Academic literature on the topic 'Image schemes'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Image schemes.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Image schemes"

1

HU, YU-CHEN. "LOW BIT-RATE IMAGE COMPRESSION SCHEMES BASED ON VECTOR QUANTIZATION." International Journal of Image and Graphics 05, no. 04 (2005): 745–64. http://dx.doi.org/10.1142/s0219467805001963.

Full text
Abstract:
Three image compression schemes based on vector quantization are proposed in this paper. The block similarity property among neighboring image blocks is exploited in these schemes to cut down the bit rate of the vector quantization scheme. For the first scheme, the correlation among the encoded block to the left and the encoded block directly above the current processing block is exploited. In the second scheme, the relative addressing technique is incorporated into the encoding procedure. Finally, the third scheme introduces a simple technique to reduce the required bit rate with only a sligh
APA, Harvard, Vancouver, ISO, and other styles
2

Hu, Wei-Tong, Ming-Chu Li, Cheng Guo, and Li-Feng Yuan. "A Reversible Steganography Scheme of Secret Image Sharing Based on Cellular Automata and Least Significant Bits Construction." Mathematical Problems in Engineering 2015 (2015): 1–11. http://dx.doi.org/10.1155/2015/849768.

Full text
Abstract:
Secret image sharing schemes have been extensively studied by far. However, there are just a few schemes that can restore both the secret image and the cover image losslessly. These schemes have one or more defects in the following aspects: (1) high computation cost; (2) overflow issue existing when modulus operation is used to restore the cover image and the secret image; (3) part of the cover image being severely modified and the stego images having worse visual quality. In this paper, we combine the methods of least significant bits construction (LSBC) and dynamic embedding with one-dimensi
APA, Harvard, Vancouver, ISO, and other styles
3

Son, J., H. Kim, and T. Kim. "COMPARISON OF GEOMETRIC CORRECTION SCHEMES FOR GEOSTATIONARY OCEAN COLOR IMAGER SLOTS WITHOUT GCPS." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-4 (September 19, 2018): 587–90. http://dx.doi.org/10.5194/isprs-archives-xlii-4-587-2018.

Full text
Abstract:
<p><strong>Abstract.</strong> Currently, the geometric correction process of GOCI (Geostationary Ocean Color Imager) image is performed by matching slot images against shorelines and utilizing the matching results as GCPs (Ground Control Point). However, there are several GOCI slots without shorelines and for such slots acquiring GCPs is not easy. The purpose of this paper is to compare several alternative geometric correction schemes applicable to the slots without GCPs. We analyzed three schemes. The first scheme is to apply the correction angle of the same slot in the most
APA, Harvard, Vancouver, ISO, and other styles
4

Gururaj, Bharathi, and G. N. Sadashivappa. "Channel encoding system for transmitting image over wireless network." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (2020): 4655. http://dx.doi.org/10.11591/ijece.v10i5.pp4655-4662.

Full text
Abstract:
Various encoding schemes have been introduced till date focusing on an effective image transmission scheme in presence of error-prone artifacts in wireless communication channel. Review of existing schemes of channel encoding systems infer that they are mostly inclined on compression scheme and less over problems of superior retention of signal retention as they lacks an essential consideration of network states. Therefore, the proposed manuscript introduces a cost effective lossless encoding scheme which ensures resilient transmission of different forms of images. Adopting an analytical resea
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Lina, Xuan Dang, Li Feng, and Junhan Yang. "Efficient Secret Image Sharing Scheme with Authentication and Cheating Prevention." Mathematical Problems in Engineering 2021 (August 21, 2021): 1–11. http://dx.doi.org/10.1155/2021/9274415.

Full text
Abstract:
Due to the widespread adoption and popularity of digital images in distributed storage, Secret Image Sharing (SIS) has attracted much attention. However, preventing the cheating of shares is an important problem that needs to be solved in the traditional SIS scheme. An adversary without image shares may participate in the restoration phase as a share owner. In this phase, the adversary can obtain real shares or prevent recovering real images by submitting fake shadows. Our schemes are based on the original Thien-Lin’s scheme. In the scheme I, we use some XOR operations to get two authenticatio
APA, Harvard, Vancouver, ISO, and other styles
6

YANG, CHING-NUNG, and TSE-SHIH CHEN. "EXTENDED VISUAL SECRET SHARING SCHEMES: IMPROVING THE SHADOW IMAGE QUALITY." International Journal of Pattern Recognition and Artificial Intelligence 21, no. 05 (2007): 879–98. http://dx.doi.org/10.1142/s0218001407005740.

Full text
Abstract:
Visual secret sharing (VSS) scheme is a perfectly secure method to divide a secret image into several noise-like shadow images by splitting a secret pixel into black and white subpixels. Unlike other secret sharing schemes, the VSS scheme can be easily decoded by the human visual sight when staking shadow images. However, noise-like shadows are unusual and suspected by censors when delivered by e-mail or fax. Also, noise-like shadows are difficult to identify and manage when distributed. The problem was solved by adding the extended capability, a meaningful shadow image, in the so-called exten
APA, Harvard, Vancouver, ISO, and other styles
7

Ratan, Ram, and Arvind Yadav. "Security Analysis of Bit plane Level Image Encryption Schemes." Defence Science Journal 71, no. 2 (2021): 209–21. http://dx.doi.org/10.14429/dsj.71.15643.

Full text
Abstract:
A selective bit-plane encryption scheme was proposed for securing the transmission of image data in mobile environments with a claim that it provides a high security viz. the encryption of the four most significant bit-planes is sufficient for a high image data security. This paper presents the security analysis of the said encryption scheme and reports new important results. We perform the security analysis of the bit-level encryption by considering the normal images and their histogram equalised enhanced images. We consider different bit-plane aspects to analyse the security of the image enc
APA, Harvard, Vancouver, ISO, and other styles
8

K., Ms CHITRA, and Dr V. PRASANNA VENKATESAN. "An Antiquity to the contemporary of Secret Sharing Scheme." Journal of Innovative Image Processing 2, no. 1 (2020): 1–13. http://dx.doi.org/10.36548/jiip.2020.1.001.

Full text
Abstract:
Secret Sharing (SS) scheme divides a secret image into shadow images (referred to as shares) in a way that requires the shadows in a certain privileged coalition for the secret reconstruction. However, the secret image cannot be revealed if they are not combined in a prescribed way. In this paper, the evolution of the traditional secret sharing scheme to the contemporary of secret sharing scheme has been presented based on its technology adoption. The basic comparison between the traditional secret sharing scheme and Visual cryptography is presented. The image-based share generation process ha
APA, Harvard, Vancouver, ISO, and other styles
9

Sun, Jianglin, Xiaofeng Liao, Xin Chen, and Shangwei Guo. "Privacy-Aware Image Encryption Based on Logistic Map and Data Hiding." International Journal of Bifurcation and Chaos 27, no. 05 (2017): 1750073. http://dx.doi.org/10.1142/s0218127417500730.

Full text
Abstract:
The increasing need for image communication and storage has created a great necessity for securely transforming and storing images over a network. Whereas traditional image encryption algorithms usually consider the security of the whole plain image, region of interest (ROI) encryption schemes, which are of great importance in practical applications, protect the privacy regions of plain images. Existing ROI encryption schemes usually adopt approximate techniques to detect the privacy region and measure the quality of encrypted images; however, their performance is usually inconsistent with a h
APA, Harvard, Vancouver, ISO, and other styles
10

Cai, Hongliang, and Dan Tang. "Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares." Mathematics 8, no. 9 (2020): 1582. http://dx.doi.org/10.3390/math8091582.

Full text
Abstract:
A Multi Secret Image sharing scheme can share several secret images among certain participators securely. Boolean-based secret sharing schemes are one kind of secret sharing method with light-weighted computation compared to the previous complex algebraic-based methods, which can realize the sharing of multi secret images. However, the existing Boolean-based multi secret sharing schemes are mostly restricted to the particular case of (2, n) and (n, n), only few Boolean-based multi secret sharing schemes study the general access structure, and the shares are mostly meaningless. In this paper, a
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Image schemes"

1

Han, Bin. "Subdivision schemes, biorthogonal wavelets and image compression." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape15/PQDD_0013/NQ34774.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

方惠靑 and Wai-ching Fong. "Perceptual models and coding schemes for image compression." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1997. http://hub.hku.hk/bib/B31235785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fong, Wai-ching. "Perceptual models and coding schemes for image compression /." Hong Kong : University of Hong Kong, 1997. http://sunzi.lib.hku.hk/hkuto/record.jsp?B18716064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Athavale, Prashant Vinayak. "Novel integro-differential schemes for multiscale image representation." College Park, Md.: University of Maryland, 2009. http://hdl.handle.net/1903/9691.

Full text
Abstract:
Thesis (Ph.D.) -- University of Maryland, College Park, 2009.<br>Thesis research directed by: Applied Mathematics & Statistics, and Scientific Computation Program. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
5

Wadhwani, Sandeep. "Using chaotic encryption schemes in distributed image storage." Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=119757.

Full text
Abstract:
Security and privacy of photos stored in the clear in third party servers has been the biggest concern for customers in recent years. One way of enhancing the privacy and security of photos stored in third party servers is to encrypt the photos before storing them. However, using encryption to secure the information held in the photos precludes applying any image processing operations while they are held in the third party servers. To address this issue, we have designed and implemented a distributed image storage system that is based on the Chord protocol which enhances privacy using chaotic
APA, Harvard, Vancouver, ISO, and other styles
6

Fan, Jiahua. "Development of Image Display-Specific Evaluation and Optimization Schemes." Diss., The University of Arizona, 2006. http://hdl.handle.net/10150/195754.

Full text
Abstract:
An electronic display is typically the last stage of an imaging chain before the human observer. Some of its physical properties can make it a bottleneck in the chain. This dissertation is an attempt to study and cope with certain critical properties of electronic displays, specifically spatial resolution, noise and contrast. The focus of this study lies in two parts. One is the measurement and estimation of display properties, including the spatial resolution and the spatial noise. The other is on the development of display-based image processing algorithms, which can compensate for the degra
APA, Harvard, Vancouver, ISO, and other styles
7

Lulich, Daniel P. "Zero-crossings : symbolic vision primitives emulating physiologic encoding schemes /." Full text open access at:, 1985. http://content.ohsu.edu/u?/etd,94.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Masupe, Shedden. "Low power VLSI implementation schemes for DCT-based image compression." Thesis, University of Edinburgh, 2001. http://hdl.handle.net/1842/12604.

Full text
Abstract:
The Discrete Cosine Transform(DCT) is the basis for current video standards like H.261, JPEG and MPEG. Since the DCT involves matrix multiplication, it is a very computationally intensive operation. Matrix multiplication entails repetitive sum of products which are carried out numerous times during the DCT computation. Therefore, as a result of the multiplications, a significant amount of switching activity takes place during the DCT process. This thesis proposes a number of new implementation schemes that reduce the switching capacitance within a DCT processor for either JPEG or MPEG environm
APA, Harvard, Vancouver, ISO, and other styles
9

Tyler, Jonathan. "Analysis and implementation of high-order compact finite difference schemes /." Diss., CLICK HERE for online access, 2007. http://contentdm.lib.byu.edu/ETD/image/etd2177.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kovvuri, Prem. "Investigation of Different Video Compression Schemes Using Neural Networks." ScholarWorks@UNO, 2006. http://scholarworks.uno.edu/td/320.

Full text
Abstract:
Image/Video compression has great significance in the communication of motion pictures and still images. The need for compression has resulted in the development of various techniques including transform coding, vector quantization and neural networks. this thesis neural network based methods are investigated to achieve good compression ratios while maintaining the image quality. Parts of this investigation include motion detection, and weight retraining. An adaptive technique is employed to improve the video frame quality for a given compression ratio by frequently updating the weigh
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Image schemes"

1

Hedblom, Maria M. Image Schemas and Concept Invention. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47329-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ikonomakis, Nicolaos. A hybrid colour image segmentation scheme. National Library of Canada, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

How the body shapes the mind. Clarendon Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gallagher, Shaun. How the body shapes the mind. Clarendon, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Body images: Embodiment as intercorporeality. Routledge, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Aburas, Abdul Razag Ali. Data compression schemes for pattern recognition in digital images using fractals. SERCentre, De Montfort University, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Aburas, Abdul Razag Ali. Data compression schemes for pattern recognition in digital images using fractals. De Montfort University, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sowelam, Sameh Mahmoud. A packet loss recovery scheme for images and video. National Library of Canada, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Body schema and body image: An interdisciplinary and philosophical study. Swets & Zeitlinger, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Surrounded by bitterness: Image schemas and metaphors for conceptualizing distress in Classical Hebrew. Pickwick Publications, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Image schemes"

1

Eymard, Robert, Angela Handlovičová, Raphaèle Herbin, Karol Mikula, and Olga Stašová. "Gradient Schemes for Image Processing." In Finite Volumes for Complex Applications VI Problems & Perspectives. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20671-9_45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Feng, and Wei Qi Yan. "Various Visual Cryptography Schemes." In Visual Cryptography for Image Processing and Security. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09644-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Feng, and Wei Qi Yan. "Various Visual Cryptography Schemes." In Visual Cryptography for Image Processing and Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23473-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cantoni, V. "Classification Schemes for Image Processing Architectures." In Computer Architectures for Spatially Distributed Data. Springer Berlin Heidelberg, 1985. http://dx.doi.org/10.1007/978-3-642-82150-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Barbu, Tudor. "Linear PDE-Based Image Denoising Schemes." In Novel Diffusion-Based Models for Image Restoration and Interpolation. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93006-0_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yan, Bin, Yong Xiang, and Guang Hua. "Improving Visual Quality for Vector Schemes." In Improving Image Quality in Visual Cryptography. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-8289-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Feng, and Wei Qi Yan. "Various Color Schemes of Visual Cryptography." In Visual Cryptography for Image Processing and Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23473-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Feng, and Wei Qi Yan. "Various Color Schemes of Visual Cryptography." In Visual Cryptography for Image Processing and Security. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09644-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Johnson, Valen E., Wing H. Wong, Xiaoping Hu, and Chin-Tu Chen. "Data Augmentation Schemes Applied to Image Restoration." In Medical Images: Formation, Handling and Evaluation. Springer Berlin Heidelberg, 1992. http://dx.doi.org/10.1007/978-3-642-77888-9_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cohen, Albert, and Basarab Matei. "Nonlinear Subdivision Schemes: Applications to Image Processing." In Mathematics and Visualization. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-662-04388-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Image schemes"

1

Morse, Bryan S., Daniel Thornton, Qing Xia, and John Uibel. "Image-Based Color Schemes." In 2007 IEEE International Conference on Image Processing. IEEE, 2007. http://dx.doi.org/10.1109/icip.2007.4379355.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dadkhahi, Hamid, and Marco F. Duarte. "Masking schemes for image manifolds." In 2014 IEEE Statistical Signal Processing Workshop (SSP). IEEE, 2014. http://dx.doi.org/10.1109/ssp.2014.6884623.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Yadong, Hongying Zhang, Yu Sun, and Hanyong Guo. "Two Image Compression Schemes Based on Image Inpainting." In 2009 International Joint Conference on Computational Sciences and Optimization, CSO. IEEE, 2009. http://dx.doi.org/10.1109/cso.2009.470.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ratnakar, Viresh, Ephraim Feig, and Prasoon Tiwari. "Fractal-based hybrid compression schemes." In Visual Communications and Image Processing '94, edited by Aggelos K. Katsaggelos. SPIE, 1994. http://dx.doi.org/10.1117/12.185987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lian, Jian-ao. "Two Adaptive Schemes for Image Sharpening." In 2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT). IEEE, 2019. http://dx.doi.org/10.1109/infoct.2019.8711269.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yamamoto, Hiromichi. "Restoration Schemes for Spectropolarimeter Image Data." In 54th International Astronautical Congress of the International Astronautical Federation, the International Academy of Astronautics, and the International Institute of Space Law. American Institute of Aeronautics and Astronautics, 2003. http://dx.doi.org/10.2514/6.iac-03-b.6.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Crosier, M. S., and L. D. Griffin. "Zipf's Law in Image Coding Schemes." In British Machine Vision Conference 2007. British Machine Vision Association, 2007. http://dx.doi.org/10.5244/c.21.57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Abid, M., M. Cagnazzo, and B. Pesquet-Popescu. "Image denoising by adaptive lifting schemes." In 2010 2nd European Workshop on Visual Information Processing (EUVIP). IEEE, 2010. http://dx.doi.org/10.1109/euvip.2010.5699143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Harrison, Chris, Anind K. Dey, and Scott E. Hudson. "Evaluation of progressive image loading schemes." In the 28th international conference. ACM Press, 2010. http://dx.doi.org/10.1145/1753326.1753557.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Chunhu, Guangchun Luo, Ke Qin, and Chunbao Li. "Chaotic Image Encryption Schemes: A Review." In 2017 2nd International Conference on Electrical, Automation and Mechanical Engineering (EAME 2017). Atlantis Press, 2017. http://dx.doi.org/10.2991/eame-17.2017.61.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Image schemes"

1

Cohen, Paul, and Carole Beal. LGIST: Learning Generalized Image Schemas for Transfer. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada491488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!