• No results found

1-in image format

The Multiresolution Image Format

The Multiresolution Image Format

... file format which allows to create, store and manipulate multiresolution raster ...same image each raster (pixel) has the same size. Multiresolution raster image (mri) are unlike the “classic” raster ...

9

A Review on Steganalysis Techniques: From Image Format Point of View

A Review on Steganalysis Techniques: From Image Format Point of View

... by 1 when the message is embedded; thus, the frequency of occurrence of the value zero in pixel differences changes most dramatically during message ...of image pixel difference and study the algorithm for ...

9

Vol 7, No 11 (2017)

Vol 7, No 11 (2017)

... digital image, song or ...secure image watermarking algorithm using array extraction from the original image will be implemented on different types of images using MATLAB ...an image by ...

6

Image Authentication Using Advanced Watermarking and Multi Layered Coding

Image Authentication Using Advanced Watermarking and Multi Layered Coding

... watermark image and recover it from the watermarked data ...an image and recover the original image from the noised data as similar as in the exact ...

9

Geological Boundary Detection for Satellite Images using AI Technique

Geological Boundary Detection for Satellite Images using AI Technique

... using image processing on post disaster satellite ...an image in visually homogeneous regions which is based on spatially localized version of k-means ...

5

Auto Key Generation and Minimal Image Distortion Mechanism for Image Steganography

Auto Key Generation and Minimal Image Distortion Mechanism for Image Steganography

... Another method more effective than LSB method is Pixel- value differencing. In this technique the data hidden in the image can be obtained without referencing the original cover image. A pseudo-random ...

5

Immunostaining for DNA modifications: computational analysis of confocal images

Immunostaining for DNA modifications: computational analysis of confocal images

... distinguishing newly synthesized DNA strands, promoting X-chromosome inactivation and maintaining transcriptional repression profiles 13 . Through recognition of hemi-methylated DNA CpG sequences, DNMT1 maintains ...

7

An Optimization of Text and Image Steganography using LSB Technique

An Optimization of Text and Image Steganography using LSB Technique

... The ASCII character stream is split into 4 two-bit pairs per character. The 2 LSBs of a pixel is replaced with these two bit pairs. These two bit pairs are then stored in an array for manipulating later. Then the lifting ...

9

EXTENDED AND EMBEDDED VISUAL CRYPTOGRAPHY

EXTENDED AND EMBEDDED VISUAL CRYPTOGRAPHY

... binary image (SI) into shares of random binary ...secret image can be visually decoded by superimposing a qualified subset of transparencies, but no secret information can be obtained from the superposition ...

13

Wavelet Transform based Steganography

Wavelet Transform based Steganography

... Audio signals are analog signals. To use digital signal processing methods on an analog signal, it is sampled periodically in time. It produces sequence of samples. WAV file is the simplest among all the audio file ...

5

Getting to “The 5 stars of Linked Open Data” for Nanoinformatics

Getting to “The 5 stars of Linked Open Data” for Nanoinformatics

... available on the web (whatever format); make it available as structured data (e.g. excel instead of image scan of a table); non-proprietary format (e.g. csv instead of excel); use URLs to identify ...

32

Using of Color Model and Contrast Variation in Wavelet Ideology for Study Megaloblastic Anemia Cells

Using of Color Model and Contrast Variation in Wavelet Ideology for Study Megaloblastic Anemia Cells

... initial image quality, improve the efficiency of the source image ...the image (pixels-individual image points) highlights become lighter and dark image regions become ...reducing ...

17

Authentication of Colored Document Images using Secret-Sharing Method with Repair Capability

Authentication of Colored Document Images using Secret-Sharing Method with Repair Capability

... (stego) image. The alpha channel plane is used to create the stego image in a form of the PNG ...an image and forms the stego image. In the image authentication process, if it seen that ...

7

Expressing imaging algorithms using a C++ based image algebra programming environment

Expressing imaging algorithms using a C++ based image algebra programming environment

... max Image maximum Find the maximum value of elements on the intersection Format imageNamel max imageName2 imageNamel, imageName2 .max imageNamel imageNamel .max max Input image image im[r] ...

172

The internet

The internet

... The most immediate challenge for the next generation internet (www.ngi.gov) is to support increasing demand for both access and greater speed. In the next few years advances in fibre optic technology will hugely increase ...

11

Interface Design for Domain-Specific Image Retrieval: A Pilot Study.  A master's paper for the M.S. in L.S. degree.

Interface Design for Domain-Specific Image Retrieval: A Pilot Study. A master's paper for the M.S. in L.S. degree.

... online image collection can adopt these design ...other image retrieval systems with different user groups are needed in order to better answer the research ...

68

Accurately Measuring Inspection Time with Computers

Accurately Measuring Inspection Time with Computers

... would be wrong to start stimulus duration timing at im age presentation, then when the calculated multiple of time intervals terminates, present the mask. The operat- ing system has many demands that result in servicing ...

7

Conversion of DICOM Image in to JPEG, BMP and PNG Image Format

Conversion of DICOM Image in to JPEG, BMP and PNG Image Format

... the image from specific ...the image. After selection we get that image into the buffered ...same image is created and set it as input to the decoding ...

5

Study on Medical Image Processing Technologies Based on DICOM

Study on Medical Image Processing Technologies Based on DICOM

... This image only contains the information of brightness grayscale, without color ...the image data occupy. An image can produce a new output image after point operation, and the grayscale range ...

8

Data security for dicom images

Data security for dicom images

... DICOM image consist of two parts one is DICOM data and another is Image file we are implementing a security DICOM toolkit which will be able to handle, encrypt and Steganograph the purpose of this tool kit ...

5

Show all 10000 documents...

Related subjects