This paper proposes a novel grayscale image compression approach using the binary wavelet transform (BWT) and context-based arithmetic coding, namely the context-based binary wavelet transform coding algorithm (CBWTC)...
详细信息
This paper proposes a novel grayscale image compression approach using the binary wavelet transform (BWT) and context-based arithmetic coding, namely the context-based binary wavelet transform coding algorithm (CBWTC). In our CBWTC, in order to alleviate the degradation of predictability caused by the BWT and eliminate the correlation within the same level subbands, three highpass wavelet coefficients at the same location are combined to form an octave symbol and then encoded with a ternary arithmetic coder. The conditional context of the CBWTC is properly modeled by exploiting the properties of the BWT as well as taking the advantages of non-causal adaptive context modeling. Experimental results show that the coding performance of the CBWTC is better than that of the state-of-the-art grayscale image coders except for images containing rich texture, and always outperforms the JBIG2 algorithm and other BWT-based binary coding technique.
This paper describes a novel content-based image recommendation system based on new image low level descriptors derived from the well known MPEG-7 parameters. Furthermore, it also proposes the integration of this reco...
详细信息
ISBN:
(纸本)9781457702495
This paper describes a novel content-based image recommendation system based on new image low level descriptors derived from the well known MPEG-7 parameters. Furthermore, it also proposes the integration of this recommendation system into a content-aware network architecture to enhance and enrich the content delivery and improve user's experience.
Eliminating artifacts left after decompression of JPEG images, especially those compressed at high quality factors, is a challenging issue in image anti-forensics. In this paper, JPEG decompression anti-forensics are ...
详细信息
ISBN:
(数字)9798350386776
ISBN:
(纸本)9798350386783
Eliminating artifacts left after decompression of JPEG images, especially those compressed at high quality factors, is a challenging issue in image anti-forensics. In this paper, JPEG decompression anti-forensics are modeled as an image-to-image translation problem, where a generative adversarial network framework is used to translate a JPEG decompressed image to a reconstructed one. Due to the introduction of chroma upsampling artifacts during image decompression, the difference distribution of odd and even pixel pairs on the chroma plane of the uncompressed and decompressed image is different. To solve this issue, we propose an odd-even chroma difference loss to recover this distribution difference. Experimental results show that the modified images generated by this anti-forensic method are able to deceive existing detectors and have excellent visual quality.
This paper presents a spatial domain image watermarking method based on regularized filter. In the proposed method, a watermark image is embedded into a host color image directly by modifying the blue color component....
详细信息
This paper presents a spatial domain image watermarking method based on regularized filter. In the proposed method, a watermark image is embedded into a host color image directly by modifying the blue color component. The watermarkmark strength is controlled by two factors, i.e. a constant value and the luminance within a local embedding area. The prediction of the original host image is obtained from the watermarked image by using the regularized filter, so that the embedded watermark can be blindly recovered by substracting the predicted image from the watermarked image. Set of experiment are carried out to verify our proposed method. The results show that the accuracy of the extracted watermark in terms of NC was higher, compared to the previous method. The robustness comparison between both methods against different types of attacks is also performed and presented.
We use the framework of multitree dictionaries (Huang et al. (2003)) to design a novel DCT-based image coder which significantly outperforms both the standard JPEG and the quadtree-based approach of Ramchandran et al....
详细信息
We use the framework of multitree dictionaries (Huang et al. (2003)) to design a novel DCT-based image coder which significantly outperforms both the standard JPEG and the quadtree-based approach of Ramchandran et al. (1993).
This paper describes one implementation of adaptive streaming over HTTP for Android based DTV platform. We have proposed a software solution that enables full adaptive streaming over HTTP protocol. The proposition inc...
详细信息
This paper describes one implementation of adaptive streaming over HTTP for Android based DTV platform. We have proposed a software solution that enables full adaptive streaming over HTTP protocol. The proposition includes two key standards to be implemented: HTTP Live Streaming and MPEG DASH (Dynamic Adaptive Streaming over HTTP). The focus is on implementation of modular architecture that enables adaptive streaming using basic adaptation algorithms leaving a simple interface for integration of advanced adaptation algorithms.
An information hiding method on escape sequences of Huffman coding which can embed a great deal of secret information into AAC files is proposed based on the research of AAC coding standard. The proposed algorithm fir...
详细信息
An information hiding method on escape sequences of Huffman coding which can embed a great deal of secret information into AAC files is proposed based on the research of AAC coding standard. The proposed algorithm first unpacks the cover AAC file to search for the escape sequences, and then modifies least significant bit (LSB) of the escape sequences with the approach of matrix encoding, to improve the embedding efficiency. This method is low in computational complexity without any changes of the length of AAC coding. Experimental results reveal that the proposed algorithm can achieve higher hidden data capacity for AAC audio at the bitrate of 128kbps or above, furthermore, it has good imperceptibility and can resist the steganalysis to some extent.
This paper describes an anomaly target detection algorithm based on JPEG images. The algorithm deals directly with JPEG image data eliminating JPEG image decoding process. The algorithm extracts the JPEG DC parameters...
详细信息
ISBN:
(纸本)9781612847719
This paper describes an anomaly target detection algorithm based on JPEG images. The algorithm deals directly with JPEG image data eliminating JPEG image decoding process. The algorithm extracts the JPEG DC parameters, and then compares two frames of adjacent DC parameters to determine whether the abnormal targets appear. Compared to the YUV image data processing methods, it costs less storage space, access time and computation, which is more suitable for embedded systems with limited resources. Finally, the simulation results of the algorithm are given.
This paper proposes a hierarchical secret sharing method for image data. In the conventional secret sharing scheme (SSS), secret data is reconstructed only if more shares are gathered and combine than a pre-decided nu...
详细信息
This paper proposes a hierarchical secret sharing method for image data. In the conventional secret sharing scheme (SSS), secret data is reconstructed only if more shares are gathered and combine than a pre-decided number, k. Though large k makes a strong security feature, it creates problems with the handling of the many shares required to reconstruct the original data. If it allows us to browse the contents of secret image data roughly, then it relieves us from the troublesome management of the secret data. Therefore, in order to improve usability, we propose a new SSS using JPEG 2000's hierarchical image representation. This method can control the number of reconstructed frequency sub-bands of image information by the number of combined shares. It can also control the precision of pixel values and the reconstructed region in the image. This paper shows the feasibility and efficiency of the proposed method by computer simulations.
暂无评论