نتایج جستجو برای: روش jpeg
تعداد نتایج: 374233 فیلتر نتایج به سال:
Among the different modes of operations allowed in the current JPEG standard, the sequential and progressive modes are the most widely used. While the sequential JPEG mode yields essentially the same level of compression performance for most encoder implementations, the performance of progressive JPEG depends highly upon the designed encoder structure. This is due to the flexibility the standar...
انتقال پ?ام به صورت مخف?انه از د?رباز ?ک? از ع?قمندیهای بـشر هوشـمند بـوده اسـت . بـا پ?شرفت فناوری روشهای انتقال مخف?انه پ?ام ?ا نهاننگاری آنها در رسـانه هـا ی د?گـر، پ?ـشرفت چشمگ?ری داشته اند.فرمت jpeg پرکاربرد تر?ن قالب تصو?ری در ارتباطات د?ج?تال اسـت و در ط? سال های اخ?ر روش های نهان نگاری متنـوع? بـرای آن ارائـه شـده اسـت هـدف از ا?ـن پایان نامه معرف? و ارائه اط?عات همه جانبه و کامل? در مو...
JPEG 2000 is a new compression technology that achieves very high compression rate and maintains visual quality. Digital watermarking techniques have been developed to protect the copyright of media signals. The goal of this paper is to put into perspective joint photographic experts group (JPEG) and JPEG 2000 concepts a long with watermarking principle. It provides evaluation of the compatibil...
To process previously JPEG coded images the knowledge of the quantization table used in compression is sometimes required. This happens for example in JPEG artifact removal and in JPEG re-compression. However, the quantization table might not be known due to various reasons. In this paper, a method is presented for the maximum likelihood estimation (MLE) of the JPEG quantization tables. An effi...
Abstract— JPEG is a popular DCT-based still image compression standard, which has played an important role in image storage and transmission since its development. Advanced Image Coding (AIC) is a still image compression system which combines the intra frame block prediction from H.264 with a JPEG-based discrete cosine transform followed by context adaptive binary arithmetic coding (CABAC). It ...
Images (typically JPEG) are used as evidence against cyber perpetrators. Typically the file is carved using standard patterns. Many concentrate on carving JPEG files and overlook the important of thumbnail in assisting forensic investigation. However, a new unique pattern is used to detect thumbnail/s and embedded JPEG file. This paper is to introduce a tool call PattrecCarv to recognize thumbn...
This memo describes an RTP payload format for the ISO/IEC International Standard 15444-1 | ITU-T Rec. T.800, better known as JPEG 2000. JPEG 2000 features are considered in the design of this payload format. JPEG 2000 is a truly scalable compression technology allowing applications to encode once and decode many different ways. The JPEG 2000 video stream is formed by extending from a single ima...
روشهای فشردهسازی تصویر را میتوان به دو دسته بااتلاف و بیاتلاف تقسیمبندی نمود. کدگذار پیشگو مبنای بسیاری از روشهای فشردهسازی بی اتلاف تصویر است. این کدگذار با توجه به مقدار پیکسلهای همسایه، مقداری را برای هر پیکسل از تصویر پیشگویی مینماید. تفاضل مقدار واقعی هر پیکسل از مقدار پیشگویی شده، مقدار خطا تلقی میشود و این مقادیر خطا کد میگردند. در این مقاله، روش پیشپردازشی پیشنهاد شده است ...
In JPEG-to-JPEG image watermarking (J2J), the input is a JPEG image file. After watermark embedding, the image is JPEG-compressed such that the output file is also a JPEG file. In this paper, we use the human visual system (HVS) model to estimate the J2J data hiding capacity of JPEG images, or the maximum number of bits that can be embedded in JPEG-compressed images. Watson’s HVS model is modif...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید