To see the other types of publications on this topic, follow the link: Jpeg to Mpeg conversion.

Journal articles on the topic 'Jpeg to Mpeg conversion'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Jpeg to Mpeg conversion.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kliuchenia, V. V. "Design of a discrete сosine transformation processor for image compression systems on a losless-to-lossy circuit". Doklady BGUIR 19, № 3 (2021): 5–13. http://dx.doi.org/10.35596/1729-7648-2021-19-3-5-13.

Full text
Abstract:
Today, mobile multimedia systems that use the H.261 / 3/4/5, MPEG-1/2/4 and JPEG standards for encoding / decoding video, audio and images are widely spread [1–4]. The core of these standards is the discrete cosine transform (DCT) of I, II, III ... VIII types [DCT]. Wide support in a huge number of multimedia applications of the JPEG format by circuitry and software solutions and the need for image coding according to the L2L scheme determines the relevance of the problem of creating a decorrelated transformation based on DCT and methods for rapid prototyping of processors for computing an integer DCT on programmable systems on a FPGA chip. At the same time, such characteristics as structural regularity, modularity, high computational parallelism, low latency and power consumption are taken into account. Direct and inverse transformation should be carried out according to the “whole-to-whole” processing scheme with preservation of the perfective reconstruction of the original image (the coefficients are represented by integer or binary rational numbers; the number of multiplication operations is minimal, if possible, they are excluded from the algorithm). The wellknown integer DCTs (BinDCT, IntDCT) do not give a complete reversible bit to bit conversion. To encode an image according to the L2L scheme, the decorrelated transform must be reversible and implemented in integer arithmetic, i. e. the conversion would follow an “integer-to-integer” processing scheme with a minimum number of rounding operations affecting the compactness of energy in equivalent conversion subbands. This article shows how, on the basis of integer forward and inverse DCTs, to create a new universal architecture of decorrelated transform on FPGAs for transformational image coding systems that operate on the principle of “lossless-to-lossy” (L2L), and to obtain the best experimental results for objective and subjective performance compared to comparable compression systems.
APA, Harvard, Vancouver, ISO, and other styles
2

Ja-Ling Wu, Shiao-Jiuan Huang, Yuh-Ming Huang, Chiou-Ting Hsu, and Jiun Shiu. "An efficient JPEG to MPEG-1 transcoding algorithm." IEEE Transactions on Consumer Electronics 42, no. 3 (1996): 447–57. http://dx.doi.org/10.1109/30.536142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shanableh, T. "Hybrid M-JPEG∕MPEG-2 video streams using MPEG-2 compliant spatial scalability." Electronics Letters 39, no. 23 (2003): 1644. http://dx.doi.org/10.1049/el:20031086.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Singh, Kulwinder, Ming Ma, Dong Won Park, and Syungog An. "Image Indexing Based On Mpeg-7 Scalable Color Descriptor." Key Engineering Materials 277-279 (January 2005): 375–82. http://dx.doi.org/10.4028/www.scientific.net/kem.277-279.375.

Full text
Abstract:
The MPEG-7 standard defines a set of descriptors that extract low-level features such as color, texture and object shape from an image and generate metadata that represents the extracted information. In this paper we propose a new image retrieval technique for image indexing based on the MPEG-7 scalable color descriptor. We use some specifications of the scalable color descriptor (SCD) for the implementation of the color histograms. The MPEG-7 standard defines 1 l norm − based matching in the SCD. But in our approach, for distance measurement, we achieve a better result by using cosine similarity coefficient for color histograms. This approach has significantly increased the accuracy of obtaining results for image retrieval. Experiments based on scalable color descriptors are illustrated. We also present the color spaces supported by the different image and video coding standards such as JPEG-2000, MPEG-1, 2, 4 and MPEG-7. In addition, this paper outlines the broad details of MPEG-7 Color Descriptors.
APA, Harvard, Vancouver, ISO, and other styles
5

Moccagatta, I., S. Soudagar, J. Liang, and H. Chen. "Error-resilient coding in JPEG-2000 and MPEG-4." IEEE Journal on Selected Areas in Communications 18, no. 6 (2000): 899–914. http://dx.doi.org/10.1109/49.848245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ramachandran, S., and S. Srinivasan. "A Dynamically Reconfigurable Video Compression Scheme Using FPGAs with Coarse-grain Parallelism." VLSI Design 15, no. 2 (2002): 521–28. http://dx.doi.org/10.1080/1065514021000012138.

Full text
Abstract:
A dynamically reconfigurable scheme for video encoder to switch among many different applications is presented. The scheme is suitable for FPGA implementation and conforms to JPEG, MPEG-1, MPEG-2, and H.263 standards. The scheme has emerged as an efficient and cost-effective solution for video compression as a result of innovative design using well-partitioned algorithms, highly pipelined architecture and coarse-grain parallelism. The reconfiguration time of the video encoder is less than 320 μs while switching from one standard to another. Although the dynamic reconfiguration scheme is presented for a video encoder, the same design methodology may be applied effectively for any other application.
APA, Harvard, Vancouver, ISO, and other styles
7

Sowmithri, K. "An Iterative Lifting Scheme on DCT Coefficients for Image Coding." International Journal of Students' Research in Technology & Management 3, no. 4 (2015): 317–19. http://dx.doi.org/10.18510/ijsrtm.2015.341.

Full text
Abstract:
Image coding is considered to be more effective, as it reduces number of bits required to store and/or to transmit image data. Transform based image coders play a significant role as they decorrelate the spatial low level information. It is found utilization in International compression standards such as JPEG, JPEG 2000, MPEG and H264. The choice of transform is an important issue in all these transforms coding schemes. Most of the literature suggests either Discrete Cosine Transform (DCT) or Discrete Wavelet Transform (DWT). In this proposed work, the energy preservation of DCT coefficients is analysed, and to down sample these coefficients, lifting scheme is iteratively applied so as to compensate the artifacts that appear in the reconstructed picture, and to yield the higher compression ratio. This is followed by scalar quantization and entropy coding, as in JPEG. The performance of the proposed iterative lifting scheme, employed on decorrelated DCT coefficients is measured with standard Peak Signal to Noise Ratio (PSNR) and the results are encouraging.
APA, Harvard, Vancouver, ISO, and other styles
8

Ramchandran, K., and M. Vetterli. "Rate-distortion optimal fast thresholding with complete JPEG/MPEG decoder compatibility." IEEE Transactions on Image Processing 3, no. 5 (1994): 700–704. http://dx.doi.org/10.1109/83.334973.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Saptariani, Trini, Sarifudin Madenda, Ernastuti Ernastuti, and Widya Silfianti. "Accelerating Compression Time of the standard JPEG by Employing The Quantized YCbCr Color Space Algorithm." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (2018): 4343. http://dx.doi.org/10.11591/ijece.v8i6.pp4343-4351.

Full text
Abstract:
In this paper, we propose a quantized YCbCr color space (QYCbCr) technique which is employed in standard JPEG. The objective of this work is to accelerate computational time of the standard JPEG image compression algorithm. This is a development of the standard JPEG which is named QYCBCr algorithm. It merges two processes i.e., YCbCr color space conversion and Q quantization in which in the standar JPEG they were performed separately. The merger forms a new single integrated process of color conversion which is employed prior to DCT process by subsequently eliminating the quantization process. The equation formula of QYCbCr color coversion is built based on the chrominance and luminance properties of the human visual system which derived from quatization matrices. Experiment results performed on images of different sizes show that the computational running time of QYCbCr algorithm gives 4 up to 8 times faster than JPEG standard, and also provides higher compression ratio and better image quality.
APA, Harvard, Vancouver, ISO, and other styles
10

Saptariani, Trini, Sarifudin Madenda, Ernastuti Ernastuti, and Widya Silfianti. "Accelerating Compression Time of the standard JPEG by Employing The Quantized YCbCr Color Space Algorithm." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (2018): 4343–51. https://doi.org/10.11591/ijece.v8i6.pp4343-4351.

Full text
Abstract:
In this paper, we propose a quantized YCbCr color space (QYCbCr) technique which is employed in standard JPEG. The objective of this work is to accelerate computational time of the standard JPEG image compression algorithm. This is a development of the standard JPEG which is named QYCBCr algorithm. It merges two processes i.e., YCbCr color space conversion and Q quantization in which in the standar JPEG they were performed separately. The merger forms a new single integrated process of color conversion which is employed prior to DCT process by subsequently eliminating the quantization process. The equation formula of QYCbCr color coversion is built based on the chrominance and luminance properties of the human visual system which derived from quatization matrices. Experiment results performed on images of different sizes show that the computational running time of QYCbCr algorithm gives 4 up to 8 times faster than JPEG standard, and also provides higher compression ratio and better image quality.
APA, Harvard, Vancouver, ISO, and other styles
11

Wang, Fang Chao, Sen Bai, Bo Zhao, and Nan He. "Grayscale Image Compression and Encryption Based on Format Conversion." Applied Mechanics and Materials 411-414 (September 2013): 1193–96. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.1193.

Full text
Abstract:
In this paper, we describe a novel encryption algorithm, which converts a greyscale image into a colored JPEG image. Firstly, it creates MCU (Minimum Coding Unit) of the colored JPEG image from the DU (Data Unit) of the greyscale image by the 8x8 construction matrix randomly. Secondly, it shuffles all the DUs with quantized DCT (Discrete Cosine Transform) coefficients according to a random ergodic matrix. Lastly, it rearranges the DUs as the format of the colored JPEG image and proceeds with the normal compression and encoding. The results show that the encryption speed of the algorithm is fast enough for real-time transmission and the encrypted image has almost the same size as original image after direct compression.
APA, Harvard, Vancouver, ISO, and other styles
12

Norcen, Roland, and Andreas Uhl. "High performance JPEG 2000 and MPEG-4 VTC on SMPs using OpenMP." Parallel Computing 31, no. 10-12 (2005): 1082–98. http://dx.doi.org/10.1016/j.parco.2005.03.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Pan, Yuanfeng, and Jiangqun Ni. "Domain Transformation of Distortion Costs for Efficient JPEG Steganography with Symmetric Embedding." Symmetry 16, no. 5 (2024): 575. http://dx.doi.org/10.3390/sym16050575.

Full text
Abstract:
Nowadays, most image steganographic schemes embed secret messages by minimizing a well-designed distortion cost function for the corresponding domain, i.e., the spatial domain for spatial image steganography or the JPEG (Joint Photographic Experts Group) domain for JPEG image steganography. In this paper, we break the boundary between these two types of schemes by establishing a theoretical link between the distortion costs in the spatial domain and those in the JPEG domain and thus propose a scheme for domain transformations of distortion costs for efficient JPEG steganography with symmetric embedding, which can directly convert the spatial distortion cost into its JPEG counterpart. Specifically, by formulating the distortion cost function for JPEG images in the decompressed spatial domain, a closed-form expression for a distortion cost cross-domain transformation is derived theoretically, which precisely characterizes the conversion from the distortion costs obtained by existing spatial steganographic schemes to those applied in JPEG steganography. Experimental results demonstrate that the proposed method outperforms other advanced JPEG steganographic schemes, e.g., JUNIWARD (JPEG steganography with Universal Wavelet Relative Distortion), JMiPOD (JPEG steganography by Minimizing the Power of the Optimal Detector), and DCDT (Distortion Cost Domain Transformation), in resisting the detection of various advanced steganalyzers.
APA, Harvard, Vancouver, ISO, and other styles
14

Boroczky, Lilla, and Agnes Y. Ngai. "Comparison of MPEG-2 and M-JPEG Video Coding at Low Bit Rates." SMPTE Journal 108, no. 3 (1999): 161–64. http://dx.doi.org/10.5594/j17094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Yasuda, Hiroshi. "Birth Stories-International Standards. (1). A Story of Standardization of JPEG and MPEG." Journal of the Institute of Image Information and Television Engineers 53, no. 4 (1999): 515–19. http://dx.doi.org/10.3169/itej.53.515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Fitriyanto, Rachmad, Anton Yudhana, and Sunardi Sunardi. "Boyer-Moore String Matching Algorithm and SHA512 Implementation for Jpeg/exif File Fingerprint Compilation in DSA." Scientific Journal of Informatics 7, no. 1 (2020): 1–9. http://dx.doi.org/10.15294/sji.v7i1.19059.

Full text
Abstract:
Data integrity, authenticity and non-repudiation are security parameters that provided by Digital Signature Algorithm (DSA). Hash value is important element inside DSA to identify information data integrity using hash function to generate message digest. Jpeg/exif is image file format that produce by digital camera as in smartphone. Hardware technology development made image file have higher resolution than before. This condition made image file fingerprinting need more time to compile jpeg/exif fingerprint. This research purpose is to develop fingerprinting process for jpeg/exif file using Boyer-Moore string matching algorithm and SHA512. Research conducted in four stages. First stage is jpeg/exif file structure identification, second stage is segment content acquisition and hashing, third stage is image file modification experiments and last stage is jpeg/exif file fingerprint compilation. Obtained result shown that jpeg/exif file fingerprint comprises of three hash value from SOI segment, APP1 segment and SOF0 segment. The jpeg/exif file fingerprint can use to detect six types image modification there are image resizing, text addition, metadata modification, image resizing, image cropping and file file type conversion.
APA, Harvard, Vancouver, ISO, and other styles
17

Deng, Jiapeng, Qichang Wang, Huihui Xu, et al. "A Systematic Study of Anti-Osteosarcoma Mechanism of pH-Sensitive Charge-Conversion Cinnamaldehyde Polymeric Prodrug Micelles In Vitro." Biomedicines 11, no. 6 (2023): 1524. http://dx.doi.org/10.3390/biomedicines11061524.

Full text
Abstract:
Osteosarcoma is an aggressive malignant neoplasm, and it is of great significance to the fabrication and investigation of the anti-tumor mechanism of nanomedicine in the treatment of osteosarcoma. Herein, a cinnamaldehyde polymeric prodrug micelle with pH-sensitive charge-conversion ability (mPEG-b-P(C7-co-CA)) was fabricated, and the anti-osteosarcoma mechanism of mPEG-b-P(C7-co-CA) micelle was investigated. mPEG-b-P(C7-co-CA) micelles were prepared by self-assembly method, and their diameter was 227 nm. mPEG-b-P(C7-co-CA) micelles could regulate the cell cycle and inhibit the proliferation of 143B cells, which was demonstrated by flow cytometry analysis, CCK-8 assay and 5-Ethynyl-2′-deoxyuridine (EdU) staining. The wound-healing assay and transwell assay showed that mPEG-b-P(C7-co-CA) micelles effectively inhibited the migration and invasion of 143B cells. It was proven that mPEG-b-P(C7-co-CA) micelles downregulated the levels of proliferation and apoptosis-related proteins and affected osteosarcoma migration and invasion by inhibiting the epithelial-mesenchymal transition (EMT). In addition, mPEG-b-P(C7-co-CA) micelles can also inhibit the transcriptional activity of the PI3K/Akt signaling pathway. Therefore, these findings provide new evidence for the pharmacological effects of mPEG-b-P(C7-co-CA) micelles.
APA, Harvard, Vancouver, ISO, and other styles
18

Kim, Cheong Ghil, and Yong-Ho Seo. "Parallel JPEG Color Conversion on Multi-Core Processor." International Journal of Multimedia and Ubiquitous Engineering 11, no. 2 (2016): 9–16. http://dx.doi.org/10.14257/ijmue.2016.11.2.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Vilkhovskiy, D. E. "Steganalysis for DCT inserts with the Koch-Zhao steganographic method in low stego-payload images." Journal of Physics: Conference Series 2182, no. 1 (2022): 012101. http://dx.doi.org/10.1088/1742-6596/2182/1/012101.

Full text
Abstract:
Abstract This study focuses on the problem of detecting and locating secret data embedded using the Koch-Zhao steganographic method with discrete embedding. The proposed method of steganalysis is based on discrete cosine transform and enables to control and verify JPEG and MPEG images of stego-payload not exceeding 25%. Mid-frequency components are considered as the components targeted by the Koch-Zhao steganographic method. The proposed method of steganalysis delivers strong detection and locating accuracy and performs in 10-% stego-payload cases with sufficient reliability. Both gray-scale and color images can be verified on being a carrier or not being when using the detecting method proposed in the study.
APA, Harvard, Vancouver, ISO, and other styles
20

Fitriyanto, Rachmad, Anton Yudhana, and Sunardi Sunardi. "Boyer-Moore String Matching Algorithm and SHA512 Implementation for Jpeg/exif File Fingerprint Compilation in DSA." JUITA: Jurnal Informatika 8, no. 1 (2020): 1. http://dx.doi.org/10.30595/juita.v8i1.4413.

Full text
Abstract:
The jpeg/exif is file’s format for image produced by digital camera such as in the smartphones. The security method for jpeg/exif usages in digital communication currently only full-fill prevention aspect from three aspects of information security, prevention, detection and response. Digital Signature Algorithm (DSA) is a cryptographic method that provide detection aspect of information security by using hash-value as fingerprint of digital documents. The purpose of this research is to compile jpeg/exif file data fingerprint using the hash-value from DSA. The research conducted in four stages. The first stages is the identification of jpeg/exif file structure using Boyer-Moore string matching algorithm to locate the position of file’s segments. The second stage is segment’s content acquisition. The third stage the image files modification experiments to select the suitable element of jpeg/exif file data fingerprint. The fourth stage is the compilation of hash-values to form data fingerprint. The Obtained result has shown that the jpeg/exif file fingerprint comprises three hash value from the SOI segment, APP1's segment, and the SOF0 segment. The jpeg/exif file fingerprint can use for modified image detection, include six types of image modification there are image resizing, text addition, metadata modification, image resizing, image cropping and file type conversion
APA, Harvard, Vancouver, ISO, and other styles
21

Fitriyanto, Rachmad, Anton Yudhana, and Sunardi Sunardi. "Implementation SHA512 Hash Function And Boyer-Moore String Matching Algorithm For Jpeg/exif Message Digest Compilation." Jurnal Online Informatika 4, no. 1 (2019): 16. http://dx.doi.org/10.15575/join.v4i1.304.

Full text
Abstract:
Security information method for JPEG/exif documents generally aims to prevent security attacks by protecting documents with password and watermark. Both methods cannot be used to determine the condition of data integrity at the detection stage of the information security cycle. Message Digest is the essence of a file that has a function as a digital fingerprint to represent data integrity. This study aims to compile digital fingerprints to detect changes that occurred in JPEG / exif documents in information security. The research phase consists of five stages. The first stage, identification of the JPEG / exif document structure conducted using the Boyer-Moore string matching algorithm to find JPEG/exif segments location. The Second stage is segment content acquisition, conducted based on segment location and length obtained. The Third step, computing message digest for each segment using SHA512 hash function. Fourth stage, JPEG / exif document modification experiments to identified affected segments. The fifth stage is selecting and combining the hash value of the segment into the message digest. The obtained result shows the message digest for JPEG/exif documents composed of three hash values. The SOI segment hash value used to detect modifications for JPEG to png conversion and image editing. The APP1 hash value used to detect metadata editing. The SOF0 hash values use to detect modification for image recoloring, cropping and resizing — the combination from three hash values as JPEG/exif’s message digest.
APA, Harvard, Vancouver, ISO, and other styles
22

Fitriyanto, Rachmad. "Jpeg/Exif Message Digest Compilation With SHA512 Hash Function." CSRID (Computer Science Research and Its Development Journal) 11, no. 1 (2021): 44. http://dx.doi.org/10.22303/csrid.11.1.2019.44-53.

Full text
Abstract:
Security information method for jpeg / exif documents generally aims to prevent security attack by protecting documents with password and watermark. Both methods cannot used to determine the condition of data integrity at the detection stage of the information security cycle. Message Digest is the essence of a file that used to represent data integrity. This study aims to compile a message digest to detect changes that occur in jpeg / exif documents in information security. The research phase consists of five stages. The first stage, identification of the jpeg / exif document structure conducted using Boyer-Moore string matching algorithm to find jpeg/exif segments location. The Second stage is segment content acquisition, conducted based on segment location and length obtained. The Third step, computing message digest for each segment using SHA512 hash function. Fourth stage, jpeg / exif document modification experiments to identified affected segments. The Fifth stage is selecting and combining the hash value of the segment into message digest. Obtained result show message digest for jpeg / exif documents composed of two parts, the hash value of the SOI segment and the APP1 segment. The SOI segment value used to detect modifications for jpeg to png conversion and image editing. The APP1 hash value used to detect metadata editing. The SOF0 hash values use to detect modification for image recoloring, cropping and resizing.
APA, Harvard, Vancouver, ISO, and other styles
23

BHATTACHARYA, ARUP K., and SYED S. HAIDER. "A VLSI IMPLEMENTATION OF THE INVERSE DISCRETE COSINE TRANSFORM." International Journal of Pattern Recognition and Artificial Intelligence 09, no. 02 (1995): 303–14. http://dx.doi.org/10.1142/s0218001495000146.

Full text
Abstract:
The Inverse Discrete Cosine Transform (IDCT) is an important function in HDTV, digital TV and multimedia systems complying with JPEG or MPEG standards for video compression. However, the IDCT is computationally intensive and therefore very expensive to implement in VLSI using direct matrix multiplication. By properly arranging the input coefficient sequence and the output data, the rows and columns of the transform matrix can be reordered to build modular regularity suitable for custom implementation in VLSI. This regularity can be exploited, so that a single permutation can be used to derive each output column from the previous one using a circular shift of an accumulator’s input data multiplied in a special sequence. This technique, using only one 1-dimensional IDCT processor and seven constant multipliers, and its implementation are presented. Operation of 58 MHz under worst case conditions is easily achieved, thus making the design applicable to a wide range of video and real time image processing applications. Fabricated in 0.5 micron triple metal CMOS technology, the IDCT contains 70,000 transistors occupying 7 mm2 square silicon. The design has been used on an AT&T MPEG video decoder chip.
APA, Harvard, Vancouver, ISO, and other styles
24

Park, Hyun-Sang. "Power Efficient Scan Order Conversion for JPEG-Embedded ISP." Journal of the Korea Academia-Industrial cooperation Society 10, no. 5 (2009): 942–46. http://dx.doi.org/10.5762/kais.2009.10.5.942.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Kichul, Kim, Seo Hanshin, Lim Junghyun, Kim Jungwoo, and Cho Nam Ik. "Single Chip Implementation of MPEG-4 Format Conversion Filters." Journal of the Korean Physical Society 40, no. 4 (2002): 672. http://dx.doi.org/10.3938/jkps.40.672.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Das, Mousumi, Atahar Mostafa, and Khan Wahid. "Division-Free Multiquantization Scheme for Modern Video Codecs." Advances in Multimedia 2012 (2012): 1–10. http://dx.doi.org/10.1155/2012/302893.

Full text
Abstract:
The current trend of digital convergence leads to the need of the video encoder/decoder (codec) that should support multiple video standards on a single platform as it is expensive to use dedicated video codec chip for each standard. The paper presents a high performance circuit shared architecture that can perform the quantization of five popular video codecs such as H.264/AVC, AVS, VC-1, MPEG-2/4, and JPEG. The proposed quantizer architecture is completely division-free as the division operation is replaced by shift and addition operations for all the standards. The design is implemented on FPGA and later synthesized in CMOS 0.18 μm technology. The results show that the proposed design satisfies the requirement of all five codecs with a maximum decoding capability of 60 fps at 187 MHz on Xilinx FPGA platform for 1080 p HD video.
APA, Harvard, Vancouver, ISO, and other styles
27

Seo, Young-Ho, Hyun-Jun Choi, Ji-Sang Yoo, and Dong-Wook Kim. "Adaptive Watermarking Scheme Using Biased Shift of Quantization Index." Journal of Electrical and Computer Engineering 2010 (2010): 1–6. http://dx.doi.org/10.1155/2010/348321.

Full text
Abstract:
We propose a watermark embedding and extracting method for blind watermarking. It uses the characteristics of a scalar quantizer to comply with the recommendation in JPEG, MPEG series, or JPEG2000. Our method performs embedding of a watermark bit by shifting the corresponding frequency transform coefficient (the watermark position) to a quantization index according to the value of the watermark bit, which prevents from losing the watermark information during the data compression process. The watermark can be embedded simultaneously to the quantization process without an additional process for watermarking, which means it can be performed at the same speed to the compression process. In the embedding process, a Linear Feedback Shift Register (LFSR) is used to hide the watermark informations and the watermark positions. The experimental results showed that the proposed method satisfies enough robustness and imperceptibility that are the major requirements for watermarking.
APA, Harvard, Vancouver, ISO, and other styles
28

Albert, Jürgen, and German Tischler. "On Succinct Representations of Textured Surfaces by Weighted Finite Automata." JUCS - Journal of Universal Computer Science 16, no. (5) (2010): 586–603. https://doi.org/10.3217/jucs-016-05-0586.

Full text
Abstract:
Generalized finite automata with weights for states and transitions have been successfully applied to image generation for more than a decade now. Bilevel images (black and white), grayscale- or color-images and even video sequences can be effectively coded as weighted finite automata. Since each state represents a subimage within those automata the weighted transitions can exploit self-similarities for image compression. These "fractal" approaches yield remarkable results in comparison to the well-known standard JPEG- or MPEG-encodings and frequently provide advantages for images with strong contrasts. Here we will study the combination of these highly effective compression techniques with a generalization of weighted finite automata to higher dimensions, which establish d-dimensional relations between resultsets of ordinary weighted automata. For the applications we will restrict ourselves to three-dimensional Bezier spline-patches and to grayscale images as textures.
APA, Harvard, Vancouver, ISO, and other styles
29

Podilchuk, Christine I., and Robert J. Safranek. "Image and Video Compression: A Review." International Journal of High Speed Electronics and Systems 08, no. 01 (1997): 119–77. http://dx.doi.org/10.1142/s0129156497000056.

Full text
Abstract:
The area of image and video compression has made tremendous progress over the last several decades. The successes in image compression are due to advances and better understanding of waveform coding methods which take advantage of the signal statistics, perceptual methods which take advantage of psychovisual properties of the human visual system (HVS) and object-based models especially for very low bit rate work. Recent years have produced several image coding standards—JPEG for still image compression and H.261, MPEG-I and MPEG-II for video compression. While we have devoted a special section in this paper to cover international coding standards because of their practical value, we have also covered a large class of nonstandard coding technology in the interest of completeness and potential future value. Very low bit rate video coding remains a challenging problem as does our understanding of the human visual system for perceptually optimum compression. The wide range of applications and bit rates, from video telephony at rates as low as 9.6 kbps to HDTV at 20 Mbps and higher, has acted as a catalyst for generating new ideas in tackling the different challenges characterized by the particular application. The area of image compression will remain an interesting and fruitful area of research as we focus on combining source coding with channel coding and multimedia networking.
APA, Harvard, Vancouver, ISO, and other styles
30

de Bruijn, F. J., W. H. A. Bruls, D. Burazerovic, and G. de Haan. "Efficient video coding integrating MPEG-2 and picture-rate conversion." IEEE Transactions on Consumer Electronics 48, no. 3 (2002): 688–93. http://dx.doi.org/10.1109/tce.2002.1037062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Kato, H., T. Sano, H. Yanagihara, Y. Nakajima, and Y. Hatori. "A fast DV to MPEG-2 IBP-picture conversion algorithm." IEEE Transactions on Consumer Electronics 49, no. 2 (2003): 433–40. http://dx.doi.org/10.1109/tce.2003.1209537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Assunção, P. A. A., and M. Ghanbari. "Optimal bit rate conversion of MPEG-2 video bit streams." Electronics Letters 33, no. 8 (1997): 675. http://dx.doi.org/10.1049/el:19970482.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Cho, Nam Ik, Kichul Kim, and Sang Uk Lee. "Design and Implementation of Format Conversion Filters for MPEG-4." Journal of Visual Communication and Image Representation 9, no. 1 (1998): 101–8. http://dx.doi.org/10.1006/jvci.1998.0373.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Huang, Chen-Hsiu, and Ja-Ling Wu. "Unveiling the Future of Human and Machine Coding: A Survey of End-to-End Learned Image Compression." Entropy 26, no. 5 (2024): 357. http://dx.doi.org/10.3390/e26050357.

Full text
Abstract:
End-to-end learned image compression codecs have notably emerged in recent years. These codecs have demonstrated superiority over conventional methods, showcasing remarkable flexibility and adaptability across diverse data domains while supporting new distortion losses. Despite challenges such as computational complexity, learned image compression methods inherently align with learning-based data processing and analytic pipelines due to their well-suited internal representations. The concept of Video Coding for Machines has garnered significant attention from both academic researchers and industry practitioners. This concept reflects the growing need to integrate data compression with computer vision applications. In light of these developments, we present a comprehensive survey and review of lossy image compression methods. Additionally, we provide a concise overview of two prominent international standards, MPEG Video Coding for Machines and JPEG AI. These standards are designed to bridge the gap between data compression and computer vision, catering to practical industry use cases.
APA, Harvard, Vancouver, ISO, and other styles
35

Hou, Jong-Uk. "MPEG and DA-AD Resilient DCT-Based Video Watermarking Using Adaptive Frame Selection." Electronics 10, no. 20 (2021): 2467. http://dx.doi.org/10.3390/electronics10202467.

Full text
Abstract:
We present a robust video watermarking scheme and report the detailed robustness of the video watermarking assessed based on standard criteria obtained from Information Hiding and its Criteria (IHC) Committee. Using discrete cosine transform domain spread-spectrum watermarking, our system achieves robustness under various non-hostile video processing techniques, including MPEG compression and digital/analog–analog/digital (DA-AD) conversion. The proposed system ensures that a 16-bit embedded sequence can be extracted through adaptive frame selection in any 15-s interval, even with a long video clip. To evaluate the performance of the proposed watermarking scheme, we conducted robustness tests under a DA-AD conversion environment, based on the MPEG-4 part 10 (H.264) codec. The experiment results obtained indicate that, in addition to being robust against non-hostile video processes, the proposed method achieves invisibility. The assessment of the developed watermarking scheme also satisfies the third edition of the IHC video watermarking evaluation criteria.
APA, Harvard, Vancouver, ISO, and other styles
36

LI, WEIHAI, and YUAN YUAN. "A NEW BLIND ATTACK PROCEDURE FOR DCT-BASED IMAGE ENCRYPTION WITH SPECTRUM LEARNING." International Journal of Image and Graphics 07, no. 03 (2007): 481–96. http://dx.doi.org/10.1142/s0219467807002787.

Full text
Abstract:
It is an important problem nowadays to ensure the security of encrypted multimedia contents on the Internet. In this paper, a new blind attack procedure called NZCA is proposed to decrypt images that are encrypted by DCT-based methods. It threatens almost all existing DCT-based image encryption methods without the need of knowing the encryption algorithm details. The parameters of the NZCA can be adaptively selected via unsupervised learning with spectrum analysis of image projection. The effectiveness of the NZCA has been quantitatively evaluated by comparing the decrypted images with the edge sketches of original images. Our experiments on a number of real-world images show that NZCA is very powerful. Furthermore, we point out that a special form of inter-block shuffle, full inter-block shuffle (FIBS), is immune to the NZCA. Hence we suggest that all DCT-based image encryption methods for JPEG, MPEG, H.26x, etc. employ the FIBS so as to enhance the security.
APA, Harvard, Vancouver, ISO, and other styles
37

Byung Cheol Song, Myung Jun Kim, Sung Kyu Jang, and Jong Beom Ra. "Modified IDCT kernel for down-conversion of MPEG-2 compressed video." IEEE Transactions on Consumer Electronics 45, no. 2 (1999): 340–44. http://dx.doi.org/10.1109/30.793418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Hu, Shan Shan, and Fang Liu. "Video Watermarking Scheme against Geometrical Distortions." Applied Mechanics and Materials 347-350 (August 2013): 2151–55. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2151.

Full text
Abstract:
A new video watermarking scheme against geometric distortions is proposed, which is most suitable for DCT-encoded compressed video, like MPEG-2, MPEG-4, H.264, etc. To lower the computational cost, 2-D DFT coefficients are constructed directly from the block DCTs by exploiting a fast inter-transformation. Then a watermark is embedded in a RST (rotation, scaling, and translation) invariant domain generated by performing the Fourier-Mellin transform (FMT) on the 2-D DFT magnitudes. For resisting different video format conversion, the watermark detection is performed in the spatial domain. The experimental results show that the proposed scheme is transparent and robust to typical signal processing attacks, lots of commonly geometric distortions including scaling, rotation and some combination of several attacks, and frame dropping.
APA, Harvard, Vancouver, ISO, and other styles
39

S.Ujgare, Nitin, and Swati P. Baviskar. "Conversion of DICOM Image in to JPEG, BMP and PNG Image Format." International Journal of Computer Applications 62, no. 11 (2013): 22–26. http://dx.doi.org/10.5120/10124-4886.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Lu, Rui, Bihai Zhang, and Dan Wang. "VVRec: Reconstruction Attacks on DL-based Volumetric Video Upstreaming via Latent Diffusion Model with Gamma Distribution." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 18 (2025): 19133–42. https://doi.org/10.1609/aaai.v39i18.34106.

Full text
Abstract:
With the popularity of 3D volumetric video applications, such as Autonomous Driving, Virtual Reality, and Mixed Reality, current developers have turned to deep learning for compressing volumetric video frames, i.e., point clouds for video upstreaming. The latest deep learning-based solutions offer higher efficiency, lower distortion, and better hardware support compared to traditional ones like MPEG and JPEG. However, privacy threats arise, especially reconstruction attacks targeting to recover the original input point cloud from the intermediate results. In this paper, we design VVRec, to the best of our knowledge, which is the first targeting DL-based Volumetric Video Reconstruction attack scheme. VVRec demonstrates the ability to reconstruct high-quality point clouds from intercepted transmission intermediate results using four well-trained neural network modules we design. Leveraging the latest latent diffusion models with Gamma distribution and a refinement algorithm, VVRec excels in reconstruction quality and color recovery and surpasses existing defenses. We evaluate VVRec using three volumetric video datasets. The results demonstrate that VVRec achieves 64.70dB reconstruction accuracy, with an impressive 46.39% reduction of distortion over baselines.
APA, Harvard, Vancouver, ISO, and other styles
41

Le, Hoang, Mahmoud Afifi, and Michael S. Brown. "Improving Color Space Conversion for Camera-Captured Images via Wide-Gamut Metadata." Color and Imaging Conference 2020, no. 28 (2020): 193–98. http://dx.doi.org/10.2352/issn.2169-2629.2020.28.30.

Full text
Abstract:
Color space conversion is the process of converting color values in an image from one color space to another. Color space conversion is challenging because different color spaces have different sized gamuts. For example, when converting an image encoded in a medium-sized color gamut (e.g., AdobeRGB or Display-P3) to a small color gamut (e.g., sRGB), color values may need to be compressed in a many-to-one manner (i.e., multiple colors in the source gamut will map to a single color in the target gamut). If we try to convert this sRGB-encoded image back to a wider gamut color encoding, it can be challenging to recover the original colors due to the color fidelity loss. We propose a method to address this problem by embedding wide-gamut metadata inside saved images captured by a camera. Our key insight is that in the camera hardware, a captured image is converted to an intermediate wide-gamut color space (i.e., ProPhoto) as part of the processing pipeline. This wide-gamut image representation is then saved to a display color space and saved in an image format such as JPEG or HEIC. Our method proposes to include a small sub-sampling of the color values from the ProPhoto image state in the camera to the final saved JPEG/HEIC image. We demonstrate that having this additional wide-gamut metadata available during color space conversion greatly assists in constructing a color mapping function to convert between color spaces. Our experiments show our metadata-assisted color mapping method provides a notable improvement (up to 60% in terms of E) over conventional color space methods using perceptual rendering intent. In addition, we show how to extend our approach to perform adaptive color space conversion based spatially over the image for additional improvements.
APA, Harvard, Vancouver, ISO, and other styles
42

Lee, Kang-Jun, Chang-Woo Ha, and Je-Chang Jeong. "Transcoding MPEG-2 to H.264/AVC in the GOP Structure Conversion." Journal of Broadcast Engineering 14, no. 1 (2009): 3–14. http://dx.doi.org/10.5909/jbe.2009.14.1.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Zalevskaya, Olha, Petro Yablonskyi, Iuliia Sydorenko, Ivan Miroshnichenko, and Akim Sytnik. "IMPROVEMENT OF METHODS AND ALGORITHM OF FRACTAL COMPRESSION OF A GRAPHIC IMAGE." APPLIED GEOMETRY AND ENGINEERING GRAPHICS, no. 100 (May 24, 2021): 118–25. http://dx.doi.org/10.32347/0131-579x.2021.100.118-125.

Full text
Abstract:
During the intensive development of information systems, the volumes of data necessary for storing and processing information, in particular graphic images, grow. One of the reasons for this phenomenon is the desire to continually improve the quality of the content we receive. The ever-growing demand for image quality requires the development of new and improvement of existing approaches to information compression. Compression algorithms use the presence of so-called surplus in the data, which can be eliminated during data storage and restored during playback. Currently in demand methods are based on storing only low-frequency components. Such methods are used in JPEG, MPEG compression algorithms. The disadvantage of such algorithms is not a large compression ratio. In this regard, methods have emerged based on fractal data compression. The main idea of ​​the method is to store the image as affine transformations, which leads to its compression.
 The paper proposes preliminary processing of graphic data for storing them in the form of a file with the * .json extension. The application of a further fractal compression algorithm to the already obtained file allows to reduce the processing time of data, computational calculations. The resulting file will have the advantages of fractal compression such as decompression speed, better compression ratio and higher resolution compared to * .jpeg and * .bmp.
 Despite all the advantages, fractal compression of graphic information is used quite rarely. This is due to the complexity of the algorithm, the lack of a sufficient number of specialists on this issue and the estimate of the licensed software. The improvement is aimed at simplifying the algorithm and its implementation will avoid these drawbacks and expand the scope of fractal compression.
APA, Harvard, Vancouver, ISO, and other styles
44

Kato, Haruhisa, Yasuhiro Takishima, and Yasuyuki Nakajima. "A Fast DV to MPEG-4 Transcoder Integrated With Resolution Conversion and Quantization." IEEE Transactions on Circuits and Systems for Video Technology 17, no. 1 (2007): 111–19. http://dx.doi.org/10.1109/tcsvt.2006.887083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Tan, Yun, Jiaohua Qin, Xuyu Xiang, Chunhu Zhang, and Zhangdong Wang. "Coverless Steganography Based on Motion Analysis of Video." Security and Communication Networks 2021 (April 21, 2021): 1–16. http://dx.doi.org/10.1155/2021/5554058.

Full text
Abstract:
With the rapid development of interactive multimedia services and camera sensor networks, the number of network videos is exploding, which has formed a natural carrier library for steganography. In this study, a coverless steganography scheme based on motion analysis of video is proposed. For every video in the database, the robust histograms of oriented optical flow (RHOOF) are obtained, and the index database is constructed. The hidden information bits are mapped to the hash sequences of RHOOF, and the corresponding indexes are sent by the sender. At the receiver, through calculating hash sequences of RHOOF from the cover video, the secret information can be extracted successfully. During the whole process, the cover video remains original without any modification and has a strong ability to resist steganalysis. The capacity is investigated and shows good improvement. The robustness performance is prominent against most attacks such as pepper and salt noise, speckle noise, MPEG-4 compression, and motion JPEG 2000 compression. Compared with the existing coverless information hiding schemes based on images, the proposed method not only obtains a good trade-off between hiding information capacity and robustness but also can achieve higher hiding success rate and lower transmission data load, which shows good practicability and feasibility.
APA, Harvard, Vancouver, ISO, and other styles
46

Kato, Haruhisa, Akio Yoneyama, Sei Naito, Shigeyuki Sakazawa, and Shuichi Matsumoto. "Adaptive Color Conversion Method based on Coding Parameters of H.264/MPEG-4 AVC." Journal of The Institute of Image Information and Television Engineers 66, no. 9 (2012): J310—J317. http://dx.doi.org/10.3169/itej.66.j310.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

LEE, J. K. "Quantization/DCT Conversion Scheme for DCT-Domain MPEG-2 to H.264/AVC Transcoding." IEICE Transactions on Communications E88-B, no. 7 (2005): 2856–63. http://dx.doi.org/10.1093/ietcom/e88-b.7.2856.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Kamauu, Aaron W. C., Scott L. DuVall, Richard H. Wiggins, and David E. Avrin. "Using Applet–Servlet Communication for Optimizing Window, Level and Crop for DICOM to JPEG Conversion." Journal of Digital Imaging 21, no. 3 (2007): 348–54. http://dx.doi.org/10.1007/s10278-007-9038-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Kamkin, Alexander Sergeevich, Mikhail Mikhaylovich Chupilko, Mikhail Sergeevich Lebedev, Sergey Aleksandrovich Smolov, and Georgi Gaydadjiev. "Comparison of High-Level Synthesis and Hardware Construction Tools." Proceedings of the Institute for System Programming of the RAS 34, no. 5 (2022): 7–22. http://dx.doi.org/10.15514/ispras-2022-34(5)-1.

Full text
Abstract:
Application-specific systems with FPGA accelerators are often designed using high-level synthesis or hardware construction tools. Nowadays, there are many frameworks available, both open-source and commercial. In this work, we attempt to fairly compare several existing solutions (languages and tools), including Verilog (our baseline), Chisel, Bluespec SystemVerilog (Bluespec Compiler), DSLX (XLS), MaxJ (MaxCompiler), and C (Bambu and Vivado HLS). Our analysis has been carried out using a representative example of 8×8 inverse discrete cosine transform (IDCT), a widely used algorithm engaged in, among others, JPEG and MPEG decoders. The metrics under consideration include: (a) the degree of automation (how much less code is required compared to Verilog), (b) the controllability (possibility to achieve given design characteristics, namely a given ratio of the performance and area), and (c) the flexibility (ease of design modification to achieve certain characteristics). Rather than focusing on computational kernels only, we have developed AXI-Stream wrappers for the synthesized implementations, which allows adequately evaluating characteristics of the designs when they are used as parts of real computer systems. Our study shows clear examples of what impact specific optimizations (tool settings and source code modifications) have on the overall system performance and area. It emphasizes how important is to be able to control the balance between the communication interface utilization and the computational kernel performance and delivers clear guidelines for the next generation tools for designing FPGA accelerator based systems.
APA, Harvard, Vancouver, ISO, and other styles
50

Song, Yonghong, Dongdong Li, Yang Lu, et al. "Ferrimagnetic mPEG-b-PHEP copolymer micelles loaded with iron oxide nanocubes and emodin for enhanced magnetic hyperthermia–chemotherapy." National Science Review 7, no. 4 (2020): 723–36. http://dx.doi.org/10.1093/nsr/nwz201.

Full text
Abstract:
Abstract As a non-invasive therapeutic method without penetration-depth limitation, magnetic hyperthermia therapy (MHT) under alternating magnetic field (AMF) is a clinically promising thermal therapy. However, the poor heating conversion efficiency and lack of stimulus–response obstruct the clinical application of magnetofluid-mediated MHT. Here, we develop a ferrimagnetic polyethylene glycol-poly(2-hexoxy-2-oxo-1,3,2-dioxaphospholane) (mPEG-b-PHEP) copolymer micelle loaded with hydrophobic iron oxide nanocubes and emodin (denoted as EMM). Besides an enhanced magnetic resonance (MR) contrast ability (r2 = 271 mM−1 s−1) due to the high magnetization, the specific absorption rate (2518 W/g at 35 kA/m) and intrinsic loss power (6.5 nHm2/kg) of EMM are dozens of times higher than the clinically available iron oxide nanoagents (Feridex and Resovist), indicating the high heating conversion efficiency. Furthermore, this composite micelle with a flowable core exhibits a rapid response to magnetic hyperthermia, leading to an AMF-activated supersensitive drug release. With the high magnetic response, thermal sensitivity and magnetic targeting, this supersensitive ferrimagnetic nanocomposite realizes an above 70% tumor cell killing effect at an extremely low dosage (10 μg Fe/mL), and the tumors on mice are completely eliminated after the combined MHT–chemotherapy.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!