نتایج جستجو برای: روش jpeg
تعداد نتایج: 374233 فیلتر نتایج به سال:
با توجه به افزایش قابل توجه استفاده از سیگنال های چندرسانه ای در ارتباطات مخابراتی تأمین امنیت برای این سیگنال ها بسیار مهم است. یکی از روش تأمین امنیت، پنهان نگاری اطلاعات است. پنهان نگاری به عنوان علم مخابره ی نامحسوس اطلاعات روی کانال هایی همانند اینترنت، تلفن، ماکرویو و ماهواره ها شناخته می شود. در میان سیگنال های چند رسانه ای، تصاویر دیجیتال، به دلیل استفاده زیاد انها در اینترنت ، دوربین د...
JPEG, görüntü sıkıştırma için en yaygın kullanılan yöntemlerin başında gelmektedir. JPEG işleminde kuantalama adımında tablosu önemli bir rol oynamaktadır. Kuantalama görüntünün kalitesini ve miktarını ölçüde belirler. Bu nedenle tablosunun oluşturulması optimizasyon problemi olarak görülmektedir. makalede daha etkili tabloları oluşturulabilmesi oran-bozulma yaklaşımı, insan görsel sistemi yakl...
یک تصویر به صورت معمولی و در حالتی که 3 بایت برای هر پیکسل (یک بایت برای هر کدام از عناصر رنگ r و g و b) آن استفاده می شود حجم قابل ملاحظه ای را اشغال می کند لذا برای کاهش این حجم از روشهای مختلف استفاده می شود. بهترین روشی که مورد استفاده قرار می گیرد روش jpeg است که دارای نسبت فشردگی خوبی است . در این پروژه سه روش فشرده سازی را اجرا کرده و آنها را نسبت به روش jpeg مقایسه کرده ایم. سه روش iir-...
Among the many different modes of operations allowed in the current JPEG standard, the sequential and progressive modes are the most widely used. While the sequential JPEG mode yields essentially the same level of compression performance for most encoder implementations, the performance of progressive JPEG depends highly upon the designed encoder structure. This is due to the flexibility the st...
Copy-paste forgery is a very common type of forgery in JPEG images. The tampered patch has always suffered from JPEG compression twice with inconsistent block segmentation. This phenomenon in JPEG image forgeries is called the shifted double JPEG (SD-JPEG) compression. Detection of SD-JPEG compressed blocks can make crucial contribution to detect and locate the tampered region. However, the exi...
The JPEG standard has known an enormous market adoption. Daily, billions of pictures are created, stored and exchanged in this format. The JPEG committee acknowledges this success and spends continued efforts in maintaining and expanding the standard specifications. JPEG XT is a standardization effort targeting the extension of the JPEG features by enabling support for high dynamic range imagin...
We present a method for automating the detection of the socalled JPEG ghosts. JPEG ghosts can be used for discriminating singleand double JPEG compression, which is a common cue for image manipulation detection. The JPEG ghost scheme is particularly well-suited for non-technical experts, but the manual search for such ghosts can be both tedious and error-prone. In this paper, we propose a metho...
Proprietary compression schemes have a cost and risk associated with their support, end of life and interoperability. Standards reduce this cost and risk. The new JPEG-LS process (ISO/IEC 14495-1), and the lossless mode of the proposed JPEG 2000 scheme (ISO/IEC CD15444-1), new standard schemes that may be incorporated into DICOM, are evaluated here. Three thousand, six hundred and seventy-nine ...
The JPEG[1] (Joint Photographic Experts Group) introduced a still image graphics format in 1987, known as JPEG. The process flow in the baseline mode, converts color images to 8x8 block based DCT mostly applied for gray images, then we applied quantization for the DCT in zigzag ordering, and obtained entropy coding using Huffman tables in the encoding process is obtained and vice versa for deco...
Abstract: JPEG is the most applicable image format in digital communication. In recent years, various steganography methods have been proposed for it. This paper aims to study and classify JPEG steganography schemes and introduce different methods to improve their security based on cover. Accordingly, the effective factors in security that are related to the cover such as double compression, sp...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید