The technique of the direct and inverse fuzzy (F-) transforms of three different types is introduced and approximating properties of the inverse F-transforms are described. A number of theorems establishing best appro...
详细信息
The technique of the direct and inverse fuzzy (F-) transforms of three different types is introduced and approximating properties of the inverse F-transforms are described. A number of theorems establishing best approximation properties have been proved. A method of lossy image compression and reconstruction on the basis of the F-transform is presented
Past research in the field of cryptography has not given much consideration to arithmetic coding as a feasible encryption technique, with studies proving compression-specific arithmetic. coding to be largely unsuitabl...
详细信息
ISBN:
(纸本)0819454990
Past research in the field of cryptography has not given much consideration to arithmetic coding as a feasible encryption technique, with studies proving compression-specific arithmetic. coding to be largely unsuitable for encryption. Nevertheless, adaptive modelling, which offers a huge model, variable in structure, and as completely as possible a function of the entire text that has been transmitted since the time the model was initialised, is a suitable candidate for a possible encryption-compression combine. The focus of the work presented in this paper has been to incorporate recent results of chaos theory, proven to be cryptographically secure, into arithmetic coding, to devise a convenient method to make the structure of the model unpredictable and variable in nature, and yet to retain, as far as is possible, statistical harmony, so that compression is possible. A chaos-based adaptive arithmetic coding-encryption technique has been designed, developed and tested and its implementation has been discussed. For typical text files, the proposed encoder gives compression between 67.5% and 70.5%, the zero-order compression suffering by about 6% due to encryption, and is not susceptible to previously carried out attacks on arithmetic coding algorithms.
Multimedia data may be transmitted or stored either according to the classical Shannon information theory or according to the newer Autosophy information theory. Autosophy algorithms combine very high "lossless&q...
详细信息
ISBN:
(纸本)0819454990
Multimedia data may be transmitted or stored either according to the classical Shannon information theory or according to the newer Autosophy information theory. Autosophy algorithms combine very high "lossless" data and image compression with virtually unbreakable "codebook" encryption. Shannon's theory treats all data items as "quantities", which are converted into binary digits (bit), for transmission in meaningless bit streams. Only "lossy" data compression is possible. A new "Autosophy" theory was developed by Klaus Holtz in 1974 to explain the functioning of natural self-assembling structures, such as chemical crystals or living trees. The same processes can also be used for growing self-assembling data structures, which grow like data crystals or data trees in electronic memories. This provides true mathematical learning algorithms, according to a new Autosophy information theory. Information in essence is only that which can be perceived and which is not already known by the receiver. The transmission bit rates are dependent on the data content only. applications already include the V.42bis compression standard in modems, the gif and tif formats for lossless image compression, and Autosophy Internet television. A new 64bit data format could make all future communications compatible and solve the Internet's Quality of Service (QoS) problems.
image compression is increasingly employed in applications such as medical imaging, for reducing data storage requirement, and Internet video transmission, to effectively increase channel bandwidth. Similarly, militar...
详细信息
ISBN:
(纸本)0819454990
image compression is increasingly employed in applications such as medical imaging, for reducing data storage requirement, and Internet video transmission, to effectively increase channel bandwidth. Similarly, military applications such as automated target recognition (ATR) often employ compression to achieve storage and communication efficiencies, particularly to enhance the effective bandwidth of communication channels whose throughput suffers, for example, from overhead due to error correction/detection or encryption. In the majority of cases, lossy compression is employed due the resultant low bit rates (high compression ratio). However, lossy compression produces artifacts in decompressed imagery that can confound ATR processes applied to such imagery, thereby reducing the probability of detection (Pd) and possibly increasing the rate or number of false alarms (Rfa or Nfa). In this paper, the authors' previous research in performance measurement of compression transforms is extended to include (a) benchmarking algorithms and software tools, (b) a suite of error exemplars that are designed to elicit compression transform behavior in an operationally relevant context, and (c) a posteriori analysis of performance data. The following transforms are applied to a suite of 64 error exemplars: visual Pattern imagecoding (VPIC [1]), Vector Quantization with a fast codebook search algorithm (VQ [2,3]), JPEG and a preliminary implementation of JPEG 2000 [4,5], and EBLAST [6-8]. compression ratios range from 2:1 to 200:1, and various noise levels and types are added to the error exemplars to produce a database of 7,680 synthetic test images. Several global and local (e.g., featural) distortion measures are applied to the decompressed test imagery to provide a basis for rate-distortion and rate-performance analysis as a function of noise and compression transform type.
The proceedings contain 16 papers from the Proceedings of SPIE - mathematics of data/imagecoding, compression, and encryption viI, with applications. The topics discussed include: autosophy data/image compression and...
详细信息
The proceedings contain 16 papers from the Proceedings of SPIE - mathematics of data/imagecoding, compression, and encryption viI, with applications. The topics discussed include: autosophy data/image compression and encryption;region segmentation techniques for object-based image compression: a review;data compression trade-offs in sensor networks;the relationship between shape under similarly transformations and shape under affine transformations;sparsity prediction and application to a new steganographic technique;phase signature-based image authentication watermark robust to compression and coding;texture-based steganalysis: results for color images;and combined dataencryption and compression using chaos functions.
The proceedings contains 79 papers from the conference on proceedings of the third international conference on wavelet analysis and its application [WAA] : volume 1. The topics discussed include: a novel solution to t...
详细信息
ISBN:
(纸本)9812389784
The proceedings contains 79 papers from the conference on proceedings of the third international conference on wavelet analysis and its application [WAA] : volume 1. The topics discussed include: a novel solution to tile effect exhibited by fractal image compression technique;global distortion optimal bit allocation scheme for image compression;one of image compression methods based on biorthogonal wavelet transform and LBG algorithm;gene, wavelet, fractal and data compression and design of biorthogonal wavelets based on lifting scheme and its application to imagecoding.
Consideration of the geometry of spaces of textual images leads to description of ensembles of text classes via representation of such imagedata using a multi-scale multi-resolution method. A direct approach to stati...
详细信息
ISBN:
(纸本)0819445606
Consideration of the geometry of spaces of textual images leads to description of ensembles of text classes via representation of such imagedata using a multi-scale multi-resolution method. A direct approach to statistics of textual imagedata using 4 by 4 matrices of pixel values in the image of the document is introduced. The mathematical approach to analysis of occurrences of such pieces of a text image is Matrix Frequency Analysis (MFA). It is shown that MFA provides effective information on the classification of files using small sample sizes.
This Volume 4793 of the conference proceedings contains 34 papers. Topics discussed include mathematics of data/imagecoding, compression, and encryption and security, remote sensing and communication and compressive ...
详细信息
This Volume 4793 of the conference proceedings contains 34 papers. Topics discussed include mathematics of data/imagecoding, compression, and encryption and security, remote sensing and communication and compressive processing.
暂无评论