The proceedings contain 40 papers. The special focus in this conference is on image and Graphics technologies and Applications. The topics include: Real-time non-invasive imaging of subcutaneous blood vessels;a digita...
ISBN:
(纸本)9783642371486
The proceedings contain 40 papers. The special focus in this conference is on image and Graphics technologies and Applications. The topics include: Real-time non-invasive imaging of subcutaneous blood vessels;a digital watermarking algorithm based on EHD image feature analysis;TLD based visual target tracking for planetary rover exploration;ocean surface rendering using shader technologies;an unsymmetrical diamond search algorithm for H.264/AVC motion estimation;a new fusion method of palmprint and palmvein;a fatigue testing method based on machine vision;extraction of cirrus cloud and its shadow based on HJ-1A/B imagery;patch-based image denoising with geometric structure clustering;a blind watermarking method in H.264 compressed domain;the homomorphic encryption scheme of security obfuscation;a tank shooting method simulation based on image analysis;treemap-based visualization methods for pesticide residues detection data;study on a compression algorithm for SAR raw data;a review on computer vision technologies applied in greenhouse plant stress detection;a prototype mapping system for marine disaster management;a transfer knowledge framework for object recognition of infrared image;a fast pen gesture matching method based on nonlinear embedding;simplification computing for visual events based on distinct silhouette and view-independent pruning algorithm;terrain rendering using GPU tessellation;improved calibration algorithm;the motion simulation for freestyle skiing aerials;contrast enhancement of mammographic images using guided image filtering;image zooming based on residuals;improved gray world algorithm based on salient detection and quad-tree 3D modeling technology oriented to WMS-based raster grid data.
GEZGN-2 is a real-time image processing subsystem, currently being developed for RASAT, the second small satellite to be launched by TÜBTAK-BLTEN, in 2007. It is an advanced version of the GEZCN payload, implemen...
详细信息
This paper addresses the important need for security measures in the transmission of medical images to ensure the confidentiality of sensitive patient information. Leveraging a synergistic combination of advanced cryp...
详细信息
The proceedings contain 66 papers. The topics discussed include: physiologically-based color matching functions;a probabilistic model of the categorical association between colors;method for optimizing the human obser...
The proceedings contain 66 papers. The topics discussed include: physiologically-based color matching functions;a probabilistic model of the categorical association between colors;method for optimizing the human observer functions;CIETC1-71 perspective: an overview on accurately computing tristimulus values;method for optimizing CIELAB;on the relationship of color imagecompression and gamut: JPEG and JPEG2000;modified multi-scaled retinex using chromaticity of highlight region for correcting color distortion;color gamut mapping algorithm for preserving spatial ratios;geodesic based ink separation for spectral printing;spectral prediction model for variable dot-size printers;printer characterization for UV encryption applications;and further accelerating the inversion of the Yule-Nielson modified Neugebauer model.
The proceedings contain 151 papers. The topics discussed include: mathematical model study of solar electrodialysis desalination;2×1-D fast Fourier transform interpolation for LTE-a OFDM pilot-based channel estim...
ISBN:
(纸本)9781538608722
The proceedings contain 151 papers. The topics discussed include: mathematical model study of solar electrodialysis desalination;2×1-D fast Fourier transform interpolation for LTE-a OFDM pilot-based channel estimation;quasi-isotropic circular arrays of anisotropic sensors;shunt compensation of SMIB power system incorporated with highly penetrated photovoltaic generator;an adaptive JPEG compression- encryption system using optimized local quantization matrices;anti-spoofing cooperative localization using Kalman filter;high efficiency 88 - 108MHz, 25W class-E PA for transmitters in smart cities;equivalent circuit for implemented low-pass filter with SRR metamaterial;design of a text independent speaker recognition system;new model for matching the sketch image with corresponding real image;comparison study between PV inverters available in the Palestinian market;analysis of PR-V-BLAST receiver for massive MIMO under correlated channel;design of triple band pass filter using defected stepped impedance log periodic resonator;FIR filter for frequency estimation using eigen-approach;the sociocultural role in perceptions and appraisals for the use of online reporting functions on social networking sites in Saudi Arabia;and planar monopole MIMO/diversity antenna for LTE/WWAN applications in smart mobile handsets.
The recommendation system functions similarly to a content filtering system, providing information depending on the preferences and behavior of the user. People use image sharing platforms such as Facebook, LinkedIn, ...
详细信息
In this paper, a new algorithm combined compression and imageencryption is presented. The proposed algorithm can be used in the field of high-speed confidential data transmission where security is required. The compr...
详细信息
In this paper, a new algorithm combined compression and imageencryption is presented. The proposed algorithm can be used in the field of high-speed confidential data transmission where security is required. The compression is based on a hierarchical structure called SPIHT(Set Partitioning in Hierarchical Trees). This compression is followed by an encryption scheme PSCS (Parametric Switching Chaotic System). The performances of this technique were evaluated in terms of compression quality and data security. Simulation results have shown the effectiveness of this technique, and thereafter, it is ready for a hardware implementation.
Consider an image that has been encrypted uncompressed. The data compression algorithms are ineffective because the encryption masks the source. To reduce the size, distributed source coding technique is used without ...
详细信息
Consider an image that has been encrypted uncompressed. The data compression algorithms are ineffective because the encryption masks the source. To reduce the size, distributed source coding technique is used without requiring the data be compressed prior to encryption. Under some reasonable condition, neither the security nor the compression efficiency will be sacrificed by performing compression in the encrypted domain. The design and analysis of a practical lossless image codec, where the image data undergoes stream-cipher based encryption before compression An efficient way to compress encrypted images is through Resolution-progressive compression (RPC), where RPC can be used for both interframe and intraframe correlation Lossless compression of encrypted sources can be achieved through Slepian-Wolf Coding. This work proposes a resolution progressive compression scheme which compresses an encrypted image progressively in resolution, such that the decoder can observe a low-resolution version of the image as well as video, study local statistics based on it, and use the statistics to decode the next resolution level. The system is implemented by using Matlab.
In modern era, multimedia technologies have been developed significantly. Multimedia data such as audio, video and image transfers over the internet is open and insecure. Security is required for storage and transmiss...
详细信息
In modern era, multimedia technologies have been developed significantly. Multimedia data such as audio, video and image transfers over the internet is open and insecure. Security is required for storage and transmission of digital images to avoid from unauthorized entities. A number of encryption schemes have been developed for security of multimedia data over insecure channel. So, there is a real need to compare encryption schemes that which technique is better for multimedia application. This paper presents the estimation for the good imageencryption algorithm. Chaos based imageencryption algorithm are used now a days because of better security and good performance. Behaviour of chaotic system is nonlinear, deterministic and sensitive to initial condition. A number of parameters, like correlation coefficient, information entropy, compression friendliness, number of pixels change rate, average intensity and unified average change intensity etc., are used to check the quality of cipher-text image. This work is review of two imageencryption schemes, namely compression Friendly encryption Scheme (CFES) and Chaos Based encryption Scheme (CBES).
In today’s era of technology, the unmeasurable data is being exchanged over the internet per second. So, for data transmission or data communication the cloud storage platforms were introduced for robust communicatio...
详细信息
暂无评论