To see the other types of publications on this topic, follow the link: Image file formats.

Journal articles on the topic 'Image file formats'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Image file formats.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Larobina, Michele, and Loredana Murino. "Medical Image File Formats." Journal of Digital Imaging 27, no. 2 (December 13, 2013): 200–206. http://dx.doi.org/10.1007/s10278-013-9657-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bode, Michael. "A Few Thoughts About Image File Storage." Microscopy Today 12, no. 1 (January 2004): 26–29. http://dx.doi.org/10.1017/s1551929500051786.

Full text
Abstract:
A recent thread on the MSA list server about problems with image formats (in this case TIF or TIFF) showed, that there is a bit of confusion in the microscopy community about the best file format for digital images. I will try to shed a bit of light onto this problem.Digital images are at the core a large array of numbers. One number per pixel for b/w images, 3 numbers per pixel for color images. The simplest file format consists of 2 numbers that define the width and height of the image, and then just a listing of numbers for each pixel. By using the right conventions, the image can be recreated from a data file like mis. In essence, this is the format of a bitmap image (BMP), and other formats derived from it.
APA, Harvard, Vancouver, ISO, and other styles
3

Moldovan, Grigore, and Michael Zabel. "Quantitative Image Format for Electron Microscopy." Microscopy and Microanalysis 26, S2 (July 30, 2020): 1176–78. http://dx.doi.org/10.1017/s1431927620017225.

Full text
Abstract:
AbstractExperimental data, simulation, data analysis and visualisation require image file formats that are open source and able to contain and manage quantitative data. Quantification techniques bring the new challenge of managing image calibration parameters and formulas in an open and efficient format, compatible with routine microscopy workflows. A practical approach to quantitative image format is presented and discussed here, relying on open and extensible file formats - Tagged Image File (TIF) and Extensible Metadata Platform (XMP).
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, JeongYeon. "Protecting Metadata of Access Indicator and Region of Interests for Image Files." Security and Communication Networks 2020 (January 22, 2020): 1–10. http://dx.doi.org/10.1155/2020/4836109.

Full text
Abstract:
With popularity of social network services, the security and privacy issues over shared contents receive many attentions. Besides, multimedia files have additional concerns of copyright violation or illegal usage to share over communication networks. For image file management, JPEG group develops new image file format to enhance security and privacy features. Adopting a box structure with different application markers, new standards for privacy and security provide a concept of replacement substituting a private part of the original image or metadata with an alternative public data. In this paper, we extend data protection features of new JPEG formats to remote access control as a metadata. By keeping location information of access control data as a metadata in image files, the image owner can allow or deny other’s data consumption regardless where the media file is. License issue also can be resolved by applying new access control schemes, and we present how new formats protect commercial image files against unauthorized accesses.
APA, Harvard, Vancouver, ISO, and other styles
5

Wiggins, Richard H., H. Christian Davidson, H. Ric Harnsberger, Jason R. Lauman, and Patricia A. Goede. "Image File Formats: Past, Present, and Future." RadioGraphics 21, no. 3 (May 2001): 789–98. http://dx.doi.org/10.1148/radiographics.21.3.g01ma25789.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Linkert, Melissa, Curtis T. Rueden, Chris Allan, Jean-Marie Burel, Will Moore, Andrew Patterson, Brian Loranger, et al. "Metadata matters: access to image data in the real world." Journal of Cell Biology 189, no. 5 (May 31, 2010): 777–82. http://dx.doi.org/10.1083/jcb.201004104.

Full text
Abstract:
Data sharing is important in the biological sciences to prevent duplication of effort, to promote scientific integrity, and to facilitate and disseminate scientific discovery. Sharing requires centralized repositories, and submission to and utility of these resources require common data formats. This is particularly challenging for multidimensional microscopy image data, which are acquired from a variety of platforms with a myriad of proprietary file formats (PFFs). In this paper, we describe an open standard format that we have developed for microscopy image data. We call on the community to use open image data standards and to insist that all imaging platforms support these file formats. This will build the foundation for an open image data repository.
APA, Harvard, Vancouver, ISO, and other styles
7

Cheng, Wei-Chung, Samuel Lam, Qi Gong, and Paul Lemaillet. "Evaluating whole-slide imaging viewers used in digital pathology." Electronic Imaging 2020, no. 9 (January 26, 2020): 372–1. http://dx.doi.org/10.2352/issn.2470-1173.2020.9.iqsp-372.

Full text
Abstract:
As a Class II medical device, whole-slide imaging (WSI) systems are emerging to succeed light microscopes used by pathologists in the past decades by digitalizing histological tissue slides into millions of pixels saved in a WSI file. Unlike the standard image file formats such as JPEG or TIFF, a WSI file usually consists of hundreds of compressed images of different magnification levels and focal planes that need to be decompressed, stitched, scaled, and colormanaged to reproduce the view demanded by the user with zooming and panning operations. Currently, most WSI files are stored in proprietary file formats, due to the lack of adopting a standard WSI file format, which hinders the development of third-party WSI viewers by making it difficult to interpret WSI files faithfully. To examine the fidelity of third-party WSI viewers, in this study, three freely available viewers, Sedeen, QuPath, and ASAP, were compared with the factory viewer, NDP, at the pixel level. A software tool was developed to register and calculate the 1976 CIE color difference for each pixel between two viewers. The average color differences were found as 1.30, 18.69, and 18.79 ΔE for Sedeen, QuPath, and ASAP, respectively.
APA, Harvard, Vancouver, ISO, and other styles
8

Sudirman, Sudirman. "Enkripsi Citra Bitmap Menggunakan Algoritma Kompresi Lampel-Ziv-Welch (LZW)." ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA 4, no. 1 (May 4, 2020): 9. http://dx.doi.org/10.30829/algoritma.v4i1.7242.

Full text
Abstract:
<p><em>The use of data in the form of image files has become more widespread in various fields. Therefore, security of image files from unauthorized persons is important. Various techniques to reduce file size, including securing files, have been developed, one of which is compression. Compression technique becomes important in processing large images such as Bitmap images. Ziv Welch seal is a loseless compression algorithm that can compress images without any loss of pixel elements in them or the resulting compression image is identical to the original image. The image will be encrypted first and then performed the compression technique using the Ziv Welch Lempel algorithm. The resulting compression is no longer in the form of images but in the form of files with the * .mat extension. The different file formats from images to non-image files can help avoid cryptanalysis</em></p>
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Yunhyong, and Seamus Ross. "Digital Forensics Formats: Seeking a Digital Preservation Storage Container Format for Web Archiving." International Journal of Digital Curation 7, no. 2 (October 23, 2012): 21–39. http://dx.doi.org/10.2218/ijdc.v7i2.227.

Full text
Abstract:
In this paper we discuss archival storage container formats from the point of view of digital curation and preservation, an aspect of preservation overlooked by most other studies. Considering established approaches to data management as our jumping off point, we selected seven container format attributes that are core to the long term accessibility of digital materials. We have labeled these core preservation attributes. These attributes are then used as evaluation criteria to compare storage container formats belonging to five common categories: formats for archiving selected content (e.g. tar, WARC), disk image formats that capture data for recovery or installation (partimage, dd raw image), these two types combined with a selected compression algorithm (e.g. tar+gzip), formats that combine packing and compression (e.g. 7-zip), and forensic file formats for data analysis in criminal investigations (e.g. aff – Advanced Forensic File format). We present a general discussion of the storage container format landscape in terms of the attributes we discuss, and make a direct comparison between the three most promising archival formats: tar, WARC, and aff. We conclude by suggesting the next steps to take the research forward and to validate the observations we have made.
APA, Harvard, Vancouver, ISO, and other styles
10

T, Vijayakumar. "A SECURE STEGANOGRAPHY CREATION ALGORITHM FOR MULTIPLE FILE FORMATS." Journal of Innovative Image Processing 1, no. 01 (October 8, 2019): 1–10. http://dx.doi.org/10.36548/jiip.2019.1.001.

Full text
Abstract:
Nowadays the skin cancer has become a more dangerous and an unpredictable disease among the humans. Nearly one million of people all over the world every year are been affected by the skin cancer and left with no treatment due to the lack of early diagnosis. Besides the usual types of cancer such as the melanoma, basal cell carcinoma and squamous cell carcinoma that could be identified easily there are certain types of unusual skin cancer such as the Merkel cell skin cancer that are rare and difficult to diagnose. As the identification of the Merkel cell skin cancer at the early stage would be very useful in deciding the necessary treatment for its cure, the paper has put forward preprocessing techniques to improve the image quality to make the further image processing procedure easy in the identification of the skin cancer. The proposed method applies the combined image enhancement and the restoration (CIEIR) on the input skin lesion images and makes it more presentable with the improved quality for the further image processing steps in the identification of the normal skin and the skin affected by the Merkel cell tumor. The CIEIR is implemented in the MATLAB and the parameters such as the PSNR, SSIM and the MSE are measured.
APA, Harvard, Vancouver, ISO, and other styles
11

Eng, Edward T., Mykhailo Kopylov, Carl J. Negro, Sarkis Dallaykan, William J. Rice, Kelsey D. Jordan, Kotaro Kelley, Bridget Carragher, and Clinton S. Potter. "Reducing cryoEM file storage using lossy image formats." Journal of Structural Biology 207, no. 1 (July 2019): 49–55. http://dx.doi.org/10.1016/j.jsb.2019.04.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Chen, Pei Jiang. "Medical Image Display Based on DICOM." Key Engineering Materials 480-481 (June 2011): 932–37. http://dx.doi.org/10.4028/www.scientific.net/kem.480-481.932.

Full text
Abstract:
Modern medical diagnose has higher demand for image archiving and communication, the medical image display technology is mainly studied under the Windows platform. According to the analysis of the DICOM 3.0 standards and file formats, the general idea of the conversion from DICOM format to BMP format is proposed. Based on the object-oriented programming idea, a format conversion class called CDicomConvert is designed by using Visual C++. The class encapsulates many data and methods for DICOM image processing, and the class CDib is also improved. The result of the software running shows that it can convert the DICOM file to BMP format, and the medical image can be displayed under Windows.
APA, Harvard, Vancouver, ISO, and other styles
13

Becker, P., L. Plesea, and T. Maurer. "Cloud Optimized Image Format and Compression." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XL-7/W3 (April 29, 2015): 613–15. http://dx.doi.org/10.5194/isprsarchives-xl-7-w3-613-2015.

Full text
Abstract:
Cloud based image storage and processing requires revaluation of formats and processing methods. For the true value of the massive volumes of earth observation data to be realized, the image data needs to be accessible from the cloud. Traditional file formats such as TIF and NITF were developed in the hay day of the desktop and assumed fast low latency file access. Other formats such as JPEG2000 provide for streaming protocols for pixel data, but still require a server to have file access. These concepts no longer truly hold in cloud based elastic storage and computation environments. <br><br> This paper will provide details of a newly evolving image storage format (MRF) and compression that is optimized for cloud environments. Although the cost of storage continues to fall for large data volumes, there is still significant value in compression. For imagery data to be used in analysis and exploit the extended dynamic range of the new sensors, lossless or controlled lossy compression is of high value. Compression decreases the data volumes stored and reduces the data transferred, but the reduced data size must be balanced with the CPU required to decompress. The paper also outlines a new compression algorithm (LERC) for imagery and elevation data that optimizes this balance. Advantages of the compression include its simple to implement algorithm that enables it to be efficiently accessed using JavaScript. Combing this new cloud based image storage format and compression will help resolve some of the challenges of big image data on the internet.
APA, Harvard, Vancouver, ISO, and other styles
14

Saidhbi, Sheik. "An Intelligent Multimedia Data Encryption and Compression and Secure Data Transmission of Public Cloud." Asian Journal of Engineering and Applied Technology 8, no. 2 (May 5, 2019): 37–40. http://dx.doi.org/10.51983/ajeat-2019.8.2.1141.

Full text
Abstract:
Data compression is a method of reducing the size of the data file so that the file should take less disk space for storage. Compression of a file depends upon encoding of file. In lossless data compression algorithm there is no data loss while compressing a file, therefore confidential data can be reproduce if it is compressed using lossless data compression. Compression reduces the redundancy and if a compressed file is encrypted it is having a better security and faster transfer rate across the network than encrypting and transferring uncompressed file. Most of the computer applications related to health are not secure and these applications exchange lot of confidential health data having different file formats like HL7, DICOM images and other audio, image, textual and video data formats etc. These types of confidential data need to be transmitted securely and stored efficiently. Therefore this paper proposes a learning compression- encryption model for identifying the files that should be compressed before encrypting and the files that should be encrypted without compressing them.
APA, Harvard, Vancouver, ISO, and other styles
15

Faccioli, N., S. Perandini, A. Comai, M. D’Onofrio, and R. Pozzi Mucelli. "Proper use of common image file formats in handling radiological images." La radiologia medica 114, no. 3 (March 27, 2009): 484–95. http://dx.doi.org/10.1007/s11547-009-0378-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Wasilah, Wasilah, Suhendro Y. Irianto, and Dona Yuliawati. "Watermarking Using LSB Shifting to Document Protection." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 12 (October 21, 2016): 7322–28. http://dx.doi.org/10.24297/ijct.v15i12.3968.

Full text
Abstract:
The original signature or document. The application demonstrates that it can be used to protect a document or signature from fraud by an authorize person. Criminal can be considered as Harmful act or omission against the public which the State wishes to prevent and which, upon con eviction, is punishable by fine, imprisonment, and/or death. No conduct constitutes a crime unless it is declared criminal in the laws of the country. Some crimes (such as theft or criminal damage) may also be civil wrongs (torts) for which the victim(s) may claim damages in compensation. Criminals may be happened in every sector and in daily life. Criminal acts may be in the form of copy right fraud and signature forgery. In this work we try to solve or prevent those criminals. By using watermarking technique, the work proposed to introduce new technique to protect document originality quickly and accurately. Watermarking was carried out by inserting an image or text into signature image in order to protect. The work shows that file size produced by integrating the two same files but on different file stored and also produce different file size. Moreover Testing shows that steganography of image file with JPEG format and file image hidden with JPEG format which produced other small size of file from file steganography storage such as BMP and PNG formats.
APA, Harvard, Vancouver, ISO, and other styles
17

Polotai, O., O. Belej, and N. Maltseva. "PHYSICAL CONTENT OF COMPUTER STEGANOGRAPHY." Bulletin of Lviv State University of Life Safety 23 (June 30, 2021): 27–32. http://dx.doi.org/10.32447/20784643.23.2021.04.

Full text
Abstract:
Introduction. The development of computer technology has given a new impetus to the use of computer steganography. However, it is important to understand the physical content of this type of steganography.Purpose. The work aims to describe the practical use and physical content of the phenomenon of computer steganography, the results of the study on the hiding of files in the stegocontainer.Results. Describes the main ns currently computer steganography methods are actively used to solve the following tasks: Protection of confidential information from unauthorized access, overcoming monitoring and management of net-work resources, software camouflage, copyright protection, which is manifested in the use of digital watermarks, is one of the most promising areas of computer steganography. Among the methods of hiding information in images, the most common is the category of algorithms using the lower bits of the image data. They are considered in this paper. These algorithms are based on the fact that in some file formats, the lower bits of the values, although present in the file, but do not affect a person's perception of sound or image. The steganographic software S-Tools was chosen for the study. We created two test monotonous images with the size of 50 × 50 pixels in 24-bit bmp format to analyze the peculiarities of the placement of stego-data in container files. We chose black and white images for the study. A text file was hidden in each of the images, after which the reverse action was performed - extracting the file. As a result of hiding, two stego files were obtained. The paper compared the binary content of the original images and files containing private data. For comparison, the binary content of the black square image and the contents of the stegocontainer with a latent text file are given. Note that the contents of the container and the stego file are only partially listed, but the addresses of the memory cells have selected accordingly. The right column shows the contents of the memory cells in hexadecimal format. The bytes that display the colour of the square are set to "00" because the original image contains only black. We noted that the contents of the cells responsible for the image changed after hiding additional data (this reflected by cells with values of "01"). The paper also describes the procedure for hiding a group of different types of files. During the study, we found that the image file (1920 × 1080 pixels) with a volume of 6,220,854 bytes can hide 777,584 bytes of information.Conclusion. When using steganography, the program uses some algorithms that hide confidential data among the contents of the container: bits of the hidden file replace the bits of the original file at random positions. Thus, the size of the source file and the container file (containing the attached information) is the same, even if you hide a different number of files or different amounts of data.
APA, Harvard, Vancouver, ISO, and other styles
18

Becker, Peter, Lucian Plesea, and Thomas Maurer. "OPTIMIZING CLOUD BASED IMAGE STORAGE, DISSEMINATION AND PROCESSING THROUGH USE OF MRF AND LERC." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLI-B4 (June 13, 2016): 201–3. http://dx.doi.org/10.5194/isprsarchives-xli-b4-201-2016.

Full text
Abstract:
The volume and numbers of geospatial images being collected continue to increase exponentially with the ever increasing number of airborne and satellite imaging platforms, and the increasing rate of data collection. As a result, the cost of fast storage required to provide access to the imagery is a major cost factor in enterprise image management solutions to handle, process and disseminate the imagery and information extracted from the imagery. Cloud based object storage offers to provide significantly lower cost and elastic storage for this imagery, but also adds some disadvantages in terms of greater latency for data access and lack of traditional file access. Although traditional file formats geoTIF, JPEG2000 and NITF can be downloaded from such object storage, their structure and available compression are not optimum and access performance is curtailed. &lt;br&gt;&lt;br&gt; This paper provides details on a solution by utilizing a new open image formats for storage and access to geospatial imagery optimized for cloud storage and processing. MRF (Meta Raster Format) is optimized for large collections of scenes such as those acquired from optical sensors. The format enables optimized data access from cloud storage, along with the use of new compression options which cannot easily be added to existing formats. The paper also provides an overview of LERC a new image compression that can be used with MRF that provides very good lossless and controlled lossy compression.
APA, Harvard, Vancouver, ISO, and other styles
19

Becker, Peter, Lucian Plesea, and Thomas Maurer. "OPTIMIZING CLOUD BASED IMAGE STORAGE, DISSEMINATION AND PROCESSING THROUGH USE OF MRF AND LERC." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLI-B4 (June 13, 2016): 201–3. http://dx.doi.org/10.5194/isprs-archives-xli-b4-201-2016.

Full text
Abstract:
The volume and numbers of geospatial images being collected continue to increase exponentially with the ever increasing number of airborne and satellite imaging platforms, and the increasing rate of data collection. As a result, the cost of fast storage required to provide access to the imagery is a major cost factor in enterprise image management solutions to handle, process and disseminate the imagery and information extracted from the imagery. Cloud based object storage offers to provide significantly lower cost and elastic storage for this imagery, but also adds some disadvantages in terms of greater latency for data access and lack of traditional file access. Although traditional file formats geoTIF, JPEG2000 and NITF can be downloaded from such object storage, their structure and available compression are not optimum and access performance is curtailed. <br><br> This paper provides details on a solution by utilizing a new open image formats for storage and access to geospatial imagery optimized for cloud storage and processing. MRF (Meta Raster Format) is optimized for large collections of scenes such as those acquired from optical sensors. The format enables optimized data access from cloud storage, along with the use of new compression options which cannot easily be added to existing formats. The paper also provides an overview of LERC a new image compression that can be used with MRF that provides very good lossless and controlled lossy compression.
APA, Harvard, Vancouver, ISO, and other styles
20

Machado, Domingos Sa´vio Alca⁁ntara. "Comparative study of file formats for image storage and transmission." Journal of Electronic Imaging 13, no. 1 (January 1, 2004): 175. http://dx.doi.org/10.1117/1.1634591.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Koptyra, Katarzyna, and Marek R. Ogiela. "Imagechain—Application of Blockchain Technology for Images." Sensors 21, no. 1 (December 25, 2020): 82. http://dx.doi.org/10.3390/s21010082.

Full text
Abstract:
Imagechain is a cryptographic structure that chain digital images with hash links. The most important feature, which differentiates it from blockchain, is that the pictures are not stored inside the blocks. Instead, the block and the image are combined together in the embedding process. Therefore, the imagechain is built from standard graphic files that may be used in the same way as any other image, but additionally, each of them contains a data block that links it to a previous element of the chain. The presented solution does not require any additional files except the images themselves. It supports multiple file formats and embedding methods, which makes it portable and user-friendly. At the same time, the scheme provides a high level of security and resistance to forgery. This is achieved by hashing the whole file with embedded data, so the image cannot be altered or removed from the chain without losing integrity. This article describes the basic concept of an imagechain together with building blocks and applications. The two most important issues are embedding methods and block structure.
APA, Harvard, Vancouver, ISO, and other styles
22

Provedel, Leonardo Francisco, Bruna Natália Alves da Silva Pimentel, Tarcísio Martins de Jesus, Ana Paula Souza Lacerda, Izabel Regina Fischer Rubira-Bullen, and Viviane Almeida Sarmento. "Effects of Image Compression on Linear Measurements of Digital Panoramic Radiographs." Brazilian Dental Journal 27, no. 6 (December 2016): 757–60. http://dx.doi.org/10.1590/0103-6440201601157.

Full text
Abstract:
Abstract This study aimed to evaluate the accuracy of panoramic radiographs obtained by digital system based on charge coupled device (CCD) and a phosphor storage plate (PSP) system with two different file formats, JPEG irreversible type and BMP. Linear measurements of artificial bony defects were made in dry mandibles with a digital caliper. Measures of digital panoramic radiographs were taken in ImageJ(r) software. Each measurement was performed twice by an experienced examiner. The intra-rater agreement was considered very strong (Pearson's correlation coefficient of 0.97). There was no significant difference between the linear measurements of dry mandibles, considered the gold standard, in relation to measurements obtained from digital radiographs (p=0.47). The error of these measures for the CCD was 1.04 mm (9.97%) for JPEG images and 1.03 mm (9.99%) for those with BMP format. For the PSP images, these values were 1.48 mm (14.94%) and 1.43 mm (14.43%), respectively. Although there was no statistical difference between the images with JPEG and BMP format, for both digital systems (p=1.00 for CCD and p=0.98 for PSP system), errors made on radiographs obtained by PSP system were significantly higher than those of CCD (p<0.05). The size of the files saved in JPEG was also significantly lower (p=0.005) compared with the files saved in BMP. It may be concluded that the digital radiographs, both saved in JPEG and BMP formats, are accurate, regardless the used digital system, and JPEG images are more suitable for teleradiology.
APA, Harvard, Vancouver, ISO, and other styles
23

Russell, Pamela H., and Debashis Ghosh. "Radtools: R utilities for smooth navigation of medical image data." F1000Research 7 (December 24, 2018): 1976. http://dx.doi.org/10.12688/f1000research.17139.1.

Full text
Abstract:
The radiology community has adopted several widely used standards for medical image files, including the popular DICOM (Digital Imaging and Communication in Medicine) and NIfTI (Neuroimaging Informatics Technology Initiative) standards. These file formats include image intensities as well as potentially extensive metadata. The NIfTI standard specifies a particular set of header fields describing the image and minimal information about the scan. DICOM headers can include any of >4,000 available metadata attributes spanning a variety of topics. NIfTI files contain all slices for an image series, while DICOM files capture single slices and image series are typically organized into a directory. Each DICOM file contains metadata for the image series as well as the individual image slice. The programming environment R is popular for data analysis due to its free and open code, active ecosystem of tools and users, and excellent system of contributed packages. Currently, many published radiological image analyses are performed with proprietary software or custom unpublished scripts. However, R is increasing in popularity in this area due to several packages for processing and analysis of image files. While these R packages handle image import and processing, no existing package makes image metadata conveniently accessible. Extracting image metadata, combining across slices, and converting to useful formats can be prohibitively cumbersome, especially for DICOM files. We present radtools, an R package for smooth navigation of medical image data. Radtools makes the problem of extracting image metadata trivially simple, providing simple functions to explore and return information in familiar R data structures. Radtools also facilitates extraction of image data and viewing of image slices. The package is freely available under the MIT license at https://github.com/pamelarussell/radtools and is easily installable from the Comprehensive R Archive Network (https://cran.r-project.org/package=radtools).
APA, Harvard, Vancouver, ISO, and other styles
24

Russell, Pamela H., and Debashis Ghosh. "Radtools: R utilities for convenient extraction of medical image metadata." F1000Research 7 (January 25, 2019): 1976. http://dx.doi.org/10.12688/f1000research.17139.2.

Full text
Abstract:
The radiology community has adopted several widely used standards for medical image files, including the popular DICOM (Digital Imaging and Communication in Medicine) and NIfTI (Neuroimaging Informatics Technology Initiative) standards. These file formats include image intensities as well as potentially extensive metadata. The NIfTI standard specifies a particular set of header fields describing the image and minimal information about the scan. DICOM headers can include any of >4,000 available metadata attributes spanning a variety of topics. NIfTI files contain all slices for an image series, while DICOM files capture single slices and image series are typically organized into a directory. Each DICOM file contains metadata for the image series as well as the individual image slice. The programming environment R is popular for data analysis due to its free and open code, active ecosystem of tools and users, and excellent system of contributed packages. Currently, many published radiological image analyses are performed with proprietary software or custom unpublished scripts. However, R is increasing in popularity in this area due to several packages for processing and analysis of image files. While these R packages handle image import and processing, no existing package makes image metadata conveniently accessible. Extracting image metadata, combining across slices, and converting to useful formats can be prohibitively cumbersome, especially for DICOM files. We present radtools, an R package for convenient extraction of medical image metadata. Radtools provides simple functions to explore and return metadata in familiar R data structures. For convenience, radtools also includes wrappers of existing tools for extraction of pixel data and viewing of image slices. The package is freely available under the MIT license at https://github.com/pamelarussell/radtools and is easily installable from the Comprehensive R Archive Network (https://cran.r-project.org/package=radtools).
APA, Harvard, Vancouver, ISO, and other styles
25

Russell, Pamela H., and Debashis Ghosh. "Radtools: R utilities for convenient extraction of medical image metadata." F1000Research 7 (March 25, 2019): 1976. http://dx.doi.org/10.12688/f1000research.17139.3.

Full text
Abstract:
The radiology community has adopted several widely used standards for medical image files, including the popular DICOM (Digital Imaging and Communication in Medicine) and NIfTI (Neuroimaging Informatics Technology Initiative) standards. These file formats include image intensities as well as potentially extensive metadata. The NIfTI standard specifies a particular set of header fields describing the image and minimal information about the scan. DICOM headers can include any of >4,000 available metadata attributes spanning a variety of topics. NIfTI files contain all slices for an image series, while DICOM files capture single slices and image series are typically organized into a directory. Each DICOM file contains metadata for the image series as well as the individual image slice. The programming environment R is popular for data analysis due to its free and open code, active ecosystem of tools and users, and excellent system of contributed packages. Currently, many published radiological image analyses are performed with proprietary software or custom unpublished scripts. However, R is increasing in popularity in this area due to several packages for processing and analysis of image files. While these R packages handle image import and processing, no existing package makes image metadata conveniently accessible. Extracting image metadata, combining across slices, and converting to useful formats can be prohibitively cumbersome, especially for DICOM files. We present radtools, an R package for convenient extraction of medical image metadata. Radtools provides simple functions to explore and return metadata in familiar R data structures. For convenience, radtools also includes wrappers of existing tools for extraction of pixel data and viewing of image slices. The package is freely available under the MIT license at GitHub and is easily installable from the Comprehensive R Archive Network.
APA, Harvard, Vancouver, ISO, and other styles
26

Lovelace, Jeffrey J., and Gloria E. O. Borgstahl. "Ripple: a program to collect and analyze digital topographic sequences." Journal of Applied Crystallography 39, no. 3 (May 10, 2006): 466–67. http://dx.doi.org/10.1107/s0021889806014956.

Full text
Abstract:
A Microsoft Windows-based system calledRipplehas been developed to drive a digital topography camera and to collect and analyze a sequence of topographic images. It has a graphical user interface, is easy to use and can be parasitically installed at existing beamlines. The modular design allows for the simple addition of detectors, detector image file formats, triggers and motion controllers.
APA, Harvard, Vancouver, ISO, and other styles
27

Arora, Priyanka, and Derminder Singh. "Copy Move Image Forgery Detection with Exact Match Block Based Technique." Oriental journal of computer science and technology 12, Issue 3 (July 29, 2019): 123–31. http://dx.doi.org/10.13005/ojcst12.03.07.

Full text
Abstract:
Digital images are a momentous part of today’s digital communication. It is very easy to manipulate digital images for hiding some useful information by image rendering tools such as Adobe Photoshop, Microsoft Paint etc. The common image forgery which is easy to carry out is copy-move in which some part of an image is copied and pasted on another part of the same image to hide the important information. In this paper we propose an algorithm to spot the copy-move forgery based on exact match block based technique. The algorithm works by matching the regions in image that are equivalent by matching the small blocks of size b b. The program is tested for 45 images of mixed image file formats by considering block sizes 2, 4, 6, 8, 10, 12, 14, and 16. It is observed from the experimental results that the proposed algorithm can detect copy-move image forgery in TIF, BMP and PNG image formats only. Results reveal that as the block size increases, execution time (time taken by CPU to display output) also increases but the number of detected forged images increases till block size 10 and attains saturation thereafter. Consequently block size should be set to 10 for getting good results in terms of less execution time.
APA, Harvard, Vancouver, ISO, and other styles
28

Von Suchodoletz, Dirk, Klaus Rechert, Randolph Welte, Maurice Van den Dobbelsteen, Bill Roberts, Jeffrey Van der Hoeven, and Jasper Schroder. "Automation of Flexible Migration Workflows." International Journal of Digital Curation 6, no. 1 (March 8, 2011): 183–98. http://dx.doi.org/10.2218/ijdc.v6i1.181.

Full text
Abstract:
Many digital preservation scenarios are based on the migration strategy, which itself is heavily tool-dependent. For popular, well-defined and often open file formats – e.g., digital images, such as PNG, GIF, JPEG – a wide range of tools exist. Migration workflows become more difficult with proprietary formats, as used by the several text processing applications becoming available in the last two decades. If a certain file format can not be rendered with actual software, emulation of the original environment remains a valid option. For instance, with the original Lotus AmiPro or Word Perfect, it is not a problem to save an object of this type in ASCII text or Rich Text Format. In specific environments, it is even possible to send the file to a virtual printer, thereby producing a PDF as a migration output. Such manual migration tasks typically involve human interaction, which may be feasible for a small number of objects, but not for larger batches of files.We propose a novel approach using a software-operated VNC abstraction layer in order to replace humans with machine interaction. Emulators or virtualization tools equipped with a VNC interface are very well suited for this approach. But screen, keyboard and mouse interaction is just part of the setup. Furthermore, digital objects need to be transferred into the original environment in order to be extracted after processing. Nevertheless, the complexity of the new generation of migration services is quickly rising; a preservation workflow is now comprised not only of the migration tool itself, but of a complete software and virtual hardware stack with recorded workflows linked to every supported migration scenario. Thus the requirements of OAIS management must include proper software archiving, emulator selection, system image and recording handling. The concept of view-paths could help either to automatically determine the proper pre-configured virtual environment or to set up system images for certain migration workflows. View-paths may rise in demand, as the generation of PDF output files from Word Perfect input could be cached as pre-fabricated emulator system images. The current groundwork provides several possible optimizations, such as using the automation features of the original environments.
APA, Harvard, Vancouver, ISO, and other styles
29

Gürdal, P., C. F. Hildebolt, and B. G. Akdeniz. "The effects of different image file formats and image-analysis software programs on dental radiometric digital evaluations." Dentomaxillofacial Radiology 30, no. 1 (January 1, 2001): 50–55. http://dx.doi.org/10.1038/sj.dmfr.4600570.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Nagarajan, S., and V. Karthikeyani. "Ensemble Classification System for Scientific Chart Recognition from PDF Files." International Journal of Computer Vision and Image Processing 2, no. 4 (October 2012): 1–10. http://dx.doi.org/10.4018/ijcvip.2012100101.

Full text
Abstract:
Portable Document Format (PDF) is the most frequently used universal document format on the Internet and E-Publishing. Wide usage of PDF files has increased the need of conversion tools that convert PDF file content to text or HTML formats. A PDF converter can be categorized into two domains, namely, text recognition and graphics recognition. This paper focus on graphic recognition, especially chart type identification, which is concerned with developing algorithms that has the ability to determine the type of a given chart image from a PDF file. In the proposed system, initially an enhanced connected component and statistical feature based method is used to separate the chart region from other regions. The chart region is then analyzed and grouped as either 2-dimensional or 3-dimensional chart. After separating the graphic component from the text components, feature extraction is performed. The features can be grouped as object features, texture features and shape features. The combined feature vector is then classified using ensemble classification system. Experimental results show that the chart separation, feature extraction and ensemble classification models significantly improve the quality of chart identification.
APA, Harvard, Vancouver, ISO, and other styles
31

Manral, Nisha. "Secure Data Transfer Using Image Steganography." International Journal for Research in Applied Science and Engineering Technology 9, no. VIII (August 10, 2021): 175–80. http://dx.doi.org/10.22214/ijraset.2021.37322.

Full text
Abstract:
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.
APA, Harvard, Vancouver, ISO, and other styles
32

BERRY, IAN, JULIE WILSON, JON DIPROSE, DAVE STUART, STEPHEN FULLER, and ROBERT ESNOUF. "IMAGE STORAGE FOR AUTOMATED CRYSTALLIZATION IMAGING SYSTEMS." International Journal of Neural Systems 15, no. 06 (December 2005): 415–25. http://dx.doi.org/10.1142/s0129065705000384.

Full text
Abstract:
To use crystallography for the determination of the three-dimensional structures of proteins, protein crystals need to be grown. Automated imaging systems are increasingly being used to monitor these crystallization experiments. These present problems of accessibility to the data, repeatability of any image analysis performed and the amount of storage required. Various image formats and techniques can be combined to provide effective solutions to high volume processing problems such as these, however lack of widespread support for the most effective algorithms, such as JPeg2000 which yielded a 64% improvement in file size over the bitmap, currently inhibits the immediate take up of this approach.
APA, Harvard, Vancouver, ISO, and other styles
33

Jung, Jongjin, Myungjin Kim, and Hanku Lee. "A Study on Efficient Design of A Multimedia Conversion Module in PESMS for Social Media Services." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 4 (August 1, 2015): 821. http://dx.doi.org/10.11591/ijece.v5i4.pp821-831.

Full text
Abstract:
The main contribution of this paper is to present the Platform-as-a-Service<br />(PaaS) Environment for Social Multimedia Service (PESMS), derived from<br />the Social Media Cloud Computing Service Environment. The main role of<br />our PESMS is to support the development of social networking services that<br />include audio, image, and video formats. In this paper, we focus in particular on the design and implementation of PESMS, including the transcoding function for processing large amounts of social media in a parallel and distributed manner. PESMS is designed to improve the quality and speed of multimedia conversions by incorporating a multimedia conversion module based on Hadoop, consisting of Hadoop Distributed File System for storing large quantities of social data and MapReduce for distributed parallel processing of these data. In this way, our PESMS has the prospect of exponentially reducing the encoding time for transcoding large numbers of image files into specific formats. To test system performance for the transcoding function, we measured the image transcoding time under a variety of experimental conditions. Based on experiments performed on a 28-node cluster, we found that our system delivered excellent performance in the image transcoding function.
APA, Harvard, Vancouver, ISO, and other styles
34

Himawan, Imam. "Steganografi untuk Keaslian Tanda Tangan yang Terdigitalisasi Algoritma RC4." STRING (Satuan Tulisan Riset dan Inovasi Teknologi) 3, no. 2 (December 6, 2018): 196. http://dx.doi.org/10.30998/string.v3i2.3046.

Full text
Abstract:
Steganography for digitalized signature authenticity with the RC4 algorithm (Ron's Code # 4). We use this concept where the text is hidden behind the image and the intended recipient is able to see it. The purpose of this research is to maintain the authenticity of the digitalized signature by hiding the message therein. So that if there is a problem regarding a fake or suspicious signature related to the document, it can be resolved properly using this system, the authenticity of the document can be known. This system uses the RC4 Algorithm made with visual basic 6 programming language. In the steganography method this method is very useful if used on computer steganography because there are many digital file formats that can be used as a medium to hide messages. Commonly used formats include: Image format: bitmap, gif, jpeg, etc., Audio format: wav, voc, mp3, etc., The method used is to insert a message and display the message Technique testing the system with RGB (Red Green Blue) . The quality of the software produced is tested based on fourthe quality characteristics of the ISO 9126 model software, namely functionality, reliability , usability , and efficiency. The results of this study will be documentation in the office PT. Jaya For Current that fits the needs of the company
APA, Harvard, Vancouver, ISO, and other styles
35

Sharov, Grigory, Dustin R. Morado, Marta Carroni, and José Miguel de la Rosa-Trevín. "Using RELION software within the Scipion framework." Acta Crystallographica Section D Structural Biology 77, no. 4 (March 30, 2021): 403–10. http://dx.doi.org/10.1107/s2059798321001856.

Full text
Abstract:
Scipion is a modular image-processing framework that integrates several software packages under a unified interface while taking care of file formats and conversions. Here, new developments and capabilities of the Scipion plugin for the widely used RELION software package are presented and illustrated with an image-processing pipeline for published data. The user interfaces of Scipion and RELION are compared and the key differences are highlighted, allowing this manuscript to be used as a guide for both new and experienced users of this software. Different on-the-fly image-processing options are also discussed, demonstrating the flexibility of the Scipion framework.
APA, Harvard, Vancouver, ISO, and other styles
36

Honsinger, Chris. "Book Rvw, Compressed Image File Formats: JPEG, PNG, GIF, XBM, BMP, 1/e, by John Miamo." Journal of Electronic Imaging 9, no. 3 (July 1, 2000): 347. http://dx.doi.org/10.1117/1.482751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Estrela, Vania V. "DICOM’s Standardization in Histo-Pathology." Medical Technologies Journal 4, no. 3 (December 7, 2020): 578–79. http://dx.doi.org/10.26415/2572-004x-vol4iss3p578-579.

Full text
Abstract:
Background: The Digital Imaging and Communications in Medicine (DICOM) standard helps to represent, store, and to exchange healthcare images associated with its data. DICOM develops over time and is continuously adapted to match the rigors of new clinical demands and technologies. An uphill battle in this regard is to conciliate new software programs with legacy systems. Methods: This work discusses the essential aspects of the standard and assesses its capabilities and limitations in a multisite, multivendor healthcare system aiming at Whole Slicing Image (WSI) procedures. Selected relevant DICOM attributes help to develop and organize WSI applications that extract and handle image data, integrated patient records, and metadata. DICOM must also interface with proprietary file formats, clinical metadata and from different laboratory information systems. Standard DICOM validation tools to measure encoding, storing, querying and retrieval of medical data can verify the generated DICOM files over the web. Results: This work investigates the current regulations and recommendations for the use of DICOM with WSI data. They rely mostly on the EU guidelines that help envision future needs and extensions based on new examination modalities like concurrent use of WSI with in-vitro imaging and 3D WSI. Conclusion: A DICOM file format and communication protocol for pathology has been defined. However, adoption by vendors and in the field is pending. DICOM allows efficient access and prompt availability of WSI data as well as associated metadata. By leveraging a wealth of existing infrastructure solutions, the use of DICOM facilitates enterprise integration and data exchange for digital pathology. In the future, the DICOM standard will have to address several issues due to the way samples are gathered and encompassing new imaging technologies.
APA, Harvard, Vancouver, ISO, and other styles
38

Fu, Zhe. "Embedded Image and Video Coding Algorithm Based on Adaptive Filtering Equation." Advances in Mathematical Physics 2021 (September 8, 2021): 1–11. http://dx.doi.org/10.1155/2021/7953993.

Full text
Abstract:
Based on the improved adaptive filtering method, this paper conducts in-depth discussion and research on embedded graphics and video coding and chooses to improve the adaptive filtering algorithm from three aspects: starting point prediction, search template, and window partitioning. The algorithm is imported into the encoder for video capture and encoding. By capturing videos of different formats, resolutions, and times, the memory size of the video files collected before and after the algorithm optimization is compared, and the optimized algorithm occupies the memory space of the video file in the actual system. The conclusion of less and higher coding rates. The collected video information is stored on a personal computer equipped with a freeness, and external electronic devices only need to download and install the browser, and the collected video information can be accessed in the local area network through the protocol. The improved coding algorithm has higher coding efficiency and can reduce the storage space occupied by the video.
APA, Harvard, Vancouver, ISO, and other styles
39

Ergüzen, Atilla, and Erdal Erdal. "An Efficient Middle Layer Platform for Medical Imaging Archives." Journal of Healthcare Engineering 2018 (June 21, 2018): 1–12. http://dx.doi.org/10.1155/2018/3984061.

Full text
Abstract:
Digital medical image usage is common in health services and clinics. These data have a vital importance for diagnosis and treatment; therefore, preservation, protection, and archiving of these data are a challenge. Rapidly growing file sizes differentiated data formats and increasing number of files constitute big data, which traditional systems do not have the capability to process and store these data. This study investigates an efficient middle layer platform based on Hadoop and MongoDB architecture using the state-of-the-art technologies in the literature. We have developed this system to improve the medical image compression method that we have developed before to create a middle layer platform that performs data compression and archiving operations. With this study, a platform using MapReduce programming model on Hadoop has been developed that can be scalable. MongoDB, a NoSQL database, has been used to satisfy performance requirements of the platform. A four-node Hadoop cluster has been built to evaluate the developed platform and execute distributed MapReduce algorithms. The actual patient medical images have been used to validate the performance of the platform. The processing of test images takes 15,599 seconds on a single node, but on the developed platform, this takes 8,153 seconds. Moreover, due to the medical imaging processing package used in the proposed method, the compression ratio values produced for the non-ROI image are between 92.12% and 97.84%. In conclusion, the proposed platform provides a cloud-based integrated solution to the medical image archiving problem.
APA, Harvard, Vancouver, ISO, and other styles
40

Tikhonov, Alexey. "Preservation of Digital Images: Question of Fixity." Heritage 2, no. 2 (April 17, 2019): 1160–65. http://dx.doi.org/10.3390/heritage2020075.

Full text
Abstract:
One of the most important aspects of the long-term digital-image preservation strategy is maintaining data fixity, i.e., assuring the integrity and authenticity of original data. This article aims to highlight the limitations of the approaches used to maintain the fixity of digital images in the digital preservation process and to offer perceptual hashing as a way to alleviate some of the limitations of current approaches, as well as discuss some non-technical implications of the described problems. This paper is exploratory, and while it includes a simple experiment description, it only outlines the problem and testing environment for a possible solution that could be elaborated on in further research. The most commonly used fixity maintaining techniques are immutability of data and file checksums/cryptographic hashes. On the other hand, planning for long-term preservation necessitates the need to migrate data into new future formats to maintain availability and sustainability, and the concept of the file itself should not be assumed to remain forever, which calls for other tools to ascertain the fixity of digital images. The problem goes beyond one that is exclusively technical: bitstream content is not ready for human perception, and the digital preservation strategy should include all the necessary technical steps to assure the availability of stored images to human eyes. This shifts the perspective on what should be considered the digital image in digital preservation. It is not the file, but a perceptible object, or, more specifically—instructions to create one. Therefore, it calls for additional tools to maintain fixity, such as perceptual hashing, transformation logging, and others.
APA, Harvard, Vancouver, ISO, and other styles
41

Moreno, Valentín, Gonzalo Génova, Manuela Alejandres, and Anabel Fraga. "Automatic Classification of Web Images as UML Static Diagrams Using Machine Learning Techniques." Applied Sciences 10, no. 7 (April 1, 2020): 2406. http://dx.doi.org/10.3390/app10072406.

Full text
Abstract:
Our purpose in this research is to develop a method to automatically and efficiently classify web images as Unified Modeling Language (UML) static diagrams, and to produce a computer tool that implements this function. The tool receives a bitmap file (in different formats) as an input and communicates whether the image corresponds to a diagram. For pragmatic reasons, we restricted ourselves to the simplest kinds of diagrams that are more useful for automated software reuse: computer-edited 2D representations of static diagrams. The tool does not require that the images are explicitly or implicitly tagged as UML diagrams. The tool extracts graphical characteristics from each image (such as grayscale histogram, color histogram and elementary geometric forms) and uses a combination of rules to classify it. The rules are obtained with machine learning techniques (rule induction) from a sample of 19,000 web images manually classified by experts. In this work, we do not consider the textual contents of the images. Our tool reaches nearly 95% of agreement with manually classified instances, improving the effectiveness of related research works. Moreover, using a training dataset 15 times bigger, the time required to process each image and extract its graphical features (0.680 s) is seven times lower.
APA, Harvard, Vancouver, ISO, and other styles
42

Tamboli, Meera. "Image Steganography using 3 ways of Encryption for Highly Secured Data Transmission." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 4739–45. http://dx.doi.org/10.22214/ijraset.2021.35572.

Full text
Abstract:
Steganography exists from many years in a variety of forms and has been used in a variety of domains. There are various types of steganographic techniques that are used to hide data in various file formats. The proposed model uses three layers of security using three algorithms namely, LSB, DES and AES. The software allows the user to encrypt the secret message which gets protected by undergoing three layers of encryption. The output of the encryption process which is the steno image can be sent across through any medium along with the secret key to decrypt. The end user then uses a unique key to extract and decrypt the secret message from the image. There are many reasons to hide data but the simplest is the need to prevent unauthorized persons from accessing the secret information.
APA, Harvard, Vancouver, ISO, and other styles
43

Hotan, A. W., W. van Straten, and R. N. Manchester. "psrchive and psrfits: An Open Approach to Radio Pulsar Data Storage and Analysis." Publications of the Astronomical Society of Australia 21, no. 3 (2004): 302–9. http://dx.doi.org/10.1071/as04022.

Full text
Abstract:
AbstractA new set of software applications and libraries for use in the archival and analysis of pulsar astronomical data is introduced. Known collectively as the psrchive scheme, the code was developed in parallel with a new data storage format called psrfits, which is based on the Flexible Image Transport System (FITS). Both of these projects utilise a modular, object-oriented design philosophy. psrchive is an open source development environment that incorporates an extensive range of c++ object classes and pre-built command line and graphical utilities. These deal transparently and simultaneously with multiple data storage formats, thereby enhancing data portability and facilitating the adoption of the psrfits file format. Here, data are stored in a series of modular header–data units that provide flexibility and scope for future expansion. As it is based on FITS, various standard libraries and applications may be used for data input, output, and visualisation. Both psrchive and psrfits are made publicly available to the academic community in the hope that this will promote their widespread use and acceptance.
APA, Harvard, Vancouver, ISO, and other styles
44

Kumar, Vinay, Abhishek Bansal, and Sunil Kumar Muttoo. "Data Hiding Method Based on Inter-Block Difference in Eight Queens Solutions and LSB Substitution." International Journal of Information Security and Privacy 8, no. 2 (April 2014): 55–68. http://dx.doi.org/10.4018/ijisp.2014040104.

Full text
Abstract:
Data hiding is an emerging field of research for secure data transmission over internet, ensuring ownership identification and copyright protection. A couple of techniques have been proposed based on pixel value differencing (PVD) and eight queens' solutions. In this paper, a new data hiding method based on inter-block difference in eight queen's solutions is presented. The result of inter-block difference is XORED with ASCII code of character from the message and the resultant value is embedded in LSB position. The presented approach is more efficient and it provides a more capacity with good imperceptibility. The approach supports different digital image file formats such as bmp, png and tiff.
APA, Harvard, Vancouver, ISO, and other styles
45

Dadaev, Tokhir, Daniel A. Leongamornlert, Edward J. Saunders, Rosalind Eeles, and Zsofia Kote-Jarai. "LocusExplorer: a user-friendly tool for integrated visualization of human genetic association data and biological annotations." Bioinformatics 32, no. 6 (November 20, 2015): 949–51. http://dx.doi.org/10.1093/bioinformatics/btv690.

Full text
Abstract:
Abstract Summary: In this article, we present LocusExplorer, a data visualization and exploration tool for genetic association data. LocusExplorer is written in R using the Shiny library, providing access to powerful R-based functions through a simple user interface. LocusExplorer allows users to simultaneously display genetic, statistical and biological data for humans in a single image and allows dynamic zooming and customization of the plot features. Publication quality plots may then be produced in a variety of file formats. Availability and implementation: LocusExplorer is open source and runs through R and a web browser. It is available at www.oncogenetics.icr.ac.uk/LocusExplorer/ or can be installed locally and the source code accessed from https://github.com/oncogenetics/LocusExplorer. Contact: tokhir.dadaev@icr.ac.uk
APA, Harvard, Vancouver, ISO, and other styles
46

Muttoo, Sunil Kumar, Vinay Kumar, and Abhishek Bansal. "Secure Data Hiding Using Eight Queens Solutions." International Journal of Information Security and Privacy 6, no. 4 (October 2012): 55–70. http://dx.doi.org/10.4018/jisp.2012100103.

Full text
Abstract:
The 8-queens problem of placing 8 non-attacking queens on an 8x8 chessboard is used to hide message in an image. The method helps in randomizing the bit selection in a cover image for hiding purpose. Cover image is divided into blocks of 8x1 bytes and then masked with solutions of the 8-queens problem. Bits from the block are collected corresponding to the 8-queen solution to make a 7 bit string. LSB of the block is not considered. It gives a number in the range of 0 to 127. If a bit string, corresponding to the 8-queens solutions, matches with ASCII code of the first character from message, the corresponding solution number of the 8-queens problem is encrypted using RC4, and the cipher is stored in first block of the cover. This encrypted value works as key. The solution number corresponding to next character is XORED with the key and the resultant value is embedded in the LSB of next block. The algorithm has been tested with cover of different image file formats like BMP, PNG and TIFF. The algorithm provides very good capacity, imperceptibility and robustness.
APA, Harvard, Vancouver, ISO, and other styles
47

Babenko, L., A. Shumilin, and D. Alekseev. "Algorithm of ensuring confidential data security of the cloud medical information system." E3S Web of Conferences 224 (2020): 03023. http://dx.doi.org/10.1051/e3sconf/202022403023.

Full text
Abstract:
The objectives of the study are to develop and assess the effectiveness of the structure of a cloud platform for storing, processing and organizing medical data, determining a method of protection, in particular, ensuring confidentiality when transferring and storing examination results. The proposed method for protecting a medical information system involves the use of an original DICOM file and subsequently a converted PNG image, which is subjected to a pixel encryption algorithm. An algorithm based on chaos theory is used to encrypt the image. The capabilities of chaos systems can significantly increase productivity. Hierarchical division of data streams into levels and standardization of data transmission protocols, as well as their storage formats, allow to form a universal, flexible and reliable medical information system. The proposed architecture has the ability to integrate into existing medical systems. In the course of the work, it was found that the considered protection method is an effective way to ensure the confidentiality of medical system data.
APA, Harvard, Vancouver, ISO, and other styles
48

Pinard, Philippe T., Marin Lagacé, Pierre Hovington, Denis Thibault, and Raynald Gauvin. "An Open-Source Engine for the Processing of Electron Backscatter Patterns: EBSD-Image." Microscopy and Microanalysis 17, no. 3 (May 6, 2011): 374–85. http://dx.doi.org/10.1017/s1431927611000456.

Full text
Abstract:
AbstractAn open source software package dedicated to processing stored electron backscatter patterns is presented. The package gives users full control over the type and order of operations that are performed on electron backscatter diffraction (EBSD) patterns as well as the results obtained. The current version of EBSD-Image (www.ebsd-image.org) offers a flexible and structured interface to calculate various quality metrics over large datasets. It includes unique features such as practical file formats for storing diffraction patterns and analysis results, stitching of mappings with automatic reorganization of their diffraction patterns, and routines for processing data on a distributed computer grid. Implementations of the algorithms used in the software are described and benchmarked using simulated diffraction patterns. Using those simulated EBSD patterns, the detection of Kikuchi bands in EBSD-Image was found to be comparable to commercially available EBSD systems. In addition, 24 quality metrics were evaluated based on the ability to assess the level of deformation in two samples (copper and iron) deformed using 220 grit SiC grinding paper. Fourteen metrics were able to properly measure the deformation gradient of the samples.
APA, Harvard, Vancouver, ISO, and other styles
49

Torheim, G., M. Lombardi, and P. A. Rinck. "An independent software system for the analysis of dynamic MR images." Acta Radiologica 38, no. 1 (January 1997): 165–72. http://dx.doi.org/10.1080/02841859709171262.

Full text
Abstract:
Purpose: A computer system for the manual, semi-automatic, and automatic analysis of dynamic MR images was to be developed on UNIX and personal computer platforms. The system was to offer an integrated and standardized way of performing both image processing and analysis that was independent of the MR unit used. Material and Methods: The system consists of modules that are easily adaptable to special needs. Data from MR units or other diagnostic imaging equipment in techniques such as CT, ultrasonography, or nuclear medicine can be processed through the ACR-NEMA/DICOM standard file formats. A full set of functions is available, among them cine-loop visual analysis, and generation of time-intensity curves., Parameters such as cross-correlation coefficients, area under the curve, peak/maximum intensity, wash-in and wash-out slopes, time to peak, and relative signal intensity/contrast enhancement can be calculated. Other parameters can be extracted by fitting functions like the gamma-variate function. Region-of-interest data and parametric values can easily be exported. Results and Conclusion: The system has been successfully tested in animal and patient examinations.
APA, Harvard, Vancouver, ISO, and other styles
50

Sánchez Rodríguez, Filomeno, Shahram Mesdaghi, Adam J. Simpkin, J. Javier Burgos-Mármol, David L. Murphy, Ville Uski, Ronan M. Keegan, and Daniel J. Rigden. "ConPlot: web-based application for the visualization of protein contact maps integrated with other data." Bioinformatics 37, no. 17 (January 28, 2021): 2763–65. http://dx.doi.org/10.1093/bioinformatics/btab049.

Full text
Abstract:
Abstract Summary Covariance-based predictions of residue contacts and inter-residue distances are an increasingly popular data type in protein bioinformatics. Here we present ConPlot, a web-based application for convenient display and analysis of contact maps and distograms. Integration of predicted contact data with other predictions is often required to facilitate inference of structural features. ConPlot can therefore use the empty space near the contact map diagonal to display multiple coloured tracks representing other sequence-based predictions. Popular file formats are natively read and bespoke data can also be flexibly displayed. This novel visualization will enable easier interpretation of predicted contact maps. Availability and implementation available online at www.conplot.org, along with documentation and examples. Alternatively, ConPlot can be installed and used locally using the docker image from the project’s Docker Hub repository. ConPlot is licensed under the BSD 3-Clause. Supplementary information Supplementary data are available at Bioinformatics online.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography