Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (5)

Search Parameters:
Keywords = JPEG fragment

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 7973 KB  
Article
Determining Thresholds for Optimal Adaptive Discrete Cosine Transformation
by Alexander Khanov, Anastasija Shulzhenko, Anzhelika Voroshilova, Alexander Zubarev, Timur Karimov and Shakeeb Fahmi
Algorithms 2024, 17(8), 366; https://doi.org/10.3390/a17080366 - 21 Aug 2024
Viewed by 1439
Abstract
The discrete cosine transform (DCT) is widely used for image and video compression. Lossy algorithms such as JPEG, WebP, BPG and many others are based on it. Multiple modifications of DCT have been developed to improve its performance. One of them is adaptive [...] Read more.
The discrete cosine transform (DCT) is widely used for image and video compression. Lossy algorithms such as JPEG, WebP, BPG and many others are based on it. Multiple modifications of DCT have been developed to improve its performance. One of them is adaptive DCT (ADCT) designed to deal with heterogeneous image structure and it may be found, for example, in the HEVC video codec. Adaptivity means that the image is divided into an uneven grid of squares: smaller ones retain information about details better, while larger squares are efficient for homogeneous backgrounds. The practical use of adaptive DCT algorithms is complicated by the lack of optimal threshold search algorithms for image partitioning procedures. In this paper, we propose a novel method for optimal threshold search in ADCT using a metric based on tonal distribution. We define two thresholds: pm, the threshold defining solid mean coloring, and ps, defining the quadtree fragment splitting. In our algorithm, the values of these thresholds are calculated via polynomial functions of the tonal distribution of a particular image or fragment. The polynomial coefficients are determined using the dedicated optimization procedure on the dataset containing images from the specific domain, urban road scenes in our case. In the experimental part of the study, we show that ADCT allows a higher compression ratio compared to non-adaptive DCT at the same level of quality loss, up to 66% for acceptable quality. The proposed algorithm may be used directly for image compression, or as a core of video compression framework in traffic-demanding applications, such as urban video surveillance systems. Full article
(This article belongs to the Special Issue Algorithms for Image Processing and Machine Vision)
Show Figures

Figure 1

25 pages, 4382 KB  
Article
Covert Communication through Robust Fragment Hiding in a Large Number of Images
by Pengfei Wang, Hua Zhong, Yapei Feng, Liangbiao Gong, Yuxiang Tang, Zhe-Ming Lu and Lixin Wang
Sensors 2024, 24(2), 627; https://doi.org/10.3390/s24020627 - 18 Jan 2024
Viewed by 1763
Abstract
For covert communication in lossy channels, it is necessary to consider that the carrier of the hidden watermark will undergo multiple image-processing attacks. In order to ensure that secret information can be extracted without distortion from the watermarked images that have undergone attacks, [...] Read more.
For covert communication in lossy channels, it is necessary to consider that the carrier of the hidden watermark will undergo multiple image-processing attacks. In order to ensure that secret information can be extracted without distortion from the watermarked images that have undergone attacks, in this paper, we design a novel fragmented secure communication system. The sender will fragment the secret data to be transmitted and redundantly hide it in a large number of multimodal carriers of messenger accounts on multiple social platforms. The receiver receives enough covert carriers, extracts each fragment, and concatenates the transmitted secret data. This article uses the image carrier as an example to fragment the text file intended for transmission and embeds it into a large number of images, with each fragment being redundant and embedded into multiple images. In this way, at the receiving end, only enough stego images need to be received to extract the information in each image, and then concatenate the final secret file. In order to resist various possible attacks during image transmission, we propose a strong robust image watermarking method. This method adopts a watermark layer based on DFT, which has high embedding and detection efficiency and good invisibility. Secondly, a watermark layer based on DCT is adopted, which can resist translation attacks, JPEG attacks, and other common attacks. Experiments have shown that our watermarking method is very fast; both the embedding time and the extraction time are less than 0.15 s for images not larger than 2000×2000. Our watermarking method has very good invisibility with 41 dB PSNR on average. And our watermarking method is more robust than existing schemes and robust to nearly all kinds of attacks. Based on this strong robust image watermarking method, the scheme of fragmenting and hiding redundant transmission content into a large number of images is effective and practical. Our scheme can 100% restore the secret file completely under different RST or hybrid attacks, such as rotation by 1 degree and 5 degrees, scaling by 1.25 and 0.8, and cropping by 10% and 25%. Our scheme can successfully restore the secret file completely even if 30% of received images are lost. When 80% of received images are lost, our scheme can still restore 61.1% of the secret file. If all stego images can be obtained, the original text file can be completely restored. Full article
(This article belongs to the Special Issue Image Processing in Sensors and Communication Systems)
Show Figures

Figure 1

10 pages, 1926 KB  
Article
A High-Capacity Coverless Information Hiding Based on the Lowest and Highest Image Fragments
by Kurnia Anggriani, Shu-Fen Chiou, Nan-I Wu and Min-Shiang Hwang
Electronics 2023, 12(2), 395; https://doi.org/10.3390/electronics12020395 - 12 Jan 2023
Cited by 9 | Viewed by 2737
Abstract
Coverless data hiding is resistant to steganalytical tool attacks because a stego image is not altered. On the other hand, one of its flaws is its limited hiding capacity. Recently, a coverless data-hiding method, known as the coverless information-hiding method based on the [...] Read more.
Coverless data hiding is resistant to steganalytical tool attacks because a stego image is not altered. On the other hand, one of its flaws is its limited hiding capacity. Recently, a coverless data-hiding method, known as the coverless information-hiding method based on the most significant bit of the cover image (CIHMSB), has been developed. This uses the most significant bit value in the cover image by calculating the average intensity value on the fragment and mapping it with a predefined sequence. As a result, CIHMBS is resistant to attack threats such as additive Gaussian white noise (AGWN), salt-and-pepper noise attacks, low-pass filtering attacks, and Joint Photographic Experts Group (JPEG) compression attacks. However, it only has a limited hiding capacity. This paper proposes a coverless information-hiding method based on the lowest and highest values of the fragment (CIHLHF) of the cover image. According to the experimental results, the hiding capacity of CIHLHF is twice that of CIHMSB. Full article
(This article belongs to the Special Issue Recent Developments and Applications of Image Watermarking)
Show Figures

Figure 1

12 pages, 3789 KB  
Article
Computed Tomography Does Not Improve Intra- and Interobserver Agreement of Hertel Radiographic Prognostic Criteria
by Paulo Ottoni di Tullio, Vincenzo Giordano, William Dias Belangero, Robinson Esteves Pires, Felipe Serrão de Souza, Pedro José Labronici, Caio Zamboni, Felipe Malzac, Paulo Santoro Belangero, Roberto Yukio Ikemoto, Sergio Rowinski and Hilton Augusto Koch
Medicina 2022, 58(10), 1489; https://doi.org/10.3390/medicina58101489 - 19 Oct 2022
Cited by 4 | Viewed by 7100
Abstract
Background and Objectives: Proximal humerus fractures are the second most frequent site of avascular necrosis (AVN), occurring in up to 16% of cases. The Hertel criteria have been used as a reference for the prediction of humerus head ischemia. However, these are [...] Read more.
Background and Objectives: Proximal humerus fractures are the second most frequent site of avascular necrosis (AVN), occurring in up to 16% of cases. The Hertel criteria have been used as a reference for the prediction of humerus head ischemia. However, these are based solely on the use of radiographs, which can make interpretation extremely difficult due to several reasons, such as the overlapping fragments, severity of the injury, and noncompliant acute pain patients. The objectives of the study were to evaluate the role of computed tomography (CT) in the interpretation of the Hertel criteria and to evaluate the intra- and interobserver agreement of orthopedic surgeons, comparing their area of expertise. Materials and Methods: The radiographs and CT scans of 20 skeletally mature patients who had fractures of the proximal humerus were converted to jpeg and mov, respectively. All images were evaluated by eight orthopedic surgeons (four trauma surgeons and four shoulder surgeons) in two different occasions. The intra- and interobserver agreement was assessed by using the Kappa coefficient. The level of significance was 5%. Results: There was a weak-to-moderate intraobserver agreement (κ < 0.59) for all examiners. Only the medial metaphyseal hinge greater than 2 mm was identified by 87.5% of evaluators both in the radiographic and CT examinations in the two rounds of the study (p < 0.05). There was no significant interobserver agreement (κ < 0.19), as it occurred only in some moments of the second round of evaluation. Conclusions: The prognostic criteria for humeral head ischemia evaluated in this study showed weak intra- and interobserver agreement in both the radiographic and tomographic evaluation. CT did not help surgeons in the primary interpretation of Hertel prognostic criteria used in this study when compared to the radiographic examination. Full article
(This article belongs to the Special Issue Current Status and Future Directions of Bone Trauma Surgery)
Show Figures

Figure 1

22 pages, 4819 KB  
Article
Error Level Analysis Technique for Identifying JPEG Block Unique Signature for Digital Forensic Analysis
by Nor Amira Nor Azhan, Richard Adeyemi Ikuesan, Shukor Abd Razak and Victor R. Kebande
Electronics 2022, 11(9), 1468; https://doi.org/10.3390/electronics11091468 - 3 May 2022
Cited by 7 | Viewed by 5155
Abstract
The popularity of unique image compression features of image files opens an interesting research analysis process, given that several digital forensics cases are related to diverse file types. Of interest has been fragmented file carving and recovery which forms a major aspect of [...] Read more.
The popularity of unique image compression features of image files opens an interesting research analysis process, given that several digital forensics cases are related to diverse file types. Of interest has been fragmented file carving and recovery which forms a major aspect of digital forensics research on JPEG files. Whilst there exist several challenges, this paper focuses on the challenge of determining the co-existence of JPEG fragments within various file fragment types. Existing works have exhibited a high false-positive rate, therefore rendering the need for manual validation. This study develops a technique that can identify the unique signature of JPEG 8 × 8 blocks using the Error Level Analysis technique, implemented in MATLAB. The experimental result that was conducted with 21 images of JFIF format with 1008 blocks shows the efficacy of the proposed technique. Specifically, the initial results from the experiment show that JPEG 8 × 8 blocks have unique characteristics which can be leveraged for digital forensics. An investigator could, therefore, search for the unique characteristics to identify a JPEG fragment during a digital investigation process. Full article
Show Figures

Figure 1

Back to TopTop