An overview of multi-filters for eliminating impulse noise for digital imagesTELKOMNIKA JOURNAL
An image through the digitization process is referred to as a digital image. The quality of the digital image may be degenerating due to interferences on the acquisition, transmission, extraction, etc. This attracted the attention of many researchers to study the causes of damage to the information in the image. In addition to finding cause of image damage, the researchers also looking for ways to overcome this problem. There are many filtering techniques that have been introduced to deal the damage to the information in the image. In addition to eliminating noise from the image, filtering techniques also aims to maintain the originality of the features in the image. Among the many research papers on image filtering there is a lack of review papers which are an important to facilitate researchers in understanding the differences in each filtering technique. Additionally, it helps researchers determine the direction of research conducted based on the results of previous research. Therefore, this paper presents a review of several filtering techniques that have been developed so far.
A Review on Overview of Image Processing Techniquesijtsrd
Image processing is actually among the fast growing innovations across various areas of a business with applications. Image processing frequently forms key scientific areas within the areas of electronics and computer science. Image processing is a tool for refining raw photographs obtained in our everyday lives from rockets, ships, space samples or military identification flights. Thanks to technologically powerful personal computers, broad databases of current devices and the Graphic Technology and the accessible resources for such software and apps, this area is strong and common. The provided input is an image and its output an enhanced high quality image according to the techniques used in the image processing procedure. Image processing is typically called digital image processing, although it is often possible to optically process and analogy photograph. An overview of image processing methods is given in this article. This article focuses mainly on identifying specific methods utilized in various image processing phases. Hirdesh Chack | Vijay Kumar Kalakar | Syed Tariq Ali "A Review on Overview of Image Processing Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31819.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/31819/a-review-on-overview-of-image-processing-techniques/hirdesh-chack
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGESijcsit
It is very simple and easier to recapture a high quality images from LCD screens with the development of multimedia technology and digital devices. In authentication, the use of such recaptured images can be very dangerous. So, it is very important to recognize the recaptured images in order to increase authenticity. Even though, there are a number of features that have been proposed in various state-of-theart
visual recognition tasks, but it is still difficult to decide which feature or combination of features have more significant impact on this task. In this paper an image recapture detection method based on set of physical based features including texture, HSV colour and blurriness is proposed. Also, this paper evaluates the performance of different distinctive featuresin the context of recognition of recaptured
images. Several experimental setups have been conducted in order to demonstrate the performance of the proposed method. In all these experimental results, the proposed method is efficient with good recognition rate. Among the combination of low-level features, CS-LBP detection is to operator which is used to extract the texture feature is the most robust feature.
PROCESSING AND ANALYSIS OF DIGITAL IMAGES: HOW TO ENSURE THE QUALITY OF DATA ...rtme
It is a common activity for researchers in materials science, the constant use of scanned images generated
by electron microscopes. While virtually all equipment that generate these images (micrographs) can use a
file type most suitable for capturing image data generated (as TIFF or RAW files in case of metallography),
many researchers choose to use a file format more common as JPEG, for example, perhaps the reason of
the space available on portable storage devices (USB, CD or DVD) that owns, or by the lack of knowledge
about the types of image files and their appropriate use. The problem with the use of certain types of image
formats is mainly the loss of the original data captured by an electron microscope. As if that were not
enough, the application of filters and processes in the original image must also be carefully crafted so as
not to lose or change data captured or data relevant to the study. This article seeks to highlight the
treatment of images in research and publications done by researchers with no knowledge of this matter,
since the use of scanned images is only a resource to continue the progress of their own research.
Furthermore, this article aims to promote a discussion on how to treat the problem of digital images
published in scientific papers so that researches can really be replicated in full.
An overview of multi-filters for eliminating impulse noise for digital imagesTELKOMNIKA JOURNAL
An image through the digitization process is referred to as a digital image. The quality of the digital image may be degenerating due to interferences on the acquisition, transmission, extraction, etc. This attracted the attention of many researchers to study the causes of damage to the information in the image. In addition to finding cause of image damage, the researchers also looking for ways to overcome this problem. There are many filtering techniques that have been introduced to deal the damage to the information in the image. In addition to eliminating noise from the image, filtering techniques also aims to maintain the originality of the features in the image. Among the many research papers on image filtering there is a lack of review papers which are an important to facilitate researchers in understanding the differences in each filtering technique. Additionally, it helps researchers determine the direction of research conducted based on the results of previous research. Therefore, this paper presents a review of several filtering techniques that have been developed so far.
A Review on Overview of Image Processing Techniquesijtsrd
Image processing is actually among the fast growing innovations across various areas of a business with applications. Image processing frequently forms key scientific areas within the areas of electronics and computer science. Image processing is a tool for refining raw photographs obtained in our everyday lives from rockets, ships, space samples or military identification flights. Thanks to technologically powerful personal computers, broad databases of current devices and the Graphic Technology and the accessible resources for such software and apps, this area is strong and common. The provided input is an image and its output an enhanced high quality image according to the techniques used in the image processing procedure. Image processing is typically called digital image processing, although it is often possible to optically process and analogy photograph. An overview of image processing methods is given in this article. This article focuses mainly on identifying specific methods utilized in various image processing phases. Hirdesh Chack | Vijay Kumar Kalakar | Syed Tariq Ali "A Review on Overview of Image Processing Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31819.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/31819/a-review-on-overview-of-image-processing-techniques/hirdesh-chack
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGESijcsit
It is very simple and easier to recapture a high quality images from LCD screens with the development of multimedia technology and digital devices. In authentication, the use of such recaptured images can be very dangerous. So, it is very important to recognize the recaptured images in order to increase authenticity. Even though, there are a number of features that have been proposed in various state-of-theart
visual recognition tasks, but it is still difficult to decide which feature or combination of features have more significant impact on this task. In this paper an image recapture detection method based on set of physical based features including texture, HSV colour and blurriness is proposed. Also, this paper evaluates the performance of different distinctive featuresin the context of recognition of recaptured
images. Several experimental setups have been conducted in order to demonstrate the performance of the proposed method. In all these experimental results, the proposed method is efficient with good recognition rate. Among the combination of low-level features, CS-LBP detection is to operator which is used to extract the texture feature is the most robust feature.
PROCESSING AND ANALYSIS OF DIGITAL IMAGES: HOW TO ENSURE THE QUALITY OF DATA ...rtme
It is a common activity for researchers in materials science, the constant use of scanned images generated
by electron microscopes. While virtually all equipment that generate these images (micrographs) can use a
file type most suitable for capturing image data generated (as TIFF or RAW files in case of metallography),
many researchers choose to use a file format more common as JPEG, for example, perhaps the reason of
the space available on portable storage devices (USB, CD or DVD) that owns, or by the lack of knowledge
about the types of image files and their appropriate use. The problem with the use of certain types of image
formats is mainly the loss of the original data captured by an electron microscope. As if that were not
enough, the application of filters and processes in the original image must also be carefully crafted so as
not to lose or change data captured or data relevant to the study. This article seeks to highlight the
treatment of images in research and publications done by researchers with no knowledge of this matter,
since the use of scanned images is only a resource to continue the progress of their own research.
Furthermore, this article aims to promote a discussion on how to treat the problem of digital images
published in scientific papers so that researches can really be replicated in full.
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...CSCJournals
The most quoted applications for digital watermarking is in the context of copyright-protection of digital (multi-)media. In this paper we offer a new digital watermarking technique, which pledges both Security and Quality for the image for the Patent protection. This methodology uses tale techniques like Shuffling, Composition & Decomposition, and Encryption & Decryption to record the information of a protected primary image and the allied watermarks. The quadtree can aid the processing of watermark and AES provides added security to information. Besides that, we intend a novel architecture for Patent Protection that holds promise for a better compromise between practicality and security for emerging digital rights management application. Security solutions must seize a suspicious version of the application-dependent restrictions and competing objectives.
Top Cited Article in Informatics Engineering Research: October 2020ieijjournal
Informatics is rapidly developing field. The study of informatics involves human-computer interaction and how an interface can be built to maximize user-efficiency. Due to the growth in IT, individuals and organizations increasingly process information digitally. This has led to the study of informatics to solve privacy, security, healthcare, education, poverty, and challenges in our environment. The Informatics Engineering, an International Journal (IEIJ) is a open access peer-reviewed journal that publishes articles which contribute new results in all areas of Informatics. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on the human use of computing fields such as communication, mathematics, multimedia, and human-computer interaction design and establishing new collaborations in these areas.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
DIP Using Image Encryption and XOR Operation Affine Transformiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A New Steganographic Method for Embedded Image In Audio FileCSCJournals
Abstract Secure transaction of information has increasing attention in the recent days, such that information concealment has become very important modern used strategies, in which the information is concealment in any other information such that the second information does not change significantly and it appears the same as original. Information hiding is the technology to embed the secret information into a cover data in a way that keeps the secret information invisible. This paper presents a new steganographic method for embedding an image in an Audio file. Emphasis will be on the proposed scheme of image hiding in audio and its comparison with simple Least Significant Bit insertion method of data hiding in audio.
Digital enhancement of indian manuscript, yashodhar charitracsandit
Over the years, many of our ancient manuscripts have been damaged by natural elements or
intentionally erased and re-used to record other information. While manual preservation
techniques are being carried out for the conservation of our ancient texts, digital image
processing is an alternative for the archival storage of the invaluable text contained in them. To
successfully recover text from such documents, it is important to understand the nature of the
writing and materials on which they are written. Different imaging and processing techniques
are needed, depending on the the condition of the manuscript. In recent years, modern imaging
techniques have been applied to ancient manuscripts to recover writings that are not visible to
the naked eye or not recognizable due to various factors. In this paper, we apply imaging
techniques on an ancient manuscript, Yashodhar Charitra, and restore it digitally.
Efficient video indexing for fast motion videoijcga
Due to advances in recent multimedia technologies, various digital video contents become available from different multimedia sources. Efficient management, storage, coding, and indexing of video are required because video contains lots of visual information and requires a large amount of memory. This paper proposes an efficient video indexing method for video with rapid motion or fast illumination change, in which motion information and feature points of specific objects are used. For accurate shot boundary detection, we make use of two steps: block matching algorithm to obtain accurate motion information and modified displaced frame difference to compensate for the error in existing methods. We also propose an object matching algorithm based on the scale invariant feature transform, which uses feature points to group shots semantically. Computer simulation with five fast-motion video shows the effectiveness of the proposed video indexing method.
TVSum: Summarizing Web Videos Using TitlesNEERAJ BAGHEL
Title-based video summarization is a relatively unexplored domain; there is no publicly available dataset suitable for our purpose.
Author therefore collected a new dataset,TVSum50, that contains 50 videos and their shot-level importance scores obtained via crowdsourcing
Pattern Approximation Based Generalized Image Noise Reduction Using Adaptive ...IJECEIAES
The problem of noise interference with the image always occurs irrespective of whatever precaution is taken. Challenging issues with noise reduction are diversity of characteristics involved with source of noise and in result; it is difficult to develop a universal solution. This paper has proposed neural network based generalize solution of noise reduction by mapping the problem as pattern approximation. Considering the statistical relationship among local region pixels in the noise free image as normal patterns, feedforward neural network is applied to acquire the knowledge available within such patterns. Adaptiveness is applied in the slope of transfer function to improve the learning process. Acquired normal patterns knowledge is utilized to reduce the level of different type of noise available within an image by recorrection of noisy patterns through pattern approximation. The proposed restoration method does not need any estimation of noise model characteristics available in the image not only that it can reduce the mixer of different types of noise efficiently. The proposed method has high processing speed along with simplicity in design. Restoration of gray scale image as well as color image has done, which has suffered from different types of noise like, Gaussian noise, salt &peper, speckle noise and mixer of it.
Human motion is fundamental to understanding behaviour. In spite of advancement on single image 3 Dimensional pose and estimation of shapes, current video-based state of the art methods unsuccessful to produce precise and motion of natural sequences due to inefficiency of ground-truth 3 Dimensional motion data for training. Recognition of Human action for programmed video surveillance applications is an interesting but forbidding task especially if the videos are captured in an unpleasant lighting environment. It is a Spatial-temporal feature-based correlation filter, for concurrent observation and identification of numerous human actions in a little-light environment. Estimated the presentation of a proposed filter with immense experimentation on night-time action datasets. Tentative results demonstrate the potency of the merging schemes for vigorous action recognition in a significantly low light environment.
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELETpaperpublications3
Abstract: The Security is the most important aspect of Database, for maintain the integrity and as well as security of the system image watermarking is technique proposed at the year of 1996, in this paper we also implement image watermarking using 2-D biorthogonal Wavelt. The importance of transmitting digital information in digital watermarking system and the dissymmetric digital watermarking framework lived on media content communication is also being discussed in this paper. Then we apply watermarking embedding algorithm to keep the balance between watermarks’ imperceptibility and its robustness while the data is being sent on the communication channel.Keywords: Discrete Wavelet Transform (DWT), Gray Scale, Peak Signal to Noise Ratio (PSNR).
Title: Entropy based Digital Watermarking using 2-D Biorthogonal WAVELET
Author: Abhinav Kumar
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...CSCJournals
The most quoted applications for digital watermarking is in the context of copyright-protection of digital (multi-)media. In this paper we offer a new digital watermarking technique, which pledges both Security and Quality for the image for the Patent protection. This methodology uses tale techniques like Shuffling, Composition & Decomposition, and Encryption & Decryption to record the information of a protected primary image and the allied watermarks. The quadtree can aid the processing of watermark and AES provides added security to information. Besides that, we intend a novel architecture for Patent Protection that holds promise for a better compromise between practicality and security for emerging digital rights management application. Security solutions must seize a suspicious version of the application-dependent restrictions and competing objectives.
Top Cited Article in Informatics Engineering Research: October 2020ieijjournal
Informatics is rapidly developing field. The study of informatics involves human-computer interaction and how an interface can be built to maximize user-efficiency. Due to the growth in IT, individuals and organizations increasingly process information digitally. This has led to the study of informatics to solve privacy, security, healthcare, education, poverty, and challenges in our environment. The Informatics Engineering, an International Journal (IEIJ) is a open access peer-reviewed journal that publishes articles which contribute new results in all areas of Informatics. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on the human use of computing fields such as communication, mathematics, multimedia, and human-computer interaction design and establishing new collaborations in these areas.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
DIP Using Image Encryption and XOR Operation Affine Transformiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A New Steganographic Method for Embedded Image In Audio FileCSCJournals
Abstract Secure transaction of information has increasing attention in the recent days, such that information concealment has become very important modern used strategies, in which the information is concealment in any other information such that the second information does not change significantly and it appears the same as original. Information hiding is the technology to embed the secret information into a cover data in a way that keeps the secret information invisible. This paper presents a new steganographic method for embedding an image in an Audio file. Emphasis will be on the proposed scheme of image hiding in audio and its comparison with simple Least Significant Bit insertion method of data hiding in audio.
Digital enhancement of indian manuscript, yashodhar charitracsandit
Over the years, many of our ancient manuscripts have been damaged by natural elements or
intentionally erased and re-used to record other information. While manual preservation
techniques are being carried out for the conservation of our ancient texts, digital image
processing is an alternative for the archival storage of the invaluable text contained in them. To
successfully recover text from such documents, it is important to understand the nature of the
writing and materials on which they are written. Different imaging and processing techniques
are needed, depending on the the condition of the manuscript. In recent years, modern imaging
techniques have been applied to ancient manuscripts to recover writings that are not visible to
the naked eye or not recognizable due to various factors. In this paper, we apply imaging
techniques on an ancient manuscript, Yashodhar Charitra, and restore it digitally.
Efficient video indexing for fast motion videoijcga
Due to advances in recent multimedia technologies, various digital video contents become available from different multimedia sources. Efficient management, storage, coding, and indexing of video are required because video contains lots of visual information and requires a large amount of memory. This paper proposes an efficient video indexing method for video with rapid motion or fast illumination change, in which motion information and feature points of specific objects are used. For accurate shot boundary detection, we make use of two steps: block matching algorithm to obtain accurate motion information and modified displaced frame difference to compensate for the error in existing methods. We also propose an object matching algorithm based on the scale invariant feature transform, which uses feature points to group shots semantically. Computer simulation with five fast-motion video shows the effectiveness of the proposed video indexing method.
TVSum: Summarizing Web Videos Using TitlesNEERAJ BAGHEL
Title-based video summarization is a relatively unexplored domain; there is no publicly available dataset suitable for our purpose.
Author therefore collected a new dataset,TVSum50, that contains 50 videos and their shot-level importance scores obtained via crowdsourcing
Pattern Approximation Based Generalized Image Noise Reduction Using Adaptive ...IJECEIAES
The problem of noise interference with the image always occurs irrespective of whatever precaution is taken. Challenging issues with noise reduction are diversity of characteristics involved with source of noise and in result; it is difficult to develop a universal solution. This paper has proposed neural network based generalize solution of noise reduction by mapping the problem as pattern approximation. Considering the statistical relationship among local region pixels in the noise free image as normal patterns, feedforward neural network is applied to acquire the knowledge available within such patterns. Adaptiveness is applied in the slope of transfer function to improve the learning process. Acquired normal patterns knowledge is utilized to reduce the level of different type of noise available within an image by recorrection of noisy patterns through pattern approximation. The proposed restoration method does not need any estimation of noise model characteristics available in the image not only that it can reduce the mixer of different types of noise efficiently. The proposed method has high processing speed along with simplicity in design. Restoration of gray scale image as well as color image has done, which has suffered from different types of noise like, Gaussian noise, salt &peper, speckle noise and mixer of it.
Human motion is fundamental to understanding behaviour. In spite of advancement on single image 3 Dimensional pose and estimation of shapes, current video-based state of the art methods unsuccessful to produce precise and motion of natural sequences due to inefficiency of ground-truth 3 Dimensional motion data for training. Recognition of Human action for programmed video surveillance applications is an interesting but forbidding task especially if the videos are captured in an unpleasant lighting environment. It is a Spatial-temporal feature-based correlation filter, for concurrent observation and identification of numerous human actions in a little-light environment. Estimated the presentation of a proposed filter with immense experimentation on night-time action datasets. Tentative results demonstrate the potency of the merging schemes for vigorous action recognition in a significantly low light environment.
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELETpaperpublications3
Abstract: The Security is the most important aspect of Database, for maintain the integrity and as well as security of the system image watermarking is technique proposed at the year of 1996, in this paper we also implement image watermarking using 2-D biorthogonal Wavelt. The importance of transmitting digital information in digital watermarking system and the dissymmetric digital watermarking framework lived on media content communication is also being discussed in this paper. Then we apply watermarking embedding algorithm to keep the balance between watermarks’ imperceptibility and its robustness while the data is being sent on the communication channel.Keywords: Discrete Wavelet Transform (DWT), Gray Scale, Peak Signal to Noise Ratio (PSNR).
Title: Entropy based Digital Watermarking using 2-D Biorthogonal WAVELET
Author: Abhinav Kumar
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...ijistjournal
Images are undoubtedly the most efficacious and easiest means of communicating an idea. They are surely an indispensable part of human life .The trend of sharing images of various kinds for example typical technical figures, modern exceptional masterpiece from an artist, photos from the recent picnic to hill station etc, on the internet is spreading like a viral. There is a mandatory requirement for checking the privacy and security of our personal digital images before making them public via the internet. There is always a threat of our original images being illegally reproduced or distributed elsewhere. To prevent the misuse and protect the copyrights, an efficient solution has been given that can withstand many attacks. This paper aims at encoding of the host image prior to watermark embedding for enhancing the security. The fast and effective full counter propagation neural network helps in the successful watermark embedding without deteriorating the image perception. Earlier techniques embedded the watermark in the image itself but is has been observed that synapses of neural network provide a better platform for reducing the distortion and increasing the message capacity.
Quality Compression for Medical Big Data X-Ray Image using Biorthogonal 5.5 W...IJERA Editor
Medical Big Data (MBD) consists of very useful type of information. It is very important for a physician for decision making and treatments to cure the patient. For accurate diagnosis, data availability is the most important factor. MBD over network needs intelligent compression schemes so that it is transferred to the destination by utilizing available bandwidth. Biorthogonal 5.5 Wavelet Compression scheme compress the MBD without losing the important information, thus making the information reliable and less in size; transference by efficient bandwidth utilization from source to destination.
October 2022: Top 10 Read Articles in Signal & Image Processingsipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
August 2022: Top 10 Read Articles in Signal & Image Processingsipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
September 2022: Top 10 Read Articles in Signal & Image Processingsipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
April 2022: Top Read Articles in Signal & Image Processingsipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
June 2022: Top 10 Read Articles in Signal & Image Processingsipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
May 2022: Top Read Articles in Signal & Image Processingsipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
July 2022: Top 10 Read Articles in Signal & Image Processingsipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
January 2023: Top 10 Read Articles in Signal &Image Processing sipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
The main goal of this presentation is to provide fundamental insight into digital audio watermarking. The presentation summarizes the concept of audio watermarking using the Least Significant Bit (LSB) algorithm.
December 2021: Top Read Articles in Signal & Image Processingsipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
The embedding of a digital signature, or tag data is carried out in the frequency domain. The
high frequency varieties are chosen by any LH and HL in the wavelet domain which are to be
applicable in DCT. Coefficients are changed mid-frequency DCT coefficients such transactions by a
low frequency of the watermark to be embedded. Watermark can be recovered from the video by
selecting a random watermark of any reference framework. The proposed techniques are more
secure, robust and are efficient due to the use of static DCT. Watermark techniques uses a bands HL
and LH for adding watermark where the movement does not impact the quality the extracted
watermark until if the video displays for different types of malware attacks.
In this work we have taken three video watermarking techniques i.e. BIT GET (spatial),
DWT, DCT and one video formats ie.MPEG video to perform a comparative analysis of different
techniques using single video formats, to obtain the best performing technique for video
watermarking. Such that to increase robustness of the video and decrease the embedding time
Similar to A robust watermarking algorithm based on image normalization and dc coefficients (20)
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
A robust watermarking algorithm based on image normalization and dc coefficients
1. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
A Robust Watermarking Algorithm Based on Image Normalization and DC Coefficients
International Journal of Computer Science and Informatics
Abstract:
Digital watermarking is a highly evolving field, which involves the embedding of a certain kind of
information under a digital object (image, video, audio) for the purpose of copyright protection. Both
the image and the watermark are most frequently translated into a transform domain where the
embedding takes place. The selection of both the transform domain and the particular algorithm that is
used for the embedding of the watermark, depend heavily on the application. One of the most widely
used transform domains for watermarking of still digital images is the Discrete Cosine Transform
domain. The reason is that the Discrete Cosine Transform is a part of the JPEG standard, which in turn is
widely used for storage of digital images. In our research we propose a unique method for DCT-based
image watermarking. In an effort to achieve robustness to cropping and JPEG compression we have
developed an algorithm for rating the 8×8 blocks of the image DCT coefficients taking into account their
embedding capacity and their spatial location within the image. Our experiments show that the
proposed scheme offers adequate transparency, and works exceptionally well against cropping while at
the same time maintains sufficient robustness to JPEG compression.
2. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
(a) Block Diagram of the JPEG Compression
(b) Encoder
3. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
(c) Decoder
(d) Three Watermarks used in Project
4. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
Default Parameters
weighting factor alpha (recommended value ---):- 0.5
index of the coefficient - 60
embedding size (number of watermark coefficients per block) Choose 2, 4 o r 8:- 4
cropping:-0
quantization:-0
marked image in uint8:-0
normalization:-0
5. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
A: - stripes
6. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
SNR of real image, SNRr(dB)=12.5997
7. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
BER(bits per pixel)=0.0000
BERmod(bits per pixel with error)=NaN
rho=1.0000
8. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
B: - NPS logo
9. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
SNR of real image, SNRr(dB)=11.3263
10. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
BER (bits per pixel)=0.0000
BERmod (bits per pixel with error)=NaN
rho =1.0000
11. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
C: - random gray scale watermark
12. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
SNR of real image, SNRr(dB)=12.7750
13. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
BER (bits per pixel)=0.0000
BERmod (bits per pixel with error)=NaN
rho=1.0000
14. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
Future Enhancement:
Embedding the coefficients in a way that will take full advantage of the human visual system’s
characteristics is a big goal of the watermarking community. Further research in this subject is required
to investigate the possibility of incorporating our metric to the Just Noticeable Difference (JND) models
that have been proposed.
In addition, in this work the transparency of a watermarking algorithm is judged by the subjective
decision of independent observers. The possibility of developing a formal model for the evaluation of
the transparency may be investigated. However this task is not trivial. A simple correlation test between
the original and the marked image would not work. This would detect any differences between the two
but cannot tell if these differences occur in a visually perceptual manner. A JND model could be used as
the basis for the evaluation of the transparency ([24]), but then it should not also be used in the
embedding model. Otherwise the judgment would be biased and therefore unable to give dependable
results.
15. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
References:
[1] F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn, "Information Hiding – A Survey",
Proceedings of the IEEE, vol.87, no.7, pp.1062-1078, July 1999.
[2] D. J. Ryan, "Infosec and Infowar, Considerations for Military Intelligence",
www.danjryan.com/MIntl.html.
[3] F. Hartung, M. Kutter, "Multimedia Watermarking Techniques", Proceedings of the
IEEE, vol.87, no.7, pp.1079-1107, July 1999.
[4] I. J. Cox, M. L. Miller, J. A. Bloom, "Digital Watermarking", Morgan Kaufmann
Publishers, 2002.
[5] C. P. Pfleeger, "Security in Computing", Prentice Hall PTR, 2
nd
edition, 2000.
[6] G. L. Friedman, "The Trustworthy Digital Camera: Restoring Credibility to the
Photographic Image", IEEE Transactions on Consumer Electronics, vol.39, pp.905-910, October
1993.
[7] D. Kundur, D. Hatzinakos, “Digital Watermarking for Telltale Tamper Proofing and
Authentication”, Proceedings of the IEEE, vol.87, no.7, pp.1167-1180, July 1999.
[8] C. I. Podilchuk, E. J. Delp, "Digital Watermarking: Algorithm and Applications", IEEE
Signal Processing Magazine, pp.33-46, July 2001.
[9] C. C. Langelaar, I. Setyawan, R. L. Lagendijk, "Watermarking Digital Image and Video
Data", IEEE Signal Processing Magazine, pp.20-46, September 2000.
[10] W. Bender, D. Gruhl, N. Morimoto, "Techniques for Data Hiding", Proceedings SPIE,
vol.2420, p.40, San Jose, CA, February 1995.
[11] N. Nikolaidis, I. Pitas, "Copyright Protection of Images using Robust Digital
Signatures", Proceedings ICASSP '96, Atlanta, GA, May 1996.
[12] C. Langelaar, J. C. A. van der Lubbe, R. L. Lagendijk, "Robust Labeling Methods for
Copy Protection of Images", Proceedings in Electronic Imaging, vol.3022, pp.298-309, San Jose,
CA, February 1997.
[13] M. Kutter, F. Jordan, F. Bossen, "Digital Signature of Color Images using Amplitude
Modulation", Proceedings in Electronic Imaging, San Jose, CA, February 1997.
[14] M. Barni, C. I. Podilchuk, F. Bartolini, E. J. Delp, "Watermark Embedding: Hiding a
Signal within a Cover Image", IEEE Communications Magazine, pp.102-108, August 2001.
[15] M. Ramkumar, A. N. Akansu, A. A. Alatan, “On the Choice of Transforms for Data
Hiding in Compressed Video”, IEEE International Conference on Acoustics, Speech, and Signal
Processing 1999, Proceedings, Vol.6 , pp.3049-3052, 1999.
[16] S. Kang, Y. Aoki, “Digital Image Watermarking by Fresnel Transform and its
Robustness”, International Conference on Image Processing, Proceedings 1999 (ICIP 99), vol.2,
pp.221-225.
[17] J. J. K. O Ruanaidh, W. J. Dowling, F. M. Boland, "Phase Watermarking of Digital
Images", Proceedings IEEE, International Conference of Image Processing, vol.III, pp.239-242,
Lausanne, Switzerland, September 16-19, 1996.
[18] A. Herrigel, H. Petersen, J. O Ruanaidh, T. Pun, P. Shelby, "Copyright Techniques for
Digital Images Based on Asymmetric Cryptographic Techniques", presented at Workshop on
Information Hiding, Portland, Oregon, USA, April 1998.
16. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
[19] A. Herrigel, J. J. K. O Ruanaidh, H. Petersen, S. Pereira, T. Pun, "Secure Copyright
Protection Techniques for Digital Images", in Information Hiding (Lecture Notes in Computer
Science, vol. 1525), D. Aucsmith, Ed. Berlin, Germany: Springer, 1998, pp.169-190.
[20] S. Pereira, J. J. K. O Ruanaidh, F. Deguillaume, G. Csurka, T. Pun, "Template-based
Recovery of Fourier-based Watermarks using Log-polar and Log-log Maps", Proceedings IEEE in
Multimedia Systems 99, International Conference in Multimedia Computing and Systems, Florence,
Italy, June 7-11, 1999.
[21] J. J. K. O Ruanaidh, F. M. Boland, O. Sinnen, "Watermarking Digital Images for
Copyright Protection", Proceedings in Electronic Imaging and the Visual Arts 1996, Florence, Italy,
February 1996.
[22] I. J. Cox, J. Kilian, F. T. Leighton, T. Shamoon, “Secure Spread Spectrum
Watermarking for Multimedia”, IEEE Transactions on Image Processing, vol.6, no.12, pp.1673-
1687, December 1997.
[23] C. I. Podilchuk, W. Zeng, “Image-adaptive Watermarking using Visual Models”, IEEE
Journal on Selected Areas in Communications, vol.16, no.4, pp.525-539, May 1998.
[24] C. I. Podilchuk, W. Zeng, “Perceptual Watermarking of Still Images”, IEEE First
Workshop on Multimedia Signal Processing, pp.363-368, 1997.
[25] A. Piva, M. Barni, E. Bartolini, V. Cappellini, "A DCT-based Watermarking Recovering
without resorting to the Uncorrupted Digital Image", Proceedings IEEE, International Conference in
Image Processing, vol.1, p.520, Santa Barbara, CA, 1997.
[26] M. Barni, F. Bartolini, V. Cappellini, A. Lipi, A. Piva, "A DWT-based Technique for
Spatio-Frequency Masking of Digital Signatures", Proceedings SPIE/IS International Conferencein
Security and Watermarking of Multimedia Contents, vol.3657, pp.31-39, San Jose, January 25-27,
1999.
[27] K. Sayood, "Introduction to Data Compression", Morgan Kaufmann Publidhers, 2
nd
edition, 2000.
[28] J. Miano, "Compressed Image File Formats", Addison Wesley Longman, Inc, 1999.
17. Base paper: - http://ijcsi.org/papers/IJCSI-8-5-2-226-232.pdf
[29] K. R Castleman, "Digital Image Processing", Prentice Hall, Inc, 1996.
[30] M. Ghanbari, "Video Coding: An Introduction to Standard Codecs", IEE
Telecommunication Series 42, 1999.
[31] C.-T. Hsu, J.-L. Wu, “Hidden Digital Watermarks in Images”, IEEE Transactions on
Image Processing, vol.8, no.1, pp. 58-68, January 1999.
[32] K. S. Shanmugan, A. M. Breipohl, "Random Signals: Detection Estimation and Data
Analysis", John Wiley and Sons, Inc, 1988.
[33] R. B Wolfgang, C. I. Podilchuk, E. J. Delp, “Perceptual Watermarks for Digital Images
and Video”, Proceedings of the IEEE, vol.87, no.7, pp. 1108-1126, July 1999.
[34] C. I. Podilchuk, E. J. Delp, "Digital Watermarking: Algorithm and Applications", IEEE
Signal Processing Magazine, pp.33-46, July 2001.
[35] Y.-P. Wang, M.-J. Chen, p.-Y. Cheng, “Robust Image Watermark With Wavelet
Transform and Spread Spectrum Techniques”, Conference Record of the Thirty-Fourth Asilomar
Conference on Signals, Systems and Computers, vol.2 , pp. 1846 –1850, Asilomar, 2000.
[36] S. B. Wicker, "Error Control Systems for Digital Communication and Storage",
Prentice-Hall Inc, 1995.
[37] I. Retsas, R. Pieper, R. Cristi, “Watermark Recovery with a DCT-based Scheme Employing
Nonuniform Imbedding”, 34
th
Southeastern Symposium on System Theory (SSST-02), Alabama,
March 18-19, 2002.