To see the other types of publications on this topic, follow the link: JPEG.

Journal articles on the topic 'JPEG'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'JPEG.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

LICKS, Renata, Vania FONTANELLA, Célia Regina Winck MAHL, and Sérgio MIGUENS JUNIOR. "A Manipulação Temporária de Arquivos JPEG afeta a densidade optica das imagens?" Revista da Faculdade de Odontologia de Porto Alegre 46, no. 1 (January 26, 2005): 5–7. http://dx.doi.org/10.22456/2177-0018.7601.

Full text
Abstract:
Para avaliar se a manipulação temporária de imagens digitais armazenadas no formato JPEG altera a sua densidade óptica, 26 radiografias periapicais de arquivo foram digitalizadas através de scanner, armazenadas no formato JPEG 12 e digfitalmente reproduzidas três vezes. Um dos conjuntos não sofreu alterações e foi denominado JPEGd. Nos demais, as imagens foram importadas para o programa Adobe Photoshop e submetidas a uma ou duas alterações, as quais foram desfeitas, sendo salvas, constituindo os conjuntos JPEG1a e JPEG2a, respectivamente. O programa ImageLab foi utilizado para a subtração digital dos seguintes pares de imagens: JPEG x JPEGd; JPEG x JPEG1a e JPEG x JPEG2a. Foram obtidos os valores médios de densidade óptica, bem como o desvio-padrão de cada imagem. Em todas elas o valor médio foi 128, contudo observou-se variabilidade quanto ao desvio-padrão. Os desvios-padrão médios (0,50, 1,47 e 1,50, para JPEGd, JPEG1a e JPEG2a, respectivamente) de cada grupo foram submetidos à Análise de Variância, utilizando o delineamento em blocos casualizados, complementada pelo Teste de Comparações Múltiplas Dunnet T3. Foram encontradas diferenças significativas nos valores de desvio-padrão entre os grupos JPEG x JPEGd e JPEG x JPEG1a/JPEG x JPEG2a. Conclui-se que a manipulação de arquivos JPEG não interfere no valor médio de densidade óptica, contudo leva ao aumento do seu desvio-padrão, o que pode interferir nos estudos dessa natureza.
APA, Harvard, Vancouver, ISO, and other styles
2

Jamil, Sonain, Oh-Jin Kwon, Jinhee Lee, Faiz Ullah, Yaseen, and Afnan. "A Novel Multimedia Player for International Standard—JPEG Snack." Journal of Imaging 9, no. 3 (March 1, 2023): 58. http://dx.doi.org/10.3390/jimaging9030058.

Full text
Abstract:
The advancement in mobile communication and technologies has led to the usage of short-form digital content increasing daily. This short-form content is mainly based on images that urged the joint photographic experts’ group (JPEG) to introduce a novel international standard, JPEG Snack (International Organization for Standardization (ISO)/ International Electrotechnical Commission (IEC) IS, 19566-8). In JPEG Snack, the multimedia content is embedded into a main background JPEG file, and the resulting JPEG Snack file is saved and transmitted as a .jpg file. If someone does not have a JPEG Snack Player, their device decoder will treat it as a JPEG file and display a background image only. As the standard has been proposed recently, the JPEG Snack Player is needed. In this article, we present a methodology to develop JPEG Snack Player. JPEG Snack Player uses a JPEG Snack decoder and renders media objects on the background JPEG file according to the instructions in the JPEG Snack file. We also present some results and computational complexity metrics for the JPEG Snack Player.
APA, Harvard, Vancouver, ISO, and other styles
3

Pinheiro, Antonio. "JPEG column: 87th JPEG meeting." ACM SIGMultimedia Records 12, no. 2 (June 2020): 1. http://dx.doi.org/10.1145/3548562.3548566.

Full text
Abstract:
The 87th JPEG meeting initially planned to be held in Erlangen, Germany, was held online from 25-30, April 2020 because of the Covid-19 outbreak. JPEG experts participated in a number of online meetings attempting to make them as effective as possible while considering participation from different time zones, ranging from Australia to California, U.S.A.
APA, Harvard, Vancouver, ISO, and other styles
4

Pinheiro, Antonio. "JPEG column: 89th JPEG meeting." ACM SIGMultimedia Records 12, no. 4 (December 2020): 1. http://dx.doi.org/10.1145/3548580.3548583.

Full text
Abstract:
JPEG initiates standardisation of image compression based on AI. The 89th JPEG meeting was held online from 5 to 9 October 2020. During this meeting, multiple JPEG standardisation activities and explorations were discussed and progressed. Notably, the call for evidence on learning-based image coding was successfully completed and evidence was found that this technology promises several new functionalities while offering at the same time superior compression efficiency, beyond the state of the art. A new work item, JPEG AI, that will use learning-based image coding as core technology has been proposed, enlarging the already wide families of JPEG standards.
APA, Harvard, Vancouver, ISO, and other styles
5

Pinheiro, Antonio. "JPEG column: 88th JPEG meeting." ACM SIGMultimedia Records 12, no. 3 (September 2020): 1. http://dx.doi.org/10.1145/3548570.3548574.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pinheiro, Antonio. "JPEG column: 74th JPEG meeting." ACM SIGMultimedia Records 8, no. 4 (July 28, 2017): 1. http://dx.doi.org/10.1145/3129151.3129154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pinheiro, Antonio. "JPEG Column: 91st JPEG Meeting." ACM SIGMultimedia Records 13, no. 2 (June 2021): 1. http://dx.doi.org/10.1145/3577941.3577945.

Full text
Abstract:
The 91st JPEG meeting was held online from 19 to 23 April 2021. This meeting saw several activities relating to holographic coding, notably the release of the JPEG Pleno Holography Call for Proposals, consolidated with the definition of the use cases and requirements for holographic coding and common test conditions that will assure the evaluation of the future proposals.
APA, Harvard, Vancouver, ISO, and other styles
8

Pinheiro, Antonio. "JPEG Column: 90th JPEG Meeting." ACM SIGMultimedia Records 13, no. 1 (March 2021): 1. http://dx.doi.org/10.1145/3577934.3577937.

Full text
Abstract:
The 90th JPEG meeting was held online from 18 to 22 January 2021. This meeting was distinguished by very relevant activities, notably the new JPEG AI standardization project planning, and the analysis of the Call for Evidence on JPEG Pleno Point Cloud Coding.
APA, Harvard, Vancouver, ISO, and other styles
9

Pinheiro, Antonio. "JPEG Column: 93rd JPEG Meeting." ACM SIGMultimedia Records 13, no. 4 (December 2021): 1. http://dx.doi.org/10.1145/3578508.3578512.

Full text
Abstract:
The 93rd JPEG meeting was held online from 18 to 22 October 2021. The JPEG Committee continued its work on the development of new standardised solutions for the representation of visual information. Notably, the JPEG Committee has decided to release a new call for proposals on point cloud coding based on machine learning technologies that targets both compression efficiency and effective performance for 3D processing as well as machine and computer vision tasks. This activity will be conducted in parallel with JPEG AI standardization. Furthermore, it was also decided to pursue the development of a new standard in the context of the exploration on JPEG Fake News activity.
APA, Harvard, Vancouver, ISO, and other styles
10

Pinheiro, Antonio. "JPEG Column: 92nd JPEG Meeting." ACM SIGMultimedia Records 13, no. 3 (September 2021): 1. http://dx.doi.org/10.1145/3578495.3578501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Pinheiro, Antonio. "JPEG Column: 95th JPEG Meeting." ACM SIGMultimedia Records 14, no. 2 (June 2022): 1. http://dx.doi.org/10.1145/3630653.3630657.

Full text
Abstract:
The 95 th JPEG meeting was held online from 25 to 29 April 2022. A Call for Proposals (CfP) was issued for JPEG Fake Media that aims at a standardisation framework for secure annotation of modifications in media assets. With this new initiative, JPEG endeavours to provide standardised means for the identification of the provenance of media assets that include imaging information. Assuring the provenance of the coded information is essential considering the current trends and possibilities on multimedia technology.
APA, Harvard, Vancouver, ISO, and other styles
12

Pinheiro, Antonio. "JPEG Column: 96th JPEG Meeting." ACM SIGMultimedia Records 14, no. 3 (September 2022): 1. http://dx.doi.org/10.1145/3630658.3630664.

Full text
Abstract:
The 96 th JPEG meeting was held online from 25 to 29 July 2022. The meeting was one of the most productive in the recent history of JPEG with the analysis of the responses of two Calls for Proposals (CfP) for machine learning-based coding solutions, notably JPEG AI and JPEG Pleno Point Cloud Coding. The superior performance of the CfP responses compared to the state-of-the-art anchors leave little doubt about the future of coding technologies becoming dominated by machine learning-based solutions with the expected consequences on the standardisation pathway. A new era of multimedia coding standardisation has begun. Both activities had defined a verification model, and are pursuing a collaborative process that will select the best technologies for the definition of the new machine learning-based standards.
APA, Harvard, Vancouver, ISO, and other styles
13

Pinheiro, Antonio. "JPEG Column: 94th JPEG Meeting." ACM SIGMultimedia Records 14, no. 1 (March 2022): 1. http://dx.doi.org/10.1145/3630646.3630650.

Full text
Abstract:
The 94 th JPEG meeting was held online from 17 to 21 January 2022. A major milestone has been reached at this meeting with the release of the final call for proposals under the JPEG AI project. This standard aims at the joint standardization of the first image coding standard based on machine learning by the IEC, ISO and ITU, offering a single stream, compact compressed domain representation, targeting both human visualization with significant compression efficiency improvement over image coding standards in common use at equivalent subjective quality and effective performance for image processing and computer vision tasks.
APA, Harvard, Vancouver, ISO, and other styles
14

MAEDA, Toshiyuki. "JPEG Codec." Journal of Japan Society for Fuzzy Theory and Systems 11, no. 2 (1999): 259–62. http://dx.doi.org/10.3156/jfuzzy.11.2_75.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Ono, Fumitaka. "JPEG 2000." Journal of The Institute of Image Information and Television Engineers 64, no. 9 (2010): 1339–43. http://dx.doi.org/10.3169/itej.64.1339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Chen, Zhipeng, Yao Zhao, and Rongrong Ni. "Detection of operation chain: JPEG-Resampling-JPEG." Signal Processing: Image Communication 57 (September 2017): 8–20. http://dx.doi.org/10.1016/j.image.2017.04.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Steingrímsson, Úlfar, and Klaus Simon. "Perceptive Quality Estimations: JPEG 2000 versus JPEG." Journal of Imaging Science and Technology 47, no. 6 (November 1, 2003): 572–85. http://dx.doi.org/10.2352/j.imagingsci.technol.2003.47.6.art00015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Pinheiro, Antonio. "JPEG column: 82nd JPEG meeting in Lisbon, Portugal." ACM SIGMultimedia Records 11, no. 1 (March 2019): 1. http://dx.doi.org/10.1145/3458462.3458468.

Full text
Abstract:
JPEG has been the most common representation format of digital images for more than 25 years. Other image representation formats have been standardised by JPEG committee like JPEG 2000 or more recently JPEG XS. Furthermore, JPEG has been extended with new functionalities like HDR or alpha plane coding with the JPEG XT standard, and more recently with a reference software. Another solutions have been also proposed by different players with limited success. The JPEG committee decided it is the time to create a new working item, named JPEG XL, that aims to develop an image coding standard with increased quality and flexibility combined with a better compression efficiency. The evaluation of the call for proposals responses had already confirmed the industry interest, and development of core experiments has now begun. Several functionalities will be considered, like support for lossless transcoding of images represented with JPEG standard.
APA, Harvard, Vancouver, ISO, and other styles
19

Uzun, Erkam, and Husrev Taha Sencar. "Jpg$Scraper$ : An Advanced Carver for JPEG Files." IEEE Transactions on Information Forensics and Security 15 (2020): 1846–57. http://dx.doi.org/10.1109/tifs.2019.2953382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Marcelo, Alvin, Paul Fontelo, Miguel Farolan, and Hernani Cualing. "Effect of Image Compression on Telepathology." Archives of Pathology & Laboratory Medicine 124, no. 11 (November 1, 2000): 1653–56. http://dx.doi.org/10.5858/2000-124-1653-eoicot.

Full text
Abstract:
Abstract Context.—For practitioners deploying store-and-forward telepathology systems, optimization methods such as image compression need to be studied. Objective.—To determine if Joint Photographic Expert Group (JPG or JPEG) compression, a lossy image compression algorithm, negatively affects the accuracy of diagnosis in telepathology. Design.—Double-blind, randomized, controlled trial. Setting.—University-based pathology departments. Participants.—Resident and staff pathologists at the University of Illinois, Chicago, and University of Cincinnati, Cincinnati, Ohio. Intervention.—Compression of raw images using the JPEG algorithm. Main Outcome Measures.—Image acceptability, accuracy of diagnosis, confidence level of pathologist, image quality. Results.—There was no statistically significant difference in the diagnostic accuracy between noncompressed (bit map) and compressed (JPG) images. There were also no differences in the acceptability, confidence level, and perception of image quality. Additionally, rater experience did not significantly correlate with degree of accuracy. Conclusions.—For providers practicing telepathology, JPG image compression does not negatively affect the accuracy and confidence level of diagnosis. The acceptability and quality of images were also not affected.
APA, Harvard, Vancouver, ISO, and other styles
21

Balsa, Jose, Tomás Domínguez-Bolaño, Óscar Fresnedo, José A. García-Naya, and Luis Castedo. "Transmission of Still Images Using Low-Complexity Analog Joint Source-Channel Coding." Sensors 19, no. 13 (July 3, 2019): 2932. http://dx.doi.org/10.3390/s19132932.

Full text
Abstract:
An analog joint source-channel coding (JSCC) system designed for the transmission of still images is proposed and its performance is compared to that of two digital alternatives which differ in the source encoding operation: Joint Photographic Experts Group (JPEG) and JPEG without entropy coding (JPEGw/oEC), respectively, both relying on an optimized channel encoder–modulator tandem. Apart from a visual comparison, the figures of merit considered in the assessment are the structural similarity (SSIM) index and the time required to transmit an image through additive white Gaussian noise (AWGN) and Rayleigh channels. This work shows that the proposed analog system exhibits a performance similar to that of the digital scheme based on JPEG compression with a noticeable better visual degradation to the human eye, a lower computational complexity, and a negligible delay. These results confirm the suitability of analog JSCC for the transmission of still images in scenarios with severe constraints on power consumption, computational capabilities, and for real-time applications. For these reasons the proposed system is a good candidate for surveillance systems, low-constrained devices, Internet of things (IoT) applications, etc.
APA, Harvard, Vancouver, ISO, and other styles
22

Pan, Yuanfeng, and Jiangqun Ni. "Domain Transformation of Distortion Costs for Efficient JPEG Steganography with Symmetric Embedding." Symmetry 16, no. 5 (May 7, 2024): 575. http://dx.doi.org/10.3390/sym16050575.

Full text
Abstract:
Nowadays, most image steganographic schemes embed secret messages by minimizing a well-designed distortion cost function for the corresponding domain, i.e., the spatial domain for spatial image steganography or the JPEG (Joint Photographic Experts Group) domain for JPEG image steganography. In this paper, we break the boundary between these two types of schemes by establishing a theoretical link between the distortion costs in the spatial domain and those in the JPEG domain and thus propose a scheme for domain transformations of distortion costs for efficient JPEG steganography with symmetric embedding, which can directly convert the spatial distortion cost into its JPEG counterpart. Specifically, by formulating the distortion cost function for JPEG images in the decompressed spatial domain, a closed-form expression for a distortion cost cross-domain transformation is derived theoretically, which precisely characterizes the conversion from the distortion costs obtained by existing spatial steganographic schemes to those applied in JPEG steganography. Experimental results demonstrate that the proposed method outperforms other advanced JPEG steganographic schemes, e.g., JUNIWARD (JPEG steganography with Universal Wavelet Relative Distortion), JMiPOD (JPEG steganography by Minimizing the Power of the Optimal Detector), and DCDT (Distortion Cost Domain Transformation), in resisting the detection of various advanced steganalyzers.
APA, Harvard, Vancouver, ISO, and other styles
23

Pinheiro, Antonio. "JPEG Column." ACM SIGMultimedia Records 9, no. 2 (December 8, 2017): 1. http://dx.doi.org/10.1145/3173058.3173062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Pinheiro, Antonio. "JPEG column." ACM SIGMultimedia Records 10, no. 4 (January 28, 2019): 9. http://dx.doi.org/10.1145/3310195.3310204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Pinheiro, Antonio. "JPEG column." ACM SIGMultimedia Records 10, no. 2 (August 3, 2018): 5. http://dx.doi.org/10.1145/3264706.3264711.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Pinheiro, Antonio. "JPEG column." ACM SIGMultimedia Records 10, no. 1 (April 23, 2018): 7. http://dx.doi.org/10.1145/3210241.3210248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Ebrahimi, Touradj, Charilaos Christopoulos, and Daniel T. Lee. "JPEG 2000." Signal Processing: Image Communication 17, no. 1 (January 2002): 1–2. http://dx.doi.org/10.1016/s0923-5965(01)00031-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Pinheiro, Antonio. "JPEG column." ACM SIGMultimedia Records 10, no. 3 (December 12, 2018): 12. http://dx.doi.org/10.1145/3300001.3300013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Pinheiro, Antonio. "JPEG column." ACM SIGMultimedia Records 9, no. 3 (January 9, 2018): 3. http://dx.doi.org/10.1145/3178422.3178425.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Pinheiro, Antonio. "JPEG column." ACM SIGMultimedia Records 9, no. 1 (October 5, 2017): 10. http://dx.doi.org/10.1145/3149647.3149657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Ullah, Faiz, Oh-Jin Kwon, and Seungcheol Choi. "Generation of a Panorama Compatible with the JPEG 360 International Standard Using a Single PTZ Camera." Applied Sciences 11, no. 22 (November 21, 2021): 11019. http://dx.doi.org/10.3390/app112211019.

Full text
Abstract:
Recently, the JPEG working group (ISO/IEC JTC1 SC29 WG1) developed an international standard, JPEG 360, that specifies the metadata and functionalities for saving and sharing 360-degree images efficiently to create a more realistic environment in various virtual reality services. We surveyed the metadata formats of existing 360-degree images and compared them to the JPEG 360 metadata format. We found that existing omnidirectional cameras and stitching software packages use formats that are incompatible with the JPEG 360 standard to embed metadata in JPEG image files. This paper proposes an easy-to-use tool for embedding JPEG 360 standard metadata for 360-degree images in JPEG image files using a JPEG-defined box format: the JPEG universal metadata box format. The proposed implementation will help 360-degree cameras and software vendors provide immersive services to users in a standardized manner for various markets, such as entertainment, education, professional training, navigation, and virtual and augmented reality applications. We also propose and develop an economical JPEG 360 standard compatible panoramic image acquisition system from a single PTZ camera with a special-use case of a wide field of view image of a conference or meeting. A remote attendee of the conference/meeting can see the realistic and immersive environment through our PTZ panorama in virtual reality.
APA, Harvard, Vancouver, ISO, and other styles
32

Pinheiro, Antonio. "JPEG column: 86th JPEG meeting in Sydney, Australia." ACM SIGMultimedia Records 12, no. 1 (March 2020): 1. http://dx.doi.org/10.1145/3548555.3548558.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Pinheiro, Antonio. "JPEG column: 83rd JPEG meeting in Geneva, Switzerland." ACM SIGMultimedia Records 11, no. 2 (June 2019): 1. http://dx.doi.org/10.1145/3524274.3524282.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Yousfi, Yassine, and Jessica Fridrich. "JPEG Steganalysis Detectors Scalable With Respect to Compression Quality." Electronic Imaging 2020, no. 4 (January 26, 2020): 75–1. http://dx.doi.org/10.2352/issn.2470-1173.2020.4.mwsf-075.

Full text
Abstract:
Practical steganalysis inevitably involves the necessity to deal with a diverse cover source. In the JPEG domain, one key element of the diversification is the JPEG quality factor, or, more generally, the JPEG quantization table used for compression. This paper investigates experimentally the scalability of various steganalysis detectors w.r.t. JPEG quality. In particular, we report that CNN detectors as well as older feature-based detectors have the capacity to contain the complexity of multiple JPEG quality factors within a single model when the quality factors are properly grouped based on their quantization tables. Detectors trained on multiple JPEG qualities show no loss of detection accuracy when compared with dedicated detectors trained for a specific JPEG quality factor. We also demonstrate that CNNs (but not so much feature-based classifiers) trained on multiple qualities can generalize to unseen custom quantization tables compared to detectors trained for specific JPEG qualities. Their ability to generalize to very different quantization tables, however, remains a challenging task. A semi-metric comparing quantization tables is introduced and used to interpret our results.
APA, Harvard, Vancouver, ISO, and other styles
35

Wang, Jie, Chunfang Yang, Ping Wang, Xiaofeng Song, and Jicang Lu. "Payload location for JPEG image steganography based on co-frequency sub-image filtering." International Journal of Distributed Sensor Networks 16, no. 1 (January 2020): 155014771989956. http://dx.doi.org/10.1177/1550147719899569.

Full text
Abstract:
In digital steganography, due to difficulties estimating the JPEG cover image, it is still very hard to accurately locate the hidden message embedded in a JPEG image. Therefore, this study proposes a payload location method for a category of pseudo-random scrambled JPEG image steganography. In order to estimate the quantized discrete cosine transform coefficients in the cover JPEG image, a cover JPEG image estimation method is proposed based on co-frequency sub-image filtering. The proposed payload location method defines a general residual, uses the estimated cover JPEG image to compute the residuals, and then employs the mean residuals of multiple stego images embedded along the same path to distinguish the stego positions. The proposed cover JPEG image estimation method constructs 64 co-frequency sub-images, and then filters the sub-image to estimate the cover JPEG image. Finally, using these methods, payload location algorithms are designed for two common JPEG image steganography algorithms: JSteg and F5. Experimental results show that the proposed location algorithms can effectively locate the stego positions in both JSteg and F5 steganography when the investigator possesses multiple stego images embedded along the same path. In addition, the location results can also be used to recover the steganography key to extract the embedded secret messages.
APA, Harvard, Vancouver, ISO, and other styles
36

Jiang, Yue, Xuehu Yan, Jia Chen, Jingwen Cheng, and Jianguo Zhang. "Meaningful secret image sharing for JPEG images with arbitrary quality factors." Mathematical Biosciences and Engineering 19, no. 11 (2022): 11544–62. http://dx.doi.org/10.3934/mbe.2022538.

Full text
Abstract:
<abstract><p>JPEG is the most common format for storing and transmitting photographic images on social network platforms. JPEG image is widely used in people's life because of their low storage space and high visual quality. Secret image sharing (SIS) technology is important to protect image data. Traditional SIS schemes generally focus on spatial images, however there is little research on frequency domain images. In addition, the current tiny research on SIS for JPEG images only focuses on JPEG images with a compression quality factor ($ QF $) of $ 100 $. To overcome the limitation of JPEG images in SIS, we propose a meaningful SIS for JPEG images to operate the quantized DCT coefficients of JPEG images. The random elements utilization model is applied to achieve meaningful shadow images. Our proposed scheme has a better quality of the shadow images and the recovered secret image. Experiment results and comparisons indicate the effectiveness of the scheme. The scheme can be used for JPEG images with any compression $ QF $. Besides, the scheme has good characteristics, such as $ (k, n) $ threshold, extended shadow images.</p></abstract>
APA, Harvard, Vancouver, ISO, and other styles
37

Jena, Riyanka, Priyanka Singh, and Manoranjan Mohanty. "PP-JPEG: A Privacy-Preserving JPEG Image-Tampering Localization." Journal of Imaging 9, no. 9 (August 27, 2023): 172. http://dx.doi.org/10.3390/jimaging9090172.

Full text
Abstract:
The widespread availability of digital image-processing software has given rise to various forms of image manipulation and forgery, which can pose a significant challenge in different fields, such as law enforcement, journalism, etc. It can also lead to privacy concerns. We are proposing that a privacy-preserving framework to encrypt images before processing them is vital to maintain the privacy and confidentiality of sensitive images, especially those used for the purpose of investigation. To address these challenges, we propose a novel solution that detects image forgeries while preserving the privacy of the images. Our method proposes a privacy-preserving framework that encrypts the images before processing them, making it difficult for unauthorized individuals to access them. The proposed method utilizes a compression quality analysis in the encrypted domain to detect the presence of forgeries in images by determining if the forged portion (dummy image) has a compression quality different from that of the original image (featured image) in the encrypted domain. This approach effectively localizes the tampered portions of the image, even for small pixel blocks of size 10×10 in the encrypted domain. Furthermore, the method identifies the featured image’s JPEG quality using the first minima in the energy graph.
APA, Harvard, Vancouver, ISO, and other styles
38

Fitriyanto, Rachmad, Anton Yudhana, and Sunardi Sunardi. "Boyer-Moore String Matching Algorithm and SHA512 Implementation for Jpeg/exif File Fingerprint Compilation in DSA." Scientific Journal of Informatics 7, no. 1 (June 5, 2020): 1–9. http://dx.doi.org/10.15294/sji.v7i1.19059.

Full text
Abstract:
Data integrity, authenticity and non-repudiation are security parameters that provided by Digital Signature Algorithm (DSA). Hash value is important element inside DSA to identify information data integrity using hash function to generate message digest. Jpeg/exif is image file format that produce by digital camera as in smartphone. Hardware technology development made image file have higher resolution than before. This condition made image file fingerprinting need more time to compile jpeg/exif fingerprint. This research purpose is to develop fingerprinting process for jpeg/exif file using Boyer-Moore string matching algorithm and SHA512. Research conducted in four stages. First stage is jpeg/exif file structure identification, second stage is segment content acquisition and hashing, third stage is image file modification experiments and last stage is jpeg/exif file fingerprint compilation. Obtained result shown that jpeg/exif file fingerprint comprises of three hash value from SOI segment, APP1 segment and SOF0 segment. The jpeg/exif file fingerprint can use to detect six types image modification there are image resizing, text addition, metadata modification, image resizing, image cropping and file file type conversion.
APA, Harvard, Vancouver, ISO, and other styles
39

Yang, Jianhua, Fei Shang, Yi Liao, and Yifang Chen. "Toward High Capacity and Robust JPEG Steganography Based on Adversarial Training." Security and Communication Networks 2023 (February 21, 2023): 1–12. http://dx.doi.org/10.1155/2023/3813977.

Full text
Abstract:
JPEG steganography has become a research hotspot in the field of information hiding. However, the capacity of conventional JPEG steganography methods is hard to meet the requirements in high-capacity application scenarios and also can not extract secret messages accurately after JPEG compression. To mitigate these problems, we propose a high-capacity and robust JPEG steganography based on adversarial training called HRJS, which implements an end-to-end framework in the JPEG domain for the first time. The encoder is responsible for embedding the secret message while the decoder can reconstruct the original secret message. To enhance robustness, an attack module forces the neural network to automatically learn how to correctly recover the secret message after an attack. Experimental results show that our method achieves near 100 % decoding accuracy against JPEG_50 compression at 1/3 bits per channel (bpc) payload while preserving the imperceptibility of the stego image. Compared with conventional JPEG steganography methods, the proposed method is feasible with high capacity (e.g., 1 bpc) and has an obvious advantage in terms of robustness against JPEG compression at the same time.
APA, Harvard, Vancouver, ISO, and other styles
40

Беляев, Н. Н., О. А. Бебенина, and В. Е. Бородкина. "DEVELOPEMENT AN ALGORITM FOR RECOGNIZING TEXT DATA IN DIGITAL GRAPHIC IMAGES." СИСТЕМЫ УПРАВЛЕНИЯ И ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ, no. 2(84) (March 1, 2021): 75–78. http://dx.doi.org/10.36622/vstu.2021.84.2.016.

Full text
Abstract:
Предложен алгоритм распознавания, реализующий процедуры: обучения выбранных классификаторов и распознавания текстовых данных, учитывающие статистические характеристики распределения коэффициентов частотной области цифровых графических изображениях формата JPEG. The article presents an approach to development an algorithm for recognizing text data within JPEG format digital graphic images. Considered a hypothesis about influence text data content in JPEG digital graphic images on the distribution of values of the discrete cosine transformation coefficients in the frequency domain JPEG images of the format. Statistical classifiers models that provide a solution to the problem of recognition of text data in JPEG images based on analysis of its frequency domain have been determined. A recognition algorithm is proposed that implements the following procedures: training of selected classifiers and recognition of text data, taking into account the statistical characteristics of the distribution of frequency domain coefficients in JPEG format images.
APA, Harvard, Vancouver, ISO, and other styles
41

Ardiansyah, Ardiansyah, Nila Hardi, and Windu Gata. "Identifikasi dan Recovery File JPEG dengan Metode Signature-Based Carving dalam Model Automata." Komputika : Jurnal Sistem Komputer 9, no. 1 (April 6, 2020): 75–83. http://dx.doi.org/10.34010/komputika.v9i1.2733.

Full text
Abstract:
Penggunaan format gambar JPEG semakin meningkat seiring dengan meningkatnya produksi foto digital yang dipicu oleh kemunculan smartphone dan perkembangan sosial media. Hal tersebut membuat file JPEG berperan penting dalam proses digital forensik, sehingga banyak metode identifikasi dan recovery file JPEG yang dikembangkan. Paper ini berusaha melihat proses data carving file JPEG dengan metode Signature-Based Carving, metode carving yang paling sederhana, dengan sebuah model diagram Finite State Automata, sebuah model algoritma dasar dalam teori komputasi.
APA, Harvard, Vancouver, ISO, and other styles
42

Safdar, Muhammad, Ming Ronnier Luo, and Xiaoyu Liu. "Performance comparison of JPEG, JPEG 2000, and newly developed CSI-JPEG by adopting different color models." Color Research & Application 42, no. 4 (November 8, 2016): 460–73. http://dx.doi.org/10.1002/col.22100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Fitriyanto, Rachmad, Anton Yudhana, and Sunardi Sunardi. "Manajemen jpeg/exif file fingerprint dengan algoritma Brute Force string matching dan Hash Function SHA256." Register: Jurnal Ilmiah Teknologi Sistem Informasi 5, no. 2 (July 1, 2019): 140. http://dx.doi.org/10.26594/register.v5i2.1707.

Full text
Abstract:
Management of jpeg/exif file fingerprint with Brute Force string matching algorithm and Hash Function SHA256Metode pengamanan berkas gambar jpeg/exif saat ini hanya mencakup aspek pencegahan, belum pada aspek deteksi integritas data. Digital Signature Algorithm (DSA) adalah metode kriptografi yang digunakan untuk memverifikasi integritas data menggunakan hash value. SHA256 merupakan hash function yang menghasilkan 256-bit hash value yang berfungsi sebagai file fingerprint. Penelitian ini bertujuan untuk menyusun file fingerprint dari berkas jpeg/exif menggunakan SHA256 dan algoritma Brute Force string matching untuk verifikasi integritas berkas jpeg/exif. Penelitian dilakukan dalam lima tahap. Tahap pertama adalah identifikasi struktur berkas jpeg/exif. Tahap kedua adalah akuisisi konten segmen. Tahap ketiga penghitungan hash value. Tahap keempat adalah eksperimen modifikasi berkas jpeg/exif. Tahap kelima adalah pemilihan elemen dan penyusunan file fingerprint. Hasil penelitian menunjukkan sebuah jpeg/exif file fingerprint tersusun atas tiga hash value. SOI (Start of Image) segment hash value digunakan untuk mendeteksi terjadinya modifikasi berkas dalam bentuk perubahan tipe berkas dan penambahan objek pada konten gambar. Hash value segmen APP1 digunakan untuk mendeteksi modifikasi pada metadata berkas. Hash value segmen SOF0 digunakan untuk mendeteksi gambar yang dimodifikasi dengan teknik recoloring, resizing, dan cropping. The method of securing jpeg/exif image files currently has covered only the prevention aspect instead of the data integrity detection aspect. Digital Signature Algorithm is a cryptographic method used to verify the data integrity using hash value. SHA256 is a hash function that produces a 256-bit hash value functioning as a fingerprint file. This study aimed at compiling fingerprint files from jpeg/exif files using SHA256 and Brute Force string matching algorithm to verify the integrity of jpeg/exif files. The research was conducted in five steps. The first step was identifying the jpeg/exif file structure. The second step was the acquisition of the segment content. The third step was calculating the hash value. The fourth step was the jpeg/exif file modification experiment. The fifth step was the selection of elements and compilation of fingerprint files. The obtained results showed a jpeg/exif fingerprint file which was compiled in three hash values. The hash value of SOI segment was used to detect the occurrence of file modification in the form of file type changing and object addition on the image content. The hash value of APP1 segment was used to detect the metadata file modification. The hash value of SOF0 segment was used to detect the images modified by recoloring, resizing, and cropping techniques.
APA, Harvard, Vancouver, ISO, and other styles
44

Fitriyanto, Rachmad, Anton Yudhana, and Sunardi Sunardi. "Implementation SHA512 Hash Function And Boyer-Moore String Matching Algorithm For Jpeg/exif Message Digest Compilation." Jurnal Online Informatika 4, no. 1 (September 6, 2019): 16. http://dx.doi.org/10.15575/join.v4i1.304.

Full text
Abstract:
Security information method for JPEG/exif documents generally aims to prevent security attacks by protecting documents with password and watermark. Both methods cannot be used to determine the condition of data integrity at the detection stage of the information security cycle. Message Digest is the essence of a file that has a function as a digital fingerprint to represent data integrity. This study aims to compile digital fingerprints to detect changes that occurred in JPEG / exif documents in information security. The research phase consists of five stages. The first stage, identification of the JPEG / exif document structure conducted using the Boyer-Moore string matching algorithm to find JPEG/exif segments location. The Second stage is segment content acquisition, conducted based on segment location and length obtained. The Third step, computing message digest for each segment using SHA512 hash function. Fourth stage, JPEG / exif document modification experiments to identified affected segments. The fifth stage is selecting and combining the hash value of the segment into the message digest. The obtained result shows the message digest for JPEG/exif documents composed of three hash values. The SOI segment hash value used to detect modifications for JPEG to png conversion and image editing. The APP1 hash value used to detect metadata editing. The SOF0 hash values use to detect modification for image recoloring, cropping and resizing — the combination from three hash values as JPEG/exif’s message digest.
APA, Harvard, Vancouver, ISO, and other styles
45

Марчеська, Марина, Інна Кондіус, and Леся Федік. "ДОСЛІДЖЕННЯ JPEG-АЛГОРИТМУ СТИСНЕННЯ ЦИФРОВИХ ВІДЕОЗОБРАЖЕНЬ І КОДУВАННЯ СИСТЕМ ТЕХНІЧНОГО ЗОРУ В ОС LINUX." Grail of Science, no. 36 (February 24, 2024): 203–8. http://dx.doi.org/10.36074/grail-of-science.16.02.2024.032.

Full text
Abstract:
У статті викладено актуальність застосування алгоритму стиснення JPEG для управління, зберігання і передачі візуальних даних. Досліджено алгоритм JPEG для стиснення цифрових відеозображень у контексті систем технічного зору та проведена оцінка його показників. Розглянуто кодування, як етап стиснення відеозображень завдяки алгоритму JPEG. А також використання його у ОС Linux.
APA, Harvard, Vancouver, ISO, and other styles
46

Fitriyanto, Rachmad, Anton Yudhana, and Sunardi Sunardi. "Boyer-Moore String Matching Algorithm and SHA512 Implementation for Jpeg/exif File Fingerprint Compilation in DSA." JUITA: Jurnal Informatika 8, no. 1 (May 4, 2020): 1. http://dx.doi.org/10.30595/juita.v8i1.4413.

Full text
Abstract:
The jpeg/exif is file’s format for image produced by digital camera such as in the smartphones. The security method for jpeg/exif usages in digital communication currently only full-fill prevention aspect from three aspects of information security, prevention, detection and response. Digital Signature Algorithm (DSA) is a cryptographic method that provide detection aspect of information security by using hash-value as fingerprint of digital documents. The purpose of this research is to compile jpeg/exif file data fingerprint using the hash-value from DSA. The research conducted in four stages. The first stages is the identification of jpeg/exif file structure using Boyer-Moore string matching algorithm to locate the position of file’s segments. The second stage is segment’s content acquisition. The third stage the image files modification experiments to select the suitable element of jpeg/exif file data fingerprint. The fourth stage is the compilation of hash-values to form data fingerprint. The Obtained result has shown that the jpeg/exif file fingerprint comprises three hash value from the SOI segment, APP1's segment, and the SOF0 segment. The jpeg/exif file fingerprint can use for modified image detection, include six types of image modification there are image resizing, text addition, metadata modification, image resizing, image cropping and file type conversion
APA, Harvard, Vancouver, ISO, and other styles
47

Hu, Guan Min, and Zhi Jun Xu. "A Portable JPEG Image Application System Base on SOPC Technology." Advanced Materials Research 424-425 (January 2012): 123–27. http://dx.doi.org/10.4028/www.scientific.net/amr.424-425.123.

Full text
Abstract:
In this text, we put forward a design using IP core which assigns a large amount of hardware operation to realize JPEG decoding in SOPC. Following the principle of JPEG decoding, we use hardware language to put up several decode modules. And these modules fulfill the design of JPEG decoder. The emulation indicates that the decoder has characteristics such as high performance, low cost,flexible use and high efficiency. Finally we can add touch screen, LCD and other devices into the SOPC to carry out the portable JPEG image application system
APA, Harvard, Vancouver, ISO, and other styles
48

Jiao, Shuming, Zhi Jin, Chenliang Chang, Changyuan Zhou, Wenbin Zou, and Xia Li. "Compression of Phase-Only Holograms with JPEG Standard and Deep Learning." Applied Sciences 8, no. 8 (July 30, 2018): 1258. http://dx.doi.org/10.3390/app8081258.

Full text
Abstract:
It is a critical issue to reduce the enormous amount of data in the processing, storage and transmission of a hologram in digital format. In photograph compression, the JPEG standard is commonly supported by almost every system and device. It will be favorable if JPEG standard is applicable to hologram compression, with advantages of universal compatibility. However, the reconstructed image from a JPEG compressed hologram suffers from severe quality degradation since some high frequency features in the hologram will be lost during the compression process. In this work, we employ a deep convolutional neural network to reduce the artifacts in a JPEG compressed hologram. Simulation and experimental results reveal that our proposed “JPEG + deep learning” hologram compression scheme can achieve satisfactory reconstruction results for a computer-generated phase-only hologram after compression.
APA, Harvard, Vancouver, ISO, and other styles
49

Christaline, J. Anita, R. Ramesh, and D. Vaishali. "Optimized JPEG Steganalysis." International Journal of Multimedia and Ubiquitous Engineering 11, no. 1 (January 31, 2016): 385–96. http://dx.doi.org/10.14257/ijmue.2016.11.1.37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Jia, Hong Li, and Qiang Liu. "JPEG DCT Compressiom." Advanced Materials Research 712-715 (June 2013): 2542–45. http://dx.doi.org/10.4028/www.scientific.net/amr.712-715.2542.

Full text
Abstract:
With the rapid spread of image processing applications and the further development of multimedia technologies, compression standards become more and more important. This paper intends to explain JPEG (Joint Photographic Experts Group) compression, which is currently a worldwide standard for digital image compression, is based on the discrete cosine transform (DCT). Based on the research, the paper describes theory and algorithms of the JPEG DCT compression and implements a baseline JPEG codec (encoder/decoder) with MATLAB.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography