Image security and processing in the JPEG 2000 compressed domain
Graph Chatbot
Chattez avec Graph Search
Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
The modelling of natural gas combustion with detailed as well as reduced kinetic mechanisms has been subject to many publications already. Most of the mechanisms are validated at higher temperatures and ambient pressures. Only recently - in parallel to a g ...
The problem of side-information scalable source coding is considered in this work, where the encoder constructs a progressive description, such that the receiver with high quality side information will be able to truncate the bitstream and reconstruct in t ...
This paper seeks to provide an overview of the currently available assessment tools for bidirectional transmission or reflection distribution functions (BTDFs and BRDFs) of complex fenestration systems (CFS). In the first part of the paper, the existing ex ...
Video signals are sequences of natural images, where images are often modeled as piecewise-smooth signals. Hence, video can be seen as a 3D piecewise-smooth signal made of piecewise-smooth regions that move through time. Based on the piecewise-smooth model ...
Efficient representation of geometrical information in images is very important in many image processing areas, including compression, denoising and feature extraction. However, the design of transforms that can capture these geometrical features and repre ...
In this paper, we propose a Secure JPEG, an open and flexible standardized framework to secure JPEG images. Its goal is to allow the efficient integration and use of security tools enabling a variety of security services such as confidentiality, integrity ...
An efficient distributed source coding system with two encoders and dependent data streams must remove two kinds of redundancy: redundancy in each stream and between the two streams. The striking result of Slepian and Wolf showed that the latter can be eli ...
Ieee Service Center, 445 Hoes Lane, Po Box 1331, Piscataway, Nj 08855-1331 Usa2006
Compact or efficient representation for either images or image sequences is key operation to performing image and video processing tasks, such as compression, analysis, etc. The efficiency of an approximation is evaluated by the sparsity measure of the app ...
In this paper we introduce a low complexity and accurate technique for target image search and retrieval. This method, which oper- ates directly in the compressed JPEG domain, addresses two of the CBIR challenges stated by The Benchathlon Network regarding ...
This paper introduces a simple, fast, and efficient algorithm for image change detection in the compressed domain. The proposed technique operates directly on Discrete Cosine Transformed (DCT-ed) data which makes it suitable for processing compressed bitst ...