The design and implementation of Medical Image Archiving, Processing, Analysis and Communication System for Teleradiology which DICOM server was developed using software such as Borland Delphi 6.0, PHP and MySQL for i...
详细信息
The design and implementation of Medical Image Archiving, Processing, Analysis and Communication System for Teleradiology which DICOM server was developed using software such as Borland Delphi 6.0, PHP and MySQL for image archive, image compression, image processing, image analysis and image transmission. The system provides the following facilities: (1) DICOM-format image archive. (2) Medical Image Compression. (3) DICOM viewer and Image processing, and (4) Image analysis. The results shown that (1) our system can also convert the image data both single frame and multiframes in normal or automatic DICOM process into the standard DICOM 3.0 format without altering the image data. (2) The resulting images are then compressed with two different techniques-JPEG and JPEG2000. The significant advantage of JPEG2000 over normal JPEG is that the error from JPEG2000 compression is smaller than the error from JPEG. Nevertheless, both methods share a similar mishap; when the compression ratio increases, they both generate more error than the processes on lower compression ratio. (3) our system can open single frame and multiframes such as DICOM, INTERFILE, BITMAP, JPEG and JPEG2000 each of which can exhibit information in. dcm file format with no distortion and image processing which has also the capabilities to zoom in/out and contrast/color map. And, (4) Image analysis sets ROI semi-automatically on region of expected disease based on geometric active contour model from edge of variance image and Canny edge detection. Thence, our system can calculate of Glomerular Filtration Rate (GFR), Effective Renal Plasma Flow (ERPF), and plot of the Time Activity Curve or Renogram The system has been developed and provided medical image services over long distance which showed the usefulness of our approach.
Digital images are the most common cover files used for steganography. This paper investigates the pros and cons of colour and grayscale versions of images when used as steganography covers. Therefore, it comparativel...
详细信息
Digital images are the most common cover files used for steganography. This paper investigates the pros and cons of colour and grayscale versions of images when used as steganography covers. Therefore, it comparatively evaluates the performance of both grayscale and colour versions of a given cover image when they are used with a given steganography method. Moreover, this paper examines the capability and impact of using the chrominance components for data hiding. However, two steganography methods are used as test methods, JSteg and JMQT. As a result, using colour images is better than using grayscale images for data hiding. In order to increase the hiding capacity, chrominance components can be used for data hiding. However, this degrades the quality of stego images and increases the ultimate stego image size.
This paper explores Bhattacharyya Distance principle and introduces it to recognize stego algorithms in use. First of all, we select the most important features by the means of applying Bhattacharyya distance. Then, B...
详细信息
This paper explores Bhattacharyya Distance principle and introduces it to recognize stego algorithms in use. First of all, we select the most important features by the means of applying Bhattacharyya distance. Then, BP neural network is used to classify cover and stego images. Extensive experimental works show that the proposed schemes have satisfactory performance on Jpeg steganography like F5, Outguess, Jsteg and MB2.
Presentation skill is essential both for academic and business purposes, but its training, particularly in Asian countries, still heavily depends on experiences. This paper reconsiders presentation skill and reports o...
详细信息
Presentation skill is essential both for academic and business purposes, but its training, particularly in Asian countries, still heavily depends on experiences. This paper reconsiders presentation skill and reports our multimedia learner corpus of basic presentation in English made by Japanese students. It consists of video, slides, prepared oral manuscripts, and holistic and element-based evaluations. With this evaluations, we discussed the correspondence between the holistic and element-based evaluations with a view to realizing semi-automatic evaluation of presentations.
A new method using an error correcting code to reduce the probability of detection error for a digital watermark is proposed. The performance of the method is evaluated with a digital watermark for a 2D image as an ex...
详细信息
A new method using an error correcting code to reduce the probability of detection error for a digital watermark is proposed. The performance of the method is evaluated with a digital watermark for a 2D image as an example. In the method, only minimum weight codewords of the code are used as embedded information and two different decoding algorithms are used to reduce the probability of detection error. Analysis and simulation results on the error correcting capability for AWGN channel are shown to ensure the effectiveness of the concept of the method. In the digital watermark, a minimum weight codeword is embedded in the frequency domain of the green plane of the color space of 2D images with a discrete cosine transform as it has a high PSNR with resistance of JPEG compression. Results on an experiment with JPEG compression attack are also shown to ensure the effectiveness of the method.
In free viewpoint television or 3D video, depth image based rendering (DIBR) is used to generate virtual views based on a textured image and its associated depth information. In doing so, image regions which are occlu...
详细信息
In free viewpoint television or 3D video, depth image based rendering (DIBR) is used to generate virtual views based on a textured image and its associated depth information. In doing so, image regions which are occluded in the original view may become visible in the virtual image. One of the main challenges in DIBR is to extrapolate known textures into the disoccluded area without inserting subjective annoyance. In this paper, a new hole filling approach for DIBR using texture synthesis is presented. Initially, the depth map in the virtual view is filled at disoccluded locations. Then, in the textured image, holes of limited spatial extent are closed by solving Laplace equations. Larger disoccluded regions are initialized via median filtering and subsequently refined by patch-based texture synthesis. Experimental results show that the proposed approach provides improved rendering results in comparison to the latest MPEG view synthesis reference software (VSRS) version 3.6.
Robust lossless data hiding (LDH) methods have attracted more and more attentions for copyright protection of multimedia in lossy environment. One of the important requirements of the robust LDH methods is the reversi...
详细信息
Robust lossless data hiding (LDH) methods have attracted more and more attentions for copyright protection of multimedia in lossy environment. One of the important requirements of the robust LDH methods is the reversibility, that is, the host images can be recovered without any distortion after the hidden messages are removed. The reversibility is often guaranteed by the embedding model, which affects the performance of the methods greatly. Another requirement is to have a better robustness, which allows the LDH methods to be well adaptable to the lossless and lossy environment, e.g., JPEG compression. In this paper, we firstly categorize the existing robust LDH methods according to the embedding model, and then make a theoretical analysis on the performance in terms of capacity, invisibility and the robustness. Finally, experimental comparisons are carried out to summarize the advantages and disadvantages of each kind of method.
Alter, Durand and Froment introduced the total-variation (TV) minimization approach to the artifact-free JPEG decoding, which is referred to as the ADF decoding method [1]. They formulated the decoding problem as the ...
详细信息
Alter, Durand and Froment introduced the total-variation (TV) minimization approach to the artifact-free JPEG decoding, which is referred to as the ADF decoding method [1]. They formulated the decoding problem as the constrained TV restoration problem, in which the TV seminorm of its restored color image is minimized under the constraint that each DCT coefficient of the restored color image should be in the quantization interval of its corresponding DCT coefficient of the JPEG-compressed data. This paper proposes a new restoration approach to the JPEG decoding. Instead of the TV regularization, our new JPEG-decoding method employs a shrinkage operation in the redundant DCT domain, to mitigate degradations caused by the JPEG coding. Our new method not only can selectively suppress ringing artifacts near color edges, but also can efficiently eliminate blocking artifacts in originally smoothly-varying image regions, where the blocking artifacts are very noticeable. Through decoding simulations, we experimentally show that our new decoding method can reduce JPEG-coding artifacts more effectively than the ADF decoding method.
Because small mobile devices do not include a floating-point processing unit due to their circuit complexity and power consumption, there exist some disconnections or noises caused by lengthening the decoding time of ...
详细信息
Because small mobile devices do not include a floating-point processing unit due to their circuit complexity and power consumption, there exist some disconnections or noises caused by lengthening the decoding time of audio data. This study proposes an algorithm that improves the decoding rate through the conversion of a real operation process to an integer operation process applied in an MPEG-4 audio decoding process in order to solve this problem. Moreover, this study implements the software that plays the MPEG-4 AAC data in real-time in embedded Linux based mobile devices and verifies the possibility of the replay of MPEG-4 audio data in its error range through the results of related experiments.
Recently, a number of digital image forensic techniques have been developed which are capable of identifying an image's origin, tracing its processing history, and detecting image forgeries. Though these technique...
详细信息
Recently, a number of digital image forensic techniques have been developed which are capable of identifying an image's origin, tracing its processing history, and detecting image forgeries. Though these techniques are capable of identifying standard image manipulations, they do not address the possibility that anti-forensic operations may be designed and used to hide evidence of image tampering. In this paper, we propose an anti-forensic operation capable of removing blocking artifacts from a previously JPEG compressed image. Furthermore, we show that by using this operation along with another anti-forensic operation which we recently proposed, we are able to fool forensic methods designed to detect evidence of JPEG compression in decoded images, determine an image's origin, detect double JPEG compression, and identify cut-and-paste image forgeries.
暂无评论