9,535 research outputs found
On color-to-gray transformation for distributing color digital images
A new block embedding algorithm with a secret key is introduced for the Color-to-Gray and Back transformation. Color is embedded into the bit planes of the luminosity component of the YUV color space. We present an interface incorporated into Adobe Photoshop and consider a solution of the high quality digital image distribution problem. The solution is based on idea that the grayscale image with hidden color is a β version of a color original. Then a user could get a gray image before buying its color original he is interested. The proposed protocol has a secret key and can protect original images from unauthorized copying
Digital Color Imaging
This paper surveys current technology and research in the area of digital
color imaging. In order to establish the background and lay down terminology,
fundamental concepts of color perception and measurement are first presented
us-ing vector-space notation and terminology. Present-day color recording and
reproduction systems are reviewed along with the common mathematical models
used for representing these devices. Algorithms for processing color images for
display and communication are surveyed, and a forecast of research trends is
attempted. An extensive bibliography is provided
Boundary and object detection in real world images
A solution to the problem of automatic location of objects in digital pictures by computer is presented. A self-scaling local edge detector which can be applied in parallel on a picture is described. Clustering algorithms and boundary following algorithms which are sequential in nature process the edge data to locate images of objects
Soil temperature investigations using satellite acquired thermal-infrared data in semi-arid regions
Thermal-infrared data from the Heat Capacity Mapping Mission satellite were used to map the spatial distribution of diurnal surface temperatures and to estimate mean annual soil temperatures (MAST) and annual surface temperature amplitudes (AMP) in semi-arid east central Utah. Diurnal data with minimal snow and cloud cover were selected for five dates throughout a yearly period and geometrically co-registered. Rubber-sheet stretching was aided by the WARP program which allowed preview of image transformations. Daytime maximum and nighttime minimum temperatures were averaged to generation average daily temperature (ADT) data set for each of the five dates. Five ADT values for each pixel were used to fit a sine curve describing the theoretical annual surface temperature response as defined by a solution of a one-dimensinal heat flow equation. Linearization of the equation produced estimates of MAST and AMP plus associated confidence statistics. MAST values were grouped into classes and displayed on a color video screen. Diurnal surface temperatures and MAST were primarily correlated with elevation
Digital Image Access & Retrieval
The 33th Annual Clinic on Library Applications of Data Processing, held at the University of Illinois at Urbana-Champaign in March of 1996, addressed the theme of "Digital Image Access & Retrieval." The papers from this conference cover a wide range of topics concerning digital imaging technology for visual resource collections. Papers covered three general areas: (1) systems, planning, and implementation; (2) automatic and semi-automatic indexing; and (3) preservation with the bulk of the conference focusing on indexing and retrieval.published or submitted for publicatio
Comparative Analysis of Techniques Used to Detect Copy-Move Tampering for Real-World Electronic Images
Evolution of high computational powerful computers, easy availability of several innovative editing software package and high-definition quality-based image capturing tools follows to effortless result in producing image forgery. Though, threats for security and misinterpretation of digital images and scenes have been observed to be happened since a long period and also a lot of research has been established in developing diverse techniques to authenticate the digital images. On the contrary, the research in this region is not limited to checking the validity of digital photos but also to exploring the specific signs of distortion or forgery. This analysis would not require additional prior information of intrinsic content of corresponding digital image or prior embedding of watermarks. In this paper, recent growth in the area of digital image tampering identification have been discussed along with benchmarking study has been shown with qualitative and quantitative results. With variety of methodologies and concepts, different applications of forgery detection have been discussed with corresponding outcomes especially using machine and deep learning methods in order to develop efficient automated forgery detection system. The future applications and development of advanced soft-computing based techniques in digital image forgery tampering has been discussed
Comparative Analysis of Techniques Used to Detect Copy-Move Tampering for Real-World Electronic Images
Evolution of high computational powerful computers, easy availability of several innovative editing software package and high-definition quality-based image capturing tools follows to effortless result in producing image forgery. Though, threats for security and misinterpretation of digital images and scenes have been observed to be happened since a long period and also a lot of research has been established in developing diverse techniques to authenticate the digital images. On the contrary, the research in this region is not limited to checking the validity of digital photos but also to exploring the specific signs of distortion or forgery. This analysis would not require additional prior information of intrinsic content of corresponding digital image or prior embedding of watermarks. In this paper, recent growth in the area of digital image tampering identification have been discussed along with benchmarking study has been shown with qualitative and quantitative results. With variety of methodologies and concepts, different applications of forgery detection have been discussed with corresponding outcomes especially using machine and deep learning methods in order to develop efficient automated forgery detection system. The future applications and development of advanced soft-computing based techniques in digital image forgery tampering has been discussed
- …