To see the other types of publications on this topic, follow the link: Image transmission.

Journal articles on the topic 'Image transmission'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Image transmission.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sun, Ke Mei. "Wireless Image Transmission System." Applied Mechanics and Materials 336-338 (July 2013): 1661–64. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.1661.

Full text
Abstract:
A wireless image transmission system is proposed, which in order to offset the disadvantages of wire video monitor laying points hard, and disadvantages of wire video monitor implementing hard in bad circumstance. The core of the system is TI series of C5000 high speed DSP processor and radio frequency wireless communication chip. Through DSP transplantation of JPEG compression algorithm, complete image collection and image compression through DSP, use wireless receiving and sending module to complete wireless images data transmission. Use wireless receiving and sending module instead of emitter and network as image data transmission device, low cost, not required network fee, system can real-time complete terminal images collection and show. It can apply community guard and video monitor of deploying points urgently in the electric power system, factory, bank and other important department, which dont require higher performance.
APA, Harvard, Vancouver, ISO, and other styles
2

García, J. A., Rosa Rodriguez-Sánchez, and J. Fdez-Valdivia. "Sustainable image transmission." Journal of Visual Communication and Image Representation 23, no. 1 (January 2012): 134–42. http://dx.doi.org/10.1016/j.jvcir.2011.09.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wei Gong, K. R. Rao, and M. T. Manry. "Progressive image transmission." IEEE Transactions on Circuits and Systems for Video Technology 3, no. 5 (1993): 380–83. http://dx.doi.org/10.1109/76.246089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nivedita, S. Angelin, and Dr T. Priyaradhikadevi. "Image Realization Steganography by Secure Key Transmission." International Journal of Trend in Scientific Research and Development Volume-2, Issue-2 (February 28, 2018): 1460–64. http://dx.doi.org/10.31142/ijtsrd9654.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Yuanming, Xiaobin Hong, Bin Cui, and Rongfa Peng. "Implementation of an Efficient Image Transmission Algorithm for Unmanned Surface Vehicles Based on Semantic Communication." Journal of Marine Science and Engineering 11, no. 12 (November 30, 2023): 2280. http://dx.doi.org/10.3390/jmse11122280.

Full text
Abstract:
With the increasingly maturing technology of unmanned surface vehicles (USVs), their applications are becoming more and more widespread. In order to meet operational requirements in complex scenarios, the real-time interaction and linkage of a large amount of information is required between USVs, between USVs and mother ships, and between USVs and shore-based monitoring systems. Visual images are the main perceptual information gathered from USVs, and their efficient transmission and recognition directly affect the real-time performance of information exchange. However, poor maritime communication signals, strong channel interference, and low bandwidth pose great challenges to efficient image transmission. Traditional image transmission methods have difficulty meeting the real-time and image quality requirements of visual image transmissions from USVs. Therefore, this paper proposes an efficient method for visual image transmission from USVs based on semantic communication. A self-encoder network for semantic encoding which compresses the image into low-dimensional latent semantics through the encoding end, thereby preserving semantic information while greatly reducing the amount of data transmitted, is designed. On the other hand, a generative adversarial network is designed for semantic decoding. The decoding end decodes and reconstructs high-quality images from the semantic information transmitted through the channel, thereby improving the efficiency of image transmission. The experimental results show that the performance of the algorithm is significantly superior to traditional image transmission methods, achieving the best image quality while transmitting the minimum amount of data. Compared with the typical BPG algorithm, when the compression ratio of the proposed algorithm is 51.6% of that of the BPG algorithm, the PSNR and SSIM values are 7.6% and 5.7% higher than the BPG algorithm, respectively. And the average total time of the proposed algorithm is only 59.4% of that of the BPG algorithm.
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, Ying, Xingchuang Xiong, Zilong Liu, Shangzhong Jin, and Juan Wang. "High-Performance Encryption Algorithms for Dynamic Images Transmission." Electronics 13, no. 1 (December 28, 2023): 131. http://dx.doi.org/10.3390/electronics13010131.

Full text
Abstract:
With the proliferation of the internet, the issue of image tampering has escalated, necessitating robust image encryption schemes. Despite the multitude of proposed image encryption algorithms, challenges such as slow computational speed, weak security, and suboptimal visibility persist. This study addresses these challenges by introducing a high-performance encryption algorithm tailored for dynamic images—QEDI (Quick Encryption Algorithm for Dynamic Images). QEDI leverages elliptic curve-based asymmetric encryption algorithms and hash algorithms. The process involves using a hash algorithm to calculate the hash of the dynamic image slated for encryption, employing the elliptic curve algorithm to generate public and private keys, and utilizing the asymmetric encryption algorithm to process the image hash, resulting in a signature ciphertext. This ciphertext is embedded into the dynamic image, completing the encryption process. To enhance the execution speed without compromising the image quality and visibility, the bit depth of the dynamic image is reduced before hash calculation, and custom information fields are encapsulated to embed the signature ciphertext into the dynamic image. Experimental evaluations, conducted within a dynamic image generation system, encompassed assessments of security, encryption algorithm execution time, and image quality. The results indicate that utilizing QEDI for dynamic image encryption yields better security compared to EDI (Encryption Algorithm for Dynamic Images). QEDI exhibits minimal impact on image quality, with a noteworthy 69.77% reduction in execution time compared to EDI. Furthermore, when compared to existing algorithms employing image conversion for encryption, QEDI-encrypted images demonstrate enhanced visibility, better image quality, and expedited encryption speed.
APA, Harvard, Vancouver, ISO, and other styles
7

Adeyinka, Michael. "Telepathological (Image Transmission) Configuration." Journal of Telemedicine and Telecare 2, no. 1_suppl (June 1996): 21–24. http://dx.doi.org/10.1177/1357633x9600201s07.

Full text
Abstract:
The Laboratory for Biomedical Informatics (LBMI) has developed a digital microscope control module incorporated into an image analysis system. This is now equipped with an ISDN switch box for linking up with a remote computer-based station for delivering histopathological services. The FRAME, client/server integrated software, was developed to initiate the communication link, adjust the microscope settings, acquire and transmit images. This LBMI telepathology initiative employs simple solutions to arrive at the point of prototyping and demonstrating the state of the art on the one hand and encountering the prevailing problems in order to deliberate on possible remedies on the other.
APA, Harvard, Vancouver, ISO, and other styles
8

CHANG, CHING-YUN, and IUON-CHANG LIN. "AN EFFICIENT PROGRESSIVE IMAGE TRANSMISSION SCHEME FOR CHINESE CALLIGRAPHY." International Journal of Pattern Recognition and Artificial Intelligence 20, no. 07 (November 2006): 1077–92. http://dx.doi.org/10.1142/s0218001406005083.

Full text
Abstract:
We invented a progressive image transmission scheme that is used for transmitting Chinese calligraphy. The scheme employs the property of simple colors of calligraphy images to design a method of transmitting images phase by phase. Overall, our scheme can achieve the following two goals. One is compressing the image data to reduce the transmission time while the other is gaining less response time by using progressive image transmission. Furthermore, the recovered image still maintains the colors of the seals with high image quality.
APA, Harvard, Vancouver, ISO, and other styles
9

Shi, Qi, Daheng Wang, Wen Chen, Jinpei Yu, Weiting Zhou, Jun Zou, and Guangzu Liu. "Research on Spaceborne Target Detection Based on Yolov5 and Image Compression." Future Internet 15, no. 3 (March 19, 2023): 114. http://dx.doi.org/10.3390/fi15030114.

Full text
Abstract:
Satellite image compression technology plays an important role in the development of space science. As optical sensors on satellites become more sophisticated, high-resolution and high-fidelity satellite images will occupy more storage. This raises the required transmission bandwidth and transmission rate in the satellite–ground data transmission system. In order to reduce the pressure from image transmission on the data transmission system, a spaceborne target detection system based on Yolov5 and a satellite image compression transmission system is proposed in this paper. It can reduce the pressure on the data transmission system by detecting the object of interest and deciding whether to transmit. An improved Yolov5 network is proposed to detect the small target on the high-resolution satellite image. Simulation results show that the improved Yolov5 network proposed in this paper can detect specific targets in real satellite images, including aircraft, ships, etc. At the same time, image compression has little effect on target detection, so detection complexity can be effectively reduced and detection speed can be improved by detecting the compressed images.
APA, Harvard, Vancouver, ISO, and other styles
10

Castro, Francesco, Donato Impedovo, and Giuseppe Pirlo. "A Medical Image Encryption Scheme for Secure Fingerprint-Based Authenticated Transmission." Applied Sciences 13, no. 10 (May 16, 2023): 6099. http://dx.doi.org/10.3390/app13106099.

Full text
Abstract:
Secure transmission of medical images and medical data is essential in healthcare systems, both in telemedicine and AI approaches. The compromise of images and medical data could affect patient privacy and the accuracy of diagnosis. Digital watermarking embeds medical images into a non-significant image before transmission to ensure visual security. However, it is vulnerable to white-box attacks because the embedded medical image can be extracted by an attacker that knows the system’s operation and does not ensure the authenticity of image transmission. A visually secure image encryption scheme for secure fingerprint-based authenticated transmission has been proposed to solve the above issues. The proposed scheme embeds the encrypted medical image, the encrypted physician’s fingerprint, and the patient health record (EHR) into a non-significant image to ensure integrity, authenticity, and confidentiality during the medical image and medical data transmission. A chaotic encryption algorithm based on a permutation key has been used to encrypt the medical image and fingerprint feature vector. A hybrid asymmetric cryptography scheme based on Elliptic Curve Cryptography (ECC) and AES has been implemented to protect the permutation key. Simulations and comparative analysis show that the proposed scheme achieves higher visual security of the encrypted image and higher medical image reconstruction quality than other secure image encryption approaches.
APA, Harvard, Vancouver, ISO, and other styles
11

Shoydin, Sergey A., and Artem L. Pazoev. "«Uncanny valley» effect in holographic image transmission." Journal of the Belarusian State University. Physics, no. 3 (October 20, 2022): 4–9. http://dx.doi.org/10.33581/2520-2243-2022-3-4-9.

Full text
Abstract:
The quality of computer-synthesised images is continuously improving, increasing in the volume of files representing them. It is noticed that passing from simple schematic images to increasingly complex ones, their perception goes through different stages. If initially the complication of the image and its approximation to the real image of a person makes a favourable impression, then there comes a moment of fright and rejection. Masahiro Mori called it the «uncanny valley» effect. Since then, all new technologies for presenting human images have been tested in order to avoid this effect. This effect should be treated especially carefully when compressing and then restoring complex images. This paper shows the position relative to the «uncanny valley» of the reconstructed 3D images, reconstructed by a hologram synthesised and transmitted with compression over the communication channel in accordance with patent RU2707582C1.
APA, Harvard, Vancouver, ISO, and other styles
12

Rizal, Syamsul, and Dong-Seong Kim. "Image Transmission in Military Network Using Bézier Curve." Journal of Advances in Computer Networks 3, no. 2 (2015): 141–45. http://dx.doi.org/10.7763/jacn.2015.v3.156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

THAKUR, NEELIMA, SIDDHARTHA CHOUBEY, and ABHA CHOUBEY. "IMAGE ENCRYPTION METHOD FOR SECURE IMAGE TRANSMISSION." i-manager’s Journal on Image Processing 8, no. 4 (2021): 21. http://dx.doi.org/10.26634/jip.8.4.18489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Liu, Zhishen. "Underwater image transmission and blurred image restoration." Optical Engineering 40, no. 6 (June 1, 2001): 1125. http://dx.doi.org/10.1117/1.1364500.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Adeyinka, Michael. "Telepathological (image transmission) configuration." Journal of Telemedicine and Telecare 2, no. 1 (March 2, 1996): 21–24. http://dx.doi.org/10.1258/1357633961929763.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Eraso, Francisco Eduardo, William C. Scarfe, Yoshihiko Hayakawa, Jane Goldsmith, and Allan G. Farman. "Teledentistry: protocols for the transmission of digitized radiographs of the temporomandibular joint." Journal of Telemedicine and Telecare 2, no. 4 (December 1, 1996): 217–23. http://dx.doi.org/10.1258/1357633961930103.

Full text
Abstract:
Tomograms of the temporomandibular joint were digitized in three different formats using a PC-based system. The image resolution for various projections was determined at different camera-film distances. Three series of images were transmitted by telephone, and transmission times were measured. The original radiographs, the digitized images, the transmitted images and the transmitted-and-printed images were presented to 10 observers, who were asked to rate image quality. No difference in image quality was found between the initial digitized and the transmitted images. However, transmitted and transmitted-and-printed images were of significantly lower quality than the original radiographs or the digitized images viewed on a computer monitor. Transmission time was reduced significantly 50 by cropping the images before transmission. The image quality of individual radiographs was better than radiographs formatted as a series.
APA, Harvard, Vancouver, ISO, and other styles
17

B. Hebbale, Sunil, V. S. Giridhar Akula, and Parashuram Baraki. "Tuna Swarm Optimization with 3D-chaotic map and DNA encoding for image encryption with lossless image compression based on FPGA." International journal of electrical and computer engineering systems 14, no. 1 (January 26, 2023): 59–72. http://dx.doi.org/10.32985/ijeces.14.1.7.

Full text
Abstract:
Images and video-based multimedia data are growing rapidly due to communication network technology. During image compression and transmission, images are inevitably corrupted by noise due to the influence of the environment, transmission channels, and other factors, resulting in the damage and degradation of digital images. Numerous real-time applications, such as digital photography, traffic monitoring, obstacle detection, surveillance applications, automated character recognition, etc are affected by this information loss. Therefore, the efficient and safe transmission of data has become a vital study area. In this research, an image compression–encryption system is proposed to achieve security with low bandwidth and image de-noising issues during image transmission. The Chevrolet transformation is proposed to improve image compression quality, reduce storage space, and enhance de- noising. A 3D chaotic logistic map with DNA encoding and Tuna Swarm Optimization is employed for innovative image encryption. This optimization approach may significantly increase the image's encryption speed and transmission security. The proposed system is built using the Xilinx system generator tool on a field-programmable gate array (FPGA). Experimental analysis and experimental findings show the reliability and scalability of the image compression and encryption technique designed. For different images, the security analysis is performed using several metrics and attains 32.33 dB PSNR, 0.98 SSIM, and 7.99721 information entropy. According to the simulation results, the implemented work is more secure and reduces image redundancy more than existing methods.
APA, Harvard, Vancouver, ISO, and other styles
18

Chaturvedi, Soumya. "Different Type of Image Compression using Various techniques, Highlighting Segmentation based image Compression." International Journal for Research in Applied Science and Engineering Technology 10, no. 2 (February 28, 2022): 171–77. http://dx.doi.org/10.22214/ijraset.2022.40207.

Full text
Abstract:
Abstract: Image compression (IC) plays an important part in Digital Image Processing (DIP), it is as well very very essential for effective transmission and storing of images. Image Compression (IC), is basically recusing the size of an image and that too without adjusting the quality of the picture. It is kind of software with records pressure on digital Image. The objective is to lessen reiteration of the picture info for you to be accomplished of store or transmit information in a proficient shape. This paper gives review of kinds of images and its compression strategies. An image, in its genuine form, conveys big extent of data which requiress no longer finest large quantity of memory provisions for its garage but moreover causes difficult transmission over limited bandwidth channel. So, one of the acute factors for picture storage space or transmission over any exchange media is Image Compression. Image Compression makes it possible for increasing file sizes of practicable, storable and communicable dimensions. Keywords: Image Compression; segmentation based image compression component; formatting; Lossless compression; Lossy compression; techniques.
APA, Harvard, Vancouver, ISO, and other styles
19

Duong, Hien-Thuan, Ca V. Phan, Quoc-Tuan Vien, and Tuan T. Nguyen. "A Secure Cooperative Transmission of Image Super-Resolution in Wireless Relay Networks." Electronics 12, no. 18 (September 6, 2023): 3764. http://dx.doi.org/10.3390/electronics12183764.

Full text
Abstract:
The image transmission over wireless media experiences not only unavailable performance loss caused by the environment and hardware issues, but also information leakage to eavesdroppers who can overhear and attempt to recover the images. This paper proposes a secure cooperative relaying (SCR) protocol for the image communications in wireless relay networks (WRNs) where Alice sends high-resolution (HR) images to Bob with the assistance of a relaying user named Relay, and in the presence of an eavesdropper named Eve. In order to enhance the security of the image communications, random linear network coding (RLNC) is employed at both Alice and Relay to conceal the original images from Eve with RLNC coefficient matrices and reference images in the shared image datastore. Furthermore, the original HR images are downscaled at Alice to save transmission bandwidth and image super-resolution (ISR) is adopted at Bob due to its capability to recover the HR images from their low-resolution (LR) version, while still maintaining the image quality. In the proposed SCR protocol, Bob can decode both the original images transmitted from Alice over the direct link and the images forwarded by Relay over the relaying links. Simulation results show that the SCR protocol achieves a considerably higher performance at Bob than at Eve since Eve does not know the coefficient matrices and reference images used at Alice and Relay for the RLNC. The SCR protocol is also shown to outperform the counterpart secure direct transmission protocol without the relaying links and secure relaying transmission without the direct link. Additionally, an increased scaling factor can save the transmission bandwidth for a slight change in the image quality. Moreover, the impacts of direct, relaying and wiretap links are evaluated, verifying the effectiveness of the SCR protocol with the employment of Relay to assist the image communications between Alice and Bob in the WRNs.
APA, Harvard, Vancouver, ISO, and other styles
20

Jin, Long Xu, Jin Li, and Xian Peng Hao. "Design of Image Transmission System for Multi Channel Panchromatic TDICCD Camera with Large Field of View." Applied Mechanics and Materials 380-384 (August 2013): 3758–61. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.3758.

Full text
Abstract:
In order to satisfy the transmission of mass data volume of on-board time delay integration charge coupled devices (TDICCD) image, a high speed image transmission system of space panchromatic TDICCD camera with a large field of view is designed in this paper. A 4-channel parallel high speed transmission system for 16-channel CCD image was designed. A high speed serializer TLK2711 is applied to send and receive multi channel TDICCD images. A single chip TLK2711 can processing 4 channels image. Experimental results show that the designed transmission system can reliably work. The designed transmission system can meet the application for space TDICCD camera with a large field of view.
APA, Harvard, Vancouver, ISO, and other styles
21

Ch, Gangadhar, and Md Habibulla. "Lucas Algorithm for Medical Images Encryption and Transmission using Orthogonal Frequency Division Multiplexing for Medical Health Information Systems and its VLSI Realization." International Journal of Online and Biomedical Engineering (iJOE) 17, no. 06 (June 25, 2021): 128. http://dx.doi.org/10.3991/ijoe.v17i06.23107.

Full text
Abstract:
<p>Security of medical images is critical for transmission of medical images and relevant patient information through public health information systems networks. Image encryption is an important tool for protecting Medical images by converting them into unrecognisable formats for the transmission and receiption of medical images. This paper proposes an algorithm for medical image encryption using Lucas Algorithm, and a discrete wavelet transform based transmission and reception technique, which is known as orthogonal frequency division multiplexing(OFDM). This paper presents an implementation of Lucas Algorithm for image encryption and combines it with Discrete wavelet transform orthogonal frequency division multiplexing using Field Programmable Gate Array.</p>
APA, Harvard, Vancouver, ISO, and other styles
22

Liu, Fulong, Gang Li, Shuqiang Yang, Wenjuan Yan, Guoquan He, and Ling Lin. "Recognition of Heterogeneous Edges in Multiwavelength Transmission Images Based on the Weighted Constraint Decision Method." Applied Spectroscopy 74, no. 8 (June 10, 2020): 883–93. http://dx.doi.org/10.1177/0003702820908951.

Full text
Abstract:
Multiwavelength light transmission imaging provides a possibility for early detection of breast cancer. However, due to strong scattering during the transmission process of breast tissue analysis, the transmitted image signal is weak and the image is blurred and this makes heterogeneous edge detection difficult. This paper proposes a method based on the weighted constraint decision (WCD) method to eliminate the erosion and checkerboard effects in image histogram equalization (HE) enhancement and to improve the recognition of heterogeneous edge. Multiwavelength transmission images of phantom are acquired on the designed experimental system and the mask image with high signal-to-noise ratio (SNR) is obtained by frame accumulation and an Otsu thresholding model. Then, during image enhancement the image is divided into low-gray-level (LGL) and high-gray-level (HGL) regions according to the distribution of light intensity in image. And the probability density distribution of gray level in the LGL and HGL regions are redefined respectively according to the WCD method. Finally, the reconstructed image is obtained based on the modified HE. The experimental results show that compared with traditional image enhancement methods, the WCD method proposed in this paper can greatly improve the contrast between heterogeneous region and normal region. Moreover, the correlation between the original image data is maintained to the greatest extent, so that the edge of the heterogeneity can be detected more accurately. In conclusion, the WCD method not only accurately identifies the edge of heterogeneity in multiwavelength transmission images, but it also could improve the clinical application of multiwavelength transmission images in the early detection of breast cancer.
APA, Harvard, Vancouver, ISO, and other styles
23

HAMAMACHI, Yuya, and Masamitsu KURISU. "Transmitting Multiple Images and a Providing Panoramic Image Using Single Image Transmission System." Proceedings of JSME annual Conference on Robotics and Mechatronics (Robomec) 2018 (2018): 2A2—B02. http://dx.doi.org/10.1299/jsmermd.2018.2a2-b02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Sridevi, P., and J. Suguna. "Image Encryption Using Arnold Map." Asian Journal of Computer Science and Technology 8, S1 (February 5, 2019): 70–73. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1954.

Full text
Abstract:
Nowadays transmission of data over the network is increasing and the data can be in the format of text, image, audio and video. Images are widely used in maximum applications of daily life. Image encryption is one of the most recent area of research to meet the demand during image transmission. Transformation of image from one form to erroneous form is called as image encryption. So, it can be secured from unauthorized users. The security of encrypted image is completely dependent on two important aspects i.e. the strength of the cryptographic algorithm and the confidentiality of the key. This paper proposes an algorithm of image encryption based on 3D Arnold cat map combined with logistic chaotic map. To evaluate the security of the encrypted image of this scheme, key space analysis and differential attack are performed. Several test images are used to demonstrate the validity of the proposed encryption algorithm. The experiment result shows that the proposed algorithm provides an efficient and secure approach to real-time image encryption and transmission.
APA, Harvard, Vancouver, ISO, and other styles
25

Shankar, K., and E. Perumal. "ANT COLONY OPTIMIZATION BASED OPTIMAL STEGANOGRAPHY TECHNIQUE FOR SECRET IMAGE SHARING SCHEME." Advances in Mathematics: Scientific Journal 10, no. 1 (January 21, 2021): 453–61. http://dx.doi.org/10.37418/amsj.10.1.45.

Full text
Abstract:
Data hiding earlier to transmission remains as an essential process for reducing the security issues in the cloud based environment. Image encryption and steganography techniques verify the safety of secret data during the transmission over the Internet. This paper presents a new multiple secret share creation (SSC) with ant colony optimization (ACO) based image steganography (SSC-ACO) technique to achieve security over image transmission. Initially, SSC algorithm is applied to generate a set of different shares for the applied image. Then, the ACO algorithm based image steganography technique is employed to generate the stego images for the applied cover and share images. The utilization of image steganography technique comprises a set of shares into the cover image to secure the details of the individual shares. The experimental validation of the projected model is tested using diabetic retinopathy (DR) images and the results are examined interms of peak signal to noise ratio (PSNR). The obtained PSNR values ensured the effective performance of the presented model on all the employed test images.
APA, Harvard, Vancouver, ISO, and other styles
26

Heri Prasetyo, Heri Prasetyo, Alim Wicaksono Hari Prayuda Heri Prasetyo, Chih-Hsien Hsia Alim Wicaksono Hari Prayuda, and Muhammad Alif Wisnu Chih-Hsien Hsia. "Integrating Companding and Deep Learning on Bandwidth-Limited Image Transmission." 網際網路技術學刊 23, no. 3 (May 2022): 467–73. http://dx.doi.org/10.53106/160792642022052303005.

Full text
Abstract:
<p>The image companding is a simple image compression technique which is very easy to be implemented in the bandwidth-limited environment. This paper presents a simple way for improving the quality of decompressed image in the image companding task. The proposed method consists of two networks, namely Sub-band Network (SubNet) and Pixel Network (PixNet), for performing an image reconstruction. The SubNet module exploits the effectiveness of Stationary Wavelet Transform (SWT) and Convolutional Neural Network (CNN) in order to recover the lost information in the wavelet sub-bands basis. Whilst, the PixNet part applies CNN with identity mapping to improve the quality of initial reconstructed image obtained from the SubNet module. As reported in this paper, the proposed method outperforms the former existing schemes in the image companding task. It has also been proven that the proposed method is able to improve the quality of reconstructed image with some simple steps.</p> <p>&nbsp;</p>
APA, Harvard, Vancouver, ISO, and other styles
27

Wang, Jinyu, Yingna Li, and Wenxiang Chen. "UAV Aerial Image Generation of Crucial Components of High-Voltage Transmission Lines Based on Multi-Level Generative Adversarial Network." Remote Sensing 15, no. 5 (March 2, 2023): 1412. http://dx.doi.org/10.3390/rs15051412.

Full text
Abstract:
With the aim of improving the image quality of the crucial components of transmission lines taken by unmanned aerial vehicles (UAV), a priori work on the defective fault location of high-voltage transmission lines has attracted great attention from researchers in the UAV field. In recent years, generative adversarial nets (GAN) have achieved good results in image generation tasks. However, the generation of high-resolution images with rich semantic details from complex backgrounds is still challenging. Therefore, we propose a novel GANs-based image generation model to be used for the critical components of power lines. However, to solve the problems related to image backgrounds in public data sets, considering that the image background of the common data set CPLID (Chinese Power Line Insulator Dataset) is simple. However, it cannot fully reflect the complex environments of transmission line images; therefore, we established an image data set named “KCIGD” (The Key Component Image Generation Dataset), which can be used for model training. CFM-GAN (GAN networks based on coarse–fine-grained generators and multiscale discriminators) can generate the images of the critical components of transmission lines with rich semantic details and high resolutions. CFM-GAN can provide high-quality image inputs for transmission line fault detection and line inspection models to guarantee the safe operation of power systems. Additionally, we can use these high-quality images to expand the data set. In addition, CFM-GAN consists of two generators and multiple discriminators, which can be flexibly applied to image generation tasks in other scenarios. We introduce a penalty mechanism-related Monte Carlo search (MCS) approach in the CFM-GAN model to introduce more semantic details in the generated images. Moreover, we presented a multiscale discriminator structure according to the multitask learning mechanisms to effectively enhance the quality of the generated images. Eventually, the experiments using the CFM-GAN model on the KCIGD dataset and the publicly available CPLID indicated that the model used in this work outperformed existing mainstream models in improving image resolution and quality.
APA, Harvard, Vancouver, ISO, and other styles
28

Fadhel, Sabah, Mohd Shafry, and Omar Farook. "Chaos Image Encryption Methods: A Survey Study." Bulletin of Electrical Engineering and Informatics 6, no. 1 (March 1, 2017): 99–104. http://dx.doi.org/10.11591/eei.v6i1.599.

Full text
Abstract:
With increasing dependence on communications over internet and networks, secure data transmission is coming under threat. One of the best solutions to ensure secure data transmissions is encryption. Multiple forms of data, such as text, audio, image, and video can be digitally transmitted, nowadays images being the most popular and old encryption techniques such as: AES,DES,RSA etc., show low security level when used for image encryption. This problem was resolved by using of chaos encryption which is an acceptable form of encryption for image data. The sensitivity to initial conditions and control parameters make chaos encryption suitable for image applications. This study discusses various chaos encryption techniques.
APA, Harvard, Vancouver, ISO, and other styles
29

Xiong, Jiang, Yong Pan, Zi Ye Hou, and Ren Zhang. "Research on the System of Image Acquisition and Wireless Transmission." Applied Mechanics and Materials 668-669 (October 2014): 1382–85. http://dx.doi.org/10.4028/www.scientific.net/amm.668-669.1382.

Full text
Abstract:
Image acquisition and wireless transmission is a key technology in the Internet of Things. This paper reports a ARM Cortex-M4 processor hand-held based Image acquisition and wireless transmission terminal. The terminal utilizes STM32F407VGT6 as its master controller, respectively. It uses Nordic nRF24L01 as its wireless transceiver module and OV9655 as its camera module. The system works in 2.4GHz ISM microwave band and can capture images and wirelessly transmit images within 20m indoors and 50m outdoors. The actual measurement of image acquisition and transmission shows that this terminal is highly stable and comparable in 2.4GHz microwave frequency.
APA, Harvard, Vancouver, ISO, and other styles
30

Lichte, Hannes. "Electron Holography Improving Transmission Electron Microscopy." Proceedings, annual meeting, Electron Microscopy Society of America 48, no. 1 (August 12, 1990): 208–9. http://dx.doi.org/10.1017/s0424820100179798.

Full text
Abstract:
Generally, the electron object wave o(r) is modulated both in amplitude and phase. In the image plane of an ideal imaging system we would expect to find an image wave b(r) that is modulated in exactly the same way, i. e. b(r) =o(r). If, however, there are aberrations, the image wave instead reads as b(r) =o(r) * FT(WTF) i. e. the convolution of the object wave with the Fourier transform of the wave transfer function WTF . Taking into account chromatic aberration, illumination divergence and the wave aberration of the objective lens, one finds WTF(R) = Echrom(R)Ediv(R).exp(iX(R)) . The envelope functions Echrom(R) and Ediv(R) damp the image wave, whereas the effect of the wave aberration X(R) is to disorder amplitude and phase according to real and imaginary part of exp(iX(R)) , as is schematically sketched in fig. 1.Since in ordinary electron microscopy only the amplitude of the image wave can be recorded by the intensity of the image, the wave aberration has to be chosen such that the object component of interest (phase or amplitude) is directed into the image amplitude. Using an aberration free objective lens, for X=0 one sees the object amplitude, for X= π/2 (“Zernike phase contrast”) the object phase. For a real objective lens, however, the wave aberration is given by X(R) = 2π (.25 Csλ3R4 + 0.5ΔzλR2), Cs meaning the coefficient of spherical aberration and Δz defocusing. Consequently, the transfer functions sin X(R) and cos(X(R)) strongly depend on R such that amplitude and phase of the image wave represent only fragments of the object which, fortunately, supplement each other. However, recording only the amplitude gives rise to the fundamental problems, restricting resolution and interpretability of ordinary electron images:
APA, Harvard, Vancouver, ISO, and other styles
31

Rao, K. Srinivasa, S. Ramya, N. Ramyasri, and M. Sirisha. "A Dehazing Benchmark with Real Hazy Outdoor Images." International Journal of Advance Research and Innovation 8, no. 2 (2020): 59–63. http://dx.doi.org/10.51976/ijari.822010.

Full text
Abstract:
A single image dehazing is one of the problemin image processing. The main aim of using this method is to obtain certain transmission map to abolish hazes from a single input image. An optical model is evaluated and the basic transmission map under an additional filter is modified. For better conservation of haze image, the globally guided image filtering can be applied to produce sharper images and preserves details in regions of fine structure visibly.
APA, Harvard, Vancouver, ISO, and other styles
32

M, Anand, and V. Mathivananr. "Quantization Encoding Algorithm Based Satellite Image Compression." Indonesian Journal of Electrical Engineering and Computer Science 8, no. 3 (December 1, 2017): 740. http://dx.doi.org/10.11591/ijeecs.v8.i3.pp740-742.

Full text
Abstract:
In the field of digital data there is a demand in bandwidth for the transmission of the videos and images all over the worlds. So in order to reduce the storage space in the field of image applications there is need for the image compression process with lesser transmission bandwidth. So in this paper we are proposing a new image compression technique for the compression of the satellite images by using the Region of Interest (ROI) based on the lossy image technique called the Quantization encoding algorithm for the compression. The performance of our method can be evaluated and analyzing the PSNR values of the output images.
APA, Harvard, Vancouver, ISO, and other styles
33

De, Kanjar, and Masilamani V. "NO-REFERENCE IMAGE QUALITY MEASURE FOR IMAGES WITH MULTIPLE DISTORTIONS USING RANDOM FORESTS FOR MULTI METHOD FUSION." Image Analysis & Stereology 37, no. 2 (July 9, 2018): 105. http://dx.doi.org/10.5566/ias.1534.

Full text
Abstract:
Over the years image quality assessment is one of the active area of research in image processing. Distortion in images can be caused by various sources like noise, blur, transmission channel errors, compression artifacts etc. Image distortions can occur during the image acquisition process (blur/noise), image compression (ringing and blocking artifacts) or during the transmission process. A single image can be distorted by multiple sources and assessing quality of such images is an extremely challenging task. The human visual system can easily identify image quality in such cases, but for a computer algorithm performing the task of quality assessment is a very difficult. In this paper, we propose a new no-reference image quality assessment for images corrupted by more than one type of distortions. The proposed technique is compared with the best-known framework for image quality assessment for multiply distorted images and standard state of the art Full reference and No-reference image quality assessment techniques available.
APA, Harvard, Vancouver, ISO, and other styles
34

Phankokkruad, Manop, and Wacharawichanant Sirirat. "Morphological Analysis of Particles in Transmission Electron Microscopy Image Using Image Processing." Advanced Materials Research 774-776 (September 2013): 1262–66. http://dx.doi.org/10.4028/www.scientific.net/amr.774-776.1262.

Full text
Abstract:
The analysis of material particles in the transmission electron microscopy (TEM) image is the most important in the development and synthesis of the new materials for application in many fields. Manual identification is the hard work, spent a lot of time and inaccurate method. To solve this problem, the image processing is proposed for automatically identifies the material particles boundary and size in TEM images in or order to extract the useful data. The image processing method has been experimented on variety of TEM images and very promising results have been achieved given more accuracy. Experimental results show that the proposed method gave the high adaptability, more accurate and rapidly than the manual method.
APA, Harvard, Vancouver, ISO, and other styles
35

Jin, Yong. "Quality of Service aware Medical CT Image Transmission Anti-collision Mechanism Based on Big Data Autonomous Anti-collision Control." Current Bioinformatics 14, no. 7 (September 17, 2019): 676–83. http://dx.doi.org/10.2174/1574893613666180502111320.

Full text
Abstract:
Background: At present, due to the limitation of hardware, software and network transmission performance, the medical diagnosis of medical CT image equipment is easy to be carried out based on the wrong image. In addition, due to the complex structure of human organs and unpredictable lesion location, it is difficult to judge the reliability of medical CT images, spatial localization of the lesion, two-dimensional slice images and shape based on stereotypes. Therefore, how to improve the efficiency of medical CT terminal and the image quality has become the key technology to improve the satisfaction of medical diagnosis and treatment. Objective: To improve the work efficiency of medical CT terminal and medical image transmission quality, with the medical CT terminal state and service quality. Methods: Firstly, from the view of throughput, packet loss rate, delay and so on, a QoS aware model for medical CT image transmission has been established. Then, with throughput, packet length, path loss, service area size, access point location, and the number of medical CT terminals, the performance change regulation of the medical CT image transmission is completed and the optimal quality of service guarantee parameters sequence is obtained. Next, the medical CT image big data autonomous collision control scheme is proposed. Results: The experimental and mathematical results verify the real-time performance, reliability, effectiveness and feasibility of the proposed medical CT image transmission anti-collision mechanism. Conclusion: The proposed scheme can satisfy the high-quality high demand for data transmission at the same time, according to a variety of user experience demand and real-time adjustment of medical CT terminal working state, which provides effective data quality assurance and optimization of the network source distribution, and also enhances the quality of medical image data transmission service.
APA, Harvard, Vancouver, ISO, and other styles
36

S, Devatha. "Image Transmission through Water Medium." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 3166–69. http://dx.doi.org/10.22214/ijraset.2022.44538.

Full text
Abstract:
Abstract: Water data communication is a potential technology to realize underwater communication. The experiment of underwater data communication in the laboratory is different with that in the real water environment because the physical scale is limited. Although since recent several decades, artificial scattering agents are used to recreate underwater data communication through water channels under different communication medium conditions, but the similarity between experimental water and natural water is not reliable, such as the similarity in frequency domain characteristics. The underwater transmitter directs a signal to the water's surface, causing tiny vibrations that correspond to the transmission. Above the surface, a highly sensitive receiver reads these minute disturbances and decodes the signal.
APA, Harvard, Vancouver, ISO, and other styles
37

Balsa, Jose, Tomás Domínguez-Bolano, Óscar Fresnedo, José A. García-Naya, and Luis Castedo. "Image Transmission: Analog or Digital?" Proceedings 2, no. 18 (September 18, 2018): 1163. http://dx.doi.org/10.3390/proceedings2181163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Huang, H. K. "Image storage, transmission and manipulation." Minimally Invasive Therapy 1, no. 1 (January 1991): 85–92. http://dx.doi.org/10.3109/13645709109152799.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Kamimura, T., H. Okura, and A. Kumagai. "ICs for digital image transmission." IEEE Transactions on Consumer Electronics 39, no. 4 (1993): 789–94. http://dx.doi.org/10.1109/30.267400.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Salous, M., D. Pycock, and G. S. Cruickshank. "CBIT - context-based image transmission." IEEE Transactions on Information Technology in Biomedicine 5, no. 2 (June 2001): 159–70. http://dx.doi.org/10.1109/4233.924806.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Erhel, Y. M., C. Perrine, D. Lemur, and A. Bourdillon. "Image transmission through ionospheric channel." Electronics Letters 41, no. 2 (2005): 80. http://dx.doi.org/10.1049/el:20056882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Gernandt, Mark N. "Document Image Transmission by Telecommunication." Journal of Forensic Sciences 35, no. 4 (July 1, 1990): 12914J. http://dx.doi.org/10.1520/jfs12914j.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Inoue, Takehiro, and Toshihiko Inoue. "ISDN application for image transmission." Computer Methods and Programs in Biomedicine 43, no. 1-2 (May 1994): 139–44. http://dx.doi.org/10.1016/0169-2607(94)90199-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Wen-Jyi Hwang and H. Derin. "Multiresolution multiresource progressive image transmission." IEEE Transactions on Image Processing 4, no. 8 (1995): 1128–40. http://dx.doi.org/10.1109/83.403418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Vasanth Raj, P. T., A. Vijayaraj, K. Pradeep, and Ebenezer Lartey Debrah. "Self-Super-Resolution of an MRI Image with Assistance of the DSTTD System." Journal of Healthcare Engineering 2022 (November 24, 2022): 1–11. http://dx.doi.org/10.1155/2022/3376079.

Full text
Abstract:
Motivation. In the modern world of information technology, the need for ensuring the safety of wireless transmissions while transiting through a given network is growing rapidly. The process of transmitting images via a wireless network is fraught with difficulty. There is a possibility that data may be corrupted while being transmitted, which would result in an image with low resolution. Both of these issues were investigated head-on in this research methodology using the aiding double space-time block coding (DSTTD) system and the self-super-resolution (SSR) method. Description. In recent times, medical image transmission over a wireless network has received a significant amount of attention, as a result of the sharing of medical images between patients and doctors. They would want to make sure that the image was sent in a risk-free and protected manner. Arnold cat map, often known as ACM, is a well-known and widely implemented method of image transmission encryption that has been in use for quite some time. At the receiver end, SSR is now being employed in order to view the transmitted medical image in the finest possible resolution. It is anticipated that in the near future, image transmission through wireless DSTTD will be technically feasible. This is performed in order to maximize the benefits that the system has to offer in terms of both spatial diversity and multiplexing as much as is possible. Conclusion. The SSR approach is used in order to represent the image in a document pertaining to human resources. ACM is used so that the image may be sent in a risk-free and protected way. The adoption of a DSTTD-based architecture for wireless communication is suggested. A comparison of the results is provided, and PSNR and SSIM values are detailed towards the results and discussion of the article.
APA, Harvard, Vancouver, ISO, and other styles
46

Enami, Yoichiro. "Special edition. Image transmission network. 2.Image transmission networks for broadcasting. 2-3 CATV." Journal of the Institute of Television Engineers of Japan 45, no. 1 (1991): 15–18. http://dx.doi.org/10.3169/itej1978.45.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Liu, Jiantao, Xiaoxiang Yang, Mingzhu Zhu, and Bingwei He. "Transmission Estimation by Complex Assumption with Occlusion Handling." Mathematical Problems in Engineering 2019 (March 24, 2019): 1–14. http://dx.doi.org/10.1155/2019/1651958.

Full text
Abstract:
Transmission estimation is a critical step in single-image dehazing. The estimate of each pixel describes the portion of the scene radiance that is degraded by hazing and finally reaches the image sensor. Transmission estimation is an underconstrained problem, and, thus, various assumptions, priors, and models are employed to make it solvable. However, most of the previous methods did not consider the different assumptions simultaneously, which, therefore, did not correctly reflect the previous assumptions in the final result. This paper focuses on this problem and proposes a method using an energy function that clearly defines the optimal transmission map and combines the assumptions from three aspects: fidelity, smoothness, and occlusion handling, simultaneously. Fidelity is measured by a novel principle derived from the dark channel prior, smoothness is described by the assumption of piecewise smoothening, and occlusion handling is achieved based on a new proposed feature. The transmissions are estimated by searching for the optimal solution of the function that can retain all the employed assumptions simultaneously. The proposed method is evaluated on the synthetic images of two datasets and various natural images. The results show that there is remarkable fidelity and smoothness in the transmission and that a good performance is exhibited for haze removal.
APA, Harvard, Vancouver, ISO, and other styles
48

Kinosita, K., H. Itoh, S. Ishiwata, K. Hirano, T. Nishizaka, and T. Hayakawa. "Dual-view microscopy with a single camera: real-time imaging of molecular orientations and calcium." Journal of Cell Biology 115, no. 1 (October 1, 1991): 67–73. http://dx.doi.org/10.1083/jcb.115.1.67.

Full text
Abstract:
A new microscope technique, termed "W" (double view video) microscopy, enables simultaneous observation of two different images of an object through a single video camera or by eye. The image pair may, for example, be transmission and fluorescence, fluorescence at different wavelengths, or mutually perpendicular components of polarized fluorescence. Any video microscope can be converted into a dual imager by simple insertion of a small optical device. The continuous appearance of the dual image assures the best time resolution in existing and future video microscopes. As an application, orientations of actin protomers in individual, moving actin filaments have been imaged at the video rate. Asymmetric calcium influxes into a cell exposed to an intense electric pulse have also been visualized.
APA, Harvard, Vancouver, ISO, and other styles
49

Qin, Hongshuai, and Huibin Qin. "Image-Based Dedicated Methods of Night Traffic Visibility Estimation." Applied Sciences 10, no. 2 (January 7, 2020): 440. http://dx.doi.org/10.3390/app10020440.

Full text
Abstract:
Traffic visibility is an essential reference for safe driving. Nighttime conditions add to the difficulty of estimating traffic visibility. To estimate the visibility in nighttime traffic images, we propose a Traffic Sensibility Visibility Estimation (TSVE) algorithm that combines laser transmission and image processing and needs no reference to the corresponding fog-free images and camera calibration. The information required is first obtained via the roadside equipment which collects environmental data and captures road images and then analyzed locally or remotely. The proposed analysis includes calculating the current atmospheric transmissivity with the laser atmospheric transmission theory and acquiring image features by using the cameras and the adjustable brightness target. Image analysis is performed using two image processing algorithms, namely, dark channel prior (DCP) and image brightness contrast. Finally, to improve the accuracy of visibility estimation, multiple nonlinear regression (MNLR) is performed on the various visibility indicators obtained by the two methods. Extensive on-site measurements analysis confirms the advantages of TSVE. Compared with other visibility estimation methods, such as the laser atmospheric transmission theory and image analysis method, TSVE significantly decreases the estimation errors.
APA, Harvard, Vancouver, ISO, and other styles
50

KULKARNI, SHIVALI D., AMEYA K. NAIK, and NITIN S. NAGORI. "2D IMAGE TRANSMISSION USING BANDWIDTH EFFICIENT MAPPING TECHNIQUE." International Journal of Image and Graphics 10, no. 04 (October 2010): 559–73. http://dx.doi.org/10.1142/s0219467810003883.

Full text
Abstract:
Transmitting images over the wireless channel require that optimum compression ratio be maintained along with good image quality. This becomes a critical issue especially at higher values of bit error rate (BER). Joint photographic experts group (JPEG) standard and its successor JPEG 2000 provide excellent compression ratio but image reconstruction becomes highly difficult under extreme noise conditions. We present a mapping technique which gives better compression as compared to the existing techniques. Also, its performance is excellent even for higher bit error rates (BERs). This is supported by the results presented for JPEG, JPEG 2000, as well as mapping technique under fading channel conditions. Moreover, it is observed that the presence of high levels of noise has negligible effect on the reconstruction of images encoded using mapping technique.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography