نتایج جستجو برای: تصویر jpeg
تعداد نتایج: 21751 فیلتر نتایج به سال:
JPEG 2000, the new ISO/ITU-T standard for still image coding, is about to be finished. Other new standards have been recently introduced, namely JPEG-LS and MPEG-4 VTC(H.264). This paper compares the set of features offered by JPEG 2000, and how well they are fulfilled, versus JPEG and MPEG-4 VTC(H.264). The study concentrates on compression efficiency and functionality set, while addressing ot...
Palette images are widely used on the World Wide Web (WWW) and in game-cartridge applications. Many images used on the WWW are stored and transmitted after they are compressed losslessly with the standard graphics interchange format (GIF), or portable network graphics (PNG). Well-known 2-D compression schemes, such as JPEG-LS and JPEG-2000, fail to yield better compression than GIF or PNG due t...
∗ Corresponding author. Fax: +30 61 997456 Email addresses: [email protected] (A.N. Skodras), [email protected] (C.A. Christopoulos), [email protected] (T. Ebrahimi). Abstract: With the increasing use of multimedia technologies, image compression requires higher performance as well as new features. To address this need in the specific area of still image encoding, a ne...
انتقال پ?ام به صورت مخف?انه از د?رباز ?ک? از ع?قمندیهای بـشر هوشـمند بـوده اسـت . بـا پ?شرفت فناوری روشهای انتقال مخف?انه پ?ام ?ا نهاننگاری آنها در رسـانه هـا ی د?گـر، پ?ـشرفت چشمگ?ری داشته اند.فرمت jpeg پرکاربرد تر?ن قالب تصو?ری در ارتباطات د?ج?تال اسـت و در ط? سال های اخ?ر روش های نهان نگاری متنـوع? بـرای آن ارائـه شـده اسـت هـدف از ا?ـن پایان نامه معرف? و ارائه اط?عات همه جانبه و کامل? در مو...
In this article, we study a recently proposed method for improving empirical security of steganography in JPEG images which the sender starts with an additive embedding scheme symmetrical costs ± 1 changes and then decreases cost one these based on image obtained by applying deblocking (JPEG dequantization) algorithm to cover JPEG. This approach provides rather significant gains at negligi...
JPEG images are self-synchronized in cases of an error; however, after the synchronization the images are not shown as the original ones. Sometimes, the blocks are shifted to right or left and the tinge is damaged as well. This paper suggests a way how to remedy the block shift and the tinge
The challenge in the case of image authentication is that in many cases images need to be subjected to non malicious operations like compression, so the authentication techniques need to be compression tolerant. In this paper we propose an image authentication system that is tolerant to JPEG lossy compression operations. A scheme for JPEG grey scale images is proposed based on a data embedding ...
In this paper packetization and reconstruction algorithms in transmission of JPEG coded images over lossy channels are proposed. An interleaving method is devised that maximizes the minimumdistance between the 8 8 blocks, used in JPEG, that are in the same packet. Then a method for estimating the missing DC coe cients of a JPEG coded image which is required for decoding the compressed image, is...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید