نتایج جستجو برای: jpeg بیاتلاف
تعداد نتایج: 4716 فیلتر نتایج به سال:
In this paper, we propose a semi-fragile watermarking technique that accepts JPEG lossy compression on the watermarked image to a pre-determined quality factor, and rejects malicious attacks. The authenticator can identify the positions of corrupted blocks, and recover them with approximation of the original ones. In addition to JPEG compression, adjustments of the brightness of the image withi...
The first two sections provide some Gauguin-like informational structure: where MPEG came from, what it is, where it is going. The description of related standards bodies is dated when considering younger readers whose main exposure to CCITT is their CRC polynomial. But it was probably helpful at the time. What isn't dated, in fact is remarkably relevant, is the relationship between MPEG and JP...
This paper shows that it is possible to train large and deep convolutional neural networks (CNN) for JPEG compression artifacts reduction, and that such networks can provide significantly better reconstruction quality compared to previously used smaller networks as well as to any other state-of-the-art methods. We were able to train networks with 8 layers in a single step and in relatively shor...
In this article we propose a new fragile watermarking algorithm that provides the means to verify the integrity of JPEG images. We begin by presenting the cryptanalysis of CWSA (Chaotic Watermarking Scheme for the Authentication of JPEG Images), an existing fragile watermarking algorithm. We analyse its weaknesses and we propose a new version that is resistant to those attacks, faster and less ...
A novel image authentication algorithm resisting to JPEG compression is proposed. The authentication watermark is generated based on the stability of relationship of adjacent Contourlet transform coefficients before and after JPEG. According to the random block mapping, the watermark is embedded into the discrete cosine transform (DCT) coefficients of other image blocks. The tampering identific...
Pictures used by GPS devices are usually overly large to be stored as Bit Map, so they are by and large compressed. The common compression method is JPEG; however JPEG assumes that the average color of beginning of each blocks line is usually similar to the average color of end of its preceding blocks line. Many times this assumption is incorrect for GPS picture. This paper suggests a way to ch...
This paper presents a robust image authentication approach that distinguishes malicious attacks from JPEG lossy compression. The authentication procedure calculates the relationships between important DCT coefficients in each pair of DCT blocks and predefined thresholds to form the authentication message, and then embeds the encryption of the authenticated message into other DCT coefficients. T...
An image compression algorithm using JPEG-LS and cubic spline interpolation (CSI) is presented in this paper. The CSI is developed in order to subsample image data with minimal distortion and to achieve image compression. It has been shown in literatures that the CSI can be combined with the transform-based image compression algorithm to develop a modified image compression codec. The compressi...
In this paper, we propose a new method of feature extraction in order to improve the efficiency of retrieving Joint Photographic Experts Group (JPEG) compressed images. Our feature extraction can be done directly to JPEG compressed images. We extract two features, DC feature and AC feature, from a JPEG compressed image. Then we measure the distances between the query image and the images in a d...
JPEG XR is a draft international standard undergoing standardization within the JPEG committee, based on a Microsoft technology known as HD Photo. One of the key innovations in the draft JPEG XR standard is its integer-reversible hierarchical lapped transform. The transform can provide both bit-exact lossless and lossy compression in the same signal flow path. The transform requires only a smal...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید