The proceedings contain 27 papers from the conference on mathematics of data/image coding, compression, and encryption IV, with applications. The topics discussed include: improving wireless video communication withou...
详细信息
The proceedings contain 27 papers from the conference on mathematics of data/image coding, compression, and encryption IV, with applications. The topics discussed include: improving wireless video communication without feedback information;analysis of digital chaotic optical signals;lossless data compression in space amplifications;security analysis of public key watermarking schemes;dataencryption scheme with arithmetic coding and robust digital watermarking using random casting method.
Consideration of the geometry of spaces of textual images leads to description of ensembles of text classes via representation of such imagedata using a multi-scale multi-resolution method. A direct approach to stati...
详细信息
ISBN:
(纸本)0819445606
Consideration of the geometry of spaces of textual images leads to description of ensembles of text classes via representation of such imagedata using a multi-scale multi-resolution method. A direct approach to statistics of textual imagedata using 4 by 4 matrices of pixel values in the image of the document is introduced. The mathematical approach to analysis of occurrences of such pieces of a text image is Matrix Frequency Analysis (MFA). It is shown that MFA provides effective information on the classification of files using small sample sizes.
The first part of the article gives a brief examination of the state of art in terms of methodologies, hardware available and algorithms used in space applications. Particular emphasis is given to the lossless algorit...
详细信息
ISBN:
(纸本)0819441899
The first part of the article gives a brief examination of the state of art in terms of methodologies, hardware available and algorithms used in space applications. Particular emphasis is given to the lossless algorithms used and their characterization. In the second part a more detailed analysis, in terms of data entropy, is presented. At the end the preliminary results in the determination of compressibility of the file will be presented.
This Volume 4793 of the conference proceedings contains 34 papers. Topics discussed include mathematics of data/imagecoding, compression, and encryption and security, remote sensing and communication and compressive ...
详细信息
This Volume 4793 of the conference proceedings contains 34 papers. Topics discussed include mathematics of data/imagecoding, compression, and encryption and security, remote sensing and communication and compressive processing.
image compression is increasingly employed in applications such as medical imaging, for reducing data storage requirement, and Internet video transmission, to effectively increase channel bandwidth. Similarly, militar...
详细信息
ISBN:
(纸本)0819454990
image compression is increasingly employed in applications such as medical imaging, for reducing data storage requirement, and Internet video transmission, to effectively increase channel bandwidth. Similarly, military applications such as automated target recognition (ATR) often employ compression to achieve storage and communication efficiencies, particularly to enhance the effective bandwidth of communication channels whose throughput suffers, for example, from overhead due to error correction/detection or encryption. In the majority of cases, lossy compression is employed due the resultant low bit rates (high compression ratio). However, lossy compression produces artifacts in decompressed imagery that can confound ATR processes applied to such imagery, thereby reducing the probability of detection (Pd) and possibly increasing the rate or number of false alarms (Rfa or Nfa). In this paper, the authors' previous research in performance measurement of compression transforms is extended to include (a) benchmarking algorithms and software tools, (b) a suite of error exemplars that are designed to elicit compression transform behavior in an operationally relevant context, and (c) a posteriori analysis of performance data. The following transforms are applied to a suite of 64 error exemplars: visual Pattern imagecoding (VPIC [1]), Vector Quantization with a fast codebook search algorithm (VQ [2,3]), JPEG and a preliminary implementation of JPEG 2000 [4,5], and EBLAST [6-8]. compression ratios range from 2:1 to 200:1, and various noise levels and types are added to the error exemplars to produce a database of 7,680 synthetic test images. Several global and local (e.g., featural) distortion measures are applied to the decompressed test imagery to provide a basis for rate-distortion and rate-performance analysis as a function of noise and compression transform type.
Recent studies have shown that chaotic processes provide an appropriate mechanism for the encryption of sensitive signal information. Thus, a Volterra nonlinear integral equation is used to generate such chaotic proce...
详细信息
ISBN:
(纸本)0819429112
Recent studies have shown that chaotic processes provide an appropriate mechanism for the encryption of sensitive signal information. Thus, a Volterra nonlinear integral equation is used to generate such chaotic processes as solutions of an initial-value problem.
The suggested device includes a spatial light modulator (SLM) allowing varying the polarization state of an input illumination source. Attached to the SLM a sub wavelength grating is placed per each pixel of the devic...
详细信息
ISBN:
(纸本)0819445606
The suggested device includes a spatial light modulator (SLM) allowing varying the polarization state of an input illumination source. Attached to the SLM a sub wavelength grating is placed per each pixel of the device. This grating is used to encode the input information. The decoding is done by another sub wavelength grating. When the two gratings are attached a variation of the energetic efficiency between the two polarization states occurs. The polarization ratio encrypts the spatial information strewn. The sub wavelength grating are hard to copy and thus high encryption capability is obtained.
The proceedings contain 16 papers from the Proceedings of SPIE - mathematics of data/imagecoding, compression, and encryption viI, with applications. The topics discussed include: autosophy data/image compression and...
详细信息
The proceedings contain 16 papers from the Proceedings of SPIE - mathematics of data/imagecoding, compression, and encryption viI, with applications. The topics discussed include: autosophy data/image compression and encryption;region segmentation techniques for object-based image compression: a review;data compression trade-offs in sensor networks;the relationship between shape under similarly transformations and shape under affine transformations;sparsity prediction and application to a new steganographic technique;phase signature-based image authentication watermark robust to compression and coding;texture-based steganalysis: results for color images;and combined dataencryption and compression using chaos functions.
This Volume 3456 of the conference proceedings contains 20 papers. Topics discussed include mathematics of data/imagecoding, compression and encryption, digital watermarking and encryption, image compression, error d...
详细信息
This Volume 3456 of the conference proceedings contains 20 papers. Topics discussed include mathematics of data/imagecoding, compression and encryption, digital watermarking and encryption, image compression, error detection, modeling and management.
Lattice independence and strong lattice independence of a set of pattern vectors are fundamental mathematical proper-ties that lie at the core of pattern recognition applications based on lattice theory. Specifically,...
详细信息
ISBN:
(纸本)9780819468482
Lattice independence and strong lattice independence of a set of pattern vectors are fundamental mathematical proper-ties that lie at the core of pattern recognition applications based on lattice theory. Specifically, the development of morphological associative memories robust to inputs corrupted by random noise are based on strong lattice independent sets, and real world problems, such as, autonomous endmember detection in hyperspectral imagery, use auto-associative morphological memories as detectors of lattice independence. In this paper, we present a unified mathematical framework that-develops the relationship between different notions of lattice independence currently used in the literature. Computational procedures are provided to test if a given set of pattern vectors is lattice independent or strongly lattice independent;in addition, different techniques are fully described that can be used to generate sets of vectors with the aforementioned lattice properties.
暂无评论