scispace - formally typeset
Search or ask a question

Showing papers on "Image file formats published in 2011"


Book
01 Jan 2011
TL;DR: In this paper, the acquisition and use of digital images in a wide variety of scientific fields is discussed. But the focus is on high dynamic range imaging in more than two dimensions.
Abstract: "This guide clearly explains the acquisition and use of digital images in a wide variety of scientific fields. This sixth edition features new sections on selecting a camera with resolution appropriate for use on light microscopes, on the ability of current cameras to capture raw images with high dynamic range, and on imaging in more than two dimensions. It discusses Dmax for X-ray images and combining images with different exposure settings to further extend the dynamic range. This edition also includes a new chapter on shape measurements, a review of new developments in image file searching, and a wide range of new examples and diagrams"

3,017 citations


Patent
05 Apr 2011
TL;DR: In this article, a method of combining data from multiple sensors is disclosed, which includes receiving lines of image data at an image processor having an input for a single camera, each line of the image data includes first-line data from a first image captured by a first camera and second-lines from a second image capturing by a second camera.
Abstract: A method of combining data from multiple sensors is disclosed. The method includes receiving lines of image data at an image processor having an input for a single camera. Each line of the image data includes first line data from a first image captured by a first camera and second line data from a second image captured by a second camera. The method also includes generating an output frame having a first section corresponding to line data of the first image and having a second section corresponding to line data of the second image. The first section and the second section are configured to be used to generate a three-dimensional (3D) image format or a 3D video format.

257 citations


Journal ArticleDOI
TL;DR: A camera signature is extracted from a JPEG image consisting of information about quantization tables, Huffman codes, thumbnails, and exchangeable image file format (EXIF) and it is shown that this signature is highly distinct across 1.3 million images spanning 773 different cameras and cell phones.
Abstract: It is often desirable to determine if an image has been modified in any way from its original recording. The JPEG format affords engineers many implementation trade-offs which give rise to widely varying JPEG headers. We exploit these variations for image authentication. A camera signature is extracted from a JPEG image consisting of information about quantization tables, Huffman codes, thumbnails, and exchangeable image file format (EXIF). We show that this signature is highly distinct across 1.3 million images spanning 773 different cameras and cell phones. Specifically, 62% of images have a signature that is unique to a single camera, 80% of images have a signature that is shared by three or fewer cameras, and 99% of images have a signature that is unique to a single manufacturer. The signature of Adobe Photoshop is also shown to be unique relative to all 773 cameras. These signatures are simple to extract and offer an efficient method to establish the authenticity of a digital image.

198 citations


Proceedings Article
Chunqiang Tang1
15 Jun 2011
TL;DR: Fast Virtual Disk is a new virtual machine (VM) image format and the corresponding block device driver developed for QEMU that enables instant VM creation and instant VM migration, even if the VM image is stored on direct-attached storage.
Abstract: Fast Virtual Disk (FVD) is a new virtual machine (VM) image format and the corresponding block device driver developed for QEMU. QEMU does I/O emulation for multiple hypervisors, including KVM, Xen-HVM, and VirtualBox. FVD is a holistic solution for both Cloud and non-Cloud environments. Its feature set includes flexible configurability, storage thin provisioning without a host file system, compact image, internal snapshot, encryption, copy-on-write, copy-on-read, and adaptive prefetching. The last two features enable instant VM creation and instant VM migration, even if the VM image is stored on direct-attached storage. As its name indicates, FVD is fast. Experiments show that the throughput of FVD is 249% higher than that of QCOW2 when using the Post-Mark benchmark to create files.

83 citations


Book ChapterDOI
24 Jun 2011
TL;DR: Image fusion is an effective way for optimum utilization of large volumes of image from multiple sources to achieve inferences that are not feasible from a single sensor or source.
Abstract: 1.1 Definition of image fusion With the development of multiple types of biosensors, chemical sensors, and remote sensors on board satellites, more and more data have become available for scientific researches. As the volume of data grows, so does the need to combine data gathered from different sources to extract the most useful information. Different terms such as data interpretation, combined analysis, data integrating have been used. Since early 1990’s, “Data fusion” has been adopt and widely used. The definition of data fusion/image fusion varies. For example: Data fusion is a process dealing with data and information from multiple sources to achieve refined/improved information for decision making (Hall 1992)[1]. Image fusion is the combination of two or more different images to form a new image by using a certain algorithm (Genderen and Pohl 1994 )[2]. Image fusion is the process of combining information from two or more images of a scene into a single composite image that is more informative and is more suitable for visual perception or computer processing. (Guest editorial of Information Fusion, 2007)[3]. Image fusion is a process of combining images, obtained by sensors of different wavelengths simultaneously viewing of the same scene, to form a composite image. The composite image is formed to improve image content and to make it easier for the user to detect, recognize, and identify targets and increase his situational awareness. 2010. (http://www.hcltech.com/aerospace-and-defense/enhanced-vision-system/). Generally speaking, in data fusion the information of a specific scene acquired by two or more sensors at the same time or separate times is combined to generate an interpretation of the scene not obtainable from a single sensor [4]. Image fusion is a component of data fusion when data type is strict to image format (Figure 1). Image fusion is an effective way for optimum utilization of large volumes of image from multiple sources. Multiple image fusion seeks to combine information from multiple sources to achieve inferences that are not feasible from a single sensor or source. It is the aim of image fusion to integrate different data in order to obtain more information than can be derived from each of the single sensor data alone (`1+1=3’)[4].

64 citations


Patent
27 Apr 2011
TL;DR: A digital image file includes an image portion including a first digital image, an information part including a second digital image of a digital code encoding information associated with or derived from the first image as mentioned in this paper.
Abstract: A digital image file includes an image portion including a first digital image, an information portion including a second digital image of a digital code encoding information associated with or derived from the first digital image. When rendered visible the second digital image is a machine-readable optical code.

57 citations


Patent
Yong-Tae Kim1, Ha-Joong Park1, Gun-IlI Lee1, Houng-sog Min1, Sung-Bin Hong1, Choi Kwang Cheol1 
23 Feb 2011
TL;DR: In this paper, a multiview still image file format is proposed, where a plurality of image areas are configurable to form a multi-view still image, and three-dimensional (3D) basic attribute information is inserted into the plurality of areas, respectively.
Abstract: Provided are an apparatus and a method of providing a multiview still image service. The method includes: configuring a multiview still image file format including a plurality of image areas into which a plurality of pieces of image information forming a multiview still image are inserted; inserting the plurality of pieces of image information into the plurality of image areas, respectively; inserting three-dimensional (3D) basic attribute information to three-dimensionally reproduce the multiview still image into a first image area of the plurality of image areas into which main-view image information from among the plurality of pieces of image information is inserted; and outputting multiview still image data comprising the plurality of pieces of image information based on the multiview still image file format.

56 citations


Proceedings ArticleDOI
01 Nov 2011
TL;DR: To implement this work, Cortex-A8 series S5PV210 embedded processor and Android operating system are correlated and the robot has an autonomous and manual travel and is controlled by only smart phone.
Abstract: In this work, Android operating system based robot platform and smart phone operated control and monitoring system are introduced. To implement this work, Cortex-A8 series S5PV210 embedded processor and Android operating system are correlated. The robot has an autonomous and manual travel and is controlled by only smart phone. In the Android OS (Operating System), the camera image is compressed to JPEG format and the image file is delivered to a smart phone through 802.11x wireless LAN communication which utilizes TCP/IP communication socket programming. Later, the transferred image data are converted into BMP format, which enables a real time image display.

52 citations


Journal ArticleDOI
TL;DR: FITS as discussed by the authors is the standard astronomical data format that stores the image, metadata, and data tables for easy transport and can be manipulated, but it is not suitable for large data sets.
Abstract: FITS is the standard astronomical data format that stores the image, metadata, and data tables for easy transport and can be manipulated. See http://fits.gsfc.nasa.gov/ for more information and software downloads. The FITS header for this image file is included as a separate text file.

51 citations


Journal ArticleDOI
TL;DR: JPG2000 standard is employed because of its high (lossy/lossless) compression ratio with minimal spatial distortion, retrieval-oriented storage, and streaming, and thanks to sophisticated JPEG2000 streaming, medical image becomes suitable for any resolution and quality display and (wireless) networks.
Abstract: The idea for softcopy viewing of medical image outside the radiology reading room spread among the scientists in various fields for several years. An image could be read on workstation of all types, from desktop across movable to handheld. Benefits are numerous and continue to grow as physicians use them discovering new usage cases. Proposed solutions vary with PACS architecture invasion level, communication and storage image formats, and utilization. We employ JPEG2000 standard because of its high (lossy/lossless) compression ratio with minimal spatial distortion, retrieval-oriented storage, and streaming. It is embedded in PACS as the DICOM Private Data Element containing JPIP parameter string, so-called DICOM2000. The DICOM2000 message is transparent for standard DICOM devices at the slightest level of invasion. Thanks to sophisticated JPEG2000 streaming, medical image becomes suitable for any resolution and quality display and (wireless) networks. The solution is validated on the ACR/NEMA standard test set of PACS images.

42 citations


Journal ArticleDOI
TL;DR: In this paper, an interactive software tool for image generation and analysis (IMAGENA) was developed for image analysis of metal isotopes by laser ablation mass spectrometry with inductively coupled plasma (LA-ICP-MS).

01 Jan 2011
TL;DR: An overview of the current state-of-the-art in file carving is presented and the implementation of a file carver for fragmented multimedia files is focused on.
Abstract: File carving is a recovery technique that recovers files based on information about their structure and content without matching file system information. As files can be recovered from their content and/or file structure this technique is indispensable during digital forensics investigations. So far many approaches for the recovery of digital images have been proposed. The main contribution of this paper is a discussion of existing and new approaches for the recovery of multimedia files. After a short discussion of relevant multimedia file formats we present an overview of the current state-of-the-art in file carving. In the main part we focus on the implementation of a file carver for fragmented multimedia files. Finally, we summarize our findings and give an outlook with regard to post-processing files that have been recovered successfully.

Patent
24 Mar 2011
TL;DR: In this article, a decision means for determining whether a storage medium having a function of transferring an image file stored in a first format to an external device is connected to its own device.
Abstract: PROBLEM TO BE SOLVED: To transfer an image file using a storage medium having a function of transferring an image file to an external device, in which an image file of an appropriate capacity is transferred SOLUTION: The problem is solved by providing a decision means for determining whether a storage medium having a function of transferring an image file stored in a first format to an external device is connected to its own device and a switching means for switching a format of the image file to the first format or a second format different from the first format in accordance with information on a capacity of the image file stored in the storage medium when the decision means determine that the storage medium is connected with the device COPYRIGHT: (C)2011,JPO&INPIT

Journal ArticleDOI
TL;DR: This study integrates direct image access with a DMLC tracking system and quantifies the tracking latency of the integrated system for both kV and MV image-based tracking, which resulted in substantial tracking latency reductions compared with image- based tracking without direct imageAccess.
Abstract: Purpose. Target tracking is a promising method for motion compensation in radiotherapy. For image-based dynamic multileaf collimator (DMLC) tracking, latency has been shown to be the main contributor to geometrical errors in tracking of respiratory motion, specifically due to slow transfer of image data from the image acquisition system to the tracking system via image file storage on a hard disk. The purpose of the current study was to integrate direct image access with a DMLC tracking system and to quantify the tracking latency of the integrated system for both kV and MV image-based tracking. Method. A DMLC tracking system integrated with a linear accelerator was used for tracking of a motion phantom with an embedded tungsten marker. Real-time target localization was based on x-ray images acquired either with a portal imager or a kV imager mounted orthogonal to the treatment beam. Images were processed directly without intermediate disk access. Continuous portal images and system log files were ...

Patent
12 Oct 2011
TL;DR: In this article, the authors proposed a method, system and device for controlling a virtual machine (VM) which can shorten the time for starting the VM by combining the template image files and incremental image files.
Abstract: The invention discloses a method, system and device for controlling a virtual machine (VM), which can shorten the time for starting the VM. The method comprises the following steps: receiving a VM starting request from a user, wherein, the starting request comprises image file description information corresponding to the VM which is requested to be started; determining template image files and incremental image files corresponding to a VM operating system according to the image file description information; and further matching the image files locally saved by a physical machine for starting the VM with the determined template image files and incremental image files, and determining index image files for starting the VM according to a matching result and then loading the files. By utilizing the technical scheme, only the index image files need to be combined; and due to small occupied data quantity of the index image files, the combining operation can be completed within quite a short period of time so as to shorten the consumed time for starting the VM.

Patent
04 Mar 2011
TL;DR: In this article, a method for creating, storing, and providing access to 3D image files for subsequent use in virtual world environments is described, which includes receiving 3D data generated through scanning of a person or object.
Abstract: A method is provided for creating, storing, and providing access to three- dimensional (3D) image files for subsequent use in virtual world environments. The method includes receiving 3D data generated through scanning of a person or object; recording and formatting the data into a digital image file; storing the digital image file in a 3D digital image file library located in a machine readable storage; providing access to the 3D digital image file library; retrieving the digital image file from the 3D digital image file library; and uploading the digital image file into an interactive virtual world environment.

Book
10 Aug 2011
TL;DR: This volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field of secure image sharing.
Abstract: With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information. Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive datasuch as medical records, financial transactions, and electronic voting systemsthe methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files. An exploration of the most prominent topics in digital imaging security, this book discusses: Potential for sharing multiple secrets Visual cryptography schemesbased either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared images Inclusion of pictures in the distributed shares Contrast enhancement techniques Color-image visual cryptography Cheating prevention Alignment problems for image shares Steganography and authentication In the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field.

Patent
18 Oct 2011
TL;DR: In this article, a vehicle identification computer identifies the second vehicle based on the vehicle identification indicia, which are generated and transmitted to the identification computer by using the captured image and a tag.
Abstract: Embodiments of the present invention provide a method, system and a vehicle identification computer for identifying a vehicle are disclosed. In accordance with an embodiment of the present invention, camera(s), mountable to a first vehicle, capture an image of at least a part of a second vehicle. The captured image includes vehicle identification indicia. An image file comprising the image and a tag are generated and transmitted to a vehicle identification computer. The vehicle identification computer identifies the second vehicle based on the vehicle identification indicia.

Patent
24 Feb 2011
TL;DR: In this article, a computing device and method for reading a barcode captured with a color image sensor is disclosed, which can have features and background that have equal brightness such that the barcode could not be decoded with known greyscale decoding techniques.
Abstract: A computing device and method for reading a barcode captured with a color image sensor is disclosed. The barcode can have features and background that have equal brightness such that the barcode could not be decoded with known greyscale decoding techniques. The method for reading the barcode includes receiving color image values for each pixel of a captured image of a target barcode from a color image sensor, determining chrominance values for each pixel from the color image values, detecting edges based on the chrominance values to generate an edge-detected image that is provided to a greyscale barcode decoder to decode the information in the target barcode. The chrominance values can be based on the blue and red difference components from the YUV image format, and the U and V values can be combined using color temperature information.

Patent
28 Jun 2011
TL;DR: In this paper, a method and a system for editing documents online, that in some implementations, simultaneously edits a webpage document in a webpage file format, and an image document, in an image file format.
Abstract: A method and a system for editing documents online, that in some implementations, simultaneously edits a webpage document, in a webpage file format, and an image document, in an image file format. The webpage document and the image document may have substantially similar visual content. In some implementations, an editing interface is displayed to a client device. The editing interface may have a first portion displaying one or more webpage editing forms for editing the webpage document and a second portion displaying the webpage document or image document being edited. The editing interface accepts editing data from the client device. Both the webpage document and an image document may be updated based on accepted editing data. The image document is updated in part by updating form data retrieved from a database. In some implementations, the updated webpage document is displayed on a webpage and access to the image document is provided from the webpage.

Patent
James D. Lynch1
30 Dec 2011
TL;DR: In this article, the optical data is projected onto at least one predefined two-dimensional plane, and a pixel value for a point of optical data on the 2D plane is calculated according to the image data.
Abstract: One or more systems, devices, and/or methods for generating path side imagery are disclosed. For example, a method includes receiving optical data measured in three-dimensional geographic coordinates and image data from at least one image bubble. The optical data is projected onto at least one predefined two-dimensional plane. A pixel value for a point of the optical data on the two-dimensional plane is calculated according to the image data. The pixel value may correspond to color or another graphical attribute. The two-dimensional plane is stored or displayed as street side imagery or other path side imagery. An image file including the pixel value for each point of the optical data may be stored in memory or a map database.

Patent
Jyrki Alakuijala1
03 Nov 2011
TL;DR: In this article, methods, systems, and articles of manufacture for image compression and decompression using sub-resolution images are disclosed, which includes determining a plurality of entropy code sets based upon statistically similar regions in the input image.
Abstract: Methods, systems, and articles of manufacture for image compression and decompression using sub-resolution images are disclosed. Compressing of images includes, determining a plurality of entropy code sets based upon statistically similar regions in the input image, generating one or more sub-resolution images including a first sub-resolution image comprising the plurality of entropy code sets, encoding the input image using the generated one or more sub-resolution images to control one or more compression parameters including an entropy code, and outputting the encoded input image and the generated one or more sub-resolution images as a compressed entropy coded image file. Decompressing of images include, decomposing an image file to access the encoded compressed input image and respective sub-resolution images for each of a plurality of compression parameters, and decoding the encoded compressed input image using the respective sub-resolution images to control each of the plurality of compression parameters.

Patent
14 Dec 2011
TL;DR: In this paper, a method for recording a screen operation process with an expressive meaning was proposed, where a smaller file can be generated so as to transmit through the internet and can be used as a software demonstration operation record for teaching or function introduction abbreviation.
Abstract: The invention relates to the fields of software, software service mode and network and the like, and in particular relates to a recording method and an application of screen operation The invention provides a method for recording a screen operation process with an expressive meaning In the method, a smaller file can be generated so as to transmit through the internet and can be used as a software demonstration operation record for teaching or function introduction abbreviation; and the method provided by the invention can also be applied to instant messaging software to add a screen demonstration function for the instant messaging software The recording method and the application of screen operation provided by the invention are characterized by acquiring the displayed image sequence data from a driving layer at the bottom layer, recording and saving the frame data, and generating an image file format, or a GIF file format or a Flash file format by using the frame data

Proceedings ArticleDOI
Lu Yuan1, Jian Sun1
06 Nov 2011
TL;DR: This paper proposes a new “hybrid” image capture mode: a high-res JPEG file and a low-res RAW file as alternative of the original RAW file to reconstruct a high quality image by combining the advantages of two kinds of files.
Abstract: A camera RAW file contains minimally processed data from the image sensor. The contents of the RAW file include more information, and potentially higher quality, than the commonly used JPEG file. But the RAW file is typically several times larger than the JPEG file (taking fewer images, slower quick shooting) and lacks the standard file format (not ready-to-use, prolonging the image workflow). These drawbacks limit its applications. In this paper, we suggest a new “hybrid” image capture mode: a high-res JPEG file and a low-res RAW file as alternative of the original RAW file. Most RAW users can be benefited from such a combination. To address this problem, we provide an effective approach to reconstruct a high quality image by combining the advantages of two kinds of files. We formulate this reconstruction process as a global optimization problem by enforcing two constraints: reconstruction constraint and detail consistency constraint. The final recovered image is smaller than the full-res RAW file, enables faster quick shooting, and has both richer information (e.g., color space, dynamic range, lossless 14 bits data) and higher resolution. In practice, the functionality of capturing such a “hybrid” image pair in one-shot has been supported in some existing digital cameras.

Journal Article
TL;DR: Wavelet based Non LSB Steganography (WNLS) is proposed, which can’t be detected by existing steganalysis techniques such as chi-square and pair of values techniques, and observes that the PSNR values are better in the case of IWT compare to DWT for all image formats.
Abstract: Steganography is the methods of communicating secrete information hidden in the cover object. The messages hidden in a host data are digital image, video or audio files, etc, and then transmitted secretly to the destination. In this paper we propose Wavelet based Non LSB Steganography (WNLS). The cover image is segmented into 4*4 cells and DWT/IWT is applied on each cell. The 2*2 cell of HH band of DWT/IWT are considered and manipulated with payload bit pairs using identity matrix to generate stego image. The key is used to extract payload bit pairs at the destination. It is observed that the PSNR values are better in the case of IWT compare to DWT for all image formats. The algorithm can’t be detected by existing steganalysis techniques such as chi-square and pair of values techniques. The PSNR values are high in the case of raw images compared to formatted images.

Proceedings ArticleDOI
11 Mar 2011
TL;DR: This system intends for data confidentiality, data authentication and data integrity, and to support effective ways for protecting data using three steganogrpaphic methods.
Abstract: Due to increasing the technologies security systems are very popular in many areas. The security of information can be achieved by using encryption and steganography. In cryptography, encrypted data is transmitted after transforming the other form instead of the original data. Contrast cryptography, information hiding process can be extended for protecting from the interesting of any attacker. This paper proposes the enhance security system by combining these two techniques. In this system, the encrypted message is embedded in a BMP image file. In proposed system, three LSB steganographic techniques have been implemented and analyzed. This proposed system intends for data confidentiality, data authentication and data integrity. This system not only enhances the security of data but also becomes more powerful mechanism. This system intends to support effective ways for protecting data. The primary goal of our system is to enhance the security of data and then to compare three steganographic techniques. Then we will use the optimized method for embedding. In this paper, we just present three steganographic approaches. In this system, data is encrypted with RC4 encryption algorithm and then embedded the encrypted text in the BMP image file using three steganogrpaphic methods.

Patent
29 Mar 2011
TL;DR: In this paper, a server system includes a storage system having a plurality of volumes, a pluralityof host systems, and a management server coupled with the storage system and the host systems via a network.
Abstract: Embodiments of the invention provide a capability to validate volume status on the host and storage system stored virtual machine image in the datacenter management server. In one embodiment, a server system includes a storage system having a plurality of volumes, a plurality of host systems, and a management server coupled with the storage system and the host systems via a network. A method of managing the server system comprises: generating a golden image in the storage system corresponding to a virtual machine image file; copying virtual machine data from the golden image to some of the plurality of volumes in the storage system; and keeping track, by the management server, of status of the volumes which have copied virtual machine data by monitoring activity of the virtual machines.

Patent
11 May 2011
TL;DR: In this article, a two-dimensional code generation method for mobile communication system is presented, in which the two-dimension code can be automatically generated by the mobile terminal for a user, so that the application range of the 2D code in the mobile communication service is extended; and in addition, when the technical scheme of the application is applied to network service, the twodimension code information with the image format is not required to be transmitted in the communication network.
Abstract: The invention discloses a two-dimension code generation method, a user mobile terminal and a mobile communication system. The two-dimension code generation method comprises the following steps; obtaining text message with a predetermined format through the user mobile terminal; encoding the text message with the predetermined format to generate two-dimension code image information; and preserving the generated two-dimension code image information. By applying the technical scheme provided in the embodiment of the application, the two-dimension code can be automatically generated by the mobile terminal for a user, so that the application range of the two-dimension code in the mobile communication service is extended; and in addition, when the technical scheme of the application is applied to network service, the two-dimension code information with the image format is not required to be transmitted in the communication network, so that the limitation of the own functions of the network transmission mechanism and the mobile terminal to the application of the two-dimension code can be effectively reduced.

Journal ArticleDOI
01 Jan 2011
TL;DR: The technical challenges raised by the foundation of this new kind of journal and its scientific evaluation issues are described and the potential impact on the development of image science is analyzed.
Abstract: Image Processing On Line (IPOL) publishes image processing and image analysis algorithms, described in ac-curate literary form, coupled with code. It allows scientists to check directly the published algorithms on line by providing a web execution interface on any uploaded image. This installation acts the universality of image science. It permits to transcend the artificial segmentation of the research community in groups using this or that image software, or working on dedicated incompatible image formats. It promotes reproducible research, and the establishment of a state of the art verifiable by all, and on any image. This paper describes the technical challenges raised by the foundation of this new kind of journal and its scientific evaluation issues. It finally analyzes the first publications, to demonstrate its potential impact on the development of image science.

Proceedings ArticleDOI
15 Nov 2011
TL;DR: A secure electronic voting system that provides enhanced security by implementing cryptography and steganography in Java is proposed.
Abstract: As information technology evolves over time, the need for a better, faster, more convenient and secure electronic voting is relevant since the traditional election procedures cannot satisfy all of voter's demands. To increase the number of voters and to offer an enhanced procedure in an election, many researchers have been introducing novel and advanced approaches to secure electronic voting systems. This paper proposes a secure electronic voting system that provides enhanced security by implementing cryptography and steganography in Java. As a preliminary investigation, two steganography techniques are considered and their performances are compared for different image file formats.