Multimedia data may be transmitted or stored either according to the classical Shannon information theory or according to the newer Autosophy information theory. Autosophy algorithms combine very high "lossless&q...
详细信息
ISBN:
(纸本)0819454990
Multimedia data may be transmitted or stored either according to the classical Shannon information theory or according to the newer Autosophy information theory. Autosophy algorithms combine very high "lossless" data and image compression with virtually unbreakable "codebook" encryption. Shannon's theory treats all data items as "quantities", which are converted into binary digits (bit), for transmission in meaningless bit streams. Only "lossy" data compression is possible. A new "Autosophy" theory was developed by Klaus Holtz in 1974 to explain the functioning of natural self-assembling structures, such as chemical crystals or living trees. The same processes can also be used for growing self-assembling data structures, which grow like data crystals or data trees in electronic memories. This provides true mathematical learning algorithms, according to a new Autosophy information theory. Information in essence is only that which can be perceived and which is not already known by the receiver. The transmission bit rates are dependent on the data content only. applications already include the V.42bis compression standard in modems, the gif and tif formats for lossless image compression, and Autosophy Internet television. A new 64bit data format could make all future communications compatible and solve the Internet's Quality of Service (QoS) problems.
The proceedings contain 16 papers from the Proceedings of SPIE - mathematics of data/imagecoding, compression, and encryption VII, with applications. The topics discussed include: autosophy data/image compression and...
详细信息
The proceedings contain 16 papers from the Proceedings of SPIE - mathematics of data/imagecoding, compression, and encryption VII, with applications. The topics discussed include: autosophy data/image compression and encryption;region segmentation techniques for object-based image compression: a review;data compression trade-offs in sensor networks;the relationship between shape under similarly transformations and shape under affine transformations;sparsity prediction and application to a new steganographic technique;phase signature-based image authentication watermark robust to compression and coding;texture-based steganalysis: results for color images;and combined dataencryption and compression using chaos functions.
The proceedings contains 22 papers of SPIE : mathematics of data/imagecoding, compression, and encryption VI, with applications. The topics discussed include: natural language insensitive short textual string compres...
详细信息
The proceedings contains 22 papers of SPIE : mathematics of data/imagecoding, compression, and encryption VI, with applications. The topics discussed include: natural language insensitive short textual string compression;techniques for region coding in object-based image compression;boundary representation techniques for object-based image compression;meitei coding for subband image compression;standards-compatible compression for automated image recognition in sensor networks and surveillance systems and non-MSE data compression for emitter location for radar pulse trains.
The proceedings contain 27 papers from the conference on mathematics of data/imagecoding, compression, and encryption IV, with applications. The topics discussed include: improving wireless video communication withou...
详细信息
The proceedings contain 27 papers from the conference on mathematics of data/imagecoding, compression, and encryption IV, with applications. The topics discussed include: improving wireless video communication without feedback information;analysis of digital chaotic optical signals;lossless data compression in space amplifications;security analysis of public key watermarking schemes;dataencryption scheme with arithmetic coding and robust digital watermarking using random casting method.
Consideration of the geometry of spaces of textual images leads to description of ensembles of text classes via representation of such imagedata using a multi-scale multi-resolution method. A direct approach to stati...
详细信息
ISBN:
(纸本)0819445606
Consideration of the geometry of spaces of textual images leads to description of ensembles of text classes via representation of such imagedata using a multi-scale multi-resolution method. A direct approach to statistics of textual imagedata using 4 by 4 matrices of pixel values in the image of the document is introduced. The mathematical approach to analysis of occurrences of such pieces of a text image is Matrix Frequency Analysis (MFA). It is shown that MFA provides effective information on the classification of files using small sample sizes.
The first part of the article gives a brief examination of the state of art in terms of methodologies, hardware available and algorithms used in space applications. Particular emphasis is given to the lossless algorit...
详细信息
ISBN:
(纸本)0819441899
The first part of the article gives a brief examination of the state of art in terms of methodologies, hardware available and algorithms used in space applications. Particular emphasis is given to the lossless algorithms used and their characterization. In the second part a more detailed analysis, in terms of data entropy, is presented. At the end the preliminary results in the determination of compressibility of the file will be presented.
This Volume 4793 of the conference proceedings contains 34 papers. Topics discussed include mathematics of data/imagecoding, compression, and encryption and security, remote sensing and communication and compressive ...
详细信息
This Volume 4793 of the conference proceedings contains 34 papers. Topics discussed include mathematics of data/imagecoding, compression, and encryption and security, remote sensing and communication and compressive processing.
Steganographic and watermarking information inserted into a color image file, regardless of embedding algorithm, causes disturbances in the relationships between neighboring pixels. A method for steganalysis utilizing...
详细信息
ISBN:
(纸本)0819454990
Steganographic and watermarking information inserted into a color image file, regardless of embedding algorithm, causes disturbances in the relationships between neighboring pixels. A method for steganalysis utilizing the local binary pattern (LBP) texture operator to examine the pixel texture patterns within neighborhoods across the color planes is presented. Providing the outputs of this simple algorithm to an artificial neural net capable of supervised learning results in the creation of a surprisingly reliable predictor of steganographic content, even with relatively small amounts of embedded data. Other tools for identifying images with steganographic content have been developed by forming a neural network input vector comprised of image statistics that respond to particular side effects of specific embedding algorithms. The neural net in our experiment is trained with general texture related statistics from clean images and images modified using only one embedding algorithm, and is able to correctly discriminate clean images from images altered by data embedded by one of various different watermarking and steganographic algorithms. Algorithms tested include various steganographic and watermarking programs and include spatial and transform domain image hiding techniques. The interesting result is that clean color images can be reliably distinguished from steganographically altered images based on texture alone, regardless of the embedding algorithm.
The suggested device includes a spatial light modulator (SLM) allowing varying the polarization state of an input illumination source. Attached to the SLM a sub wavelength grating is placed per each pixel of the devic...
详细信息
ISBN:
(纸本)0819445606
The suggested device includes a spatial light modulator (SLM) allowing varying the polarization state of an input illumination source. Attached to the SLM a sub wavelength grating is placed per each pixel of the device. This grating is used to encode the input information. The decoding is done by another sub wavelength grating. When the two gratings are attached a variation of the energetic efficiency between the two polarization states occurs. The polarization ratio encrypts the spatial information strewn. The sub wavelength grating are hard to copy and thus high encryption capability is obtained.
The next generation of Compton telescopes (such as MEGA or NCT) will detect impinging gamma rays by measuring one or more Compton interactions, possibly electron tracks, and a final photo absorption. However, the reco...
详细信息
ISBN:
(纸本)9780819468482
The next generation of Compton telescopes (such as MEGA or NCT) will detect impinging gamma rays by measuring one or more Compton interactions, possibly electron tracks, and a final photo absorption. However, the recovery of the original parameters of the photon, especially its energy and direction, is a challenging task, since the measured data only consists of a set of energy and position measurements and their ordering, i.e. the path of the photon, is unknown. Thus the main tasks of the pattern recognition algorithm are to identify the interaction sequence of the photon (i.e. which hit is the start point) and distinguish the pattern from background signatures, especially incompletely absorbed events. The most promising approach up to now is based on Bayesian statistics: The Compton interactions are parameterized in a multi-dimensional data space, which contains the interaction information of the Compton sequence as well as geometry information of the detector. For each data space cell the probability that the corresponding interaction sequence is one of a correctly ordered, completely absorbed source photon can be determined by Bayesian statistics and detailed simulations. This probability can then be used to distinguish source photons from incompletely absorbed photons. Simulations show that the Bayesian approach can improve the 68% event containment of the ARM distribution by up to 40%, and results in a much better separation between '' good '' and '' bad '' events. In addition, sensitivity improvements up to a factor 1.7 can be achieved.
暂无评论