نتایج جستجو برای: تصویر jpeg

تعداد نتایج: 21751  

Journal: :Nature Precedings 2011

2006
Wei Yu

JPEG 2000, the new ISO/ITU-T standard for still image coding, is about to be finished. Other new standards have been recently introduced, namely JPEG-LS and MPEG-4 VTC(H.264). This paper compares the set of features offered by JPEG 2000, and how well they are fulfilled, versus JPEG and MPEG-4 VTC(H.264). The study concentrates on compression efficiency and functionality set, while addressing ot...

Journal: :J. Electronic Imaging 2006
Ziya Arnavut Ferat Sahin

Palette images are widely used on the World Wide Web (WWW) and in game-cartridge applications. Many images used on the WWW are stored and transmitted after they are compressed losslessly with the standard graphics interchange format (GIF), or portable network graphics (PNG). Well-known 2-D compression schemes, such as JPEG-LS and JPEG-2000, fail to yield better compression than GIF or PNG due t...

Journal: :Sig. Proc.: Image Comm. 2002
Touradj Ebrahimi Charilaos A. Christopoulos Daniel T. Lee

∗ Corresponding author. Fax: +30 61 997456 Email addresses: [email protected] (A.N. Skodras), [email protected] (C.A. Christopoulos), [email protected] (T. Ebrahimi). Abstract: With the increasing use of multimedia technologies, image compression requires higher performance as well as new features. To address this need in the specific area of still image encoding, a ne...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد شاهرود - دانشکده مهندسی کامپیوتر 1393

انتقال پ?ام به صورت مخف?انه از د?رباز ?ک? از ع?قمندیهای بـشر هوشـمند بـوده اسـت . بـا پ?شرفت فناوری روشهای انتقال مخف?انه پ?ام ?ا نهاننگاری آنها در رسـانه هـا ی د?گـر، پ?ـشرفت چشمگ?ری داشته اند.فرمت jpeg پرکاربرد تر?ن قالب تصو?ری در ارتباطات د?ج?تال اسـت و در ط? سال های اخ?ر روش های نهان نگاری متنـوع? بـرای آن ارائـه شـده اسـت هـدف از ا?ـن پایان نامه معرف? و ارائه اط?عات همه جانبه و کامل? در مو...

Journal: :IS&T International Symposium on Electronic Imaging Science and Technology 2023

In this article, we study a recently proposed method for improving empirical security of steganography in JPEG images which the sender starts with an additive embedding scheme symmetrical costs ± 1 changes and then decreases cost one these based on image obtained by applying deblocking (JPEG dequantization) algorithm to cover JPEG. This approach provides rather significant gains at negligi...

2015
Yair Wiseman

JPEG images are self-synchronized in cases of an error; however, after the synchronization the images are not shown as the original ones. Sometimes, the blocks are shifted to right or left and the tinge is damaged as well. This paper suggests a way how to remedy the block shift and the tinge

2009
Mona F. M. Mursi Ghazy M.R. Assassa Hatim A. Aboalsamh Khaled Alghathbar

The challenge in the case of image authentication is that in many cases images need to be subjected to non malicious operations like compression, so the authentication techniques need to be compression tolerant. In this paper we propose an image authentication system that is tolerant to JPEG lossy compression operations. A scheme for JPEG grey scale images is proposed based on a data embedding ...

1998
Shahram Shirani Faouzi Kossentini Samir Kallel Rabab Ward

In this paper packetization and reconstruction algorithms in transmission of JPEG coded images over lossy channels are proposed. An interleaving method is devised that maximizes the minimumdistance between the 8 8 blocks, used in JPEG, that are in the same packet. Then a method for estimating the missing DC coe cients of a JPEG coded image which is required for decoding the compressed image, is...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید