9 research outputs found

    Application and Theory of Multimedia Signal Processing Using Machine Learning or Advanced Methods

    Get PDF
    This Special Issue is a book composed by collecting documents published through peer review on the research of various advanced technologies related to applications and theories of signal processing for multimedia systems using ML or advanced methods. Multimedia signals include image, video, audio, character recognition and optimization of communication channels for networks. The specific contents included in this book are data hiding, encryption, object detection, image classification, and character recognition. Academics and colleagues who are interested in these topics will find it interesting to read

    Data Hiding and Its Applications

    Get PDF
    Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others

    Discrete Wavelet Transforms

    Get PDF
    The discrete wavelet transform (DWT) algorithms have a firm position in processing of signals in several areas of research and industry. As DWT provides both octave-scale frequency and spatial timing of the analyzed signal, it is constantly used to solve and treat more and more advanced problems. The present book: Discrete Wavelet Transforms: Algorithms and Applications reviews the recent progress in discrete wavelet transform algorithms and applications. The book covers a wide range of methods (e.g. lifting, shift invariance, multi-scale analysis) for constructing DWTs. The book chapters are organized into four major parts. Part I describes the progress in hardware implementations of the DWT algorithms. Applications include multitone modulation for ADSL and equalization techniques, a scalable architecture for FPGA-implementation, lifting based algorithm for VLSI implementation, comparison between DWT and FFT based OFDM and modified SPIHT codec. Part II addresses image processing algorithms such as multiresolution approach for edge detection, low bit rate image compression, low complexity implementation of CQF wavelets and compression of multi-component images. Part III focuses watermaking DWT algorithms. Finally, Part IV describes shift invariant DWTs, DC lossless property, DWT based analysis and estimation of colored noise and an application of the wavelet Galerkin method. The chapters of the present book consist of both tutorial and highly advanced material. Therefore, the book is intended to be a reference text for graduate students and researchers to obtain state-of-the-art knowledge on specific applications

    Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with 4th International Symposium on Mobile Internet Security (MobiSec 2019)

    Get PDF
    The International Symposium on Future ICT (Future-ICT 2019) in conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019) was held on 17–19 October 2019 in Taichung, Taiwan. The symposium provided academic and industry professionals an opportunity to discuss the latest issues and progress in advancing smart applications based on future ICT and its relative security. The symposium aimed to publish high-quality papers strictly related to the various theories and practical applications concerning advanced smart applications, future ICT, and related communications and networks. It was expected that the symposium and its publications would be a trigger for further related research and technology improvements in this field

    Coverless image steganography using morphed face recognition based on convolutional neural network

    Get PDF
    In recent years, information security has become a prime issue of worldwide concern. To improve the validity and proficiency of the image data hiding approach, a piece of state-of-the-art secret information hiding transmission scheme based on morphed face recognition is proposed. In our proposed data hiding approach, a group of morphed face images is produced from an arranged small-scale face image dataset. Then, a morphed face image which is encoded with a secret message is sent to the receiver. The receiver uses powerful and robust deep learning models to recover the secret message by recognizing the parents of the morphed face images. Furthermore, we design two novel Convolutional Neural Network (CNN) architectures (e.g. MFR-Net V1 and MFR-Net V2) to perform morphed face recognition and achieved the highest accuracy compared with existing networks. Additionally, the experimental results show that the proposed schema has higher retrieval capacity and accuracy and it provides better robustness

    Transmission of compressed images over power line channel

    Get PDF
    In the telecommunications industry, the use of existing power lines has drawn the attention of many researchers in the recent years. PLC suffers from impulsive noise that can affect data transmission by causing bit or burst errors. In this thesis, PLC channel was used as a transmission scheme to transmit compressed still images using FFT-OFDM. When lossy compression is applied to an image, a small loss of quality in the compressed image is tolerated. One of the challenging tasks in image compression and transmission is the trade-off between compression ratio and image quality. Therefore, we utilized the latest developments in quality assessment techniques, SSIM, to adaptively optimize this trade-off to the type of image application which the compression is being used for. A comparison between different compression techniques, namely, discrete cosine transform (DCT), discrete wavelet transform (DWT), and block truncation coding (BTC) was carried out. The performance criteria for our compression methods include the compression ratio, relative root-meansquared (RMS) error of the received data, and image quality evaluation via structural similarity index (SSIM). Every link in a powerline has its own attenuation profile depending on the length, layout, and cable types. Also, the influences of multipath fading due to reflections at branching point vary the attenuation profile of the link. As a result, we observed the effect of different parameters of the PLC channel based on the number of paths, and length of link on the quality of the image. Simulations showed that the image quality is highly affected by the interaction of the distance of PLC channel link and the number of multipath reflections. The PLC channel is assumed to be subjected to Gaussian and impulsive noises. There are two types of impulsive noise: asynchronous impulsive noise and periodic impulsive noise synchronous to the mains frequency. BER analysis was performed to compare the performance of the channel for the two types of impulsive noise under three impulsive scenarios. The first scenario is named as "heavily disturbed" and it was measured during the evening hours in a transformer substation in an industrial area. The second scenario is named as "moderately disturbed" and was recorded in a transformer substation in a residential area with detached and terraced houses. The third scenario is named as "weakly disturbed" and was recorded during night-time in an apartment located in a large building. The experiments conducted showed that both types of noise performed similarly in the three impulsive noise scenarios. We implemented Bose-Chaudhuri-Hocquenghen (BCH) coding to study the performance of Power Line Channel (PLC) impaired by impulsive noise and AWGN. BCH codes and RS codes are related and their decoding algorithms are quite similar. A comparison was made between un-coded system and BCH coding system. The performance of the system is assessed by the quality of the image for different sizes of BCH encoder, in three different impulsive environments. Simulation results showed that with BCH coding, the performance of the PLC system has improved dramatically in all three impulsive scenarios

    An intelligent system for the classification and selection of novel and efficient lossless image compression algorithms

    Get PDF
    We are currently living in an era revolutionised by the development of smart phones and digital cameras. Most people are using phones and cameras in every aspect of their lives. With this development comes a high level of competition between the technology companies developing these devices, each one trying to enhance its products to meet the new market demands. One of the most sought-after criteria of any smart phone or digital camera is the camera’s resolution. Digital imaging and its applications are growing rapidly; as a result of this growth, the image size is increasing, and alongside this increase comes the important challenge of saving these large-sized images and transferring them over networks. With the increase in image size, the interest in image compression is increasing as well, to improve the storage size and transfer time. In this study, the researcher proposes two new lossless image compression algorithms. Both proposed algorithms focus on decreasing the image size by reducing the image bit-depth through using well defined methods of reducing the coloration between the image intensities.The first proposed lossless image compression algorithm is called Column Subtraction Compression (CSC), which aims to decrease the image size without losing any of the image information by using a colour transformation method as a pre-processing phase, followed by the proposed Column Subtraction Compression function to decrease the image size. The proposed algorithm is specially designed for compressing natural images. The CSC algorithm was evaluated for colour images and compared against benchmark schemes obtained from (Khan et al., 2017). It achieved the best compression size over the existing methods by enhancing the average storage saving of the BBWCA, JPEG 2000 LS, KMTF– BWCA, HEVC and basic BWCA algorithms by 2.5%, 15.6%, 41.6%, 7.8% and 45.07% respectively. The CSC algorithm simple implementation positively affects the execution time and makes it one of the fastest algorithms, since it needed less than 0.5 second for compressing and decompressing natural images obtained from (Khan et al., 2017). The proposed algorithm needs only 19.36 seconds for compressing and decompressing all of the 10 images from the Kodak image set, while the BWCA, KMTF – BWCA and BBWCA need 398.5s, 429.24s and 475.38s respectively. Nevertheless, the CSC algorithm achieved less compression ratio, when compressing low resolution images since it was designed for compressing high resolution images. To solve this issue, the researcher proposed the Low-Resolution Column Subtraction Compression algorithm (LRCSC) to enhance the CSC low compression ratio related to compressing low-resolution images.The LRCSC algorithm starts by using the CSC algorithm as a pre-processing phase, followed by the Huffman algorithm and Run-Length Coding (RLE) to decrease the image size as a final compression phase. The LRCSC enhanced the average storage saving of the CSC algorithm for raster map images by achieving 13.68% better compression size. The LRCSC algorithm decreases the raster map image set size by saving 96% from the original image set size but did not reach the best results when compared with the PNG, GIF, BLiSE and BBWCA where the storage saving is 97.42%, 98.33%, 98.92% and 98.93% respectively. The LRCSC algorithm enhanced the compression execution time with acceptable compression ratio. Both of the proposed algorithms are effective with any image types such as colour or greyscale images. The proposed algorithms save a lot of memory storage and dramatically decreased the execution time.Finally, to take full benefits of the two newly developed algorithms, anew system is developed based on running both of the algorithm for the same input image and then suggest the appropriate algorithm to be used for the de-compression phase

    High-Precision Authentication Scheme Based on Matrix Encoding for AMBTC-Compressed Images

    No full text
    In this paper, a high-precision image authentication scheme for absolute moment block truncation coding (AMBTC)-compressed images is presented. For each block, two sub-bitmaps are conducted using the symmetrical separation, and the six-bit authentication code is symmetrically assigned to two sub-codes, which is virtually embedded into sub-bitmaps using the matrix encoding later. To overcome distortion caused by modifications to the bitmap, the corresponding to-be-flipped bit-location information is recorded instead of flipping these bits of the bitmap directly. Then, the bit-location information is inserted into quantization levels based on adjusted quantization level matching. In contrast to previous studies, the proposed scheme offers a significantly improved tampering detection ability, especially in the first hierarchical tampering detection without remediation measures, with an average tampering detection rate of up to 98.55%. Experimental results show that our approach provides a more stable and reliable tampering detection performance and sustains an acceptable visual quality
    corecore