• Title/Summary/Keyword: Binary images

Search Result 560, Processing Time 0.029 seconds

Binary and Halftone Image Data Hiding Technique using Run-Length (RLE를 이용한 이진 이미지 및 하프톤 영상에 데이터 은폐 기술)

  • Kim, Cheon-Shik;Hong, You-Sik;Han, Chang-Pyoung;Oh, Seon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.37-43
    • /
    • 2009
  • In this paper, we proposed that a novel method base on a binary image that technique is proposed for data hiding into binary images and halftone image. A binary image is bitmap image and halftone is composed by two-tone value in a limited region in an image. For this reason, it is not easy to hide messages in binary images. PWLC is a new method to hide a message in binary images. However, it yields images of unacceptable quality, unless you should change very few of it. Therefore, in order to solve this problem, we used run-length method into binary images. That is, we find a proper region to hide messages. In this paper, we proposed new method to hide messages in binary images. In addition, we proved that our algorithm is better than PWLC through the experiment.

  • PDF

Binary Image Data Hiding Using Advanced Run-Length Coding Method (런렝스 코딩(Run Length Coding) 기법을 이용한 이진 이미지에서의 데이터 은닉)

  • Kim, Cheon-Shik;Kim, Hyung-Joong
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.8 no.2
    • /
    • pp.78-83
    • /
    • 2009
  • In this paper, a novel method for data hiding into binary images is proposed. Binary image has two tones: black and white. For this reason, it is not easy to hide messages into binary images. PWLC (pair-wise logical computation) is a new method to hide message into binary images. However, it yields images of unacceptable quality and its decoding process is unclear. Therefore, in order to solve this problem, we adopt the run-length method to achieve advanced reversible data hiding. That is, we find a proper region to hide messages to reduce visual degradation. In this paper, we introduce an improved procedure to hide messages into binary images.

  • PDF

REVERSIBLE INFORMATION HIDING FOR BINARY IMAGES BASED ON SELECTING COMPRESSIVE PIXELS ON NOISY BLOCKS

  • Niimi, Michiharu;Noda, Hideki
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.588-591
    • /
    • 2009
  • This paper proposes a reversible information hiding method for binary images. A half of pixels in noisy blocks on cover images is candidate for embeddable pixels. Among the candidate pixels, we select compressive pixels by bit patterns of its neighborhood to compress the pixels effectively. Thus, embeddable pixels in the proposed method are compressive pixels in noisy blocks. We provide experimental results using several binary images binarized by the different methods.

  • PDF

A Joint Transform Correlator Encryption System Based on Binary Encoding for Grayscale Images

  • Peng, Kaifei;Shen, Xueju;Huang, Fuyu;He, Xuan
    • Current Optics and Photonics
    • /
    • v.3 no.6
    • /
    • pp.548-554
    • /
    • 2019
  • A binary encoding method for grayscale images is proposed to address their unsatisfactory decryption results from joint transform correlator (JTC) encryption systems. The method converts the encryption and decryption of grayscale images into that of binary images, and effectively improves decrypted-image quality. In the simulation, we replaced unencoded grayscale images with their binary encoded counterparts in the JTC encryption and decryption processes, then adopted a median filter to suppress saturation noise while keeping other settings unchanged. Accordingly, decrypted-image quality was clearly enhanced as the correlation coefficient (CC) between a decrypted image and its original rose from 0.8237 to 0.9473 initially, and then further to 0.9937, following the above two steps respectively. Finally, optical experimental results confirmed that the proposed encryption system works correctly.

AN APPLICATION OF BINARY SOFT MAPPINGS TO THE PROBLEM IN MEDICAL EXPERT SYSTEMS

  • HUSSAIN, SABIR;ALKHALIFAH, MASHAEL M.A.
    • Journal of applied mathematics & informatics
    • /
    • v.38 no.5_6
    • /
    • pp.533-545
    • /
    • 2020
  • We initiate and introduce the notion of binary soft mapping, which is defined on collection of binary soft sets named as binary soft class over two initial universes U1 and U2 with fixed set of parameters. We also define and study the properties of binary soft images and binary soft inverse images of binary soft sets. Examples and counter examples are also given in support of presented properties. Moreover, these concepts are applied to the problem of medical diagnosis in medical expert systems.

Three-dimensional Head Tracking Using Adaptive Local Binary Pattern in Depth Images

  • Kim, Joongrock;Yoon, Changyong
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.16 no.2
    • /
    • pp.131-139
    • /
    • 2016
  • Recognition of human motions has become a main area of computer vision due to its potential human-computer interface (HCI) and surveillance. Among those existing recognition techniques for human motions, head detection and tracking is basis for all human motion recognitions. Various approaches have been tried to detect and trace the position of human head in two-dimensional (2D) images precisely. However, it is still a challenging problem because the human appearance is too changeable by pose, and images are affected by illumination change. To enhance the performance of head detection and tracking, the real-time three-dimensional (3D) data acquisition sensors such as time-of-flight and Kinect depth sensor are recently used. In this paper, we propose an effective feature extraction method, called adaptive local binary pattern (ALBP), for depth image based applications. Contrasting to well-known conventional local binary pattern (LBP), the proposed ALBP cannot only extract shape information without texture in depth images, but also is invariant distance change in range images. We apply the proposed ALBP for head detection and tracking in depth images to show its effectiveness and its usefulness.

Application of Modified Median Filter for Grading Produce

  • Morio, Yoshinari;Ikeda, Yoshio
    • Proceedings of the Korean Society for Agricultural Machinery Conference
    • /
    • 1996.06c
    • /
    • pp.842-851
    • /
    • 1996
  • Median filter(MF) has often been applied to color or gray images as a noise fiilter in image processing . Application of MF to binary images was tried in this study. For binary images, MF not only can remove noise but can also work as an indicator showing the dominant color in a region which is called window . Fro example, MF can be used to categorize clusters and to detect interested parts of an object. In other words, MF can also be used to remove unnecessary parts. The function of MF can be intensified by introducing a thresholding value, which is determined by the size of the interested part of an object. This improved MF for binary images is called the modified median filter(MMF), and its applicability to grade produce will be discussed in this paper.

  • PDF

A Service Strategy of Binary Document Images based on JBIG in Digital Library (전자도서관에서의 JBIG 기반 이전 문서영상 서비스 방안)

  • 한영미;김민환
    • Journal of Korea Multimedia Society
    • /
    • v.1 no.1
    • /
    • pp.37-44
    • /
    • 1998
  • While the SGML(standard generalized markup language) tend to be used in multimedia document management systems, still binary document images are widely used in servicing the information of printed documents at digital libraries. But the printed documents are scanned in 200 dpi resolution and the scanned binary document images are compressed by the ITU-T T.6 method, so they have difficulties in representing them in good quality and compressing them very efficiently. In this paper, by considering quality of the binary document images and expandability and effectiveness of database of them, we show that the suitable scanning resolution of them is 600 dpi and the best compression method is the JBIG. A staged service strategy of them is also suggested to solve the difficulty caused from long decompression time of the JBIG by analyzing characteristics of retrieving the binary document images in monitor and printer. In experiments for several typical binary document images, high compression rate of the JBIG and effectiveness of the staged service strategy are verified.

  • PDF

Binary Image Based Fast DoG Filter Using Zero-Dimensional Convolution and State Machine LUTs

  • Lee, Seung-Jun;Lee, Kye-Shin;Kim, Byung-Gyu
    • Journal of Multimedia Information System
    • /
    • v.5 no.2
    • /
    • pp.131-138
    • /
    • 2018
  • This work describes a binary image based fast Difference of Gaussian (DoG) filter using zero-dimensional (0-d) convolution and state machine look up tables (LUTs) for image and video stitching hardware platforms. The proposed approach for using binary images to obtain DoG filtering can significantly reduce the data size compared to conventional gray scale based DoG filters, yet binary images still preserve the key features of the image such as contours, edges, and corners. Furthermore, the binary image based DoG filtering can be realized with zero-dimensional convolution and state machine LUTs which eliminates the major portion of the adder and multiplier blocks that are generally used in conventional DoG filter hardware engines. This enables fast computation time along with the data size reduction which can lead to compact and low power image and video stitching hardware blocks. The proposed DoG filter using binary images has been implemented with a FPGA (Altera DE2-115), and the results have been verified.

Secure sharing method for a secret binary image and its reconstruction system

  • Lee, Sang-Su;Han, Jong-Wook
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1240-1243
    • /
    • 2003
  • In this paper, an encryption method to share a secret binary image is proposed. It divides the image to be encrypted into an arbitrary number of images and encrypts them using XOR process with different binary random images which was prepared by the means of the XOR process, too. Each encrypted slice image can be distributed to the authenticated ones. However, we transfer the encrypted images to the binary phase masks to strengthen the security power, that means phase masks can not be copied with general light-intensity sensitive tools such as CCDs or cameras. For decryption, we used the Mach-Zehnder interferometer in which linearly polarized two light beams in orthogonal direction, respectively. The experimental result proved the efficiency of the proposed method.

  • PDF