78 research outputs found

    An importance driven genetic algorithm for the halftoning process

    Get PDF
    Most evolutionary approaches to halftoning techniques have been concerned with the paramount goal of halftoning: achieving an accurate reproduction of local grayscale intensities while avoiding the introduction of artifacts. A secondary concern in halftoning has been the preservation of edges in the halftoned image. In this paper, we will introduce a new evolutionary approach through the use of an importance function. This approach has at least two main characteristics. First, it can produce results similar to many other halftoning techniques. Second, if the chosen importance function is accordingly changed, areas of the image with high variance can be highlighted.III Workshop de Computación Gráfica, Imágenes y Visualización (WCGIV)Red de Universidades con Carreras en Informática (RedUNCI

    Dithering by Differences of Convex Functions

    Get PDF
    Motivated by a recent halftoning method which is based on electrostatic principles, we analyse a halftoning framework where one minimizes a functional consisting of the difference of two convex functions (DC). One of them describes attracting forces caused by the image gray values, the other one enforces repulsion between points. In one dimension, the minimizers of our functional can be computed analytically and have the following desired properties: the points are pairwise distinct, lie within the image frame and can be placed at grid points. In the two-dimensional setting, we prove some useful properties of our functional like its coercivity and suggest to compute a minimizer by a forward-backward splitting algorithm. We show that the sequence produced by such an algorithm converges to a critical point of our functional. Furthermore, we suggest to compute the special sums occurring in each iteration step by a fast summation technique based on the fast Fourier transform at non-equispaced knots which requires only Ο(m log(m)) arithmetic operations for m points. Finally, we present numerical results showing the excellent performance of our DC dithering method

    An importance driven genetic algorithm for the halftoning process

    Get PDF
    Most evolutionary approaches to halftoning techniques have been concerned with the paramount goal of halftoning: achieving an accurate reproduction of local grayscale intensities while avoiding the introduction of artifacts. A secondary concern in halftoning has been the preservation of edges in the halftoned image. In this paper, we will introduce a new evolutionary approach through the use of an importance function. This approach has at least two main characteristics. First, it can produce results similar to many other halftoning techniques. Second, if the chosen importance function is accordingly changed, areas of the image with high variance can be highlighted.III Workshop de Computación Gráfica, Imágenes y Visualización (WCGIV)Red de Universidades con Carreras en Informática (RedUNCI

    Survey on Securing Medical Image Transmission using Visual Cryptography Techniques

    Get PDF
    Visual cryptography scheme is a cryptographic technique which allows visual information text or image to be encrypted in such a way that the decryption can be performed by the human visual system and without the aid of computers. It encodes the secret image into shares of different patterns. Visual Cryptography is done on black and white image as well as on color image. This paper includes the literature survey regarding Visual Cryptography techniques for secure medical image transmission

    Reversible Data Hiding using Visual Cryptography: A Review

    Get PDF
    ABSTRACT: Data security and data integrity are the two challenging areas for research. There are so many research is progressing on the field like internet security, steganography, cryptography. Data hiding are a group of techniques used to put a secure data in a host media with small deterioration in host and the means to extract the secure data afterwards. Reversible data hiding is a technique to embed additional message into some distortion-unacceptable cover media, such as military or medical images, with a reversible manner so that the original cover content can be perfectly restored after extraction of the hidden message. The reversibility means not only embedding data but also original image can be precisely recovered in the extracting stage. Most hiding techniques perform data embedding by altering the contents of a host media. These types of data hiding techniques are thus irreversible. However in a number of domains such as military, legal and medical imaging although some embedding distortion is admissible, permanent loss of signal fidelity is undesirable. This highlights the need for Reversible (Lossless) data embedding techniques. This paper gives a review on various reversible data hiding techniques and also proposes a novel approach for reversible data hiding using visual cryptography. This involves no use of keys thus keeping the computation cost for encryption/decryption low. This scheme applies a method of vacating the room for data prior to the image encryption used to hide the secret data. By reversing the order of encryption and data hiding we overcome the difficulty of finding the room for data from already encrypted image

    Simulation of an electrophotographic halftone reproduction

    Get PDF
    The robustness of three digital halftoning techniques are simulated for a hypothetical electrophotographic laser printer subjected to dynamic environmental conditions over a copy run of one thousand images. Mathematical electrophotographic models have primarily concentrated on solid area reproductions under time-invariant conditions. The models used in this study predict the behavior of complex image distributions at various stages in the electrophotographic process. The system model is divided into seven subsystems: Halftoning, Laser Exposure, Photoconductor Discharge, Toner Development, Transfer, Fusing, and Image Display. Spread functions associated with laser spot intensity, charge migration, and toner transfer and fusing are used to predict the electrophotographic system response for continuous and halftone reproduction. Many digital halftoning techniques have been developed for converting from continuous-tone to binary (halftone) images. The general objective of halftoning is to approximate the intermediate gray levels of continuous tone images with a binary (black-and-white) imaging system. Three major halftoning techniques currently used are Ordered-Dither, Cluster-Dot, and Error Diffusion. These halftoning algorithms are included in the simulation model. Simulation in electrophotography can be used to better understand the relationship between electrophotographic parameters and image quality, and to observe the effects of time-variant degradation on electrophotographic parameters and materials. Simulation programs, written in FORTRAN and SLAM (Simulation Language Alternative Modeling), have been developed to investigate the effects of system degradation on halftone image quality. The programs have been designed for continuous simulation to characterize the behavior or condition of the electrophotographic system. The simulation language provides the necessary algorithms for obtaining values for the variables described by the time-variant equations, maintaining a history of values during the simulation run, and reporting statistical information on time-dependent variables. Electrophotographic variables associated with laser intensity, initial photoconductor surface voltage, and residual voltage are degraded over a simulated run of one thousand copies. These results are employed to predict the degraded electrophotographic system response and to investigate the behavior of the various halftone techniques under dynamic system conditions. Two techniques have been applied to characterize halftone image quality: Tone Reproduction Curves are used to characterize and record the tone reproduction capability of an electrophotographic system over a simulated copy run. Density measurements are collected and statistical inferences drawn using SLAM. Typically the sharpness of an image is characterized by a system modulation transfer function (MTF). The mathematical models used to describe the subsystem transforms of an electrophotographic system involve non-linear functions. One means for predicting this non-linear system response is to use a Chirp function as the input to the model and then to compare the reproduced modulation to that of the original. Since the imaging system is non-linear, the system response cannot be described by an MTF, but rather an Input Response Function. This function was used to characterize the robustness of halftone patterns at various frequencies. Simulated images were also generated throughout the simulation run and used to evaluate image sharpness and resolution. The data, generated from each of the electrophotographic simulation models, clearly indicates that image stability and image sharpness is not influenced by dot orientation, but rather by the type of halftoning operation used. Error-Diffusion is significantly more variable than Clustered-Dot and Dispersed-Dot at low to mid densities. However, Error-Diffusion is significantly less variable than the ordered dither patterns at high densities. Also, images generated from Error-Diffusion are sharper than those generated using Clustered-Dot and Dispersed-Dot techniques, but the resolution capability of each of the techniques remained the same and degraded equally for each simulation run

    IRAbMC: Image Recommendation with Absorbing Markov Chain

    Get PDF
    Image Recommendation is an important feature for search engine as tremendous amount images are available online. It is necessary to retrieve relevant images to meet user's requirement. In this paper, we present an algorithm Image Recommendation with Absorbing Markov Chain (IRAbMC) to retrieve relevant images for user input query. Images are ranked by calculating keyword relevance probability between annotated keywords from log and keywords of user input query. Absorbing Markov chain is used to calculate keyword relevance. Experiments results show that the IRAbMC algorithm outperforms Markovian Semantic Indexing (MSI) method with improved relevance score of retrieved ranked images

    M-lattice, a system for signal synthesis and processing based on reaction-diffusion

    Get PDF
    Thesis (Sc. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1994.Includes bibliographical references (leaves 148-154).by Alexander Semyon Sherstinsky.Sc.D

    Co-evolutionary automated software correction: a proof of concept

    Get PDF
    The task of ensuring that a software artifact is correct can be a very time consuming process. To be able to say that an algorithm is correct is to say that it will produce results in accordance with its specifications for all valid input. One possible way to identify an incorrect implementation is through the use of automated testing (currently an open problem in the field of software engineering); however, actually correcting the implementation is typically a manual task for the software developer. In this thesis a system is presented which automates not only the testing but also the correction of an implementation. This is done using genetic programming methods to evolve the implementation itself and an appropriate evolutionary algorithm to evolve test cases. These two evolutionary algorithms are tied together using co-evolution such that each population plays a large role in the evolution of the other population. A prototype of the Co-evolutionary Automated Software Correction (CASC) system has been developed, which has allowed for preliminary experimentation to test the validity of the idea behind the CASC system --Abstract, page iii
    corecore