Dissertations / Theses on the topic 'JPEG'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'JPEG.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Caplan, Paul Lomax. "JPEG : the quadruple object." Thesis, Birkbeck (University of London), 2013. http://bbktheses.da.ulcc.ac.uk/32/.
Full textGünther, Emanuel. "Entwicklung eines JPEG-Dateianalysators." Hochschule für Technik und Wirtschaft, 2021. https://htw-dresden.qucosa.de/id/qucosa%3A76129.
Full textThis work deals with the improvement and extension of an existing software project for streaming JPEG images via RTP. In the project JPEG images are read in from MJPEG files and transmitted from a server to a client. To guarantee a faultless transmission the fitness of the files for transmission should be checked. The corresponding requirements can be found in RFC 2435 in which the transmission of JPEG images via RTP is standardized. An automation of this verification is realized in an own program. Further improvements are done in regard to the executability of the project on different hardware. Internal algorithms are improved to get a smooth execution even on weaker hardware. Additionally the compatibility of the implementation of RTSP in the project with that in the VLC Media Player is established. Finally the software project is extended in terms of the encryption of the transmission. The requirements of media data encryption are analyzed and used as the base for the following considerations. There are two operations which were examined and implemented: On the one hand the SRTP protocoll which is widely used. On the other hand an own JPEG encryption. Following that the complexity of developing an own encryption method is shown by breaking the developed JPEG encryption with a replacement attack.
Jirák, Jakub. "Alternativní JPEG kodér/dekodér." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-317121.
Full textTong, Henry Hoi-Yu. "A perceptually adaptive JPEG coder." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/MQ29417.pdf.
Full textTuladhar, Punnya. "Nonattribution Properties of JPEG Quantization Tables." ScholarWorks@UNO, 2010. http://scholarworks.uno.edu/td/1261.
Full textGoodenow, Daniel P. "A reference guide to JPEG compression /." Online version of thesis, 1993. http://hdl.handle.net/1850/11714.
Full textNguyen, Anthony Ngoc. "Importance Prioritised Image Coding in JPEG 2000." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16005/1/Anthony_Nguyen_Thesis.pdf.
Full textNguyen, Anthony Ngoc. "Importance Prioritised Image Coding in JPEG 2000." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16005/.
Full textNguyen, Ricky D. (Ricky Do). "Rate control and bit allocations for JPEG transcoding." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/41667.
Full textIncludes bibliographical references (leaves 50-51).
An image transcoder that produces a baseline JPEG file from a baseline JPEG input is developed. The goal is to produce a high quality image while accurately meeting a filesize target and keeping computational complexity-especially the memory usage and number of passes at the input image--low. Building upon the work of He and Mitra, the JPEG transcoder exploits a linear relationship between the number of zero-valued quantized DCT coefficients and the bitrate. Using this relationship and a histogram of coefficients, it is possible to determine an effective way to scale the quantization tables of an image to approach a target filesize. As the image is being transcoded, an intra-image process makes minor corrections, saving more bits as needed throughout the transcoding of the image. This intra-image process decrements specific coefficients, minimizing the change in value (and hence image quality) while maximizing the savings in bitrate. The result is a fast JPEG transcoder that reliably achieves a target filesize and preserves as much image quality as possible. The proposed transcoder and several variations were tested on a set of twenty-nine images that gave a fair representation of typical JPEG photos. The evaluation metric consisted of three parts: first, the accuracy and precision of the output filesize with respect to the target filesize; second, the PSNR of the output image with respect to the original image; and third, the subjective visual image quality.
by Ricky D. Nguyen.
M.Eng.
Oh, Han, Ali Bilgin, and Michael Marcellin. "Visually Lossless JPEG 2000 for Remote Image Browsing." MDPI AG, 2016. http://hdl.handle.net/10150/621987.
Full textGondlyala, Siddharth Rao. "Enhancing the JPEG Ghost Algorithm using Machine Learning." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-20692.
Full textZakaria, Ahmad. "Batch steganography and pooled steganalysis in JPEG images." Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS079.
Full textABSTRACT:Batch steganography consists of hiding a message by spreading it out in a set of images, while pooled steganalysis consists of analyzing a set of images to conclude whether or not a hidden message is present. There are many strategies for spreading a message and it is reasonable to assume that the steganalyst does not know which one is being used, but it can be assumed that the steganographer uses the same embedding algorithm for all images. In this case, it can be shown that the most appropriate solution for pooled steganalysis is to use a single quantitative detector (i.e. one that predicts the size of the hidden message), to evaluate for each image the size, the hidden message (which can be zero if there is none), and to average the sizes (which are finally considered as scores) obtained over all the images.What would be the optimal solution if now the steganalyst could discriminate the spreading strategy among a set of known strategies. Could the steganalyst use a pooled steganalysis algorithm that is better than averaging the scores? Could the steganalyst obtain results close to the so-called "clairvoyant" scenario where it is assumed that the steganalyst knows exactly the spreading strategy?In this thesis, we try to answer these questions by proposing a pooled steganalysis architecture based on a quantitative image detector and an optimized score pooling function. The first contribution is a study of quantitative steganalysis algorithms in order to decide which one is best suited for pooled steganalysis. For this purpose, we propose to extend this comparison to binary steganalysis algorithms and we propose a methodology to switch from binary steganalysis results to quantitative steganalysis and vice versa.The core of the thesis lies in the second contribution. We study the scenario where the steganalyst does not know the spreading strategy. We then propose an optimized pooling function of the results based on a set of spreading strategies which improves the accuracy of the pooled steganalysis compared to a simple average. This pooling function is computed using supervised learning techniques. Experimental results obtained with six different spreading strategies and a state-of-the-art quantitative detector confirm our hypothesis. Our pooling function gives results close to a clairvoyant steganalyst who is supposed to know the spreading strategy.Keywords: Multimedia Security, Batch Steganography, Pooled Steganalysis, Machine Learning
Nilsson, Henrik. "Gaze-based JPEG compression with varying quality factors." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18237.
Full textKinney, Albert C. "Analysis of M-JPEG video over an ATM network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA392117.
Full textThesis advisor(s): McEachen, John C. "June 2001." Includes bibliographical references (p. 83-84). Also Available in print.
Andersson, Mikael, and Per Karlström. "Parallel JPEG Processing with a Hardware Accelerated DSP Processor." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2615.
Full textThis thesis describes the design of fast JPEG processing accelerators for a DSP processor.
Certain computation tasks are moved from the DSP processor to hardware accelerators. The accelerators are slave co processing machines and are controlled via a new instruction set. The clock cycle and power consumption is reduced by utilizing the custom built hardware. The hardware can perform the tasks in fewer clock cycles and several tasks can run in parallel. This will reduce the total number of clock cycles needed.
First a decoder and an encoder were implemented in DSP assembler. The cycle consumption of the parts was measured and from this the hardware/software partitioning was done. Behavioral models of the accelerators were then written in C++ and the assembly code was modified to work with the new hardware. Finally, the accelerators were implemented using Verilog.
Extension of the accelerator instructions was given following a custom design flow.
Yu, Lang. "Evaluating and Implementing JPEG XR Optimized for Video Surveillance." Thesis, Linköping University, Computer Engineering, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-54307.
Full textThis report describes both evaluation and implementation of the new coming image compression standard JPEG XR. The intention is to determine if JPEG XR is an appropriate standard for IP based video surveillance purposes. Video surveillance, especially IP based video surveillance, currently has an increasing role in the security market. To be a good standard for surveillance, the video stream generated by the camera is required to be low bit-rate, low latency on the network and at the same time keep a high dynamic display range. The thesis start with a deep insightful study of JPEG XR encoding standard. Since the standard could have different settings,optimized settings are applied to JPEG XR encoder to fit the requirement of network video surveillance. Then, a comparative evaluation of the JPEG XR versusthe JPEG is delivered both in terms of objective and subjective way. Later, part of the JPEG XR encoder is implemented in hardware as an accelerator for further evaluation. SystemVerilog is the coding language. TSMC 40nm process library and Synopsys ASIC tool chain are used for synthesize. The throughput, area, power ofthe encoder are given and analyzed. Finally, the system integration of the JPEGXR hardware encoder to Axis ARTPEC-X SoC platform is discussed.
Tovslid, Magnus Jeffs. "JPEG 2000 Quality Scalability in an IP Networking Scenario." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for elektronikk og telekommunikasjon, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18465.
Full textŽičevičius, Linas. "Atvirojo kodo JPEG realizacijų, aprašytų aparatūros aprašymo kalbomis, tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2013. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20131104_110054-48993.
Full textIn this age of technological advances more and more technologies interact with environment. It is various devices, systems, robots which are capable to process and/or interpret visual information. Visual information is very space consuming information in comparison with other types of information, so problems like storing, downloading emerges and data compression is trying to resolve these problems. These data compression solutions may be implemented using software or hardware. Hardware solutions characterized with their high speed. In future more and more technologies will be capable to interact with environment, so tools capable of fast, precise and good compression render of images will become very important. These tools may be designed and studied using hardware description languages. Furthermore, visual information processing tools becoming very complex. Reuse methodology enables easier, faster and cheaper design of such tools.
Aouadi, Imed. "Optimisation de JPEG 2000 sur système sur puce programmable." Paris 11, 2005. https://pastel.archives-ouvertes.fr/pastel-00001658.
Full textRecently the field of video, image and audio processing has experienced several significant progresses on both the algorithms and the architectures levels. One of these evolutions is the emergence of the new ISO/IEC JPEG2000 image compression standard which succeeds to JPEG. This new standard presents many functionalities and features which allows it to be adapted to a large spectrum of applications. However, these features bring up new algorithmic complexities of higher degree than those of JPEG which in turn makes it very difficult to be optimized for certain implementations under very hard constraints. Those constraints could be area, timing or power constraints or more likely all of them. One of the key steps during the JPEG2000 processing is entropy coding that takes about 70 % of the total execution time when compressing an image. It is therefore essential to analyze the potentialities of optimizations of implementations of JPEG2000. FPGA devices are currently the main reconfigurable circuits available on the market. Although they have been used for a long time only for ASIC prototyping, they are able today to provide an effective solution to the hardware implementation of applications in many fields. Considering the progress experienced by the FPGA semiconductor industry on integration capacity and working frequency, reconfigurable architectures are now an effective and competitive solution to meet the needs of both prototyping and final hardware implementations. In this work we propose a methodology for the study of the possibilities of implementation of JPEG2000. This study starts with the evaluation of software implementations on commercial platforms
Taylor, James Cary, Jacklynn Hall, and Tony Yuan. "Dean's Innovation Challenge: Researching the JPEG 2000 Image Decoder." Thesis, The University of Arizona, 2012. http://hdl.handle.net/10150/244833.
Full textFawcett, Roger James. "Efficient practical image compression." Thesis, University of Oxford, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.365711.
Full textAgostini, Luciano Volcan. "Projeto de arquiteturas integradas para a compressão de imagens JPEG." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2002. http://hdl.handle.net/10183/11431.
Full textThis dissertation presents the design of architectures for JPEG image compression. Architectures for a gray scale images JPEG compressor that were developed are herein presented. This work also addresses a color images JPEG compressor and a color space converter. The designed architectures are described in detail and they were completely described in VHDL, with synthesis directed for Altera Flex10KE family of FPGAs. The integrated architecture for gray scale images JPEG compressor has a minimum latency of 237 clock cycles and it processes an image of 640x480 pixels in 18,5ms, allowing a processing rate of 54 images per second. The compression rate, according to estimates, would be of 6,2 times or 84%, in percentage of bits compression. The integrated architecture for color images JPEG compression was generated starting from incremental changes in the architecture of gray scale images compressor. This architecture also has the minimum latency of 237 clock cycles and it can process a color image of 640 x 480 pixels in 54,4ms, allowing a processing rate of 18,4 images per second. The compression rate, according to estimates, would be of 14,4 times or 93%, in percentage of bits compression. The architecture for space color conversor from RBG to YCbCr has a latency of 6 clock cycles and it is able to process a color image of 640 x 480 pixels in 84,6ms, allowing a processing rate of 11,8 images per second. This architecture was finally not integrated with the color images compressor architecture, but some suggestions, alternatives and estimates were made in this direction.
Haddad, Sahar. "Protection of encrypted and/or compressed medical images by means of watermarking." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0184.
Full textThe rapid growth of information and communication technologies have offered new possibilities to store, access and transfer medical images over networks. In this context, data leaks, robbery as well as data manipulations represent a real danger needing thus new protection solutions, in terms of data confidentiality, reliability control and data traceability. The work conducted during this Ph.D. thesis aims at the combination, or even the fusion of watermarking and data encryption for medical image security. Nevertheless, the deployment of these protection mechanisms in the healthcare domain should take into account its specificities. Particularly, as medical images constitute large volumes of data, they are usually encoded in lossy or lossless compressed form so as to minimize transmission and storage costs. The first part of this work focused on joint watermarking-compression of medical images so as to be able to verify image reliability from the compressed bitstream without decompressing it, even partially. In the continuity of this work, we were interested in verifying the reliability of compressed and encrypted images while maintaining their confidentiality. Its main principle is based on the insertion of two messages, containing security attributes, in the image during the image compression and encryption. Each of them is only accessible in one domain: the compressed domain or the encrypted domain, without having to decompress or decrypt the image, even partially. Note that these schemes have been developed to be compliant to the DICOM standard. A second part of these research activities focused on the reversible watermarking of encrypted medical images. The reversibility property guarantees the recovery of the original image after removing the inserted watermark. We have developed an original watermarking scheme allowing a reversible insertion of a message in an encrypted image, based on a new robust histogram shifting reversible watermarking modulation. This message is accessible in both encrypted and clear domains. Finally, in order to validate the distortion introduced by watermark embedding in the proposed solutions, we have implemented a “psychovisual” assessment protocol for medical image watermarking
CHEN, MAO-XIONG, and 陳茂雄. "The investigation of JPEG and JPEG-TEC system." Thesis, 1992. http://ndltd.ncl.edu.tw/handle/86000106695283386379.
Full textChou, Chin-tai, and 周清泰. "JPEG Study on Reducing Blocking Artifacts in JPEG Decoded Images." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/74381511550239526258.
Full text國立高雄第一科技大學
電腦與通訊工程所
93
Block-based image coding system, such as JPEG, MPEG, VQ-coder, H.263, and H.246, etc., easily causes the degradation of reconstruction image in high compression ratio (low bit-rate). So there is a discontinuous condition between block and block, which is called the blocking artifacts. In this thesis, we propose two new methods to improve the blocking artifacts, including: the methods using four-point discrete cosine transform (DCT) and using standard deviation equalizer. The DCT has the property of energy compaction on low-frequency coefficients for real-world digital images. The production of the blocking artifacts is mainly to contain high frequency components, so we will recant on the high frequency coefficients in order to reduce the blocking effects. Because the blocking artifacts are produced between block and block, there are obvious changes at the block boundary (high frequency components). We adjust high-frequency coefficient to reduce the blocking effect and keep the quality of the reconstruction image. The second method in this thesis is conceived from the inverse enhancement of an image by reducing the difference value at the boundary to approximate one standard deviation of uniform distribution. The standard deviation can represent the scattered degree of the discrete signal. At the area of larger contrast region, decaying the degree of mutual difference can reduce the contrast of the boundary so that the blocking artifacts are reduced. In the experimental results, it is shown that the two methods proposed in this thesis can really and effectively improve the blocking artifacts of the reconstruction image in the block-based coding system.
Chang, Ih-Hwa, and 張益華. "Adaptive JPEG coding system." Thesis, 1995. http://ndltd.ncl.edu.tw/handle/30356233472343637102.
Full text國立中央大學
電機工程研究所
83
JPEG has become the industrial standard for still image compression. At medium bitrate, JPEG performs well. At low bitrate, on the other hand, JPEG suffers from serious blocking effects. In this thesis, we present a JPEG-based coding system. By adding pre-/post- processing on JPEG, a simple and easy to implement system is constructed. The pre-/post- processing schemes employ two techniques - classification and subsampling. An input image is segmented into high/low activity blocks by combining the L1 norm and the mean difference method. Low activity blocks are subsampled and encoded by JPEG, while hige activity blocks are directly encoded by JPEG. As a result, it yields better, in comparison with JPEG, quality in both smooth and complex areas of image at low bitrates. Simpler schemes by applying only classification technique or subsampling technique are discussed also.
Lin, Zih-Chen, and 林子辰. "Fast JPEG 2000 Encryptor." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/03990532894756652275.
Full text國防大學中正理工學院
電子工程研究所
96
With the progress of information science, the network has become important. The image security is getting more important too. The image compression technologies change with each passing day. They do not only improve compression efficiency, but also provide different characteristics for a variety of applications. So, an efficient image encryption method should be developed according to the characteristics of the compression technique itself. JPEG 2000 is an emerging standard for still image compression. JPEG 2000 provides various functionalities to solve the problems for different image applications and possibly become a most popular image format. Therefore, JPEG 2000 image encryption has become a hot topic for the researches of image security. One of the important properties of JPEG 2000 codestream is that the two consecutive bytes in the packet body should be in the interval [0x0000, 0xFF8F] so that a standard JPEG 2000 decoder can exactly decode the JPEG 2000 compressed codestream. This is so called the compatibility of JPEG 2000 and should be followed by an effective JPEG 2000 encryption method. This thesis proposes a fast JPEG 2000 encryptor which uses cryptographical technology to encrypt most of the JPEG 2000 compressed data, and uses the hardware to improve the shortcoming of the slow performance of the software encryption methods. The experimental results show that the proposed JPEG 2000 encryptor can encrypt most of JPEG 2000 compressed data. Moreover, the encrypted JPEG 2000 images can be decoded by standard JPEG 2000 decoders and can be exactly recovered by the proposed decryptor.
Chen, IChien, and 陳怡蒨. "JPEG-Based Moment Computations." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/84349415593594808215.
Full text國立臺灣科技大學
資訊管理系
89
Computing moments is important in image processing field. Especially the low--order moments are used widely in many practical applications. In this paper, we present an efficient algorithm for computing moments in the JPEG--compressed domain directly without the need to decompress the JPEG--compressed image. Experimental results reveal that the execution time improvement is about $98.8\%$ when compared to the indirect method by decompressing the JPEG--encoded image first, then applying the conventional moment--computation algorithm on the original image. In addition, the proposed algorithm is much faster than the conventional algorithm while preserving the similar accuracy.
Ondruš, Jan. "Bezztrátová komprese JPEG grafiky." Master's thesis, 2009. http://www.nusl.cz/ntk/nusl-286256.
Full text劉姵菱. "JPEG-Based Steganographic Algorithms." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/59601611431232686953.
Full text國立清華大學
資訊工程學系
100
Steganography is a method of data hiding. It is more and more important while the Internet communication grows up. Now, many steganographic algorithms or software have already been developed including image hiding techniques for JPEG images. JPEG is the most common image format used by digital cameras and transmitted in the Internet. This thesis proposes two methods to increase the capacity of F5 embedding algorithm. The first method is a pre-processing method, we randomly modifies the qDCT coefficients before the F5 embedding algorithm to get more nonzero qDCT coefficients to embed message. In the second method, we slightly modify the end of block (EOB) information in a JPEG image to increase the capacity of embedding after the F5 embedding algorithm. We change a qDCT coefficient on each qDCT 8×8 block to embed 3 more bits of message. Although the PSNR value is slightly decreased, our proposed algorithm significantly increases the capacity of embedding compared with many classical steganographic algorithms.
Dwivedi, Harsh Vardhan. "Design of JPEG Compressor." Thesis, 2009. http://ethesis.nitrkl.ac.in/1090/1/Thesis.pdf.
Full textLian, Chung-Jr, and 連崇志. "Design and Implementation of Image Coding Systems: JPEG, JPEG 2000 and MPEG-4 VTC." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/77902516298772727288.
Full text國立臺灣大學
電機工程學研究所
91
In this dissertation, the hardware architecture design and implementation of image coding systems are presented. The research focuses on three image coding standards: JPEG, JPEG2000, and MPEG-4 Visual Texture Coding (VTC). JPEG is a well-known and matured standard. It has been widely used for natural image compression, especially very popular for digital still camera applications. In the first part of this dissertation, we proposed fully pipelined JPEG encoder and decoder for high speed image processing requirements in post-PC electronic appliances. The processing power is 50 million samples per second at 50 MHz working frequency. The proposed architectures can handle million-pixel digital images'''''''' encoding and decoding in very high speed. Other feature is that both the encoder and decoder are stand-alone and full-function solutions. They can encode or decode the JPEG compliant file without any aids from extra processor. JPEG2000 is the latest image coding standard. It is defined to be a more powerful standard after JPEG. JPEG2000 provids better compression performance, especially at low bitrates. It also provides various features, such as quality and resolution progressive, region of interest coding, lossy and lossless coding in an unified framework, etc. The performance of JPEG2000 comes at the cost of higher computational complexity. In the second part of the dissertation, we discuss the challenges and issues of the design of a JPEG2000 coding system. Cycle efficient block encoding and decoding engines, and computation reduction techniques by Tier-2 feedback are proposed for the most critical module, Embedded Block Coding with Optimized Truncation (EBCOT). With the proposed parallel checking and skipping-based coding schemes, the scanning cycles can be reduced to 40% of the direct bit-by-bit implementation. As for the Tier-2 feedback control in lossy coding mode, the execution cycles and therefore power consumption can be lowered to 50% in the case of about 10 times compression. MPEG-4 Visual Texture Coding (VTC) tool is another compression algorithm that also adopts the wavelet-based algorithm. In VTC, Zero-tree coding algorithm is adopted to generate the context symbols for arithmetic coder. In the third part, the design of the zero-tree coding algorithm is discussed. Tree-depth scan with multiple quantization mode are realized. Dedicated data access scheme are designed for smooth coding flow. In each chapter, detailed analysis of the algorithms are provided first. Then, efficient hardware architectures are proposed exploiting special algorithm characteristics. The proposed dedicated architectures can greatly improve the processing performance compared with a general processor-based solution. For non-PC consumer applications, these architectures are more competitive solutions for cost-efficient and high performance requirements.
Chen, Yi-Lei, and 陳以雷. "Tampering Detection in JPEG Images." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/43195323821600534654.
Full text國立清華大學
資訊工程學系
97
Since JPEG has been a popularly used image compression standard, tampering detection in JPEG images now plays an important role. Tampering on compressed images often involve recompression and tend to erase those tampering traces existed in uncompressed images. We could, however, try to discover new traces caused by recompression and use these traces to detect the recompression tampering. The artifacts introduced by lossy JPEG compression can be seen as an inherent signature for recompressed images. In this thesis, we first propose a robust tampered image detection approach by periodicity analysis with the compression artifacts both in spatial and DCT domain. To locate the forged regions, we then propose a forged regions localization method via quantization noise model and image restoration techniques. Finally, we conduct a series of experiments to demonstrate the validity of the proposed periodic features and quantization noise model, which all outperform the existing methods. Also, we show the effectiveness and feasibility of our forged regions localization method with proposed image restoration techniques.
Lee, Jung-Chieh, and 李榮杰. "JPEG image compression chip design." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/96388169020307901202.
Full text國立暨南國際大學
電機工程學系
93
Today we can access the real-time video news by the cell phone. When we walk down the street there is a camera mechinge, lovers or friends like to go in and take a funny picture. The digital application is ubiquity and more and more million-pixel digital cameras appear in the markets. Howerer, it take a lot of storage space and transmission bandwidth to maintain the high resolution and high quality images. Hence decreasing the amount of data is a very important topic. JPEG is a widely used still image compression and matured standard, we choice it to solve these problems for its ability to provide high compression ratio and controllable trade-off between compression and image quality. First we use C language to simulate the JPEG encoder algorithm, then we try to implement some core techniques such as Discrete Cosine Transform (DCT), quantizer, and zigzag by register transfer level (RTL) of Verilog. The designed block is verified correct by Verilog simulations and is synthesized by TSMC 0.18 standard cell library. The core is very practical and will reuse to multimedia system and digital vedio applications, and even remote sensing image processing in the satellites.
Chen, Yung-Chen, and 陳詠哲. "Wavelet-Based JPEG 2000 Image Compression." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/66542893741935624689.
Full textLopata, Jan. "Odstraňování artefaktů JPEG komprese obrazových dat." Master's thesis, 2014. http://www.nusl.cz/ntk/nusl-341236.
Full textThanh, V. T. Kieu(Vien Tat Kieu). "Post-processing of JPEG decompressed images." Thesis, 2002. https://eprints.utas.edu.au/22088/1/whole_ThanhVienTatKieu2002_thesis.pdf.
Full textTsai, Chi-Shien, and 蔡繼賢. "Image Quality Improvement for JPEG Images." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/07438556114344329220.
Full text淡江大學
資訊工程學系資訊網路與通訊碩士班
101
In this paper we proposed a method to enhance the quality of the decompressed JPEG images, which is an improved version of the method proposed by Chang et.al.. A so-called Modified Coefficient Adjustment Block is used to record the round off situation while DCT coefficients in a block are quantized according to a given quantization block. In the decompression stage, the information recorded in the Modified Coefficient Adjustment Block is then referred to adjust the de-quantized DCT coefficients before the Inverse DCT transformation. We provide two choices of parameter setting, fixed and adaptive parameters. Experimental results show that no matter whether fixed or adaptive parameters are used, our method provides significantly better results than The method proposed by Chang et al..
Jiun-HauJang and 張駿豪. "Hardware Design for JPEG Image Decoder." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/15216442530660602971.
Full text國立成功大學
電機工程學系碩博士班
101
In this paper, we propose hardware design for JPEG image decoder. The design process of decoder is handled JPEG header file. Then it handled variable length decoding and inverse quantization. We use inverse zig-zag scan rearrange the data, and use the two-dimensional inverse discrete cosine transform the data from the frequency domain values back to the apace domain values. Finally, it transformed YCbCr coordinate values into RGB coordinate values. The foregoing are completed by hardware description languages (Verilog). JPEG read file, and the data of RGB after decoding is added BMP header file let it became BMP image. The two parts are completed by high level language(C language). According to the experimental data, the average speedup of the hardware JPEG decoder is about 2.9 to 4.3 times more than that of the software JPEG decoder. The larger the pixels of the input JPEG image are, the better the performance will be, particularly during the transformation from YcbCr to RGB.
Lo, Zhi-Yao, and 羅子堯. "Securing JPEG Architecture Based on Switching Chaos." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/77569658525601132313.
Full text國立宜蘭大學
電子工程學系碩士班
104
Chaotic system has the high sensitivity to initial conditions and excellent random behaviors. It can be applied to cryptosystem. The computation of low-dimensional chaotic systems is fast, but there are some concerns on their security for the simple system parameters. The high-dimensional chaotic systems are more secure, but have more complex parameters that lead to high computation complexity. The switching chaotic system is introduced by adopting multiple low-dimensional chaotic systems, to promote the security of the system and the difficulties of attackers. JPEG is the most popular format of digital image. It is a common compress format of image which saves the storage space and transmission time greatly. The security of JPEG is an important topic for both theoretic research and practical application. For JPEG, we present an image encryption algorithm based on switching chaotic system. By the switching chaotic sequence, permutation operation and diffusion operation are performed on the JPEG images. In this thesis, we further apply the proposed switching image encryption algorithm to the JPEG internal encoder and decoder. The experimental results show that the proposed image encryption algorithm has less correlation between adjacent pixels, large key space, good key sensitivity and a better security for statistical analysis. In secure JPEG structure, the experimental results have good PSNR (Peak Signal to Noise Ratio) and less MSE (Mean Square Error).
LO, Shun-Teng, and 羅順騰. "Blocking Noise Suppression Schemes for JPEG Images." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/77855472324138344824.
Full text國立交通大學
電機與控制工程系
90
The image compression by JPEG is very common in our daily life, for example, Internet or the digital camera. JPEG, itself, is a standard of image compression to decrease the data rate. Unfortunately, annoying blocking artifacts would appear. The blocking noise makes us uncomfortable usually. It is necessary and important to remove the blocking noises. The thesis introduces several schemes for the JPEG blocking noise removal: the noise discussed here is the blocking noise resulted from the quantization of DCT coefficients. Traditionally, different filters are applied respectively to the monotone area and the edge area, aiming at smoothing the monotone area or enhancing the edge area. We propose two methods to remove the blocking noise. The first one is the use of the fuzzy rule-based filter (FRB). The fuzzy rule-based filter’s output is a weighted average the processing pixel itself and its neighborhood pixels, dependent on the gray level difference between pixels, the spatial distance and direction between pixels, and the variance in the local window. Using the LMS learning algorithm we can determine the best membership function for the FRB filter. For the second method, we only deal with pixels around the block boundaries, letting the pixels not so blocky. By the simulation results, we have demonstrated the effectiveness and robustness in blocking noise removal our proposal schemes.
Hsu, Shou-Hua, and 許修華. "Error Isolation Progressive JPEG over Wireless Communication." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/75498753504065489826.
Full text國立中央大學
電機工程學系
86
With the development of mobile communication, data transmissionover wireless channels is getting more popular recently. We face two problems in wireless communication, limited bandwidth and high error rates. When using progressive coding, the decoder can decide where to stop receiving data to save bandwidth. In this thesis, we focus on the progressive mode in JPEG image compression standard over relatively high error rate channels. We utilize synchronization technique in JPEG standard to isolate error blocks, and then use the corresponding error concealment technique based on its error position occurring in spectral selection or successive approximation progressive mode. The concealment technique improves subjective quality of reconstruction image.
Xu, Xiu-Hua, and 許修華. "Error Isolation Progressive JPEG over Wireless Communication." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/70434434214941235497.
Full textShen, Chih-yi, and 沈志益. "A Secure Steganographic Technique for JPEG Images." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/96089069159659958717.
Full text逢甲大學
通訊工程所
94
Image steganography, which differs from cryptography that directly encrypts the data transmitted, embeds important messages into a digital image that appears usual before transmission to improve the concealment of communication. Its security depends on the ability to bypass the awareness of others and to resist the detection of secret messages. Steganalysis is the art of detecting acts of secret communication. The JPEG image format is currently the most widely used storage format in the Internet. JPEG image steganography applies the JPEG format as the cover image, thus to develop an efficient, safety and useful JPEG image steganography technology is a meaningful and urgent problem. There are only a few JPEG image steganography techniques formerly proposed, yet most utilize the LSB flipping concept, which cannot resist detection attacks based on the variations of block effects. Observing the flaws mentioned above, we propose a method to remedy the problems. Our main concept is to embed as much message bits as possible while minimizing the number of modified bits. Our method is based on the data hiding method proposed by Chen, Pan and Tseng in 2002, and it only needs to adjust one coefficient of average in a block. In this way, the modified message will be sparsely distributed in the block, which significantly reduces statistical distortion that may occur at the block edges and also drastically diminishes the characteristics of repeating replacement. Experiment results show that our concept is correct and has the following properties: 1. Applying the most commonly used image storage format, the JPEG format. 2. Possesses high undetectability. 3. Is capable of resisting the Chi-square statistical detection attack. 4. Is capable of resisting the Calibration statistical detection attack. 5. Higher embedding capacity when compared with several renowned JPEG steganographic software such as J-Steg, F5 and Outguess.
Wu, Bing-Ze, and 吳秉澤. "A Tamper Detection Scheme for JPEG Images." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/24884799067982841065.
Full text大同大學
資訊工程學系(所)
98
This paper presents a tamper detection scheme that can locate the tampered areas in JPEG images. Unlike other schemes that deal with uncompressed images, the presented scheme accepts JPEG image as input. The presented scheme calculates the difference values as the watermark from the host JPEG image and embeds the watermark into the DCT frequency domain of the image. When there is a JPEG image that needs to be verified, the scheme compares the watermark to detect the tampered areas. The experimental result shows the scheme can effectively detect the tampered areas of images that have been compressed by JPEG.
LIN, NEIN-HSIEN, and 林念賢. "A Jpeg-2000-Based Deforming Mesh Streaming." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/25369764370956605840.
Full text國立臺灣大學
資訊網路與多媒體研究所
95
For PC and even mobile device, video and image streaming technologies, such as H.264 and JPEG/JPEG 2000, are already mature. However, the streaming technology for 3D model or so-called mesh data is still far from practical use. Therefore, in this paper, we propose a mesh streaming method based on JPEG 2000 standard and integrate it into an existed multimedia streaming server, so that our mesh streaming method can directly benefit from current image and video streaming technologies. In this method, the mesh data of a 3D model is first converted into a JPEG 2000 image, and then based on the JPEG 2000 streaming technique, the mesh data can then be transmitted over the Internet as a mesh streaming. Furthermore, we also extend this mesh streaming method for deforming meshes as the extension from a JPEG 2000 image to a Motion JPEG 2000 video, so that our mesh streaming method is not only for transmitting a static 3D model but also a 3D animation model. To increase the usability of our method, the mesh stream can also be inserted into a X3D scene as an extension node of X3D. Moreover, since this method is based on the JPEG 2000 standard, our system is much suitable to be integrated into any existed client-server or pear-to-pear multimedia streaming system.
Jiang, Wan-Shang, and 江萬晟. "Hardwar/Software Codesign of an JPEG Decoder." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/58679345676521432485.
Full text國立海洋大學
電機工程學系
89
The development process for consumer-electronics products is often characterized by relatively short time-to-market, because of intensive competition. An efficient development process is, therefore, crucial to the successful introduction of such a product into the marketplace. Hardware/software codesign is a development methodology which involves proper partitioning and scheduling of the hardware and software parts within a system. Through well-defined communication interfaces, the hardware and software modules can be designed, simulated, and verified in parallel and in a coordinated fashion. The results are shorter development time, lower system cost, and more efficient management of manpower. The capability to handle multimedia is a common feature of many consumer- electronics products. Due to limited storage capacity, image and sound are normally compressed in these devices. For the storage and display of still images, JPEG standard is widely supported due to its high compression ratio and relatively low distortion. This thesis describes our effort in building an embedded JPEG decoder by using a hardware/software codesign approach. In partitioning the JPEG decoding process, the inverse discrete cosine transform (IDCT) is found to be the most time-consuming computation and, therefore, together with the normalization operation, are implemented in hardware using an FPGA. On the other hand, the entropy decoding and dequantization are realized in software such that their execution overlaps the hardware operations in a pipelined fashion. The finished prototype for the embedded JPEG decoder successfully demonstrates the effectiveness of the underlying development methodology.
In, Jaehan. "Rd optimized progressive image coding using JPEG." Thesis, 1998. http://hdl.handle.net/2429/7921.
Full textHu, Guang-nan, and 胡光南. "Fast downsizing transcoder for JPEG 2000 images." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/64887184539077129199.
Full text南華大學
資訊管理學研究所
96
This paper presents a fast downsizing method for JPEG 2000 images. The proposed method is used to downsize the JPEG 2000 images under frequency domain. Compared with the traditional method, which downsizes the JPEG 2000 images under spatial domain, our proposed method can effectivelyreduce both required memory space and execution time. Experimental results reveal that the proposed frequency domain downsizing method can reduce the average execution time of the spatial domain downsizing method by 6% to 73% for images are downscaled to 1/2n×1/2n of the original image sizes.
Chih-chen, Chiang, and 江至晨. "Optimnu JPEG Watermarking Based on Genetic Algorithms." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/62374334771209270590.
Full text長榮大學
經營管理研究所
93
With the rapid growth of the Internet, Multimedia, and E-Commerce, it becomes more convenient and fast for the users to interchange the information. However, the image files are extremely huge, it is necessary to use the compression technology to reduce the file space. Digital watermarking is one of commonly used techniques to hide information in images to protect copyright. To increase the application of watermarking area, the two techniques, digital watermarking and high image compression standard of JPEG, will be integrated in the thesis. In the processing of embedding watermark, the quantization field will be obtained from Q. According to the quantization field, the coefficients of DCT will be modified in the processing of embedding the watermark. In order to embed the watermark, middle frequency and the position information of watermark are needed, and the technique of GA is used to obtain the best position for the sake of embedding watermark. By adoptting the GA algorithm, PSNR and NC value will be promoted.