The relationship between information prioritization and visual distinctness in two progressive image transmission schemes
نویسندگان
چکیده
The goal of this paper is to analyze the relation between the visual distinctness and the priority assigned to the information in two di2erent progressive transmission schemes: the Set Partitioning in Hierarchical Trees (SPIHT) and the Rational Embedded Wavelet Image Coding (REWIC). SPIHT assigns priority based on the mean squared-error (MSE) distortion measure. REWIC quanti;es the visual distinctness through the expected increase in utility per coding bit, using a simple function of the Kullback– Leibler’s information gain, called distREWIC . We will show that in progressive transmission, the information selected through the increase in utility per coding bit corresponds to information with the largest visual relevance to a higher degree than the information selected on the basis of the MSE metric. ? 2003 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved.
منابع مشابه
On the Pixel Expansion of Hypergraph Access Structures in Visual Cryptography Schemes
In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of participants have no information about the secret image. Pixel expansion, which represents the number of subpi...
متن کاملIntelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms
Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...
متن کاملA survey on digital data hiding schemes: principals, algorithms, and applications
This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...
متن کاملMaximal Independent Sets for the Pixel Expansion of Graph Access Structure
Abstract : A visual cryptography scheme based on a given graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper a maximal independent sets of the graph G was ...
متن کاملSwitched Segmented Image Coding - JPEG Schemes for Progressive Image Transmission
This paper describes two schemes that combine JPEG and Segmented Image Coding (SIC) for progressive image transmission. Compared to JPEG-based progressive transmission schemes, the new schemes produce reconstructed images of better quality during all the stages of transmission and never transmit more bits. Also, the computational complexity of the new schemes is lower than that of the SIC-only ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Pattern Recognition
دوره 37 شماره
صفحات -
تاریخ انتشار 2004