نتایج جستجو برای: jpeg بیاتلاف

تعداد نتایج: 4716  

Journal: :CoRR 2014
Bin Li Tian-Tsong Ng Xiaolong Li Shunquan Tan Jiwu Huang

This paper focuses on the JPEG noises, which include the quantization noise and the rounding noise, during a JPEG compression cycle. The JPEG noises in the first compression cycle have been well studied; however, so far less attention has been paid on the JPEG noises in higher compression cycles. In this work, we present a statistical analysis on JPEG noises beyond the first compression cycle. ...

2003
Touradj Ebrahimi Raphaël Grosbois

The Joint Photographic Experts Group (JPEG) has recently rolled out a new still image coding standard called JPEG 2000. This standard integrates an efficient image compression scheme with functionalities required by multimedia applications, such as progressiveness up to lossless coding, region of interest coding, and error resiliency. Security is a concern in many applications, and therefore al...

2000
Yoshihiro Noguchi Hiroyuki Kobayashi Hitoshi Kiya

We proposed a method for embedding binary data into JPEG bitstreams and extracting embedded data from JPEG bitstreams using the standard JPEG decoder. In the proposed method, we can decode the image from JPEG bitstreams into which the binary data is embedded first using the traditional standard JPEG decoder, and then we can extract the embedded binary data perfectly by the post-processing from ...

2012
Yu Chen Vrizlynn L. L. Thing

In this paper, we propose a sector-wise JPEG fragment point classification approach to classify normal and erroneous JPEG data fragments with the minimum size of 512 Bytes per fragment. The contributions of this work are two-folds: 1) a sectorwise JPEG erroneous fragment classification approach is proposed 2) a new DCT coefficient analysis method is introduced for the JPEG image content analysi...

Journal: :D-Lib Magazine 2009
Hannes Kulovits Andreas Rauber Anna Kugler Markus Brantl Tobias Beinert Astrid Schoger

Studies and user reports claim JPEG 2000 to be – or at least will become – the next archiving format for digital images [1]. The format offers new possibilities, such as streaming, and reduces storage consumption through lossless and lossy compression [2]. Another often claimed advantage of JPEG 2000 is that the master image can possibly serve as the access copy as well, and thus replace derive...

2007
Guorong Xuan Yun Q. Shi Zhicheng Ni Peiqi Chai Xia Cui Xuefeng Tong

This paper proposes a lossless data hiding technique for JPEG images based on histogram pairs. It embeds data into the JPEG quantized 8x8 block DCT coefficients and can achieve good performance in terms of PSNR versus payload through manipulating histogram pairs with optimum threshold and optimum region of the JPEG DCT coefficients. It can obtain higher payload than the prior arts. In addition,...

2005
Konrad Froitzheim Heiner Wolf

JPEG picture compression and related algorithms are not only used in still picture compression, but also to a growing degree for moving picture compression in telecommunication applications. Real-time JPEG compression and decompression are crucial in these scenarios. We present a method to significantly improve the performance of software based JPEG decompression. Key to these performance gains...

2009
Lakshmanan Nataraj Anindya Sarkar B. S. Manjunath

In this paper, we propose robust methods to detect image resizing. A common problem affecting most resizing detection algorithms is that they are susceptible to JPEG compression attacks. The reason is that JPEG compression introduces its own periodicity, as it works on 8×8 blocks. In our proposed approach, we add a suitable amount of Gaussian noise to a resized and JPEG compressed image so that...

Journal: :J. Electronic Imaging 2008
Yu-Jie Chang Sian-Jheng Lin Ja-Chen Lin

This work presents an authentication and cross-recovery scheme to protect a group of n JPEG images. Given n images, the images are scaled down and then encoded using JPEG to create n recovery data. Based on a pre-determined threshold t, 2 ≤ t < n, the n recovery data are shared to create n shadows. Next, n authentication data are generated to identify malicious attacks on the system. Additional...

2003
José Salvado Bruno Roque

This paper addresses the most relevant aspects of lossy image coding techniques, and presents an evaluation study on this subject, using several transforms and different methods in the transform domain. We developed different transform based image coders/decoders (codecs) using different transforms, such as the discrete cosine transform, the discrete wavelet transform and the S transform. Besid...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید