16 research outputs found

    Image Compression Based On Region Of Interest For Computerized Tomography Images

    Get PDF
    The use of computers for handling image data in the healthcare is growing. The amount of data produced by modem image generating techniques, such as Computed Tomography (CT) and Magnetic Resonance (MR), is vast. The amount of data might be a problem from a storage point of view or when the data is sent over a network. To overcome these problems data compression techniques adapted to these applications are needed. Many classes of images contain some spatial regions which are more important than other regions. Compression methods which are capable of achieving higher reconstruction quality of important parts of the image have been implemented. For medical images, only a small portion of the image might be diagnostically useful, but the cost of wrong interpretation is high. Algorithms which deliver lossless compression within the regions of interest (ROI), and lossy compression elsewhere in the image, might be the key to providing efficient and accurate image coding to the medical community. In this thesis both of compression techniques (lossy and lossless) of medical images using the JPEG algorithm (DCT), will be discussed

    Video Encryption Based on Chaotic Systems in the Compression Domain

    Get PDF
    With the development of the internet and multimedia technology digital video encryption has attracted a great deal of research interest in the recent few years in applications. In this paper, we propose a method to encrypt video data. The proposed algorithm is based on the MPEG video coding standard. It selectively encrypts some DCT coefficients in the I frame, B frame and P frame in MPEG video compression by using chaotic systems. The key in this paper is chaotic sequence based on logistic mapping. It can produce the pseudo-random sequences with good randomness. The experimental results based on chaotic maps prove the effectiveness of the proposed method, showing advantages of large key space and high-level security. The proposed algorithm was measured through a series of tests and achieved good results. The results indicate that the algorithm can be implemented for video encryption efficiently and it provides considerable levels of security

    A Secure and Robust Compressed Domain Video Steganography for Intra- and Inter-Frames Using Embedding-Based Byte Differencing (EBBD) Scheme.

    No full text
    This paper presents a novel secure and robust steganographic technique in the compressed video domain namely embedding-based byte differencing (EBBD). Unlike most of the current video steganographic techniques which take into account only the intra frames for data embedding, the proposed EBBD technique aims to hide information in both intra and inter frames. The information is embedded into a compressed video by simultaneously manipulating the quantized AC coefficients (AC-QTCs) of luminance components of the frames during MPEG-2 encoding process. Later, during the decoding process, the embedded information can be detected and extracted completely. Furthermore, the EBBD basically deals with two security concepts: data encryption and data concealing. Hence, during the embedding process, secret data is encrypted using the simplified data encryption standard (S-DES) algorithm to provide better security to the implemented system. The security of the method lies in selecting candidate AC-QTCs within each non-overlapping 8 × 8 sub-block using a pseudo random key. Basic performance of this steganographic technique verified through experiments on various existing MPEG-2 encoded videos over a wide range of embedded payload rates. Overall, the experimental results verify the excellent performance of the proposed EBBD with a better trade-off in terms of imperceptibility and payload, as compared with previous techniques while at the same time ensuring minimal bitrate increase and negligible degradation of PSNR values

    Example of segmenting 8×8 coefficients data into a series of 2×2 blocks.

    No full text
    <p>Example of segmenting 8×8 coefficients data into a series of 2×2 blocks.</p

    Summary of BER values of different steganographic techniques for compression attack.

    No full text
    <p>Summary of BER values of different steganographic techniques for compression attack.</p

    Flowchart for data extraction in the compressed domain using EBBD steganographic scheme.

    No full text
    <p>Flowchart for data extraction in the compressed domain using EBBD steganographic scheme.</p
    corecore