Performance analysis of data hiding in thermal image using alpha blending technique
TL;DR: A simple technique called alpha blending is used to hide the data in an image and its impact is analyzed for different alpha values using alpha blending in thermal images.
Abstract: Hiding data in an image become a very successful technique to communicate with end users, blinding the interpreter’s intention. Various algorithms have been analyzed on the basis of masking the content within the coordinates of the images or in the color of the images used. Few advanced developed complex algorithms to hide the content in the values of the colors to ensure or guarantee robustness of the data hidden. In this research, a simple technique called alpha blending is used to hide the data in an image and its impact is analyzed for different alpha values. The unavoidable impact of noise on the transmitted carrier image was formulated and studied by many researchers using various available algorithms. In this regard: the same is analyzed using alpha blending in thermal images.
TL;DR: In this paper , a pre-trained Convolutional Neural Network (CNN) model was trained via transfer learning and tested to detect concrete defect indications, such as cracks, spalling, and potential subsurface defects.
Abstract: This study investigates the semantic segmentation of common concrete defects when using different imaging modalities. One pre-trained Convolutional Neural Network (CNN) model was trained via transfer learning and tested to detect concrete defect indications, such as cracks, spalling, and potential subsurface defects. We compared the model's performance using datasets of visible, thermal, and fused images. In addition, the impact of using different image enhancement techniques, such as histogram equalization and resolution improvement, was investigated. The data was collected from four different concrete structures using four infrared cameras with distinct sensitivities and resolutions, with imaging campaigns conducted during autumn, summer, and winter. Although specific defects can be detected in monomodal images, the results demonstrated that a larger number of defect classes could be detected using fused images with the same viewpoint and resolution as the single-sensor image without significant loss of information. In addition, the output of one hypothesis test showed that the image enhancement techniques provided no significant improvement in the CNN performance for this case of study, even though they resulted in enhanced images with higher information content (entropy) than the original images.
25 Apr 2004
TL;DR: The results of a user study are presented in which multiblended palettes provided higher recognizability of both the background and the palette than the best participating version of alpha blending.
Abstract: Alpha blending allows the simultaneous display of overlapping windows-such as palette windows in visual workspaces. Although alpha blending has been used in some applications, such as games, it has not been widely adopted. One reason for the limited acceptance is that in many scenarios, alpha blending compromises the readability of content. We introduce a new blending mechanism called multiblending that uses a vector of blending weights, one for each class of features, rather than a single transparency value. Multiblending can in most cases be automatically optimized to preserve the most relevant features of both the palette and the background window. We present the results of a user study in which multiblended palettes provided higher recognizability of both the background and the palette than the best participating version of alpha blending.
TL;DR: A new way to derive the over operator is shown and some implementation details that the author has found useful are described, which are related to matting and alpha blending.
Abstract: Associating a pixel's color with its opacity is the basis for a compositing function that is simple, elegant, and general. However, there are more reasons than mere prettiness to store pixels this way. One of the most important anti-aliening tools in computer graphics comes from a generalization of the simple act of storing a pixel into a frame buffer. Several people simultaneously discovered the usefulness of this operation, so it goes by several names: matting, image compositing, alpha blending, overlaying, or lerping. It was most completely codified in a previous paper by Porter and Duff (1984), where they call it the over operator. The author shows a new way to derive the over operator and describes some implementation details that he has found useful. >
01 Jan 2012
TL;DR: A Steganography transformation machine (STM) is proposed for solving Binary operation for manipulation of original image with help to least significant bit (LSB) operator based matching.
Abstract: Abst ract - Steg anography is the art and science of hiding information by embedding data into cover media. In this paper we propose a new method of information hiding in digital image in spatial domain. In this method we use Plane Bit Substitution Method (PBSM) technique in which message bits are embedded into the pixel value(s) of an image. We first, proposed a Steganography transformation machine (STM) for solving Binary operation for manipulation of original image with help to least significant bit (LSB) operator based matching. Second, we use pixel encryption and decryption techniques under theoretical and experimental evolution. Our experimental, techniques are sufficient to discriminate analysis of stego and cover image as each pixel based PBSM, and operand with LSB. Ke ywords : spatial domain, pbsm, stm, lsb.
••04 Oct 1998
TL;DR: A DCTdomain convolution theorem is developed which besides exploiting the sparseness of the DCT domain representation also exploits the orthogonality and symmetry in the D CT domain representation to lead to efficient compressed domain based processing methods unlike their spatial domain counterparts, where such properties are not available.
Abstract: For direct manipulation in the compressed domain, we develop a DCT domain convolution theorem which besides exploiting the sparseness of the DCT domain representation also exploits the orthogonality and symmetry in the DCT domain representation. These properties lead to efficient compressed domain based processing methods unlike their spatial domain counterparts, where such properties are not available. This theorem can be used in a variety of image and video editing functions when the image and video data are available only as a JPEG or MPEG bitstream. We illustrate the use of these DCT domain convolution theorems in a typical video editing application such as video bluescreen editing.
TL;DR: The investigation of wireless communication of steganography images is presented in this paper to study the sensitivity of extraction of hidden images to the channel degradation effects, which is not studied appropriately in the literature.
Abstract: This paper presents a robust color image steganography approach for image communication over wireless communication systems. The objective of this approach is to hide three color images in one color cover image to increase the capacity of hiding as most previously published steganography approaches suffer from a capacity problem. Moreover, the investigation of wireless communication of steganography images is presented in this paper to study the sensitivity of extraction of hidden images to the channel degradation effects, which is not studied appropriately in the literature. The proposed approach depends on the Discrete Cosine and Discrete Wavelet transform. The cover image is first transformed to luminance and chrominance components for embedding the images to be hidden. The secret images are encrypted by chaotic Baker map, which is a good representative of the family of permutation-based algorithms, which tolerate the channel degradations better. The investigated wireless communication system is the Orthogonal Frequency Division Multiplexing system with channel equalization. The simulation results reveal the success of the proposed work for robust image communication.
Related Papers (5)
01 Jan 2010