94 research outputs found
A User Oriented Image Retrieval System using Halftoning BBTC
The objective of this paper is to develop a system for content based image retrieval (CBIR) by accomplishing the benefits of low complexity Ordered Dither Block Truncation Coding based on half toning technique for the generation of image content descriptor. In the encoding step ODBTC compresses an image block into corresponding quantizes and bitmap image. Two image features are proposed to index an image namely co-occurrence features and bitmap patterns which are generated using ODBTC encoded data streams without performing the decoding process. The CCF and BPF of an image are simply derived from the two quantizes and bitmap respectively by including visual codebooks. The proposed system based on block truncation coding image retrieval method is not only convenient for an image compression but it also satisfy the demands of users by offering effective descriptor to index images in CBIR system
Text Hiding in Coded Image Based on Quantization Level Modification and Chaotic Function
A text hiding method in codded image is presented in this paper that based on quantization level modification. The used image is transformed into wavelet domain by DWT and coefficient of transform is partitioned into predefined block size. Specific threshold has been used to classify these blocks into two types named smooth and complex. Each type has its own method of text hiding (binary data), for smooth blocks, secret bits which represent the text data are switched by the bitmap. In order to reduce distortion, the quantization levels are modified. To reach extra embedding payload the quantization level could carry extra two bits depending on other threshold. The complex block carry one data bit on each block and quantization levels are swapped to reduce distortion with bitmap flipping. The proposed method result shows a high signal to noise ratio, with studying capacity as important in this work
Entropy in Image Analysis II
Image analysis is a fundamental task for any application where extracting information from images is required. The analysis requires highly sophisticated numerical and analytical methods, particularly for those applications in medicine, security, and other fields where the results of the processing consist of data of vital importance. This fact is evident from all the articles composing the Special Issue "Entropy in Image Analysis II", in which the authors used widely tested methods to verify their results. In the process of reading the present volume, the reader will appreciate the richness of their methods and applications, in particular for medical imaging and image security, and a remarkable cross-fertilization among the proposed research areas
Data hiding techniques in steganography using fibonacci sequence and knight tour algorithm
The foremost priority in the information and communication technology era, is achieving an efficient and accurate steganography system for hiding information. The developed system of hiding the secret message must capable of not giving any clue to the adversaries about the hidden data. In this regard, enhancing the security and capacity by maintaining the Peak Signal-to-Noise Ratio (PSNR) of the steganography system is the main issue to be addressed. This study proposed an improved for embedding secret message into an image. This newly developed method is demonstrated to increase the security and capacity to resolve the existing problems. A binary text image is used to represent the secret message instead of normal text. Three stages implementations are used to select the pixel before random embedding to select block of (64 × 64) pixels, follows by the Knight Tour algorithm to select sub-block of (8 × 8) pixels, and finally by the random pixels selection. For secret embedding, Fibonacci sequence is implemented to decomposition pixel from 8 bitplane to 12 bitplane. The proposed method is distributed over the entire image to maintain high level of security against any kind of attack. Gray images from the standard dataset (USC-SIPI) including Lena, Peppers, Baboon, and Cameraman are implemented for benchmarking. The results show good PSNR value with high capacity and these findings verified the worthiness of the proposed method. High complexities of pixels distribution and replacement of bits will ensure better security and robust imperceptibility compared to the existing systems in the literature
A novel robust reversible watermarking scheme for protecting authenticity and integrity of medical images
It is of great importance in telemedicine to protect authenticity and
integrity of medical images. They are mainly addressed by two technologies, which
are region of interest (ROI) lossless watermarking and reversible watermarking.
However, the former causes biases on diagnosis by distorting region of none interest
(RONI) and introduces security risks by segmenting image spatially for watermark
embedding. The latter fails to provide reliable recovery function for the tampered
areas when protecting image integrity. To address these issues, a novel robust
reversible watermarking scheme is proposed in this paper. In our scheme, a reversible
watermarking method is designed based on recursive dither modulation (RDM) to
avoid biases on diagnosis. In addition, RDM is combined with Slantlet transform and
singular value decomposition to provide a reliable solution for protecting image
authenticity. Moreover, ROI and RONI are divided for watermark generation to
design an effective recovery function under limited embedding capacity. Finally,
watermarks are embedded into whole medical images to avoid the risks caused by
segmenting image spatially. Experimental results demonstrate that our proposed
lossless scheme not only has remarkable imperceptibility and sufficient robustness,
but also provides reliable authentication, tamper detection, localization and recovery
functions, which outperforms existing schemes for protecting medical image
Application and Theory of Multimedia Signal Processing Using Machine Learning or Advanced Methods
This Special Issue is a book composed by collecting documents published through peer review on the research of various advanced technologies related to applications and theories of signal processing for multimedia systems using ML or advanced methods. Multimedia signals include image, video, audio, character recognition and optimization of communication channels for networks. The specific contents included in this book are data hiding, encryption, object detection, image classification, and character recognition. Academics and colleagues who are interested in these topics will find it interesting to read
Data Hiding and Its Applications
Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others
Point Processing Method for Improving Dental Radiology Image Quality
Radiology field is very important in today's world, especially in the field of medicine including dentistry. Radiology equipment that is popular in dentistry is the panoramic machine. A panoramic image facilitate the dentist in making a diagnosis of the abnormality in the mouth and teeth. But unfortunately, for developing countries like Indonesia, panoramic machine available are low resolution which have an effect on the resulting image also has low quality. This research aims to improve the quality of the panoramic image to have a better quality. We use point processing method with emphasis on contrast stretching method. We chose this method because it is quite simple but has a high performance. Based on the second opinion from the hospital, the performance is 83.9%, therefore this method is promising to be implemented on the improvement of dental radiology images
A NOVEL METHOD FOR EDGE DETECTION USING BLOCK TRUNCATION CODING AND CONVOLUTION TECHNIQUE FOR MAGNETIC RESONANCE IMAGES(MRI) WITH PERFORMANCE MEASURES
In this paper, we propose a novel method to detect edges in digital images. Attention is given to magnetic resonance images (MRI) of the brain in particular. Edge detection using block truncation coding and convolution technique are presented. The results are compared with the standard edge detection Canny method . The results of this study are presented and discussed
- …