نتایج جستجو برای: روش jpeg

تعداد نتایج: 374233  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سمنان 1390

با توجه به افزایش قابل توجه استفاده از سیگنال های چندرسانه ای در ارتباطات مخابراتی تأمین امنیت برای این سیگنال ها بسیار مهم است. یکی از روش تأمین امنیت، پنهان نگاری اطلاعات است. پنهان نگاری به عنوان علم مخابره ی نامحسوس اطلاعات روی کانال هایی همانند اینترنت، تلفن، ماکرویو و ماهواره ها شناخته می شود. در میان سیگنال های چند رسانه ای، تصاویر دیجیتال، به دلیل استفاده زیاد انها در اینترنت ، دوربین د...

Journal: : 2022

JPEG, görüntü sıkıştırma için en yaygın kullanılan yöntemlerin başında gelmektedir. JPEG işleminde kuantalama adımında tablosu önemli bir rol oynamaktadır. Kuantalama görüntünün kalitesini ve miktarını ölçüde belirler. Bu nedenle tablosunun oluşturulması optimizasyon problemi olarak görülmektedir. makalede daha etkili tabloları oluşturulabilmesi oran-bozulma yaklaşımı, insan görsel sistemi yakl...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علم و صنعت ایران 1378

یک تصویر به صورت معمولی و در حالتی که 3 بایت برای هر پیکسل (یک بایت برای هر کدام از عناصر رنگ r و g و b) آن استفاده می شود حجم قابل ملاحظه ای را اشغال می کند لذا برای کاهش این حجم از روشهای مختلف استفاده می شود. بهترین روشی که مورد استفاده قرار می گیرد روش jpeg است که دارای نسبت فشردگی خوبی است . در این پروژه سه روش فشرده سازی را اجرا کرده و آنها را نسبت به روش jpeg مقایسه کرده ایم. سه روش iir-...

Journal: :IEEE transactions on image processing : a publication of the IEEE Signal Processing Society 1999
Jaehan In Shahram Shirani Faouzi Kossentini

Among the many different modes of operations allowed in the current JPEG standard, the sequential and progressive modes are the most widely used. While the sequential JPEG mode yields essentially the same level of compression performance for most encoder implementations, the performance of progressive JPEG depends highly upon the designed encoder structure. This is due to the flexibility the st...

2011
Yujin Zhang Shenghong Li Shilin Wang

Copy-paste forgery is a very common type of forgery in JPEG images. The tampered patch has always suffered from JPEG compression twice with inconsistent block segmentation. This phenomenon in JPEG image forgeries is called the shifted double JPEG (SD-JPEG) compression. Detection of SD-JPEG compressed blocks can make crucial contribution to detect and locate the tampered region. However, the exi...

2015
Thomas Richter Tim Bruylants Peter Schelkens Touradj Ebrahimi

The JPEG standard has known an enormous market adoption. Daily, billions of pictures are created, stored and exchanged in this format. The JPEG committee acknowledges this success and spends continued efforts in maintaining and expanding the standard specifications. JPEG XT is a standardization effort targeting the extension of the JPEG features by enabling support for high dynamic range imagin...

2012
Fabian Zach Christian Riess Elli Angelopoulou

We present a method for automating the detection of the socalled JPEG ghosts. JPEG ghosts can be used for discriminating singleand double JPEG compression, which is a common cue for image manipulation detection. The JPEG ghost scheme is particularly well-suited for non-technical experts, but the manual search for such ghosts can be both tedious and error-prone. In this paper, we propose a metho...

2000
David A. Clunie

Proprietary compression schemes have a cost and risk associated with their support, end of life and interoperability. Standards reduce this cost and risk. The new JPEG-LS process (ISO/IEC 14495-1), and the lossless mode of the proposed JPEG 2000 scheme (ISO/IEC CD15444-1), new standard schemes that may be incorporated into DICOM, are evaluated here. Three thousand, six hundred and seventy-nine ...

2014
Sharmila Rani K. Sri Harsha

The JPEG[1] (Joint Photographic Experts Group) introduced a still image graphics format in 1987, known as JPEG. The process flow in the baseline mode, converts color images to 8x8 block based DCT mostly applied for gray images, then we applied quantization for the DCT in zigzag ordering, and obtained entropy coding using Huffman tables in the encoding process is obtained and vice versa for deco...

Abstract: JPEG is the most applicable image format in digital communication. In recent years, various steganography methods have been proposed for it. This paper aims to study and classify JPEG steganography schemes and introduce different methods to improve their security based on cover. Accordingly, the effective factors in security that are related to the cover such as double compression, sp...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید