Artículos de revistas sobre el tema "JPEG"

Siga este enlace para ver otros tipos de publicaciones sobre el tema: JPEG.

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "JPEG".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

LICKS, Renata, Vania FONTANELLA, Célia Regina Winck MAHL y Sérgio MIGUENS JUNIOR. "A Manipulação Temporária de Arquivos JPEG afeta a densidade optica das imagens?" Revista da Faculdade de Odontologia de Porto Alegre 46, n.º 1 (26 de enero de 2005): 5–7. http://dx.doi.org/10.22456/2177-0018.7601.

Texto completo
Resumen
Para avaliar se a manipulação temporária de imagens digitais armazenadas no formato JPEG altera a sua densidade óptica, 26 radiografias periapicais de arquivo foram digitalizadas através de scanner, armazenadas no formato JPEG 12 e digfitalmente reproduzidas três vezes. Um dos conjuntos não sofreu alterações e foi denominado JPEGd. Nos demais, as imagens foram importadas para o programa Adobe Photoshop e submetidas a uma ou duas alterações, as quais foram desfeitas, sendo salvas, constituindo os conjuntos JPEG1a e JPEG2a, respectivamente. O programa ImageLab foi utilizado para a subtração digital dos seguintes pares de imagens: JPEG x JPEGd; JPEG x JPEG1a e JPEG x JPEG2a. Foram obtidos os valores médios de densidade óptica, bem como o desvio-padrão de cada imagem. Em todas elas o valor médio foi 128, contudo observou-se variabilidade quanto ao desvio-padrão. Os desvios-padrão médios (0,50, 1,47 e 1,50, para JPEGd, JPEG1a e JPEG2a, respectivamente) de cada grupo foram submetidos à Análise de Variância, utilizando o delineamento em blocos casualizados, complementada pelo Teste de Comparações Múltiplas Dunnet T3. Foram encontradas diferenças significativas nos valores de desvio-padrão entre os grupos JPEG x JPEGd e JPEG x JPEG1a/JPEG x JPEG2a. Conclui-se que a manipulação de arquivos JPEG não interfere no valor médio de densidade óptica, contudo leva ao aumento do seu desvio-padrão, o que pode interferir nos estudos dessa natureza.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Jamil, Sonain, Oh-Jin Kwon, Jinhee Lee, Faiz Ullah, Yaseen y Afnan. "A Novel Multimedia Player for International Standard—JPEG Snack". Journal of Imaging 9, n.º 3 (1 de marzo de 2023): 58. http://dx.doi.org/10.3390/jimaging9030058.

Texto completo
Resumen
The advancement in mobile communication and technologies has led to the usage of short-form digital content increasing daily. This short-form content is mainly based on images that urged the joint photographic experts’ group (JPEG) to introduce a novel international standard, JPEG Snack (International Organization for Standardization (ISO)/ International Electrotechnical Commission (IEC) IS, 19566-8). In JPEG Snack, the multimedia content is embedded into a main background JPEG file, and the resulting JPEG Snack file is saved and transmitted as a .jpg file. If someone does not have a JPEG Snack Player, their device decoder will treat it as a JPEG file and display a background image only. As the standard has been proposed recently, the JPEG Snack Player is needed. In this article, we present a methodology to develop JPEG Snack Player. JPEG Snack Player uses a JPEG Snack decoder and renders media objects on the background JPEG file according to the instructions in the JPEG Snack file. We also present some results and computational complexity metrics for the JPEG Snack Player.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Pinheiro, Antonio. "JPEG column: 87th JPEG meeting". ACM SIGMultimedia Records 12, n.º 2 (junio de 2020): 1. http://dx.doi.org/10.1145/3548562.3548566.

Texto completo
Resumen
The 87th JPEG meeting initially planned to be held in Erlangen, Germany, was held online from 25-30, April 2020 because of the Covid-19 outbreak. JPEG experts participated in a number of online meetings attempting to make them as effective as possible while considering participation from different time zones, ranging from Australia to California, U.S.A.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Pinheiro, Antonio. "JPEG column: 89th JPEG meeting". ACM SIGMultimedia Records 12, n.º 4 (diciembre de 2020): 1. http://dx.doi.org/10.1145/3548580.3548583.

Texto completo
Resumen
JPEG initiates standardisation of image compression based on AI. The 89th JPEG meeting was held online from 5 to 9 October 2020. During this meeting, multiple JPEG standardisation activities and explorations were discussed and progressed. Notably, the call for evidence on learning-based image coding was successfully completed and evidence was found that this technology promises several new functionalities while offering at the same time superior compression efficiency, beyond the state of the art. A new work item, JPEG AI, that will use learning-based image coding as core technology has been proposed, enlarging the already wide families of JPEG standards.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Pinheiro, Antonio. "JPEG column: 88th JPEG meeting". ACM SIGMultimedia Records 12, n.º 3 (septiembre de 2020): 1. http://dx.doi.org/10.1145/3548570.3548574.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Pinheiro, Antonio. "JPEG column: 74th JPEG meeting". ACM SIGMultimedia Records 8, n.º 4 (28 de julio de 2017): 1. http://dx.doi.org/10.1145/3129151.3129154.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Pinheiro, Antonio. "JPEG Column: 91st JPEG Meeting". ACM SIGMultimedia Records 13, n.º 2 (junio de 2021): 1. http://dx.doi.org/10.1145/3577941.3577945.

Texto completo
Resumen
The 91st JPEG meeting was held online from 19 to 23 April 2021. This meeting saw several activities relating to holographic coding, notably the release of the JPEG Pleno Holography Call for Proposals, consolidated with the definition of the use cases and requirements for holographic coding and common test conditions that will assure the evaluation of the future proposals.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Pinheiro, Antonio. "JPEG Column: 90th JPEG Meeting". ACM SIGMultimedia Records 13, n.º 1 (marzo de 2021): 1. http://dx.doi.org/10.1145/3577934.3577937.

Texto completo
Resumen
The 90th JPEG meeting was held online from 18 to 22 January 2021. This meeting was distinguished by very relevant activities, notably the new JPEG AI standardization project planning, and the analysis of the Call for Evidence on JPEG Pleno Point Cloud Coding.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Pinheiro, Antonio. "JPEG Column: 93rd JPEG Meeting". ACM SIGMultimedia Records 13, n.º 4 (diciembre de 2021): 1. http://dx.doi.org/10.1145/3578508.3578512.

Texto completo
Resumen
The 93rd JPEG meeting was held online from 18 to 22 October 2021. The JPEG Committee continued its work on the development of new standardised solutions for the representation of visual information. Notably, the JPEG Committee has decided to release a new call for proposals on point cloud coding based on machine learning technologies that targets both compression efficiency and effective performance for 3D processing as well as machine and computer vision tasks. This activity will be conducted in parallel with JPEG AI standardization. Furthermore, it was also decided to pursue the development of a new standard in the context of the exploration on JPEG Fake News activity.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Pinheiro, Antonio. "JPEG Column: 92nd JPEG Meeting". ACM SIGMultimedia Records 13, n.º 3 (septiembre de 2021): 1. http://dx.doi.org/10.1145/3578495.3578501.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Pinheiro, Antonio. "JPEG Column: 95th JPEG Meeting". ACM SIGMultimedia Records 14, n.º 2 (junio de 2022): 1. http://dx.doi.org/10.1145/3630653.3630657.

Texto completo
Resumen
The 95 th JPEG meeting was held online from 25 to 29 April 2022. A Call for Proposals (CfP) was issued for JPEG Fake Media that aims at a standardisation framework for secure annotation of modifications in media assets. With this new initiative, JPEG endeavours to provide standardised means for the identification of the provenance of media assets that include imaging information. Assuring the provenance of the coded information is essential considering the current trends and possibilities on multimedia technology.
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Pinheiro, Antonio. "JPEG Column: 96th JPEG Meeting". ACM SIGMultimedia Records 14, n.º 3 (septiembre de 2022): 1. http://dx.doi.org/10.1145/3630658.3630664.

Texto completo
Resumen
The 96 th JPEG meeting was held online from 25 to 29 July 2022. The meeting was one of the most productive in the recent history of JPEG with the analysis of the responses of two Calls for Proposals (CfP) for machine learning-based coding solutions, notably JPEG AI and JPEG Pleno Point Cloud Coding. The superior performance of the CfP responses compared to the state-of-the-art anchors leave little doubt about the future of coding technologies becoming dominated by machine learning-based solutions with the expected consequences on the standardisation pathway. A new era of multimedia coding standardisation has begun. Both activities had defined a verification model, and are pursuing a collaborative process that will select the best technologies for the definition of the new machine learning-based standards.
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Pinheiro, Antonio. "JPEG Column: 94th JPEG Meeting". ACM SIGMultimedia Records 14, n.º 1 (marzo de 2022): 1. http://dx.doi.org/10.1145/3630646.3630650.

Texto completo
Resumen
The 94 th JPEG meeting was held online from 17 to 21 January 2022. A major milestone has been reached at this meeting with the release of the final call for proposals under the JPEG AI project. This standard aims at the joint standardization of the first image coding standard based on machine learning by the IEC, ISO and ITU, offering a single stream, compact compressed domain representation, targeting both human visualization with significant compression efficiency improvement over image coding standards in common use at equivalent subjective quality and effective performance for image processing and computer vision tasks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

MAEDA, Toshiyuki. "JPEG Codec". Journal of Japan Society for Fuzzy Theory and Systems 11, n.º 2 (1999): 259–62. http://dx.doi.org/10.3156/jfuzzy.11.2_75.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Ono, Fumitaka. "JPEG 2000". Journal of The Institute of Image Information and Television Engineers 64, n.º 9 (2010): 1339–43. http://dx.doi.org/10.3169/itej.64.1339.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Chen, Zhipeng, Yao Zhao y Rongrong Ni. "Detection of operation chain: JPEG-Resampling-JPEG". Signal Processing: Image Communication 57 (septiembre de 2017): 8–20. http://dx.doi.org/10.1016/j.image.2017.04.008.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Steingrímsson, Úlfar y Klaus Simon. "Perceptive Quality Estimations: JPEG 2000 versus JPEG". Journal of Imaging Science and Technology 47, n.º 6 (1 de noviembre de 2003): 572–85. http://dx.doi.org/10.2352/j.imagingsci.technol.2003.47.6.art00015.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Pinheiro, Antonio. "JPEG column: 82nd JPEG meeting in Lisbon, Portugal". ACM SIGMultimedia Records 11, n.º 1 (marzo de 2019): 1. http://dx.doi.org/10.1145/3458462.3458468.

Texto completo
Resumen
JPEG has been the most common representation format of digital images for more than 25 years. Other image representation formats have been standardised by JPEG committee like JPEG 2000 or more recently JPEG XS. Furthermore, JPEG has been extended with new functionalities like HDR or alpha plane coding with the JPEG XT standard, and more recently with a reference software. Another solutions have been also proposed by different players with limited success. The JPEG committee decided it is the time to create a new working item, named JPEG XL, that aims to develop an image coding standard with increased quality and flexibility combined with a better compression efficiency. The evaluation of the call for proposals responses had already confirmed the industry interest, and development of core experiments has now begun. Several functionalities will be considered, like support for lossless transcoding of images represented with JPEG standard.
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Uzun, Erkam y Husrev Taha Sencar. "Jpg$Scraper$ : An Advanced Carver for JPEG Files". IEEE Transactions on Information Forensics and Security 15 (2020): 1846–57. http://dx.doi.org/10.1109/tifs.2019.2953382.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Marcelo, Alvin, Paul Fontelo, Miguel Farolan y Hernani Cualing. "Effect of Image Compression on Telepathology". Archives of Pathology & Laboratory Medicine 124, n.º 11 (1 de noviembre de 2000): 1653–56. http://dx.doi.org/10.5858/2000-124-1653-eoicot.

Texto completo
Resumen
Abstract Context.—For practitioners deploying store-and-forward telepathology systems, optimization methods such as image compression need to be studied. Objective.—To determine if Joint Photographic Expert Group (JPG or JPEG) compression, a lossy image compression algorithm, negatively affects the accuracy of diagnosis in telepathology. Design.—Double-blind, randomized, controlled trial. Setting.—University-based pathology departments. Participants.—Resident and staff pathologists at the University of Illinois, Chicago, and University of Cincinnati, Cincinnati, Ohio. Intervention.—Compression of raw images using the JPEG algorithm. Main Outcome Measures.—Image acceptability, accuracy of diagnosis, confidence level of pathologist, image quality. Results.—There was no statistically significant difference in the diagnostic accuracy between noncompressed (bit map) and compressed (JPG) images. There were also no differences in the acceptability, confidence level, and perception of image quality. Additionally, rater experience did not significantly correlate with degree of accuracy. Conclusions.—For providers practicing telepathology, JPG image compression does not negatively affect the accuracy and confidence level of diagnosis. The acceptability and quality of images were also not affected.
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Balsa, Jose, Tomás Domínguez-Bolaño, Óscar Fresnedo, José A. García-Naya y Luis Castedo. "Transmission of Still Images Using Low-Complexity Analog Joint Source-Channel Coding". Sensors 19, n.º 13 (3 de julio de 2019): 2932. http://dx.doi.org/10.3390/s19132932.

Texto completo
Resumen
An analog joint source-channel coding (JSCC) system designed for the transmission of still images is proposed and its performance is compared to that of two digital alternatives which differ in the source encoding operation: Joint Photographic Experts Group (JPEG) and JPEG without entropy coding (JPEGw/oEC), respectively, both relying on an optimized channel encoder–modulator tandem. Apart from a visual comparison, the figures of merit considered in the assessment are the structural similarity (SSIM) index and the time required to transmit an image through additive white Gaussian noise (AWGN) and Rayleigh channels. This work shows that the proposed analog system exhibits a performance similar to that of the digital scheme based on JPEG compression with a noticeable better visual degradation to the human eye, a lower computational complexity, and a negligible delay. These results confirm the suitability of analog JSCC for the transmission of still images in scenarios with severe constraints on power consumption, computational capabilities, and for real-time applications. For these reasons the proposed system is a good candidate for surveillance systems, low-constrained devices, Internet of things (IoT) applications, etc.
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Pan, Yuanfeng y Jiangqun Ni. "Domain Transformation of Distortion Costs for Efficient JPEG Steganography with Symmetric Embedding". Symmetry 16, n.º 5 (7 de mayo de 2024): 575. http://dx.doi.org/10.3390/sym16050575.

Texto completo
Resumen
Nowadays, most image steganographic schemes embed secret messages by minimizing a well-designed distortion cost function for the corresponding domain, i.e., the spatial domain for spatial image steganography or the JPEG (Joint Photographic Experts Group) domain for JPEG image steganography. In this paper, we break the boundary between these two types of schemes by establishing a theoretical link between the distortion costs in the spatial domain and those in the JPEG domain and thus propose a scheme for domain transformations of distortion costs for efficient JPEG steganography with symmetric embedding, which can directly convert the spatial distortion cost into its JPEG counterpart. Specifically, by formulating the distortion cost function for JPEG images in the decompressed spatial domain, a closed-form expression for a distortion cost cross-domain transformation is derived theoretically, which precisely characterizes the conversion from the distortion costs obtained by existing spatial steganographic schemes to those applied in JPEG steganography. Experimental results demonstrate that the proposed method outperforms other advanced JPEG steganographic schemes, e.g., JUNIWARD (JPEG steganography with Universal Wavelet Relative Distortion), JMiPOD (JPEG steganography by Minimizing the Power of the Optimal Detector), and DCDT (Distortion Cost Domain Transformation), in resisting the detection of various advanced steganalyzers.
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Pinheiro, Antonio. "JPEG Column". ACM SIGMultimedia Records 9, n.º 2 (8 de diciembre de 2017): 1. http://dx.doi.org/10.1145/3173058.3173062.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Pinheiro, Antonio. "JPEG column". ACM SIGMultimedia Records 10, n.º 4 (28 de enero de 2019): 9. http://dx.doi.org/10.1145/3310195.3310204.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Pinheiro, Antonio. "JPEG column". ACM SIGMultimedia Records 10, n.º 2 (3 de agosto de 2018): 5. http://dx.doi.org/10.1145/3264706.3264711.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Pinheiro, Antonio. "JPEG column". ACM SIGMultimedia Records 10, n.º 1 (23 de abril de 2018): 7. http://dx.doi.org/10.1145/3210241.3210248.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Ebrahimi, Touradj, Charilaos Christopoulos y Daniel T. Lee. "JPEG 2000". Signal Processing: Image Communication 17, n.º 1 (enero de 2002): 1–2. http://dx.doi.org/10.1016/s0923-5965(01)00031-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Pinheiro, Antonio. "JPEG column". ACM SIGMultimedia Records 10, n.º 3 (12 de diciembre de 2018): 12. http://dx.doi.org/10.1145/3300001.3300013.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Pinheiro, Antonio. "JPEG column". ACM SIGMultimedia Records 9, n.º 3 (9 de enero de 2018): 3. http://dx.doi.org/10.1145/3178422.3178425.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Pinheiro, Antonio. "JPEG column". ACM SIGMultimedia Records 9, n.º 1 (5 de octubre de 2017): 10. http://dx.doi.org/10.1145/3149647.3149657.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Ullah, Faiz, Oh-Jin Kwon y Seungcheol Choi. "Generation of a Panorama Compatible with the JPEG 360 International Standard Using a Single PTZ Camera". Applied Sciences 11, n.º 22 (21 de noviembre de 2021): 11019. http://dx.doi.org/10.3390/app112211019.

Texto completo
Resumen
Recently, the JPEG working group (ISO/IEC JTC1 SC29 WG1) developed an international standard, JPEG 360, that specifies the metadata and functionalities for saving and sharing 360-degree images efficiently to create a more realistic environment in various virtual reality services. We surveyed the metadata formats of existing 360-degree images and compared them to the JPEG 360 metadata format. We found that existing omnidirectional cameras and stitching software packages use formats that are incompatible with the JPEG 360 standard to embed metadata in JPEG image files. This paper proposes an easy-to-use tool for embedding JPEG 360 standard metadata for 360-degree images in JPEG image files using a JPEG-defined box format: the JPEG universal metadata box format. The proposed implementation will help 360-degree cameras and software vendors provide immersive services to users in a standardized manner for various markets, such as entertainment, education, professional training, navigation, and virtual and augmented reality applications. We also propose and develop an economical JPEG 360 standard compatible panoramic image acquisition system from a single PTZ camera with a special-use case of a wide field of view image of a conference or meeting. A remote attendee of the conference/meeting can see the realistic and immersive environment through our PTZ panorama in virtual reality.
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Pinheiro, Antonio. "JPEG column: 86th JPEG meeting in Sydney, Australia". ACM SIGMultimedia Records 12, n.º 1 (marzo de 2020): 1. http://dx.doi.org/10.1145/3548555.3548558.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Pinheiro, Antonio. "JPEG column: 83rd JPEG meeting in Geneva, Switzerland". ACM SIGMultimedia Records 11, n.º 2 (junio de 2019): 1. http://dx.doi.org/10.1145/3524274.3524282.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Yousfi, Yassine y Jessica Fridrich. "JPEG Steganalysis Detectors Scalable With Respect to Compression Quality". Electronic Imaging 2020, n.º 4 (26 de enero de 2020): 75–1. http://dx.doi.org/10.2352/issn.2470-1173.2020.4.mwsf-075.

Texto completo
Resumen
Practical steganalysis inevitably involves the necessity to deal with a diverse cover source. In the JPEG domain, one key element of the diversification is the JPEG quality factor, or, more generally, the JPEG quantization table used for compression. This paper investigates experimentally the scalability of various steganalysis detectors w.r.t. JPEG quality. In particular, we report that CNN detectors as well as older feature-based detectors have the capacity to contain the complexity of multiple JPEG quality factors within a single model when the quality factors are properly grouped based on their quantization tables. Detectors trained on multiple JPEG qualities show no loss of detection accuracy when compared with dedicated detectors trained for a specific JPEG quality factor. We also demonstrate that CNNs (but not so much feature-based classifiers) trained on multiple qualities can generalize to unseen custom quantization tables compared to detectors trained for specific JPEG qualities. Their ability to generalize to very different quantization tables, however, remains a challenging task. A semi-metric comparing quantization tables is introduced and used to interpret our results.
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Wang, Jie, Chunfang Yang, Ping Wang, Xiaofeng Song y Jicang Lu. "Payload location for JPEG image steganography based on co-frequency sub-image filtering". International Journal of Distributed Sensor Networks 16, n.º 1 (enero de 2020): 155014771989956. http://dx.doi.org/10.1177/1550147719899569.

Texto completo
Resumen
In digital steganography, due to difficulties estimating the JPEG cover image, it is still very hard to accurately locate the hidden message embedded in a JPEG image. Therefore, this study proposes a payload location method for a category of pseudo-random scrambled JPEG image steganography. In order to estimate the quantized discrete cosine transform coefficients in the cover JPEG image, a cover JPEG image estimation method is proposed based on co-frequency sub-image filtering. The proposed payload location method defines a general residual, uses the estimated cover JPEG image to compute the residuals, and then employs the mean residuals of multiple stego images embedded along the same path to distinguish the stego positions. The proposed cover JPEG image estimation method constructs 64 co-frequency sub-images, and then filters the sub-image to estimate the cover JPEG image. Finally, using these methods, payload location algorithms are designed for two common JPEG image steganography algorithms: JSteg and F5. Experimental results show that the proposed location algorithms can effectively locate the stego positions in both JSteg and F5 steganography when the investigator possesses multiple stego images embedded along the same path. In addition, the location results can also be used to recover the steganography key to extract the embedded secret messages.
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Jiang, Yue, Xuehu Yan, Jia Chen, Jingwen Cheng y Jianguo Zhang. "Meaningful secret image sharing for JPEG images with arbitrary quality factors". Mathematical Biosciences and Engineering 19, n.º 11 (2022): 11544–62. http://dx.doi.org/10.3934/mbe.2022538.

Texto completo
Resumen
<abstract><p>JPEG is the most common format for storing and transmitting photographic images on social network platforms. JPEG image is widely used in people's life because of their low storage space and high visual quality. Secret image sharing (SIS) technology is important to protect image data. Traditional SIS schemes generally focus on spatial images, however there is little research on frequency domain images. In addition, the current tiny research on SIS for JPEG images only focuses on JPEG images with a compression quality factor ($ QF $) of $ 100 $. To overcome the limitation of JPEG images in SIS, we propose a meaningful SIS for JPEG images to operate the quantized DCT coefficients of JPEG images. The random elements utilization model is applied to achieve meaningful shadow images. Our proposed scheme has a better quality of the shadow images and the recovered secret image. Experiment results and comparisons indicate the effectiveness of the scheme. The scheme can be used for JPEG images with any compression $ QF $. Besides, the scheme has good characteristics, such as $ (k, n) $ threshold, extended shadow images.</p></abstract>
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Jena, Riyanka, Priyanka Singh y Manoranjan Mohanty. "PP-JPEG: A Privacy-Preserving JPEG Image-Tampering Localization". Journal of Imaging 9, n.º 9 (27 de agosto de 2023): 172. http://dx.doi.org/10.3390/jimaging9090172.

Texto completo
Resumen
The widespread availability of digital image-processing software has given rise to various forms of image manipulation and forgery, which can pose a significant challenge in different fields, such as law enforcement, journalism, etc. It can also lead to privacy concerns. We are proposing that a privacy-preserving framework to encrypt images before processing them is vital to maintain the privacy and confidentiality of sensitive images, especially those used for the purpose of investigation. To address these challenges, we propose a novel solution that detects image forgeries while preserving the privacy of the images. Our method proposes a privacy-preserving framework that encrypts the images before processing them, making it difficult for unauthorized individuals to access them. The proposed method utilizes a compression quality analysis in the encrypted domain to detect the presence of forgeries in images by determining if the forged portion (dummy image) has a compression quality different from that of the original image (featured image) in the encrypted domain. This approach effectively localizes the tampered portions of the image, even for small pixel blocks of size 10×10 in the encrypted domain. Furthermore, the method identifies the featured image’s JPEG quality using the first minima in the energy graph.
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Fitriyanto, Rachmad, Anton Yudhana y Sunardi Sunardi. "Boyer-Moore String Matching Algorithm and SHA512 Implementation for Jpeg/exif File Fingerprint Compilation in DSA". Scientific Journal of Informatics 7, n.º 1 (5 de junio de 2020): 1–9. http://dx.doi.org/10.15294/sji.v7i1.19059.

Texto completo
Resumen
Data integrity, authenticity and non-repudiation are security parameters that provided by Digital Signature Algorithm (DSA). Hash value is important element inside DSA to identify information data integrity using hash function to generate message digest. Jpeg/exif is image file format that produce by digital camera as in smartphone. Hardware technology development made image file have higher resolution than before. This condition made image file fingerprinting need more time to compile jpeg/exif fingerprint. This research purpose is to develop fingerprinting process for jpeg/exif file using Boyer-Moore string matching algorithm and SHA512. Research conducted in four stages. First stage is jpeg/exif file structure identification, second stage is segment content acquisition and hashing, third stage is image file modification experiments and last stage is jpeg/exif file fingerprint compilation. Obtained result shown that jpeg/exif file fingerprint comprises of three hash value from SOI segment, APP1 segment and SOF0 segment. The jpeg/exif file fingerprint can use to detect six types image modification there are image resizing, text addition, metadata modification, image resizing, image cropping and file file type conversion.
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Yang, Jianhua, Fei Shang, Yi Liao y Yifang Chen. "Toward High Capacity and Robust JPEG Steganography Based on Adversarial Training". Security and Communication Networks 2023 (21 de febrero de 2023): 1–12. http://dx.doi.org/10.1155/2023/3813977.

Texto completo
Resumen
JPEG steganography has become a research hotspot in the field of information hiding. However, the capacity of conventional JPEG steganography methods is hard to meet the requirements in high-capacity application scenarios and also can not extract secret messages accurately after JPEG compression. To mitigate these problems, we propose a high-capacity and robust JPEG steganography based on adversarial training called HRJS, which implements an end-to-end framework in the JPEG domain for the first time. The encoder is responsible for embedding the secret message while the decoder can reconstruct the original secret message. To enhance robustness, an attack module forces the neural network to automatically learn how to correctly recover the secret message after an attack. Experimental results show that our method achieves near 100 % decoding accuracy against JPEG_50 compression at 1/3 bits per channel (bpc) payload while preserving the imperceptibility of the stego image. Compared with conventional JPEG steganography methods, the proposed method is feasible with high capacity (e.g., 1 bpc) and has an obvious advantage in terms of robustness against JPEG compression at the same time.
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Беляев, Н. Н., О. А. Бебенина y В. Е. Бородкина. "DEVELOPEMENT AN ALGORITM FOR RECOGNIZING TEXT DATA IN DIGITAL GRAPHIC IMAGES". СИСТЕМЫ УПРАВЛЕНИЯ И ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ, n.º 2(84) (1 de marzo de 2021): 75–78. http://dx.doi.org/10.36622/vstu.2021.84.2.016.

Texto completo
Resumen
Предложен алгоритм распознавания, реализующий процедуры: обучения выбранных классификаторов и распознавания текстовых данных, учитывающие статистические характеристики распределения коэффициентов частотной области цифровых графических изображениях формата JPEG. The article presents an approach to development an algorithm for recognizing text data within JPEG format digital graphic images. Considered a hypothesis about influence text data content in JPEG digital graphic images on the distribution of values of the discrete cosine transformation coefficients in the frequency domain JPEG images of the format. Statistical classifiers models that provide a solution to the problem of recognition of text data in JPEG images based on analysis of its frequency domain have been determined. A recognition algorithm is proposed that implements the following procedures: training of selected classifiers and recognition of text data, taking into account the statistical characteristics of the distribution of frequency domain coefficients in JPEG format images.
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Ardiansyah, Ardiansyah, Nila Hardi y Windu Gata. "Identifikasi dan Recovery File JPEG dengan Metode Signature-Based Carving dalam Model Automata". Komputika : Jurnal Sistem Komputer 9, n.º 1 (6 de abril de 2020): 75–83. http://dx.doi.org/10.34010/komputika.v9i1.2733.

Texto completo
Resumen
Penggunaan format gambar JPEG semakin meningkat seiring dengan meningkatnya produksi foto digital yang dipicu oleh kemunculan smartphone dan perkembangan sosial media. Hal tersebut membuat file JPEG berperan penting dalam proses digital forensik, sehingga banyak metode identifikasi dan recovery file JPEG yang dikembangkan. Paper ini berusaha melihat proses data carving file JPEG dengan metode Signature-Based Carving, metode carving yang paling sederhana, dengan sebuah model diagram Finite State Automata, sebuah model algoritma dasar dalam teori komputasi.
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Safdar, Muhammad, Ming Ronnier Luo y Xiaoyu Liu. "Performance comparison of JPEG, JPEG 2000, and newly developed CSI-JPEG by adopting different color models". Color Research & Application 42, n.º 4 (8 de noviembre de 2016): 460–73. http://dx.doi.org/10.1002/col.22100.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Fitriyanto, Rachmad, Anton Yudhana y Sunardi Sunardi. "Manajemen jpeg/exif file fingerprint dengan algoritma Brute Force string matching dan Hash Function SHA256". Register: Jurnal Ilmiah Teknologi Sistem Informasi 5, n.º 2 (1 de julio de 2019): 140. http://dx.doi.org/10.26594/register.v5i2.1707.

Texto completo
Resumen
Management of jpeg/exif file fingerprint with Brute Force string matching algorithm and Hash Function SHA256Metode pengamanan berkas gambar jpeg/exif saat ini hanya mencakup aspek pencegahan, belum pada aspek deteksi integritas data. Digital Signature Algorithm (DSA) adalah metode kriptografi yang digunakan untuk memverifikasi integritas data menggunakan hash value. SHA256 merupakan hash function yang menghasilkan 256-bit hash value yang berfungsi sebagai file fingerprint. Penelitian ini bertujuan untuk menyusun file fingerprint dari berkas jpeg/exif menggunakan SHA256 dan algoritma Brute Force string matching untuk verifikasi integritas berkas jpeg/exif. Penelitian dilakukan dalam lima tahap. Tahap pertama adalah identifikasi struktur berkas jpeg/exif. Tahap kedua adalah akuisisi konten segmen. Tahap ketiga penghitungan hash value. Tahap keempat adalah eksperimen modifikasi berkas jpeg/exif. Tahap kelima adalah pemilihan elemen dan penyusunan file fingerprint. Hasil penelitian menunjukkan sebuah jpeg/exif file fingerprint tersusun atas tiga hash value. SOI (Start of Image) segment hash value digunakan untuk mendeteksi terjadinya modifikasi berkas dalam bentuk perubahan tipe berkas dan penambahan objek pada konten gambar. Hash value segmen APP1 digunakan untuk mendeteksi modifikasi pada metadata berkas. Hash value segmen SOF0 digunakan untuk mendeteksi gambar yang dimodifikasi dengan teknik recoloring, resizing, dan cropping. The method of securing jpeg/exif image files currently has covered only the prevention aspect instead of the data integrity detection aspect. Digital Signature Algorithm is a cryptographic method used to verify the data integrity using hash value. SHA256 is a hash function that produces a 256-bit hash value functioning as a fingerprint file. This study aimed at compiling fingerprint files from jpeg/exif files using SHA256 and Brute Force string matching algorithm to verify the integrity of jpeg/exif files. The research was conducted in five steps. The first step was identifying the jpeg/exif file structure. The second step was the acquisition of the segment content. The third step was calculating the hash value. The fourth step was the jpeg/exif file modification experiment. The fifth step was the selection of elements and compilation of fingerprint files. The obtained results showed a jpeg/exif fingerprint file which was compiled in three hash values. The hash value of SOI segment was used to detect the occurrence of file modification in the form of file type changing and object addition on the image content. The hash value of APP1 segment was used to detect the metadata file modification. The hash value of SOF0 segment was used to detect the images modified by recoloring, resizing, and cropping techniques.
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Fitriyanto, Rachmad, Anton Yudhana y Sunardi Sunardi. "Implementation SHA512 Hash Function And Boyer-Moore String Matching Algorithm For Jpeg/exif Message Digest Compilation". Jurnal Online Informatika 4, n.º 1 (6 de septiembre de 2019): 16. http://dx.doi.org/10.15575/join.v4i1.304.

Texto completo
Resumen
Security information method for JPEG/exif documents generally aims to prevent security attacks by protecting documents with password and watermark. Both methods cannot be used to determine the condition of data integrity at the detection stage of the information security cycle. Message Digest is the essence of a file that has a function as a digital fingerprint to represent data integrity. This study aims to compile digital fingerprints to detect changes that occurred in JPEG / exif documents in information security. The research phase consists of five stages. The first stage, identification of the JPEG / exif document structure conducted using the Boyer-Moore string matching algorithm to find JPEG/exif segments location. The Second stage is segment content acquisition, conducted based on segment location and length obtained. The Third step, computing message digest for each segment using SHA512 hash function. Fourth stage, JPEG / exif document modification experiments to identified affected segments. The fifth stage is selecting and combining the hash value of the segment into the message digest. The obtained result shows the message digest for JPEG/exif documents composed of three hash values. The SOI segment hash value used to detect modifications for JPEG to png conversion and image editing. The APP1 hash value used to detect metadata editing. The SOF0 hash values use to detect modification for image recoloring, cropping and resizing — the combination from three hash values as JPEG/exif’s message digest.
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Марчеська, Марина, Інна Кондіус y Леся Федік. "ДОСЛІДЖЕННЯ JPEG-АЛГОРИТМУ СТИСНЕННЯ ЦИФРОВИХ ВІДЕОЗОБРАЖЕНЬ І КОДУВАННЯ СИСТЕМ ТЕХНІЧНОГО ЗОРУ В ОС LINUX". Grail of Science, n.º 36 (24 de febrero de 2024): 203–8. http://dx.doi.org/10.36074/grail-of-science.16.02.2024.032.

Texto completo
Resumen
У статті викладено актуальність застосування алгоритму стиснення JPEG для управління, зберігання і передачі візуальних даних. Досліджено алгоритм JPEG для стиснення цифрових відеозображень у контексті систем технічного зору та проведена оцінка його показників. Розглянуто кодування, як етап стиснення відеозображень завдяки алгоритму JPEG. А також використання його у ОС Linux.
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Fitriyanto, Rachmad, Anton Yudhana y Sunardi Sunardi. "Boyer-Moore String Matching Algorithm and SHA512 Implementation for Jpeg/exif File Fingerprint Compilation in DSA". JUITA: Jurnal Informatika 8, n.º 1 (4 de mayo de 2020): 1. http://dx.doi.org/10.30595/juita.v8i1.4413.

Texto completo
Resumen
The jpeg/exif is file’s format for image produced by digital camera such as in the smartphones. The security method for jpeg/exif usages in digital communication currently only full-fill prevention aspect from three aspects of information security, prevention, detection and response. Digital Signature Algorithm (DSA) is a cryptographic method that provide detection aspect of information security by using hash-value as fingerprint of digital documents. The purpose of this research is to compile jpeg/exif file data fingerprint using the hash-value from DSA. The research conducted in four stages. The first stages is the identification of jpeg/exif file structure using Boyer-Moore string matching algorithm to locate the position of file’s segments. The second stage is segment’s content acquisition. The third stage the image files modification experiments to select the suitable element of jpeg/exif file data fingerprint. The fourth stage is the compilation of hash-values to form data fingerprint. The Obtained result has shown that the jpeg/exif file fingerprint comprises three hash value from the SOI segment, APP1's segment, and the SOF0 segment. The jpeg/exif file fingerprint can use for modified image detection, include six types of image modification there are image resizing, text addition, metadata modification, image resizing, image cropping and file type conversion
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Hu, Guan Min y Zhi Jun Xu. "A Portable JPEG Image Application System Base on SOPC Technology". Advanced Materials Research 424-425 (enero de 2012): 123–27. http://dx.doi.org/10.4028/www.scientific.net/amr.424-425.123.

Texto completo
Resumen
In this text, we put forward a design using IP core which assigns a large amount of hardware operation to realize JPEG decoding in SOPC. Following the principle of JPEG decoding, we use hardware language to put up several decode modules. And these modules fulfill the design of JPEG decoder. The emulation indicates that the decoder has characteristics such as high performance, low cost,flexible use and high efficiency. Finally we can add touch screen, LCD and other devices into the SOPC to carry out the portable JPEG image application system
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Jiao, Shuming, Zhi Jin, Chenliang Chang, Changyuan Zhou, Wenbin Zou y Xia Li. "Compression of Phase-Only Holograms with JPEG Standard and Deep Learning". Applied Sciences 8, n.º 8 (30 de julio de 2018): 1258. http://dx.doi.org/10.3390/app8081258.

Texto completo
Resumen
It is a critical issue to reduce the enormous amount of data in the processing, storage and transmission of a hologram in digital format. In photograph compression, the JPEG standard is commonly supported by almost every system and device. It will be favorable if JPEG standard is applicable to hologram compression, with advantages of universal compatibility. However, the reconstructed image from a JPEG compressed hologram suffers from severe quality degradation since some high frequency features in the hologram will be lost during the compression process. In this work, we employ a deep convolutional neural network to reduce the artifacts in a JPEG compressed hologram. Simulation and experimental results reveal that our proposed “JPEG + deep learning” hologram compression scheme can achieve satisfactory reconstruction results for a computer-generated phase-only hologram after compression.
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Christaline, J. Anita, R. Ramesh y D. Vaishali. "Optimized JPEG Steganalysis". International Journal of Multimedia and Ubiquitous Engineering 11, n.º 1 (31 de enero de 2016): 385–96. http://dx.doi.org/10.14257/ijmue.2016.11.1.37.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Jia, Hong Li y Qiang Liu. "JPEG DCT Compressiom". Advanced Materials Research 712-715 (junio de 2013): 2542–45. http://dx.doi.org/10.4028/www.scientific.net/amr.712-715.2542.

Texto completo
Resumen
With the rapid spread of image processing applications and the further development of multimedia technologies, compression standards become more and more important. This paper intends to explain JPEG (Joint Photographic Experts Group) compression, which is currently a worldwide standard for digital image compression, is based on the discrete cosine transform (DCT). Based on the research, the paper describes theory and algorithms of the JPEG DCT compression and implements a baseline JPEG codec (encoder/decoder) with MATLAB.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía