Detection of object and recognition of objects in real world computing environment is one of the challenging tasks in computer vision. To solve this task there are many challenges in designing algorithm, we have to in...
详细信息
ISBN:
(纸本)9781538681909
Detection of object and recognition of objects in real world computing environment is one of the challenging tasks in computer vision. To solve this task there are many challenges in designing algorithm, we have to introduce different and innovative techniques to detect objects in natural environments. image security is of high importance in various applications including military, medical and many others. Security is one of the most challenging aspects in the internet and network applications. Encrypting entire image is very slow. Selective encryption is a scheme which intends to save computational power, network resources, and execution time. To encrypt object selectively object detection techniques are used. This technique is one of the most promising solutions to increase the speed of encryption as compared to the traditional encryption techniques. Selective encryption is helpful for the multimedia contents like image, video and audio. The compression ratio achieved is very high, since we store only the residues of extracted pixel of an image. So this paper discussed about Selective encryption with object detection technique.
In the present article, is proposed a novel encryption-watermarking approach. It is applied for embedding speech signals into digital images. It consists at first step in encrypting the watermark. After that, the obta...
详细信息
ISBN:
(纸本)9783030210090;9783030210083
In the present article, is proposed a novel encryption-watermarking approach. It is applied for embedding speech signals into digital images. It consists at first step in encrypting the watermark. After that, the obtained encrypted watermark is embedded into the host image. This watermark encryption is performed employing Arnold cat map and the embedding is performed employing a secure image watermarking technique based on LWT - SVD. We evaluate the performance of this proposed technique by comparing it to an existing encryption watermarking approach called DSAWM. The latter is also a secure watermarking scheme based on DWT - SVD. It also applies Arnold Cat Map for encrypting the watermark at first step and then inserting the obtained encrypted watermark into the cover image. Evaluation and comparison of the two techniques are performed by computing the SegSNR;PESQ;PSNR;RMSE, pcc, MAE and SSIM. The obtained results from this evaluation show the performance of this proposed encryption-watermarking approach. In fact, the PSNR, RMSE, pcc, MAE and SSIM values show a good perceptual quality of the watermarked images. Moreover, the SegSNR and PESQ values show a very good perceptual quality of the speech signals reconstructed after watermark extraction and decryption. We also tested the robustness of the proposed technique by applying three sorts of attacks on the watermarked images. Those attacks are Median, JPEG compression and additive White Noise attacks. The results obtained from calculation of the SNR, PESQ;PSNR and SSIM, show the robustness of this proposed approach against those attacks.
Traditional fast Discrete Cosine Transforms (DCT)/ Inverse DCT (IDCT) algorithms have focused on reducing the arithmetic complexity. In this manuscript, we implemented a new architecture simultaneous for image compres...
详细信息
In this paper a novel coding method which based on fuzzy vector quantization for polluted image by Gaussian white-noise is presented. By restraining the high frequency component of wavelet image, the noise is signific...
详细信息
ISBN:
(纸本)0819442798
In this paper a novel coding method which based on fuzzy vector quantization for polluted image by Gaussian white-noise is presented. By restraining the high frequency component of wavelet image, the noise is significantly removed. Then it could be coded by fuzzy vector quantization technique. The simulation result shows that this method can not only achieve high compression ratio but also remove noise dramatically.
In this paper. a new method is proposed to hide watermark image based on the discrete integer Haar wavelet transform. This method utilizes excellent properties of the discrete integer Haar wavelet transform and some c...
详细信息
ISBN:
(纸本)0819442798
In this paper. a new method is proposed to hide watermark image based on the discrete integer Haar wavelet transform. This method utilizes excellent properties of the discrete integer Haar wavelet transform and some characteristies of human visual system(HSV). The watermark are processed the discrete Haar wavelet transforms as a grey-value image, and are decomposed and synthesized the image of the watermark and hiding. The algorithm of the discrete integer Haar wavelet is simple and viable. Algorithmic operation is also small The speed of algorithmic operation is quick. The algorithm is of parallel structure. The experimental results using this algorithm shows that the method of this paper implement that be added watermark and be hidden processing to image. This method can improve robustness of watermarking.
An emerging feature of multimedia and telepresence systems is stereo imagery. Stereo images provide an enhanced sense of presence, and have been found to be operationally useful in tasks requiring remote manipulation ...
详细信息
ISBN:
(纸本)0819442798
An emerging feature of multimedia and telepresence systems is stereo imagery. Stereo images provide an enhanced sense of presence, and have been found to be operationally useful in tasks requiring remote manipulation or judgment of spatial relationships. A conventional stereo system with a single left-fight pair needs twice the raw data as a monoscopic imaging system. As a result there has been increasing attention given to imagecompression methods specialized to stereo pairs. In this paper, the mixed-resolution coding, is a psychophysically justified technique that exploits known facts about human stereovision to code stereopairs in a subjectively acceptable manner, is used to the stereo imagecompression. By combining both the mixed-resolution coding and SPT(subspace projection technique)-based disparity-compensation techniques,the left image can be compressed by a wavelet-transform-based scheme independent of the fight image. By performing low-resolution SPT-based disparity-compensation technique, the disparity is able to predict the low-resolution fight image from the left image at a lower resolution using the disparity relation, The low-resolution images are obtained using the wavelet decomposition. At the decoder, the low-resolution fight subimage is estimated using the disparity from the low-resolution left subimage. A full-sized resolution is obtained by upsampling with a factor of 4 and resonstructing with the synthesis low pass filter. We provide experimental results,that show that our proposed scheme achieves a PSNR gain of about 0.98 dB as compared to a block-based disparity compensation coding scheme,encoded at the same bit rate.
In this paper, an image representation method based on arbitrary shaped regions, and motion estimation of the image sequence according to this representation of the image is proposed. In order to avoid over-segmentati...
详细信息
ISBN:
(纸本)0819442798
In this paper, an image representation method based on arbitrary shaped regions, and motion estimation of the image sequence according to this representation of the image is proposed. In order to avoid over-segmentation. the initial frame in the image sequence is smoothed while edge of the image is preserved. The smoothing algorithm is the modification version of Alvarez's method. Then, the smoothed frame is segmented by the watershed method. According to the label image, the image is stored in the form of region adjacency graph. To further solve the problem of the over-segmentation, the merging criterions based on average region intensity and edge strength and region size are given. The affine transformation is used as motion model for each region, and the nonlinear least square method is used for the optimization. Compared with the method based on pixel, the result shows that the motion vectors produced by our algorithm are more consistent and the PSNR is improved.
A new Autosophy information theory may provide an alternative in transmitting graphics or live television on the Internet or information superhighway. In this new information theory, 'Information' is dependent...
详细信息
ISBN:
(纸本)0780326377
A new Autosophy information theory may provide an alternative in transmitting graphics or live television on the Internet or information superhighway. In this new information theory, 'Information' is dependent only on image content or 'Novelty' and 'Movement' within the images. Information is redefined as something not already known to the receiver. Everything the receiver already knows is redundant and need not to be communicated. 'Knowledge' is accumulated in tree networks that grow by themselves like data crystals. The result is a new kind of television in which the bandwidth is determined only by the image content or what is to be shown onscreen. Hardware parameters become irrelevant. Very high lossless imagecompression is achieved without sacrificing image quality. The transmission method is especially suitable for packet switching networks and provides optional encryption for network security.
The traffic of digital images has grown rapidly in the Internet. Security of image becomes important for many sectors mainly for medical applications. Nowadays, the transmission of medical images is a daily routine, e...
详细信息
ISBN:
(纸本)1604238216
The traffic of digital images has grown rapidly in the Internet. Security of image becomes important for many sectors mainly for medical applications. Nowadays, the transmission of medical images is a daily routine, especially over wireless (battlefields, traffic accidents, etc). Partial encryption is an approach to reduce the computational resources for huge volumes of multimedia data in low power network. This paper presents a method of partial or selective encryption for JPEG images. It is based on encryption of some quantified DCT coefficients in low and high frequencies. We have combined compression and encryption in order to fully dissimulate the visual information of the image and to see the image in low quality resolution.
Computer aided surgery is by sure a set of technologies that provide a real support to surgeons during their operational job. This includes - but it is not limited to - novel sensors and systems and software for data ...
详细信息
ISBN:
(纸本)9780819487469
Computer aided surgery is by sure a set of technologies that provide a real support to surgeons during their operational job. This includes - but it is not limited to - novel sensors and systems and software for data analysis and visualization. In particular the use of intraoperational probes is eased if the position of the probe within the operational field can be exactly calculated by the supporting software. Commercial systems have already been developed for this purpose but their complexity and cost reduces their usability for the majority of probes. This paper presents a simple approach to calculate the probe position within the operational field that requires a minimum cost.
暂无评论