The purpose of this paper is to analyze and further optimize the JPEG image compression algorithm. First we analysis of JPEG image compression algorithm to achieve the specific methods with the advantages and disadvan...
详细信息
The purpose of this paper is to analyze and further optimize the JPEG image compression algorithm. First we analysis of JPEG image compression algorithm to achieve the specific methods with the advantages and disadvantages, at the same time, in the algorithm module in the sending, the output of a new data transfer mode was developed to reduce the error rate and enhance perform well in the data transfer rate based on the algorithm local optimization. In the end, we proved that the new data transfer mode can efficiently improve the data transfer rate and reduce the error rate through an experiment.
Image quality assessment plays an important role to the 3G network QoE/QoS planners. A great deal of effort has been made in recent years to develop objective image quality metrics that correlate with perceived qualit...
详细信息
Image quality assessment plays an important role to the 3G network QoE/QoS planners. A great deal of effort has been made in recent years to develop objective image quality metrics that correlate with perceived quality measurement. Unfortunately, there is a lack of non-simulation image material to optimize the algorithms and the parameter settings. In this paper, we suggest a method to capture the frame of video phone on Dtivy™ A2000+H platform. With these frames, the objective image quality assessment algorithms could be improved so that they are used more targeted.
This paper presents an authentication scheme for a JPEG 2000 image codestream, which is obtained by using JPEG 2000 Interactive Protocol (JPIP). JPIP allows a client to request a JPEG 2000 image that has a different r...
详细信息
This paper presents an authentication scheme for a JPEG 2000 image codestream, which is obtained by using JPEG 2000 Interactive Protocol (JPIP). JPIP allows a client to request a JPEG 2000 image that has a different representation from the original image. The client-requested image codestream is a portion of the original JPEG 2000 codestream and its structure differs for each client request. To verify the authenticity of the image requested by the client, a scalable verification mechanism is required. Hence, we propose a new scalable authentication scheme using an aggregate signature. The proposed scheme allows the scalable generation of digital signatures for any client-requested image. Simulation results show the effectiveness of the proposed scheme.
A family safety monitoring system is designed, which integrated function of telephone alarm, remote control by network, and video linkage. Host alarm system, controlled by MCU, collects data wirelessly from sensors, a...
详细信息
A family safety monitoring system is designed, which integrated function of telephone alarm, remote control by network, and video linkage. Host alarm system, controlled by MCU, collects data wirelessly from sensors, and makes remote alarm by DTMF. The video processing and transmitting system, with a DSP chip of TMS320F2812 as the core processor, transmits the video data by means of Bluetooth indoors, and by Ethernet in the residential district, so that remote control through Internet can be implemented.
Image can be parsed into two main categories of representation: structure shape and region texture. In this paper, the parallel multi-regions image restoration system is proposed in order to ensure the real-time appli...
详细信息
Image can be parsed into two main categories of representation: structure shape and region texture. In this paper, the parallel multi-regions image restoration system is proposed in order to ensure the real-time application. This system is implemented on a dedicated cluster. With different number of regions, PMR system is executed on the same original image in order to obtain the best restoration result. Experiments have demonstrated that our PMR system can improve the restoration efficiency significantly and achieve optimal restoration.
This paper proposes an efficient prefetching strategy for interactive remote browsing of sequences of high resolution JPEG 2000 images. As a result of the inherent latency of client-server communication, the experimen...
详细信息
This paper proposes an efficient prefetching strategy for interactive remote browsing of sequences of high resolution JPEG 2000 images. As a result of the inherent latency of client-server communication, the experiments of this study prove that a significant benefit, can be achieved, in terms of both quality and responsiveness, by anticipating certain data from the rest of the sequence while an image is being explored. This paper proposes a model based on the quality progression of the image in order to estimate which percentage of the bandwidth is dedicated to prefetch data. This solution can be easily implemented over any existing remote browsing architecture.
Two dimensional (2D) barcodes are becoming a pervasive interface for mobile devices, such as camera phones. Often, only monochrome 2D-barcodes are used due to their robustness in an uncontrolled operating environment ...
详细信息
Two dimensional (2D) barcodes are becoming a pervasive interface for mobile devices, such as camera phones. Often, only monochrome 2D-barcodes are used due to their robustness in an uncontrolled operating environment of camera phones. Most camera phones capture and store such 2D-barcode images in the baseline JPEG format. As a lossy compression technique, JPEG does introduce a fair amount of error in the decoding of captured 2D-barcode images. In this paper, we introduce an improved JPEG compression scheme for such barcode images. By altering the JPEG compression parameters based on the DCT coefficient distribution of such barcode images, the improved compression scheme produces JPEG images with higher PSNR value as compared to the baseline implementation. We have also applied our improved scheme to a real 2D-barcode system - the QR Code and analyzed its performance against the baseline JPEG scheme.
Blind Steganalysis attempts to detect steganographic data without prior knowledge of either the embedding algorithm or the `cover' image. This paper proposes new features for JPEG blind steganalysis using a combin...
详细信息
Blind Steganalysis attempts to detect steganographic data without prior knowledge of either the embedding algorithm or the `cover' image. This paper proposes new features for JPEG blind steganalysis using a combination of Huffman Bit Code Length (HBCL) Statistics and File size to Resolution ratio (FR Index); the Huffman Bit File Index Resolution (HUBFIRE) algorithm proposed uses these functionals to build the classifier using a multi-class Support Vector Machine (SVM). JPEG images spanning a wide range of resolutions are used to create a `stego-image' database employing three embedding schemes - the advanced Least Significant Bit encoding technique, that embeds in the spatial domain, a transform-domain embedding scheme: JPEG Hide-and-Seek and Model Based Steganography which employs an adaptive embedding technique. This work employs a multi-class SVM over the proposed `HUBFIRE' algorithm for statistical steganalysis, which is not yet explored by steganalysts. Experiments conducted prove the model's accuracy over a wide range of payloads and embedding schemes.
In this paper, a blind statistical method for watermark detection is developed using a symmetrical normal inverse Gaussian (SNIG) prior for modelling the block-DCT coefficients of images. The proposed detector is moti...
详细信息
In this paper, a blind statistical method for watermark detection is developed using a symmetrical normal inverse Gaussian (SNIG) prior for modelling the block-DCT coefficients of images. The proposed detector is motivated by the superior ability of the SNIG prior in capturing the statistics of the DCT coefficients as compared to the conventionally used priors. Analytical expressions are derived for the Bayesian log-likelihood ratio and the corresponding mean and variance under null and alternative hypotheses. Extensive experiments are carried out using standard images to study the performance of the proposed detector and the results show that it performs better than several existing detectors in terms of the associated probabilities of false alarm and detection for watermarks of varying strength.
Both Data hiding and data compression are very important technologies in the field of image processing. It seems that there is no relationship between data hiding and data compression because most of the data hiding m...
详细信息
Both Data hiding and data compression are very important technologies in the field of image processing. It seems that there is no relationship between data hiding and data compression because most of the data hiding mechanisms focus on information security and the data compression mechanisms emphasize the compression ratio. In fact, they are closely related. Until now, there are many literatures to discuss the secret data how to be embedded into the media image. Unfortunately, the stego-image's size will be increased when the media image is hidden a lot of secret data. In order to overcome this disadvantage, a reversible data hiding scheme based on EMD data hiding and JPEG compression technology will be proposed in this paper. According to the experimental results, we can prove that our proposed scheme still keeps high embedding capacity, security and good compression ratio.
暂无评论