1,628 research outputs found
Recent Advances in Steganography
Steganography is the art and science of communicating which hides the existence of the communication. Steganographic technologies are an important part of the future of Internet security and privacy on open systems such as the Internet. This book's focus is on a relatively new field of study in Steganography and it takes a look at this technology by introducing the readers various concepts of Steganography and Steganalysis. The book has a brief history of steganography and it surveys steganalysis methods considering their modeling techniques. Some new steganography techniques for hiding secret data in images are presented. Furthermore, steganography in speeches is reviewed, and a new approach for hiding data in speeches is introduced
Digital Image Access & Retrieval
The 33th Annual Clinic on Library Applications of Data Processing, held at the University of Illinois at Urbana-Champaign in March of 1996, addressed the theme of "Digital Image Access & Retrieval." The papers from this conference cover a wide range of topics concerning digital imaging technology for visual resource collections. Papers covered three general areas: (1) systems, planning, and implementation; (2) automatic and semi-automatic indexing; and (3) preservation with the bulk of the conference focusing on indexing and retrieval.published or submitted for publicatio
A comprehensive survey of multi-view video summarization
[EN] There has been an exponential growth in the amount of visual data on a daily basis acquired from single or multi-view surveillance camera networks. This massive amount of data requires efficient mechanisms such as video summarization to ensure that only significant data are reported and the redundancy is reduced. Multi-view video summarization (MVS) is a less redundant and more concise way of providing information from the video content of all the cameras in the form of either keyframes or video segments. This paper presents an overview of the existing strategies proposed for MVS, including their advantages and drawbacks. Our survey covers the genericsteps in MVS, such as the pre-processing of video data, feature extraction, and post-processing followed by summary generation. We also describe the datasets that are available for the evaluation of MVS. Finally, we examine the major current issues related to MVS and put forward the recommendations for future research(1). (C) 2020 Elsevier Ltd. All rights reserved.This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. 2019R1A2B5B01070067)Hussain, T.; Muhammad, K.; Ding, W.; Lloret, J.; Baik, SW.; De Albuquerque, VHC. (2021). A comprehensive survey of multi-view video summarization. Pattern Recognition. 109:1-15. https://doi.org/10.1016/j.patcog.2020.10756711510
Securing DICOM images based on adaptive pixel thresholding approach
This paper presents a novel efficient two-region Selective encryption approach that exploits medical images statistical properties to adaptively segment Digital Imaging and Communications in Medicine (DICOM) images into regions using thresholding technique in the spatial domain. This approach uses adaptive pixel thresholding, in which thresholds for same DICOM modality, anatomy part and pixel intensities' range were extracted off-line. Then, the extracted thresholds were objectively and subjectively evaluated to select the most accurate threshold for the correspondent pixel intensities' range. In the on-line stage, DICOM images were segmented into a Region Of Interest (ROI) and a Region Of Background (ROB) based on their pixels intensities using the adopted thresholds. After that, ROI was encrypted using Advanced Encryption Standard (AES), while ROB was encrypted using XXTEA. The main goal of the proposed approach is to reduce the encryption processing time overhead in comparison with the Naïve approach; where all image pixels are encrypted using AES. The proposed approach aims to achieve a trade-off between processing time and a high level of security. The encryption time of the proposed approach can save up to 60% of the Naïve encryption time for DICOM images with small-medium ROI
Data Clustering: Algorithms and Its Applications
Data is useless if information or knowledge that can
be used for further reasoning cannot be inferred from it.
Cluster analysis, based on some criteria, shares data into important, practical or both categories (clusters) based on shared common characteristics. In research, clustering and classification have been used to analyze data, in the field of machine learning, bioinformatics, statistics, pattern recognition to mention a few. Different methods of clustering include Partitioning (K-means), Hierarchical (AGNES), Density-based (DBSCAN), Grid-based (STING), Soft clustering (FANNY), Model-based (SOM) and Ensemble clustering. Challenges and problems in clustering arise from large datasets, misinterpretation of results and efficiency/performance of clustering algorithms, which is necessary for choosing clustering algorithms. In this paper, application of data clustering was systematically discussed in view of the characteristics of the different clustering techniques
that make them better suited or biased when applied to several types of data, such as uncertain data, multimedia data, graph data, biological data, stream data, text data, time series data, categorical data and big data. The suitability of the available clustering algorithms to different application areas was presented. Also investigated were some existing cluster validity
methods used to evaluate the goodness of the clusters produced by the clustering algorithms
Natural Disaster Detection Using Wavelet and Artificial Neural Network
Indonesia, by the location of its geographic and
geologic, it have more potential encounters for natural disasters.
This nation is traversed by three tectonic plates, namely: IndoAustralian, the Eurasian and the Pacific plates.
One of the tools employed to detect danger and send an early disaster warning is sensor device for ocean waves, but it has drawbacks related to the very
limited
time
gap
between
information/warnings
obtained
and
the
real
disaster
event,
which
is only
less
than
30
minutes.
Natural
disaster
early
detection
information
system
is
essential
to
prevent
potential
danger.
The system can make use of the pattern recognition of satellite imagery sequences that take place before and during the natural disaster.
This study is conducted to determine the right wavelet to compress the satellite image sequences and to perform the pattern recognition process of a natural disaster employing an artificial neural network.
This study makes use of satellite imagery sequences of tornadoes and hurricanes
- …