimally processed data from the image sensor compared with JPEG ...
ver más
|
|
|
|
|
|
|
Barbara Cardone, Ferdinando Di Martino and Salvatore Sessa
This research proposes a new image compression method based on the F1-transform which improves the quality of the reconstructed image without increasing the coding/decoding CPU time. The advantage of compressing color images in the YUV space is due to th...
ver más
|
|
|
|
|
|
|
Ralf Stemmer, Hai-Dang Vu, Sébastien Le Nours, Kim Grüttner, Sébastien Pillement and Wolfgang Nebel
Fast yet accurate performance and timing prediction of complex parallel data flow applications on multi-processor systems remains a very difficult discipline. The reason for it comes from the complexity of the data flow applications w.r.t. data dependent...
ver más
|
|
|
|
|
|
|
Benjamin Aziz, Jeyong Jung, Julak Lee and Yong-Tae Chun
In this study, we evaluated one of the modern automated steganalysis tools, Stegdetect, to study its false negative rates when analysing a bulk of images. In so doing, we used JPHide method to embed a randomly generated messages into 2000 JPEG images. Th...
ver más
|
|
|
|
|
|
|
Weigui Li, Wenyu Sun, Yadong Zhao, Zhuqing Yuan and Yongpan Liu
An end-to-end image compression framework based on deep residual learning is proposed. Three levels of residual learning are adopted to improve the compression quality: (1) the ResNet structure; (2) the deep channel residual learning for quantization; an...
ver más
|
|
|
|
|
|
|
Qingming Zhang and Buhai Shi
This paper presents a novel method to extract local features, which instead of calculating local extrema computes global maxima in a discretized scale-space representation. To avoid interpolating scales on few data points and to achieve perfect rotation ...
ver más
|
|
|
|
|
|
|
Rasber Dh. Rashid, Ladeh S. Abdulrahman, Taban F. Majeed
Pág. 1 - 12
Digital Steganography means hiding sensitive data inside a cover object in a way that is invisible to un-authorized persons. Many proposed steganography techniques in spatial domain may achieve high invisibility requirement but sacrifice the good robustn...
ver más
|
|
|
|
|
|
|
Hongmei Liu, Jinhua Liu and Mingfeng Zhao
To improve the invisibility and robustness of the multiplicative watermarking algorithm, an adaptive image watermarking algorithm is proposed based on the visual saliency model and Laplacian distribution in the wavelet domain. The algorithm designs an ad...
ver más
|
|
|
|
|
|
|
Caterina Valeo and Rishi Gupta
Cell phone images of pervious pavement surfaces were used to explore relationships between surface infiltration rates (SIR) measured using the ASTM C1701 standard test and using a simple falling head test. A fiber-reinforced porous asphalt surface and a ...
ver más
|
|
|
|
|
|
|
Caterina Valeo and Rishi Gupta
Cell phone images of pervious pavement surfaces were used to explore relationships between surface infiltration rates (SIR) measured using the ASTM C1701 standard test and using a simple falling head test. A fiber-reinforced porous asphalt surface and a ...
ver más
|
|
|
|
|
|
|
Hengfu Yang, Jianping Yin and Mingfang Jiang
Robustness and discriminability are the two most important features of perceptual image hashing (PIH) schemes. In order to achieve a good balance between perceptual robustness and discriminability, a novel PIH algorithm is proposed by combining latent lo...
ver más
|
|
|
|
|
|
|
Luz Fátima Huallpa Vargas,Luis Pánfilo Yapu Quispe
En este trabajo se presenta el desarrollo de un procedimiento de autenticación de imágenes digitales combinando diversos métodos relacionados con watermarks (marcas de agua) digitales y métodos de cifrado, con el fin de proteger los derechos de autor de ...
ver más
|
|
|
|