The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Communication between devices and data through networks have been increasing drastically in the past few decades. Encryption of data provides high level of security. This paper presents a median based technique for selective encryption where partial data of image is encrypted based on pixel values. An encrypted mask of the image is also appended with the image that specifies the pixels that are encrypted...
Various statistical methods such as co-occurrence matrix, local binary patterns and spectral approaches such as Gabor filters have been used for generating global features for image classification. However, global image features fail to distinguish between local variations within an image. Bag-of-visual-words (BoVW) model do capture local variations in an image, but typically do not consider spatial...
This paper deals with a method of clipping a line segment into a circular window. Its unlike other algorithms, instead of dividing region into segments and generating the corresponding region codes, yields results based their parametric equations which not only yields precise result for each pixel but also compute faster. Its an algorithm that can be embedded in many circular displays in order to...
In the paper we introduce three methods for image processing, they are pixel extraction method, memory method and pointer method. With the same condition of data structure and algorithm, the three methods are used in edge detection for the digital images. In order to compare the actual operation efficiency of these three kinds of methods, we use C# to write a Windows Form Application program in the...
Abstract- Newer generations of diagnostic machines are based on digital technologies for data acquisition and consequently with the emergence of digital archiving systems for preservation of diagnosis is rapidly increasing. The goals of Content-Based Image Retrieval (CBIR) systems is to process on collections of images, extract features and based on visual queries, extract relevant image from a repository...
Visual secret sharing scheme (for short the VSS scheme) with access structure based on graph \cite{ABSS96} has been proposed and this can be considered as an extension of $(2, n) $-threshold VSS scheme. Ateniese et al. showed a decomposition method that we decompose star graphs from a given graph which edges are specified by qualified sets. Namely, two participants (vertices in a given graph) has...
In this work, a sample rate estimator is proposed for selective graphics rendering so that the samples are allocated such that the best perceived image quality can be achieved under a given sample budget. In the proposed estimator, the sample rate of a pixel is decided by not only the visual attention (VA) level of the region to which the pixel belongs but also the required rendering complexity (RC)...
Traditional window-based color indexing techniques have been widely used in image analysis and retrieval systems. In the existing approaches, all the image regions are treated with equal importance. However, some image areas carry more information about their content (e.g. the scene foreground). The human visual system bases indeed the categorization process on such set of perceptually salient region...
This paper proposes a novel texture synthesis method to a wide variety of texture and any triangulated surface. According to the vector of the neighboring triangulated surfaces of model. it uses a extent first strategy to divide the model. The orthographic Float method has been used to parameterize and evaluate for each model block. When the model block has large tortuosity. it can fractionize the...
Malaysia has been recognized as one of the twelve nations endowed with rich biodiversity. Such huge number of species in the rain forest and sea are an important asset that need to be properly documented. Responding to these important needs, we have designed and evaluated a content based image retrieval system catered for marine life images. This paper investigates the effectiveness of various low...
Content aware image resizing technique has become more important with the development of device technology. Although the seam carving method produces high-quality resized images, it requires high computational complexity. In this paper, we propose a block-based seam carving method, which is extended from the seam carving method. In our method, a seam element is a pixel block, and a seam is a path...
Medical databases have been a popular application field for image retrieval techniques during the last decade. More recently, much attention has been paid to the prediction of medical image modality (X-rays, MRI…) and the integration of the predicted modality into image retrieval systems. This paper addresses these two issues. On the one hand, we believe it is possible to design specific visual descriptors...
This contribution deals with the testing and selection of methods and algorithms for the automatic video image (or visual signal) segmentation. The aim of this work has been to select a reliable and fast method for visual signal segmentation, which can be used in the system for audio-visual automatic TV broadcast transcription.
A low-complexity, interlacing-artifact-aware de-interlacing algorithm which can efficiently remove interlacing artifacts from a video sequence before encoding is presented in this paper. The proposed algorithm detects the areas where interlacing artifacts occur and de-interlaces only those detected areas within a frame. It bypasses areas unaffected by artifacts. The proposed de-interlacing algorithm...
Visual Cryptography is an encryption technique where a secret image is cryptographically encoded into n meaningless share images. In visual secret sharing scheme (k, n) the secret images can be visually revealed by stacking together any k or more transparencies of the shares and by inspecting less than k shares, one cannot retrieve the secret image. In Visual Secret Sharing based on halftoning, the...
In this paper a secret message/image transmission technique has been proposed through (2, 2) visual cryptographic shares which are covered by meaningful images so that a potential eavesdropper won't know there's a message to be read. A binary image is taken as cover image and authenticating message/image has been fabricated into it through a hash function where two bits in each pixel within four bits...
Biometrics is the detailed measurements of the human body. Biometrics deals with automated methods of identifying a person or verifying the identity of a person based on physiological or behavioural characteristics. Protection of biometric data is gaining interest and digital watermarking techniques are used to protect the biometric data from either accidental or intentional attacks. Among the various...
In mixed-resolution (MR) stereoscopic video, one view is presented with a lower resolution compared with the other one; therefore, a lower bitrate, a reduced computational complexity, and a decrease in memory access bandwidth can be expected in coding. The human visual system is known to fuse left and right views in such a way that the perceptual visual quality is closer to that of the higher-resolution...
Most image retargeting algorithms rely heavily on valid saliency map detection to proceed. But the inefficiency of high quality saliency map detection severely restricts applications of these image retargeting methods. In this paper, we describe a stochastic algorithm for efficient context-aware saliency map detection. Our method is a multiple level saliency map detection algorithm which integrates...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.