The proceedings contain 26 papers. The topics discussed include: object/image relations in full and weak perspective and 3D reconstruction;the design of wavelets for limited-angle tomographic hyperspectral imaging sys...
ISBN:
(纸本)9780819482952
The proceedings contain 26 papers. The topics discussed include: object/image relations in full and weak perspective and 3D reconstruction;the design of wavelets for limited-angle tomographic hyperspectral imaging systems;an overview of view-based 2D/3D indexing methods;image algebra Matlab language version 2.3 for image processing and compression research;a comparison study between Wiener and adaptive state estimation (STAP-ASE) algorithms for space time adaptive radar processing;information theoretic analysis of edge detection in visual communication;combination of the sensitivity in EM field and the optimum nonlinear interpolation approximation as a favorable means of CAD of composite meta-materials;3D object recognition with photon-counting integral imaging using independent component analysis;and decision tree classifier for character recognition combining support vector machines and artificial neural networks.
Watermarking aims at enforcing property right for digital video: a mark is imperceptibly - transparently - embedded into original data. The true owner is identified by detecting this mark. The robust watermarking tech...
详细信息
ISBN:
(纸本)0819463949
Watermarking aims at enforcing property right for digital video: a mark is imperceptibly - transparently - embedded into original data. The true owner is identified by detecting this mark. The robust watermarking techniques allow the mark detection even when the protected video is attacked. Transparency and robustness constraints restrict the mark size: the better transparency and robustness, the smaller the data payload. The paper presents a method to evaluate the maximum quantity of information which can be theoretically inserted into the 2D-DCT coefficient hierarchy, for prescribed transparency and robustness. This approach relies on the noisy channel model for watermarking. Within this mathematical framework, the maximal data payload is expressed by the channel capacity. As any capacity evaluation procedure requires an intimate knowledge of the noise sources, the paper first describes the developed statistical approach enabling: (1) to properly handle the inner dependency existing among successive frames in a video sequence, and (2) to accurately check-out the Gaussian behaviour for each noise source. The experiments were carried out in partnership with the SFR mobile service provider in France (Vodafone group).
A number of methods have been recently proposed in the literature for the encryption of 2-D information using linear optical systems. In particular the double random phase encoding system has received widespread atten...
详细信息
A number of methods have been recently proposed in the literature for the encryption of 2-D information using linear optical systems. In particular the double random phase encoding system has received widespread attention. This system uses two Random Phase Keys (RPK) positioned in the input spatial domain and the spatial frequency domain and if these random phases are described by statistically independent white noises then the encrypted image can be shown to be a white noise. Decryption only requires knowledge of the RPK in the frequency domain. The RPK may be implemented using a Spatial Light Modulators (SLM). In this paper we propose and investigate the use of SLMs for secure optical multiplexing. We show that in this case it is possible to encrypt multiple images in parallel and multiplex them for transmission or storage. The signal energy is effectively spread in the spatial frequency domain. As expected the number of images that can be multiplexed together and recovered without loss is proportional to the ratio of the input image and the SLM resolution. Many more images may be multiplexed with some loss in recovery. Furthermore each individual encryption is more robust than traditional double random phase encoding since decryption requires knowledge of both RPK and a lowpass filter in order to despread the spectrum and decrypt the image. Numerical simulations are presented and discussed.
The aim of this research is to develop efficient algorithms for fractal imagecoding, which can be applied in digital image compression, image magnification and image denoising. Fractal imagecoding can provide a high...
详细信息
The aim of this research is to develop efficient algorithms for fractal imagecoding, which can be applied in digital image compression, image magnification and image denoising. Fractal imagecoding can provide a highly reconstructed image quality with a high compression ratio, is independent of resolution, and has a fast decoding process. The problem with fractal coding is its high computational complexity in the encoding process. Most of the encoding time is spent finding the best-matched domain block from a large domain pool to represent an input range block with respect to contrast and intensity offset, as well as the isometry transformations. The objectives of this research are to investigate and develop efficient techniques for fractal imagecoding, fractal-based image magnification and denoising. In this thesis, four efficient fractal image-coding algorithms have been proposed. The first algorithm is based on new feature vectors and the property of zero contrast. The proposed feature vectors can provide a better representation of image blocks, and thus result in a more efficient search of the domain block. The second algorithm is an efficient windowing scheme for fractal imagecoding based on the local variances method. In our method, windows covering those domain blocks whose variances are higher than that of the range block are considered according to a mathematical model. The exhaustive search algorithm can obtain the optimal result by searching all the blocks within the domain pool, but this process requires a high computational cost, which limits its practical application. A single kick-out condition is proposed which can avoid a large number of range-domain block matches when finding the best-matched domain block. An efficient method for zero contrast prediction is also proposed, which can determine whether the contrast factor for a domain block is zero or not, and compute the corresponding difference between the range block and the transformed domain b
This conference proceedings consists of 54 papers. The main subjects are enhancement and restoration, imagecoding, industrial applications, medical applications, multidimensional image processing techniques, hardware...
详细信息
ISBN:
(纸本)0852963325
This conference proceedings consists of 54 papers. The main subjects are enhancement and restoration, imagecoding, industrial applications, medical applications, multidimensional image processing techniques, hardware and architectures for image processing, image interpretation and recognition, video applications, data compression, data reduction and analysis, image segmentation, image labelling, and image texture.
In this paper, a new encryption mode, which we call the 2D-encryption Mode, is presented. 2D-encryption Mode extends ID-encryption modes, as ECB, CBC and CTR, to two dimensions. It has good security and practical prop...
详细信息
In this paper, a new encryption mode, which we call the 2D-encryption Mode, is presented. 2D-encryption Mode extends ID-encryption modes, as ECB, CBC and CTR, to two dimensions. It has good security and practical properties. We first look at the type of problems it tries to solve, then describe the technique and its properties, and present a detailed mathematical analysis of its security, and finally discuss some practical issues related to its implementation.
暂无评论