Simultaneous Encryption/Compression of Images Using Alpha Rooting
|
|
- Silvester Wilkins
- 6 years ago
- Views:
Transcription
1 Simultaneous Encryption/Compression of Images Using Alpha Rooting Eric Wharton 1, Karen Panetta 1, and Sos Agaian 2 1 Tufts University, Dept. of Electrical and Computer Eng., Medford, MA The University of Texas at San Antonio, College of Eng., San Antonio, TX Abstract Significant work has been done in the areas of image encryption and compression as two independent problems, yet the two areas are strongly interleaved and should be considered simultaneously. Consider that current practice in image processing generally uses encryption on compressed image data or attempts to compress data that has already been encrypted. However, it is generally seen that traditional encryption techniques degrades compression. In this paper, we propose a novel method which prepares an image for compression while simultaneously encrypting the image data. We perform this using the well known alpha rooting algorithm. By increasing the relative magnitudes of the DCT transform coefficients, we are able to simplify the image in a way which makes it indiscernible, while also higher compression ratios. We demonstrate encryption and compression performance using the independent group JPEG algorithm, showing compression ratios and error metrics including MSE and SSIM for a collection of images. 1. Introduction Significant work has been performed on encrypting images and compressing images as two separate problems, but traditional encryption techniques geneally degrade the performance of multimedia compression systems [1]. To get around this difficulty, two methods have been used. The first employs known encryption algorithms on compressed image data [2][3][4][5]. The second attempts to develop compression algorithms which work well for typical encrypted data [6][7][8]. Algorithms which rely on encrypting compressed data generally rely on well known encryption methods, such as Digital Encryption Standard (DES) and Advanced Encryption Standard (AES), to encrypt portions of a compressed stream. In [2], DES is used to encrypt portions of an SPIHT compressed image. [3] and [4] detail two other ways of using well-known encryption methods to encrypt compressed data. Also, scrambling methods can be used as in [5], where scrambling techniques are used on JPEG image data to encrypt the image. However, such scrambling techniques have been cryptanalyzed and found to be lacking in security [24][25]. Excellent work has also been performed in the domain of compressing encrypted image data. In [6] and [7], compression of encrypted data is seen as a problem of source coding with side information. In order to achieve this, a distributed source coding scheme is used whose inter source correlations match the unencrypted source s statistics [6]. Another method is presented in [8], where an entropy coder is employed which combines run-length and Golomb-Rice encoders to compress Gaussian sources.
2 The work of Johnson et al. indicates that data should be able to be encrypted to the original source entropy regardless of encryption methods [6][7]. This is based on the assumption that, no matter what, the encrypted data is still related to the original image data with some amount of side information. In this paper, we develop a novel method to work towards this goal, using a method which both encrypts the image data and prepares it for compression. Alpha rooting has been used effectively for image enhancement [9][10][11][12]. It functions in the transform domain, reducing the magnitudes of the coefficients while leaving the phase unchanged. In [13] it was first shown that, by increasing instead of decreasing the magnitudes of the coefficients, an image could be encrypted instead of enhanced. By increasing the relative magnitudes of the coefficients, placing more emphasis on the less important information, a blurred and degraded image is produced. This affect can be undone by using the same alpha rooting equation and the inverse of the original encryption key. In this paper, we investigate the compression of these images, using alpha rooting as a pre-processing stage for compression as well as to perform the encryption of the image. For simplicity, we use the well known JPEG image compression algorithm, both in the lossless and lossy modes, to demonstrate the effectiveness of alpha rooting for simultaneous encryption and compression. We will present sample results and metrics to demonstrate the performance of this method, including compression ratio, mean squared error (MSE) of the encoded and decoded images, and the structural similarity (SSIM) [14] measure of the encoded and decoded images. This paper is organized as follows: section 2 presents necessary background information, including the alpha rooting algorithm and the metrics used. Section 3 presents the use of alpha rooting for simultaneous encryption and compression. Section 4 presents experimental results, giving compression ratios and error metrics to quantify performance. Section 5 is a discussion of results and some concluding comments are made. 2. Background In this section, we present necessary background information, including alpha rooting, the relational MSE measurement, and the relational SSIM measurement Alpha Rooting Alpha rooting is a straightforward method originally proposed by Jain [9]. This algorithm was later modified by Aghagolzadeh and Ersoy [10] as well as by Agaian [11][12]. Alpha rooting can be used in combination with any orthogonal transform such as Fourier, Hartley, Haar wavelet and cosine transforms. Alpha rooting modifies these transform coefficients in the following manner: α 1 O( p, s) = X ( p, s) X ( p, s) (1) Where X( p, s ) is the 2-D orthogonal transform of the input image, O( p, s ) is the 2-D orthogonal transform of the output image, and α is a user-defined operating parameters,
3 Fig. 1. Sample results for alpha rooting enhancement, top row: Original images, bottom row: Alpha Rooting enhanced images with range 0 < α < 1 when used for enhancement. For this paper, we will use the Discrete Cosine Transform (DCT). Sample results for the alpha rooting enhancement method are shown in figure 1, showing enhancement of the fine details in the image Error Metrics A number of image similarity metrics have been proposed. Two common methods are the well known mean squared error (MSE), and Structural Similiarity (SSIM) measure [14]. MSE takes the sum of the squared error over the entire image and scales it by the number of pixels, returning smaller numbers for a more perfect match. The SSIM measure uses image statistics to compare luminance, contrast, and structure; outputting a number between 0 and 1 with 1 being a perfect match. In [15], a measure was proposed comparing the error of the decrypted signal to the error of the encrypted signal. Using the assumption that an encrypted image should have as large a difference from the original as possible while the decrypted image should have as small an error as possible, the measure divides the MSE of the encrypted image by the MSE of the decrypted image to measure encryption quality. This measure can be modified to use the original SSIM. Continuing to use the assumption that the error between the decoded and original images should be as small as possible while the error between the encrypted image and original should be as large as possible, we introduce the Relational SSIM (ReSSIM) measure as follows: SSIM decrypted Re SSIM = (2) SSIM encrypted 3. Alpha Rooting for Simultaneous Encryption and Compression Every day massive quantities of two-dimensional data are produced, stored, and transmitted [16]. As the amount of data generated continues to grow, it is clear that the role of data compression will be crucial in this development [17]. As well as the data compression techniques outlined in [6][7][8], there exist methods based on compression-
4 . boosting transforms [16], conditional averages [17], wavelet transforms and hierarchical trees [18], and adaptive linear predictors [19]. Both government and industry entities are interested in protecting information [20]. The government requires data protection to ensure national security. Industry requires data protection for information vital to it economic endeavors. As well as the methods in [2][3][4] which rely on DES or AES, there exist encryption algorithms which rely on scrambling [5][21] and methods which rely on chaotic systems [22][23]. It can be seen that there is a large amount of overlap between the need for compression and encryption. For example, government and corporations with proprietary documents demand effective encryption to protect their interests, while also requiring efficient compression to meet storage requirements. Despite this, there is little in the literature to address simultaneous encryption and compression. In [7] it is shown that, theoretically, it should be possible to compress encrypted data to the same limit as the unencrypted data that produced it. In [6], a method is proposed which can compress encrypted video frames by about 3:1, however it relies on temporal relations between different frames, making it unable to compress still images. In [8], a method is proposed which is specifically designed to compress data with Gaussian statistics, which could be useful as an ideally encrypted image would have a Gaussian distribution. In [13], the alpha rooting algorithm was first used for image encryption. It was shown that this could achieve scalable encryption, where a larger α-value would result in better encryption. In this paper, we will show that, not only does this simplification of the image destroy the visual image in a recoverable way, but it also simplifies the image in a way which makes it better for compression. Section 4 will demonstrate the encryption performance for a collection of test images, showing the previously presented error statistics to quantify performance. In addition, further demonstration will show how this method prepares an image for compression using the common JPEG algorithm, both in the lossless and lossy modes. The experimental results will show that, as α increases, the compression ratio and encryption strength increases as well, with a tradeoff of less precise decryption. Figure 2 demonstrates the encryption method alone, giving the image histogram and error metrics to quantify the performance of alpha rooting encryption using the arctic hare image. It can be seen that, as α increases, the encryption strength increased and the image histogram moves toward a Gaussian distribution. This also results in a more readily compressed transform domain representation of the image, which lends itself to common compression techniques, such as JPEG but also compression methods intended for encrypted data such as those from [8]. It is noted that the error in the figure 2 comes from machine precision. If the decrypted images could be stored as floating point numbers instead of integers, the MSE would be significantly decreased. This is one issue which must be overcome for compression of these images. While lossless JPEG only rounds off the fractional portion resulting in
5 α = 1 (Original) α = 2 α = 3 α = MSE = 0 (original) SSIM = 1 ReSSIM = 1 MSE = x10-20 SSIM = 1 ReSSIM = MSE = x10-9 SSIM = ReSSIM = MSE = x10-4 SSIM = ReSSIM = Fig. 2. Sample results for alpha rooting; top row: encrypted images, middle row: histogram of encrypted images, bottom row: decrypted images with MSE values and SSIM values similar results as those shown here, lossy JPEG encryption slightly changes these values, which will result in a larger amount of error in the decrypted signal. However, it will be seen that this can be easily corrected by using a simple low pass filter or other methods. 4. Experimental Results In this section, we present experimental results for a collection of images using alpha rooting to simultaneously encrypt an image and prepare it for compression. We show results for a collection of test images. These consist of common test images such as Lena and the pentagon, camera phone images, and a collection of documents. Figure 3 shows experimental results using the pentagon image to demonstrate compression using different alpha values and lossless JPEG. The decryption becomes increasingly lossy as α increases, however this could be improved by a compression technique which can compress floating point data values instead of integers. This can also be improved using simple denoising techniques, for example when the image using α = 4 is processed using a simple low pass filter, the SSIM = and the ReSSIM = , both significant gains. It is further noted that the alpha rooting processed images achieve a higher compression ratio than the original, unencrypted image. Figure 4 shows experimental results for lossy JPEG compression with Q=90. Again, the compression ratio increases as alpha increases, compressing the encrypted images better than the unencrypted images. It can be seen that, with acceptable amounts of error, compression ratios around 5:1 can be achieved with acceptable security for this image.
6 α = 1 (Original) CR = 1.39:1 α = 2 CR = 1.64:1 α = 3 CR = 1.95:1 α = 4 CR = 2.34:1 MSE = 0 (Original) SSIM = 1 ReSSIM = 1 MSE = SSIM = ReSSIM = MSE = x10 3 SSIM = ReSSIM = MSE = x10 3 SSIM = ReSSIM = Fig. 3. Sample results for simultaneous encryption and compression using Lossless JPEG; top row: encrypted images with compression ratio, bottom row: decrypted images with MSE values and SSIM values α = 1 (Original) CR = 1.84:1 α = 2 CR = 3.52:1 α = 3 CR = 5.45:1 α = 4 CR = 7.80:1 MSE = (Original) SSIM = 1 ReSSIM = 1 MSE = SSIM = ReSSIM = MSE = x10 3 SSIM = ReSSIM = MSE = x10 3 SSIM = ReSSIM = Fig. 4. Sample results for simultaneous encryption and compression using Lossy JPEG with Q=90; top row: encrypted images with compression ratio, bottom row: decrypted images with MSE values and SSIM values Tables I and II demonstrate the encryption and compression properties for a number of images. Table I shows the compression ratios and error metrics for a number of compressed images using lossless JPEG compression. Table II shows the compression ratios and error metrics for a number of compressed images using lossy JPEG compression. Of the images, Pentagon, Lena, and Cronkite are all well known test images. Cave and Faces are images captured using a Motorola RAZR V3 0.3 megapixel camera phone. Patent and Summons are examples of archived legal documents, and Resume is another document example.
7 It can be seen that the Lossy JPEG achieves a compression ratio of approximately 3:1, with the Summons document achieving a ratio so high as 5.59:1. Also, Lossy JPEG achieves appropriately larger compression ratios, with results so large as 10.40:1. Finally, an example is given in the appendix for the Resume document. As Table II shows, this image achieved 6.77:1 compression ratio with higher MSE than the other images and lower SSIM than the others. Despite this, the decrypted image is fully readable and contains all of the original information. Table I Encryption/Compression using Alpha Rooting and Lossless JPEG Image Compression MSE decrypted SSIM decrypted ReSSIM Ratio Pentagon : x Lena : Cronkite : Cave : Faces : x Patent : x Summons : x Resume : x Table II Encryption/Compression using Alpha Rooting and Lossy JPEG Image Compression MSE decrypted SSIM decrypted ReSSIM Ratio Pentagon : x Lena : Cronkite : x Cave : x Faces : x Patent x Summons x Resume : x Conclusion In conclusion, we have presented a novel use of alpha rooting to simultaneously encrypt an image and prepare it for compression. We have used the well known JPEG standard to compress the image, quantifying performance using compression ratios and established error metrics. We have shown that using lossless JPEG on encrypted images, compression ratios of 3:1 are possible. Also, we have shown that, using lossy JPEG, compression ratios of 10:1 are possible. Future work includes developing methods to overcome the lossy nature of the decoding, either developing some denoising filter to improve the decoded image or developing a more application specific compression method. For example, the compression method in [8] is developed specifically for compression of sources with Gaussian distributions, further development of similar methods could increase both the compression and decoding of alpha rooting processed images. References [1]C. P. Wu and C. C. Jay Kuo, Design of Integrated Multimedia Compression and Encryption Systems, IEEE Tran. Multimedia, 7(5), pp , October [2] H. Cheng and X. Li, Partial Encryption of Compressed Image and Videos, IEEE Tran. Signal Processing, 48(8), pp , August 2000.
8 [3]M. M. Fisch, H. Stögner, and A. Uhl, Layered Encryption Techniques for DCT- Coded Visual Data, in Proc. European Signal Processing Conf. 2004, #XXXV-2310, September [4]X. Li, J. Knipe, and H. Cheng, Image Compression and Encryption Using Tree Structures, Pattern Recognition Letters, 18(11-13), pp , November [5]S. Lian, J. Sun, Z. Wang, A Novel Image Encryption Scheme Based-on JPEG Encoding, in Proc. 8th Int. Conf. Information Visualisation 2004, pp , July [6]D. Schonberg, C. Yeo, S. C. Draper, and K. Ramchandran, On Compression of Encrypted Video, in Proc. Data Compression Conference 2007, pp , March [7]M. Johnson et al., On Compressing Encrypted Data, IEEE Tran. Signal Processing, 52(10), pp , October, [8]H. S. Malvar, Adaptive Run-Length / Golomb-Rice Encoding of Quantized Generalized Gaussian Sources with Unknown Statistics, in Proc. Data Compression Conference 2006, pp , March [9]A. K. Jain, Fundamentals of Digital Image Processing, Prentice-Hall, Inc., Upper Saddle River, New Jersey, [10]S. Aghagolzadeh and O.K. Ersoy, Transform image enhancement, Optical Engineering, 31(3), , (1992). [11]R. Kogan, S. Agaian, and Karen A. Panetta, Visualization Using Rational Morphology and Zonal Magnitude Reduction, in Proc. SPIE Symp. Electronic Imaging Science & Technology, 3387, (1998). [12]R. Kogan, S. S. Agaian, and K. Panetta, Visualization using rational morphology and zonal magnitude-reduction, in Proc. SPIE, 3304, (1998). [13]E. J. Wharton, K. A. Panetta, S. S. Agaian, Scalable Encryption Using Alpha Rooting, Submitted to: SPIE Defense and Security Symposium 2008, Orlando, FL, March, [14]Z. Wang, A. C. Bovik, H. M. Sheikh, and E. P. Simoncelli, Image Quality Assessment: From Error Visibility to Structural Similarity, IEEE Tran. Image Processing, 13(4), pp , April [15] A. Gurijala, S. A. Khayam, H. Radha, and J. R. Séller, Jr., On Encryption- Compression Tradeoff of Pre/Post-Filtered Images, in Proc. SPIE Mathematics of Data/Image Coding, Compression, and Encryption VIII, with Applications, Vol. 5915, pp. 1-10, September [16]Q. Yang and S. Lonardi, A compression-boosting Transform for 2D Data, in Proc. Data Compression Conference 2005, p. 492, March [17]H. Wang, S. D. Babacan, and K. Sayood, Lossless Hyperspectral Image Compression Using Context-based Conditional Averages, in Proc. Data Compression Conference 2005, pp , March [18]K. K Lin and R. M. Gray, Video Residual Coding Using SPIHT and Dependent Optimization, in Proc. Data Compression Conference 2001, pp , March [19]G. Motta, J. A. Storer, B. Carpentieri, Adaptive Linear Prediction Lossless Image Coding, in Proc. Data Compression Conference 1999, pp , March 1999.
9 [20]G. L. Mayhew, A Low Cost, High Speed Encryption System and Method, in Proc. IEEE Computer Society Symp. on Research in Security and Privacy, 1994, pp , May [21]W. Zeng and S. Lei, Efficient Frequency Domain Selective Scrambling of Digital Video, IEEE Tran. On Mutlimedia, 5(1), pp , March [22]D. Socek, S. Li, S. S> Magliveras, and B. Furht, Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption, in Proc. IEEE/CreateNet Int. Conf. Security and Privacy for Emerging Areas in Communication Networks 2005, pp , [23]A. Akhshani, H. Mahmodi, and A. Akhavan, A Novel Block Cipher Based on Hierarchy of One-Dimensional Composition Chaotic Maps, in Proc. IEEE Int. Conf Image Processing 2006, pp , October [24]C. Li, X. Li, S. Li, and G. Chen, Cryptanalysis of a Multistage Encryption System, in Proc. IEEE Int. Symp. Circuits and Systems 2005, pp , [25]S. Li, C. Li, K.-T. Lo, G. Chen, Crypanalysis of an Image Scrambling Scheme without Bandwidth Expansion, Accepted for Publication: Physics Letters A, August APPENDIX A:
10 APPENDIX B:
Compression and Image Formats
Compression Compression and Image Formats Reduce amount of data used to represent an image/video Bit rate and quality requirements Necessary to facilitate transmission and storage Required quality is application
More informationSSIM based Image Quality Assessment for Lossy Image Compression
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): 2321-0613 SSIM based Image Quality Assessment for Lossy Image Compression Ripal B. Patel 1 Kishor
More informationAssistant Lecturer Sama S. Samaan
MP3 Not only does MPEG define how video is compressed, but it also defines a standard for compressing audio. This standard can be used to compress the audio portion of a movie (in which case the MPEG standard
More informationImage Encryption by Redirection & Cyclical Shift
Image Encryption by Redirection & Cyclical Shift Dr. Artyom M. Grigoryan Bryan A. Wiatrek Dr. Sos S. Again THE UNIVERSITY OF TEXAS AT SAN ANTONIO College of Engineering Department of Electrical & Computer
More informationA New Compression Method for Encrypted Images
Technology, Volume-2, Issue-2, March-April, 2014, pp. 15-19 IASTER 2014, www.iaster.com Online: 2347-5099, Print: 2348-0009 ABSTRACT A New Compression Method for Encrypted Images S. Manimurugan, Naveen
More informationA Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor
A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor Umesh 1,Mr. Suraj Rana 2 1 M.Tech Student, 2 Associate Professor (ECE) Department of Electronic and Communication Engineering
More informationHybrid Coding (JPEG) Image Color Transform Preparation
Hybrid Coding (JPEG) 5/31/2007 Kompressionsverfahren: JPEG 1 Image Color Transform Preparation Example 4: 2: 2 YUV, 4: 1: 1 YUV, and YUV9 Coding Luminance (Y): brightness sampling frequency 13.5 MHz Chrominance
More informationISSN: [Khan* et al., 7(8): August, 2018] Impact Factor: 5.164
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY IMAGE ENCRYPTION USING TRAPDOOR ONE WAY FUNCTION Eshan Khan *1, Deepti Rai 2 * Department of EC, AIT, Ujjain, India DOI: 10.5281/zenodo.1403406
More informationPERFORMANCE EVALUATION OFADVANCED LOSSLESS IMAGE COMPRESSION TECHNIQUES
PERFORMANCE EVALUATION OFADVANCED LOSSLESS IMAGE COMPRESSION TECHNIQUES M.Amarnath T.IlamParithi Dr.R.Balasubramanian M.E Scholar Research Scholar Professor & Head Department of Computer Science & Engineering
More informationImage Compression Technique Using Different Wavelet Function
Compression Technique Using Different Dr. Vineet Richariya Mrs. Shweta Shrivastava Naman Agrawal Professor Assistant Professor Research Scholar Dept. of Comp. Science & Engg. Dept. of Comp. Science & Engg.
More informationHYBRID MEDICAL IMAGE COMPRESSION USING SPIHT AND DB WAVELET
HYBRID MEDICAL IMAGE COMPRESSION USING SPIHT AND DB WAVELET Rahul Sharma, Chandrashekhar Kamargaonkar and Dr. Monisha Sharma Abstract Medical imaging produces digital form of human body pictures. There
More informationA Modified Image Coder using HVS Characteristics
A Modified Image Coder using HVS Characteristics Mrs Shikha Tripathi, Prof R.C. Jain Birla Institute Of Technology & Science, Pilani, Rajasthan-333 031 shikha@bits-pilani.ac.in, rcjain@bits-pilani.ac.in
More informationUNEQUAL POWER ALLOCATION FOR JPEG TRANSMISSION OVER MIMO SYSTEMS. Muhammad F. Sabir, Robert W. Heath Jr. and Alan C. Bovik
UNEQUAL POWER ALLOCATION FOR JPEG TRANSMISSION OVER MIMO SYSTEMS Muhammad F. Sabir, Robert W. Heath Jr. and Alan C. Bovik Department of Electrical and Computer Engineering, The University of Texas at Austin,
More informationAudio Signal Compression using DCT and LPC Techniques
Audio Signal Compression using DCT and LPC Techniques P. Sandhya Rani#1, D.Nanaji#2, V.Ramesh#3,K.V.S. Kiran#4 #Student, Department of ECE, Lendi Institute Of Engineering And Technology, Vizianagaram,
More informationKeywords: BPS, HOLs, MSE.
Volume 4, Issue 4, April 14 ISSN: 77 18X International Journal of Advanced earch in Computer Science and Software Engineering earch Paper Available online at: www.ijarcsse.com Selective Bit Plane Coding
More informationA COMPARATIVE ANALYSIS OF DCT AND DWT BASED FOR IMAGE COMPRESSION ON FPGA
International Journal of Applied Engineering Research and Development (IJAERD) ISSN:2250 1584 Vol.2, Issue 1 (2012) 13-21 TJPRC Pvt. Ltd., A COMPARATIVE ANALYSIS OF DCT AND DWT BASED FOR IMAGE COMPRESSION
More informationModule 6 STILL IMAGE COMPRESSION STANDARDS
Module 6 STILL IMAGE COMPRESSION STANDARDS Lesson 16 Still Image Compression Standards: JBIG and JPEG Instructional Objectives At the end of this lesson, the students should be able to: 1. Explain the
More informationLossless Huffman coding image compression implementation in spatial domain by using advanced enhancement techniques
Lossless Huffman coding image compression implementation in spatial domain by using advanced enhancement techniques Ali Tariq Bhatti 1, Dr. Jung H. Kim 2 1,2 Department of Electrical & Computer engineering
More informationEfficient Image Compression Technique using JPEG2000 with Adaptive Threshold
Efficient Image Compression Technique using JPEG2000 with Adaptive Threshold Md. Masudur Rahman Mawlana Bhashani Science and Technology University Santosh, Tangail-1902 (Bangladesh) Mohammad Motiur Rahman
More informationPRIOR IMAGE JPEG-COMPRESSION DETECTION
Applied Computer Science, vol. 12, no. 3, pp. 17 28 Submitted: 2016-07-27 Revised: 2016-09-05 Accepted: 2016-09-09 Compression detection, Image quality, JPEG Grzegorz KOZIEL * PRIOR IMAGE JPEG-COMPRESSION
More informationISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More information2. REVIEW OF LITERATURE
2. REVIEW OF LITERATURE Digital image processing is the use of the algorithms and procedures for operations such as image enhancement, image compression, image analysis, mapping. Transmission of information
More informationA Modified Image Template for FELICS Algorithm for Lossless Image Compression
Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet A Modified
More informationA New Scheme for No Reference Image Quality Assessment
Author manuscript, published in "3rd International Conference on Image Processing Theory, Tools and Applications, Istanbul : Turkey (2012)" A New Scheme for No Reference Image Quality Assessment Aladine
More informationImage Compression Supported By Encryption Using Unitary Transform
Image Compression Supported By Encryption Using Unitary Transform Arathy Nair 1, Sreejith S 2 1 (M.Tech Scholar, Department of CSE, LBS Institute of Technology for Women, Thiruvananthapuram, India) 2 (Assistant
More informationJPEG Image Transmission over Rayleigh Fading Channel with Unequal Error Protection
International Journal of Computer Applications (0975 8887 JPEG Image Transmission over Rayleigh Fading with Unequal Error Protection J. N. Patel Phd,Assistant Professor, ECE SVNIT, Surat S. Patnaik Phd,Professor,
More informationSatellite Image Compression using Discrete wavelet Transform
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 08, Issue 01 (January. 2018), V2 PP 53-59 www.iosrjen.org Satellite Image Compression using Discrete wavelet Transform
More informationImprovement in DCT and DWT Image Compression Techniques Using Filters
206 IJSRSET Volume 2 Issue 4 Print ISSN: 2395-990 Online ISSN : 2394-4099 Themed Section: Engineering and Technology Improvement in DCT and DWT Image Compression Techniques Using Filters Rupam Rawal, Sudesh
More informationA JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS. Shruti Agarwal and Hany Farid
A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS Shruti Agarwal and Hany Farid Department of Computer Science, Dartmouth College, Hanover, NH 3755, USA {shruti.agarwal.gr, farid}@dartmouth.edu
More informationAN ERROR LIMITED AREA EFFICIENT TRUNCATED MULTIPLIER FOR IMAGE COMPRESSION
AN ERROR LIMITED AREA EFFICIENT TRUNCATED MULTIPLIER FOR IMAGE COMPRESSION K.Mahesh #1, M.Pushpalatha *2 #1 M.Phil.,(Scholar), Padmavani Arts and Science College. *2 Assistant Professor, Padmavani Arts
More informationInternational Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES
Scientific Journal of Impact Factor (SJIF) : 3.134 ISSN (Print) : 2348-6406 ISSN (Online): 2348-4470 ed International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW
More informationArtifacts and Antiforensic Noise Removal in JPEG Compression Bismitha N 1 Anup Chandrahasan 2 Prof. Ramayan Pratap Singh 3
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 05, 2015 ISSN (online: 2321-0613 Artifacts and Antiforensic Noise Removal in JPEG Compression Bismitha N 1 Anup Chandrahasan
More informationA Hybrid Technique for Image Compression
Australian Journal of Basic and Applied Sciences, 5(7): 32-44, 2011 ISSN 1991-8178 A Hybrid Technique for Image Compression Hazem (Moh'd Said) Abdel Majid Hatamleh Computer DepartmentUniversity of Al-Balqa
More informationNO-REFERENCE IMAGE BLUR ASSESSMENT USING MULTISCALE GRADIENT. Ming-Jun Chen and Alan C. Bovik
NO-REFERENCE IMAGE BLUR ASSESSMENT USING MULTISCALE GRADIENT Ming-Jun Chen and Alan C. Bovik Laboratory for Image and Video Engineering (LIVE), Department of Electrical & Computer Engineering, The University
More informationSteganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005
Steganography & Steganalysis of Images Mr C Rafferty Msc Comms Sys Theory 2005 Definitions Steganography is hiding a message in an image so the manner that the very existence of the message is unknown.
More informationReversible Data Hiding in JPEG Images Based on Adjustable Padding
Reversible Data Hiding in JPEG Images Based on Adjustable Padding Ching-Chun Chang Department of Computer Science University of Warwick United Kingdom Email: C.Chang.@warwick.ac.uk Chang-Tsun Li School
More informationIntroduction to Video Forgery Detection: Part I
Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,
More informationImage Processing Final Test
Image Processing 048860 Final Test Time: 100 minutes. Allowed materials: A calculator and any written/printed materials are allowed. Answer 4-6 complete questions of the following 10 questions in order
More informationCh. 3: Image Compression Multimedia Systems
4/24/213 Ch. 3: Image Compression Multimedia Systems Prof. Ben Lee (modified by Prof. Nguyen) Oregon State University School of Electrical Engineering and Computer Science Outline Introduction JPEG Standard
More informationINSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad
INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad - 500 043 ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK Course Title Course Code Class Branch DIGITAL IMAGE PROCESSING A70436 IV B. Tech.
More informationObjective Evaluation of Edge Blur and Ringing Artefacts: Application to JPEG and JPEG 2000 Image Codecs
Objective Evaluation of Edge Blur and Artefacts: Application to JPEG and JPEG 2 Image Codecs G. A. D. Punchihewa, D. G. Bailey, and R. M. Hodgson Institute of Information Sciences and Technology, Massey
More informationDELAY-POWER-RATE-DISTORTION MODEL FOR H.264 VIDEO CODING
DELAY-POWER-RATE-DISTORTION MODEL FOR H. VIDEO CODING Chenglin Li,, Dapeng Wu, Hongkai Xiong Department of Electrical and Computer Engineering, University of Florida, FL, USA Department of Electronic Engineering,
More informationLevel-Successive Encoding for Digital Photography
Level-Successive Encoding for Digital Photography Mehmet Celik, Gaurav Sharma*, A.Murat Tekalp University of Rochester, Rochester, NY * Xerox Corporation, Webster, NY Abstract We propose a level-successive
More informationAdaptive Digital Video Transmission with STBC over Rayleigh Fading Channels
2012 7th International ICST Conference on Communications and Networking in China (CHINACOM) Adaptive Digital Video Transmission with STBC over Rayleigh Fading Channels Jia-Chyi Wu Dept. of Communications,
More informationMultimedia Communications. Lossless Image Compression
Multimedia Communications Lossless Image Compression Old JPEG-LS JPEG, to meet its requirement for a lossless mode of operation, has chosen a simple predictive method which is wholly independent of the
More informationImage Quality Assessment for Defocused Blur Images
American Journal of Signal Processing 015, 5(3): 51-55 DOI: 10.593/j.ajsp.0150503.01 Image Quality Assessment for Defocused Blur Images Fatin E. M. Al-Obaidi Department of Physics, College of Science,
More informationAnalysis and Improvement of Image Quality in De-Blocked Images
Vol.2, Issue.4, July-Aug. 2012 pp-2615-2620 ISSN: 2249-6645 Analysis and Improvement of Image Quality in De-Blocked Images U. SRINIVAS M.Tech Student Scholar, DECS, Dept of Electronics and Communication
More informationCOLOR IMAGE QUALITY EVALUATION USING GRAYSCALE METRICS IN CIELAB COLOR SPACE
COLOR IMAGE QUALITY EVALUATION USING GRAYSCALE METRICS IN CIELAB COLOR SPACE Renata Caminha C. Souza, Lisandro Lovisolo recaminha@gmail.com, lisandro@uerj.br PROSAICO (Processamento de Sinais, Aplicações
More informationLOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD
LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE J.M. Rodrigues, W. Puech and C. Fiorio Laboratoire d Informatique Robotique et Microlectronique de Montpellier LIRMM,
More informationUncorrelated Noise. Linear Transfer Function. Compression and Decompression
Final Report on Evaluation of Synthetic Aperture Radar (SAR) Image Compression Techniques Guner Arslan and Magesh Valliappan EE381K Multidimensional Signal Processing Prof. Brian L. Evans December 6, 1998
More informationChapter 9 Image Compression Standards
Chapter 9 Image Compression Standards 9.1 The JPEG Standard 9.2 The JPEG2000 Standard 9.3 The JPEG-LS Standard 1IT342 Image Compression Standards The image standard specifies the codec, which defines how
More informationImage compression using hybrid of DWT, DCT, DPCM and Huffman Coding Technique
Image compression using hybrid of DWT,, DPCM and Huffman Coding Technique Ramakant Katiyar 1, Akhilesh Kosta 2 Assistant Professor, CSE Dept. 1 1.2 Department of computer science & Engineering, Kanpur
More informationSensors & Transducers 2015 by IFSA Publishing, S. L.
Sensors & Transducers 5 by IFSA Publishing, S. L. http://www.sensorsportal.com Low Energy Lossless Image Compression Algorithm for Wireless Sensor Network (LE-LICA) Amr M. Kishk, Nagy W. Messiha, Nawal
More informationAn Analytical Study on Comparison of Different Image Compression Formats
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 7 December 2014 ISSN (online): 2349-6010 An Analytical Study on Comparison of Different Image Compression Formats
More informationIJSER. No Reference Perceptual Quality Assessment of Blocking Effect based on Image Compression
803 No Reference Perceptual Quality Assessment of Blocking Effect based on Image Compression By Jamila Harbi S 1, and Ammar AL-salihi 1 Al-Mustenseriyah University, College of Sci., Computer Sci. Dept.,
More informationISSN: Seema G Bhateja et al, International Journal of Computer Science & Communication Networks,Vol 1(3),
A Similar Structure Block Prediction for Lossless Image Compression C.S.Rawat, Seema G.Bhateja, Dr. Sukadev Meher Ph.D Scholar NIT Rourkela, M.E. Scholar VESIT Chembur, Prof and Head of ECE Dept NIT Rourkela
More informationModified TiBS Algorithm for Image Compression
Modified TiBS Algorithm for Image Compression Pravin B. Pokle 1, Vaishali Dhumal 2,Jayantkumar Dorave 3 123 (Department of Electronics Engineering, Priyadarshini J.L.College of Engineering/ RTM N University,
More informationVisual Attention Guided Quality Assessment for Tone Mapped Images Using Scene Statistics
September 26, 2016 Visual Attention Guided Quality Assessment for Tone Mapped Images Using Scene Statistics Debarati Kundu and Brian L. Evans The University of Texas at Austin 2 Introduction Scene luminance
More informationHigh-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction
High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction Pauline Puteaux and William Puech; LIRMM Laboratory UMR 5506 CNRS, University of Montpellier; Montpellier, France Abstract
More informationDetection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table
Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Tran Dang Hien University of Engineering and Eechnology, VietNam National Univerity, VietNam Pham Van At Department
More informationDWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON
DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON K.Thamizhazhakan #1, S.Maheswari *2 # PG Scholar,Department of Electrical and Electronics Engineering, Kongu Engineering College,Erode-638052,India.
More informationDesign of Various Image Enhancement Techniques - A Critical Review
Design of Various Image Enhancement Techniques - A Critical Review Moole Sasidhar M.Tech Department of Electronics and Communication Engineering, Global College of Engineering and Technology(GCET), Kadapa,
More informationAn Adaptive Wavelet and Level Dependent Thresholding Using Median Filter for Medical Image Compression
An Adaptive Wavelet and Level Dependent Thresholding Using Median Filter for Medical Image Compression Komal Narang M.Tech (Embedded Systems), Department of EECE, The North Cap University, Huda, Sector
More informationJPEG2000: IMAGE QUALITY METRICS INTRODUCTION
JPEG2000: IMAGE QUALITY METRICS Bijay Shrestha, Graduate Student Dr. Charles G. O Hara, Associate Research Professor Dr. Nicolas H. Younan, Professor GeoResources Institute Mississippi State University
More informationReversible Data Hiding in Encrypted Images based on MSB. Prediction and Huffman Coding
Reversible Data Hiding in Encrypted Images based on MSB Prediction and Huffman Coding Youzhi Xiang 1, Zhaoxia Yin 1,*, Xinpeng Zhang 2 1 School of Computer Science and Technology, Anhui University 2 School
More informationImplementation of Image Compression Using Haar and Daubechies Wavelets and Comparitive Study
IJCST Vo l. 4, Is s u e 1, Ja n - Ma r c h 2013 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Implementation of Image Compression Using Haar and Daubechies Wavelets and Comparitive Study 1 Ramaninder
More informationDetermination of the MTF of JPEG Compression Using the ISO Spatial Frequency Response Plug-in.
IS&T's 2 PICS Conference IS&T's 2 PICS Conference Copyright 2, IS&T Determination of the MTF of JPEG Compression Using the ISO 2233 Spatial Frequency Response Plug-in. R. B. Jenkin, R. E. Jacobson and
More informationROI-based DICOM image compression for telemedicine
Sādhanā Vol. 38, Part 1, February 2013, pp. 123 131. c Indian Academy of Sciences ROI-based DICOM image compression for telemedicine VINAYAK K BAIRAGI 1, and ASHOK M SAPKAL 2 1 Department of Electronics
More informationLinear Gaussian Method to Detect Blurry Digital Images using SIFT
IJCAES ISSN: 2231-4946 Volume III, Special Issue, November 2013 International Journal of Computer Applications in Engineering Sciences Special Issue on Emerging Research Areas in Computing(ERAC) www.caesjournals.org
More informationAnalysis on Color Filter Array Image Compression Methods
Analysis on Color Filter Array Image Compression Methods Sung Hee Park Electrical Engineering Stanford University Email: shpark7@stanford.edu Albert No Electrical Engineering Stanford University Email:
More informationREVERSIBLE data hiding, or lossless data hiding, hides
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 16, NO. 10, OCTOBER 2006 1301 A Reversible Data Hiding Scheme Based on Side Match Vector Quantization Chin-Chen Chang, Fellow, IEEE,
More information[Srivastava* et al., 5(8): August, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY COMPRESSING BIOMEDICAL IMAGE BY USING INTEGER WAVELET TRANSFORM AND PREDICTIVE ENCODER Anushree Srivastava*, Narendra Kumar Chaurasia
More informationDigital Image Processing 3/e
Laboratory Projects for Digital Image Processing 3/e by Gonzalez and Woods 2008 Prentice Hall Upper Saddle River, NJ 07458 USA www.imageprocessingplace.com The following sample laboratory projects are
More informationIMPLEMENTATION OF IMAGE COMPRESSION USING SYMLET AND BIORTHOGONAL WAVELET BASED ON JPEG2000
IMPLEMENTATION OF IMAGE COMPRESSION USING SYMLET AND BIORTHOGONAL WAVELET BASED ON JPEG2000 Er.Ramandeep Kaur 1, Mr.Naveen Dhillon 2, Mr.Kuldip Sharma 3 1 PG Student, 2 HoD, 3 Ass. Prof. Dept. of ECE,
More informationNo-Reference Image Quality Assessment using Blur and Noise
o-reference Image Quality Assessment using and oise Min Goo Choi, Jung Hoon Jung, and Jae Wook Jeon International Science Inde Electrical and Computer Engineering waset.org/publication/2066 Abstract Assessment
More informationReduced Complexity Wavelet-Based Predictive Coding of Hyperspectral Images for FPGA Implementation
Reduced Complexity Wavelet-Based Predictive Coding of Hyperspectral Images for FPGA Implementation Agnieszka C. Miguel Amanda R. Askew Alexander Chang Scott Hauck Richard E. Ladner Eve A. Riskin Department
More informationSPIHT Algorithm with Huffman Encoding for Image Compression and Quality Improvement over MIMO OFDM Channel
SPIHT Algorithm with Huffman Encoding for Image Compression and Quality Improvement over MIMO OFDM Channel Dnyaneshwar.K 1, CH.Suneetha 2 Abstract In this paper, Compression and improving the Quality of
More informationPerformance Evaluation of Booth Encoded Multipliers for High Accuracy DWT Applications
Performance Evaluation of Booth Encoded Multipliers for High Accuracy DWT Applications S.Muthu Ganesh, R.Bharkkavi, S.Kannadasan Abstract--In this momentary, a booth encoded multiplier is projected. The
More informationAn Implementation of LSB Steganography Using DWT Technique
An Implementation of LSB Steganography Using DWT Technique G. Raj Kumar, M. Maruthi Prasada Reddy, T. Lalith Kumar Electronics & Communication Engineering #,JNTU A University Electronics & Communication
More informationStudy of Turbo Coded OFDM over Fading Channel
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 3, Issue 2 (August 2012), PP. 54-58 Study of Turbo Coded OFDM over Fading Channel
More informationCOMPRESSION OF SENSOR DATA IN DIGITAL CAMERAS BY PREDICTION OF PRIMARY COLORS
COMPRESSION OF SENSOR DATA IN DIGITAL CAMERAS BY PREDICTION OF PRIMARY COLORS Akshara M, Radhakrishnan B PG Scholar,Dept of CSE, BMCE, Kollam, Kerala, India aksharaa009@gmail.com Abstract The Color Filter
More informationIMAGE COMPRESSION BASED ON BIORTHOGONAL WAVELET TRANSFORM
IMAGE COMPRESSION BASED ON BIORTHOGONAL WAVELET TRANSFORM *Loay A. George, *Bushra Q. Al-Abudi, and **Faisel G. Mohammed *Astronomy Department /College of Science /University of Baghdad. ** Computer Science
More informationNO-REFERENCE PERCEPTUAL QUALITY ASSESSMENT OF RINGING AND MOTION BLUR IMAGE BASED ON IMAGE COMPRESSION
NO-REFERENCE PERCEPTUAL QUALITY ASSESSMENT OF RINGING AND MOTION BLUR IMAGE BASED ON IMAGE COMPRESSION Assist.prof.Dr.Jamila Harbi 1 and Ammar Izaldeen Alsalihi 2 1 Al-Mustansiriyah University, college
More informationAudio Compression using the MLT and SPIHT
Audio Compression using the MLT and SPIHT Mohammed Raad, Alfred Mertins and Ian Burnett School of Electrical, Computer and Telecommunications Engineering University Of Wollongong Northfields Ave Wollongong
More informationTeaching Scheme. Credits Assigned (hrs/week) Theory Practical Tutorial Theory Oral & Tutorial Total
Code ITC7051 Name Processing Teaching Scheme Credits Assigned (hrs/week) Theory Practical Tutorial Theory Oral & Tutorial Total Practical 04 02 -- 04 01 -- 05 Code ITC704 Name Wireless Technology Examination
More informationMeasurement of Texture Loss for JPEG 2000 Compression Peter D. Burns and Don Williams* Burns Digital Imaging and *Image Science Associates
Copyright SPIE Measurement of Texture Loss for JPEG Compression Peter D. Burns and Don Williams* Burns Digital Imaging and *Image Science Associates ABSTRACT The capture and retention of image detail are
More informationMeasure of image enhancement by parameter controlled histogram distribution using color image
Measure of image enhancement by parameter controlled histogram distribution using color image P.Senthil kumar 1, M.Chitty babu 2, K.Selvaraj 3 1 PSNA College of Engineering & Technology 2 PSNA College
More informationOptimization Method of Redundant Coefficients for Multiple Description Image Coding
1 2 Optimization Method of Redundant Coefficients for Multiple Description Image Coding Takaaki Ishikawa 1 and Hiroshi Watanabe 2 We propose a new optimization method of redundant coefficients for multiple
More informationEEG SIGNAL COMPRESSION USING WAVELET BASED ARITHMETIC CODING
International Journal of Science, Engineering and Technology Research (IJSETR) Volume 4, Issue 4, April 2015 EEG SIGNAL COMPRESSION USING WAVELET BASED ARITHMETIC CODING 1 S.CHITRA, 2 S.DEBORAH, 3 G.BHARATHA
More informationA Preprocessing Approach For Image Analysis Using Gamma Correction
Volume 38 o., January 0 A Preprocessing Approach For Image Analysis Using Gamma Correction S. Asadi Amiri Department of Computer Engineering, Shahrood University of Technology, Shahrood, Iran H. Hassanpour
More informationCHAPTER 6: REGION OF INTEREST (ROI) BASED IMAGE COMPRESSION FOR RADIOGRAPHIC WELD IMAGES. Every image has a background and foreground detail.
69 CHAPTER 6: REGION OF INTEREST (ROI) BASED IMAGE COMPRESSION FOR RADIOGRAPHIC WELD IMAGES 6.0 INTRODUCTION Every image has a background and foreground detail. The background region contains details which
More information2.1. General Purpose Run Length Encoding Relative Encoding Tokanization or Pattern Substitution
2.1. General Purpose There are many popular general purpose lossless compression techniques, that can be applied to any type of data. 2.1.1. Run Length Encoding Run Length Encoding is a compression technique
More informationChapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS
44 Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 45 CHAPTER 3 Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING
More informationContent Based Image Retrieval Using Color Histogram
Content Based Image Retrieval Using Color Histogram Nitin Jain Assistant Professor, Lokmanya Tilak College of Engineering, Navi Mumbai, India. Dr. S. S. Salankar Professor, G.H. Raisoni College of Engineering,
More informationAnna University, Chennai B.E./B.TECH DEGREE EXAMINATION, MAY/JUNE 2013 Seventh Semester
www.vidyarthiplus.com Anna University, Chennai B.E./B.TECH DEGREE EXAMINATION, MAY/JUNE 2013 Seventh Semester Electronics and Communication Engineering EC 2029 / EC 708 DIGITAL IMAGE PROCESSING (Regulation
More informationThe Application of Selective Image Compression Techniques
Software Engineering 2018; 6(4): 116-120 http://www.sciencepublishinggroup.com/j/se doi: 10.11648/j.se.20180604.12 ISSN: 2376-8029 (Print); ISSN: 2376-8037 (Online) Review Article The Application of Selective
More informationWatermarking-based Image Authentication with Recovery Capability using Halftoning and IWT
Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,
More informationReview Paper on. Quantitative Image Quality Assessment Medical Ultrasound Images
Review Paper on Quantitative Image Quality Assessment Medical Ultrasound Images Kashyap Swathi Rangaraju, R V College of Engineering, Bangalore, Dr. Kishor Kumar, GE Healthcare, Bangalore C H Renumadhavi
More informationTemplates and Image Pyramids
Templates and Image Pyramids 09/06/11 Computational Photography Derek Hoiem, University of Illinois Project 1 Due Monday at 11:59pm Options for displaying results Web interface or redirect (http://www.pa.msu.edu/services/computing/faq/autoredirect.html)
More informationIntroduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio
Introduction to More Advanced Steganography John Ortiz Crucial Security Inc. San Antonio John.Ortiz@Harris.com 210 977-6615 11/17/2011 Advanced Steganography 1 Can YOU See the Difference? Which one of
More information