scispace - formally typeset
Search or ask a question

Showing papers on "Image file formats published in 2012"


Patent
Oren Somekh1, Nadav Golbandi1, Liran Katzir1, Ronny Lempel1, Yoelle Maarek1 
31 May 2012
TL;DR: In this article, a system and method for assigning one or more tags to an image file was proposed, where the server computer determines metadata associated with the image file and identifies a dictionary of potential textual tags from the metadata.
Abstract: A system and method for assigning one or more tags to an image file. In one aspect, a server computer receives an image file captured by a client device. In one embodiment, the image file includes an audio component embedded therein by the client device, where the audio component was spoken by a user of the client device as a tag of the image file. The server computer determines metadata associated with the image file and identifies a dictionary of potential textual tags from the metadata. The server computer determines a textual tag from the audio component and from the dictionary of potential textual tags. The server computer then associates the textual tag with the image file as additional metadata.

137 citations


Patent
28 Sep 2012
TL;DR: In this article, the authors describe a system that can render images using light field image files containing an image synthesized from light field data and metadata describing the image that includes a depth map.
Abstract: Systems and methods in accordance with embodiments of the invention are configured to render images using light field image files containing an image synthesized from light field image data and metadata describing the image that includes a depth map. One embodiment of the invention includes a processor and memory containing a rendering application and a light field image file including an encoded image and metadata describing the encoded image, where the metadata comprises a depth map that specifies depths from the reference viewpoint for pixels in the encoded image. In addition, the rendering application configures the processor to: locate the encoded image within the light field image file; decode the encoded image; locate the metadata within the light field image file; and post process the decoded image by modifying the pixels based on the depths indicated within the depth map to create a rendered image.

132 citations


Journal ArticleDOI
TL;DR: The present dataset provides clinical anesthesia monitoring data from entire surgical cases where patients underwent anesthesia, includes a wide range of vital signs variables that are commonly monitored during surgery, and is published in accessible, user-friendly file formats.
Abstract: Data recorded from the devices used to monitor a patient's vital signs are often used in the development of displays, alarms, and information systems, but high-resolution, multiple-parameter datasets of anesthesia monitoring data from patients during anesthesia are often difficult to obtain. Existing databases have typically been collected from patients in intensive care units. However, the physical state of intensive care patients is dissimilar to those undergoing surgery, more frequent and marked changes to cardiovascular and respiratory variables are seen in operating room patients, and additional and highly relevant information to anesthesia (e.g., end-tidal agent monitoring, etc.) is omitted from these intensive care databases. We collected a set of high-quality, high-resolution, multiple-parameter monitoring data suitable for anesthesia monitoring research. Vital signs data were recorded from patients undergoing anesthesia at the Royal Adelaide Hospital. Software was developed to capture, time synchronize, and interpolate vital signs data from Philips IntelliVue MP70 and MP30 patient monitors and Datex-Ohmeda Aestiva/5 anesthesia machines into 10 millisecond resolution samples. The recorded data were saved in a variety of accessible file formats. Monitoring data were recorded from 32 cases (25 general anesthetics, 3 spinal anesthetics, 4 sedations) ranging in duration from 13 minutes to 5 hours (median 105 min). Most cases included data from the electrocardiograph, pulse oximeter, capnograph, noninvasive arterial blood pressure monitor, airway flow, and pressure monitor and, in a few cases, the Y-piece spirometer, electroencephalogram monitor, and arterial blood pressure monitor. Recorded data were processed and saved into 4 file formats: (1) comma-separated values text files with full numerical and waveform data, (2) numerical parameters recorded in comma-separated values files at 1-second intervals, (3) graphical plots of all waveform data in a range of resolutions as Portable Network Graphics image files, and (4) graphical overview plots of numerical data for entire cases as Portable Network Graphics and Scalable Vector Graphics files. The complete dataset is freely available online via doi:102.100.100/6914 and has been listed in the Australian National Data Service Collections Registry. The present dataset provides clinical anesthesia monitoring data from entire surgical cases where patients underwent anesthesia, includes a wide range of vital signs variables that are commonly monitored during surgery, and is published in accessible, user-friendly file formats. The text and image file formats let researchers without engineering or computer science backgrounds easily access the data using standard spreadsheet and image browsing software. In future work, monitoring data should be collected from a wider range and larger number of cases, and software tools are needed to support searching and navigating the database.

125 citations


Patent
30 Mar 2012
TL;DR: In this paper, an apparatus and a method of the apparatus for uploading an image file to a social network service (SNS) is described, where the image file is generated by scanning, or previously saved at the apparatus, using an application installed on the apparatus.
Abstract: An apparatus and a method of the apparatus for uploading an image file to a social network service (SNS) are provided. The apparatus uploads an image file generated by scanning, or an image file previously saved at the apparatus, using an application installed on the apparatus. The apparatus selects at least one of the image files generated by scanning at an image scanning apparatus connected to the apparatus, or previously-saved image files, and uploads the selected image file to at least one SNS site, using the application installed on the apparatus.

100 citations


Journal ArticleDOI
TL;DR: An IDL implementation for the classification and regression analysis of remote sensing images with Random Forests is introduced, called imageRF, which is platform and license independent and uses generic image file formats.
Abstract: An IDL implementation for the classification and regression analysis of remote sensing images with Random Forests is introduced. The tool, called imageRF, is platform and license independent and uses generic image file formats. It works well with default parameterization, yet all relevant parameters can be defined in intuitive GUIs. This makes it a user-friendly image processing tool, which is implemented as an add-on in the free EnMAP-Box and may be used in the commercial IDL/ENVI software.

91 citations


Patent
08 Mar 2012
TL;DR: In this paper, a social networking system determines one or more individuals matching one or multiple faces in an image file of a still image or a video sequence, associated with a first user based on the individuals' spatial and temporal proximity to the image file, and presents the matched individuals to the first user.
Abstract: In one embodiment, a social networking system determines one or more individuals matching one or more faces in an image file of a still image or a video sequence, associated with a first user based on the one or more individuals' spatial and temporal proximity to the image file, and presents the matched individuals to the first user.

87 citations


Patent
31 Oct 2012
TL;DR: In this article, an image layout apparatus consisting of a cropping unit, displaying unit, a checking unit, first and second computing units, a noticing unit, and a preventing unit is described.
Abstract: An image layout apparatus includes a cropping unit, a displaying unit, a checking unit, first and second computing units, a noticing unit, and a preventing unit. The cropping unit crops an image file image. The displaying unit displays and arranges cropped images on a page. The checking unit checks whether first and second image files are same. The first computing unit computes, in response to the first image file and the second image file being the same, an overlapping area between a first displayed image and a second displayed image. The second computing unit computes overlapping size ratio of the computed overlapping area. The noticing unit notices, in response to the first image file and the second image file being the same, information regarding duplication of image files. The preventing unit prevents, in response to the computed overlapping size ratio being smaller than a predetermined value, noticing the information.

77 citations


Journal ArticleDOI
TL;DR: This article suggests several tips and tricks that can be used by the radiologist so that the digital potential of DICOM images can be fully utilized for maximization of workflow in the radiology practice.
Abstract: All modalities in radiology practice have become digital, and therefore deal with DICOM images. Image files that are compliant with part 10 of the DICOM standard are generally referred to as "DICOM format files" or simply "DICOM files" and are represented as ".dcm." DICOM differs from other image formats in that it groups information into data sets. A DICOM file consists of a header and image data sets packed into a single file. The information within the header is organized as a constant and standardized series of tags. By extracting data from these tags one can access important information regarding the patient demographics, study parameters, etc. In the interest of patient confidentiality, all information that can be used to identify the patient should be removed before DICOM images are transmitted over a network for educational or other purposes. In addition to the DICOM format, the radiologist routinely encounters images of several file formats such as JPEG, TIFF, GIF, and PNG. Each format has its own unique advantages and disadvantages, which must be taken into consideration when images are archived, used in teaching files, or submitted for publication. Knowledge about these formats and their attributes, such as image resolution, image compression, and image metadata, helps the radiologist in optimizing the archival, organization, and display of images. This article aims to increase the awareness among radiologists regarding DICOM and other image file formats encountered in clinical practice. It also suggests several tips and tricks that can be used by the radiologist so that the digital potential of these images can be fully utilized for maximization of workflow in the radiology practice.

76 citations


Patent
24 Oct 2012
TL;DR: In this article, a stereoscopic image can be displayed at an appropriate disparity amount on the basis of attribute information recorded in a three-dimensional image file, and the most appropriate image is selected from the images of acquired viewpoint numbers.
Abstract: A stereoscopic image can be displayed at an appropriate disparity amount on the basis of attribute information recorded in a three-dimensional image file. A size of a display for performing 3D display is acquired (Step S31), and a 3D image file is read out (Step S32). From meta data of the read 3D image file, the maximum display size capable of appropriately performing 3D display of each viewpoint image is acquired (Step S33). The size acquired in Step S31 and the maximum display size acquired in Step S33 are compared (Step S34). Viewpoint numbers of images in which the maximum display size is larger are acquired (Step S35), the most appropriate image is selected from the images of acquired viewpoint numbers (Step S37), and 3D display is performed using the selected image (Step S38). Therefore, 3D display by selecting an appropriate image can be performed on the basis of the maximum display size.

51 citations


Journal ArticleDOI
TL;DR: The cell: an image library-CCDB (CIL- CCDB) is a searchable database and archive of cellular images that accepts all forms of cell imaging from light and electron microscopy, including multi-dimensional images, Z- and time stacks in a broad variety of raw-data formats, as well as movies and animations.
Abstract: The cell: an image library-CCDB (CIL-CCDB) (http://www.cellimagelibrary.org) is a searchable database and archive of cellular images. As a repository for microscopy data, it accepts all forms of cell imaging from light and electron microscopy, including multi-dimensional images, Z- and time stacks in a broad variety of raw-data formats, as well as movies and animations. The software design of CIL-CCDB was intentionally designed to allow easy incorporation of new technologies and image formats as they are developed. Currently, CIL-CCDB contains over 9250 images from 358 different species. Images are evaluated for quality and annotated with terms from 14 different ontologies in 16 different fields as well as a basic description and technical details. Since its public launch on 9 August 2010, it has been designed to serve as not only an archive but also an active site for researchers and educators.

47 citations


Journal ArticleDOI
TL;DR: An enhanced global feature extraction method based on the on statistical analysis of the behavior of edge pixels in binary images that can boost the overall performance of optical font recognition.
Abstract: The binary image is essential to image formats where the textual image is the best example of the binary image representation. Feature extraction is a fundamental process in pattern recognition. In this regard, pattern recognition studies involve document analysis techniques. Optical font recognition is among the pattern recognition techniques that are becoming popular today. In this paper, we propose an enhanced global feature extraction method based on the on statistical analysis of the behavior of edge pixels in binary images. A novel method in feature extraction for binary images has been proposed whereby the behavior of the edge pixels between a white background and a black pattern in a binary image captures information about the properties of the pattern. The proposed method is tested on an Arabic calligraphic script image for an optical font recognition application. To evaluate the performance of our proposed method, we compared it with a gray-level co occurrence matrix (GLCM). We classified the features using a multilayer artificial immune system, a Bayesian network, decision table rules, a decision tree, and a multilayer network to identify which approach is most suitable for our proposed method. The results of the experiments show that the proposed method with a decision tree classifier can boost the overall performance of optical font recognition.

Patent
21 Dec 2012
TL;DR: In this article, a structured state capture file (SSCF) is used to represent the session state and steps or actions which produced the state, and does not include a memory image or memory dump of the first computer system.
Abstract: System and method for capturing and/or restoring session state of a machine without using image files. Session state information for a first computer system may be captured in a structured state capture file (SSCF) using metadata to represent the session state and steps or actions which produced the session state, and does not include a memory image or memory dump of the first computer system. The SSCF may be stored, and subsequently provided for restoration of the session state on the first computer system or a different computer system. A server computer system may store the SSCF (with other SSCFs) and may provide the SSCF to the first computer system or a different computer system over a network for session state restoration, e.g., in response to a request over the network. The first computer system may implement a virtual machine (VM). The session state may be that of the VM.

Patent
08 Aug 2012
TL;DR: In this article, a caching method of a virtual machine mirror image in a cloud computing system is described, which comprises the following steps of: A10, dividing all computer nodes in a Cloud computing system network into multiple clusters; A20, respectively arranging a sharing cache for storing corresponding virtual machine mirrors of each computer node in the cluster in each cluster; and A30, when a computation node in one cluster requires operating a VM example, downloading the corresponding VM mirror image to the sharing cache, establishing a corresponding VM image copy in the cache, and when the VM example is closed
Abstract: The invention discloses a caching method of a virtual machine mirror image in a cloud computing system, which comprises the following steps of: A10, dividing all computer nodes in a cloud computing system network into multiple clusters; A20, respectively arranging a sharing cache for storing corresponding virtual machine mirror image of each computer node in the cluster in each cluster; and A30, when a computation node in one cluster requires operating a virtual machine example, downloading the corresponding virtual machine mirror image to the sharing cache in the cluster, establishing a corresponding virtual machine mirror image copy in the sharing cache, and when the virtual machine example is closed, deleting the corresponding virtual machine mirror image copy from the sharing cache According to the invention, the flow transmitted by the sharing virtual machine mirror image is limited in the cluster to the greatest extent, the mirror image copy is hung to the computation node in a shared file manner, and the example can be started without downloading the mirror image file, so that the virtual machine starting time is shortened and the expense is lowered

Proceedings ArticleDOI
01 Dec 2012
TL;DR: There exists a realistic chance to fool state-of-the-art image file forensic methods using available software tools and the analysis of ordered data structures on the example of JPEG file formats and the EXIF metadata format as countermeasure is introduced.
Abstract: JPEG file format standards define only a limited number of mandatory data structures and leave room for interpretation. Differences between implementations employed in digital cameras, image processing software, and software to edit metadata provide valuable clues for basic authentication of digital images. We show that there exists a realistic chance to fool state-of-the-art image file forensic methods using available software tools and introduce the analysis of ordered data structures on the example of JPEG file formats and the EXIF metadata format as countermeasure. The proposed analysis approach enables basic investigations of image authenticity and documents a much better trustworthiness of EXIF metadata than commonly accepted. Manipulations created with the renowned metadata editor ExifTool and various image processing software can be reliably detected. Analysing the sequence of elements in complex data structures is not limited to JPEG files and might be a general principle applicable to different multimedia formats.

25 Oct 2012
TL;DR: It is demonstrated conclusively that working in the compressed domain is consistently faster than in the pixel domain, typically requiring around 15% of the processing time.
Abstract: While content-based image retrieval (CBIR) has been an active research area over many years, most CBIR techniques operate in the pixel domain even though images are typically stored in compressed form. Consequently, image decoding is required prior to feature calculation leading to a computational overhead that is prohibitive in particular for the case of online retrieval. However, as has been shown by several authors, well performing image features can also be extracted directly from the compressed domain of the images. In this paper, we focus on JPEG compression since it represents the dominant image format, and provide an overview of JPEG compressed domain CBIR algorithms. We furthermore compare these algorithms on a common benchmark database, the MPEG-7 Common Colour dataset. We demonstrate conclusively that working in the compressed domain is consistently faster than in the pixel domain, typically requiring around 15% of the processing time. We also show that in several cases the retrieval performance is comparable to that of methods in the pixel domain whilst maintaining this speed gain.

Journal ArticleDOI
TL;DR: This paper proposes least significant bit (LSB) substitution method to encrypt the message in the watermark image file to provide new ways of ensuring the sufficient protection of copyright holders in the intellectual property dispersion process.
Abstract: The Internet as a whole does not use secure links, thus information in transit may be vulnerable to interruption as well. The important of reducing a chance of the information being detected during the transmission is being an issue in the real world now days. The Digital watermarking method provides for the quick and inexpensive distribution of digital information over the Internet. This method provides new ways of ensuring the sufficient protection of copyright holders in the intellectual property dispersion process. The property of digital watermarking images allows insertion of additional data in the image without altering the value of the image.In this paper investigate the following relevant concepts and terminology, history of watermarks and the properties of a watermarking system and applications. We are proposing edge detection using Gabor Filters. In this paper we are proposed least significant bit (LSB) substitution method to encrypt the message in the watermark image file. The benefits of the LSB are its simplicity to embed the bits of the message directly into the LSB plane of cover-image and many techniques using these methods. The LSB does not result in a human perceptible difference because the amplitude of the change is little therefore the human eye the resulting stego image will look identical to the cover image and this allows high perceptual transparency of the LSB. The spatial domain technique LSB substitution it would be able to use a pseudo-random number generator to determine the pixels to be used for embedding based on a given key. We are using DCT transform watermark algorithms based on robustness. The watermarking robustness have been calculated by the Peak Signal to Noise Ratio (PSNR) and Normalized cross correlation (NC) is used to quantify by the similarity between the real watermark and after extracting watermark.

Patent
03 Feb 2012
TL;DR: In this article, a method of processing paper checks that divides into two independent paths the processing of a data file representing a check and the digital image of the check is presented, with the data files being used to promptly initiate the transfer of funds to and from appropriate accounts, while the paper checks are scanned to create digital image files and deposited as an image or substitute check if deemed ACH ineligible.
Abstract: A method of processing paper checks that divides into two independent paths the processing of a data file representing a check and the digital image of the check. The data files and image files are separated both in time and in space, with the data files being used to promptly initiate the transfer of funds to and from appropriate accounts, while the paper checks, at a remote location and typically lagging in time, are scanned to create digital image files and deposited as an image or substitute check if deemed ACH ineligible. The method provides for the comparison of data files to image files, based on MICR information, to find any unmatching or mismatched items for exception processing and a process to manage ACH-ineligible items as an image or substitute check. A process for translating raw MICR data to a desired format, and for identifying the proper translation to be applied, is described.

Patent
25 Jan 2012
TL;DR: In this paper, a method for automatic recognition and stage compression of medical image regions of interest based on an artificial neural network was proposed. But the method was not applied to remote medical systems.
Abstract: The invention relates to a method for automatic recognition and stage compression of medical image regions of interest based on an artificial neural network. Medical image files in a digital diagnostic system are generally larger, and due to the limitation by factors of bandwidth and the like, the transmission speed is low, the effect is not good, and the diagnosis quality is influenced. By the method, medical digital images are subjected to noise elimination, the tissue outline of a human body is recognized, tissue images are subjected to multiple times of overlay operation, image features of the regions of interest are strengthened, feature values are extracted, classification is performed by using an artificial neural network method, the regions of interest and corresponding levels are determined, and tagged image file format (TIFF) images are generated in different compression modes according to different levels of the regions of interest and non-regions of interest. By the method, the medical image files are greatly lessened, the transmission speed is increased, and effective necessary information used for diagnosis and treatment in the images is kept, so the method facilitates the reading of doctors, and can be applied to the digital diagnostic system and a remote medical system, and improve the diagnosis and treatment efficiency and effect.

Patent
15 Aug 2012
TL;DR: In this article, the authors present an example of digital media privacy protection, where a computer-readable medium stores computer-executable instructions that, when executed, cause one or more processors to execute operations including capturing at least one image file, obfuscating at least all facial images included in the captured image file.
Abstract: In one example of digital media privacy protection, a computer-readable medium stores computer-executable instructions that, when executed, cause one or more processors to execute operations including capturing at least one image file, obfuscating at least all facial images included in the captured image file, comparing all facial images included in the captured image file against a locally stored privacy policy, unobfuscating those of the facial images included in the captured image file for which the comparison against the locally stored privacy policy results in a positive match, and rendering the captured image file.

Journal ArticleDOI
TL;DR: The results of the study show that NCD can be used to address some of the selected image comparison problems, but care must be taken on the compressor and image format selected.
Abstract: Similarity metrics are widely used in computer graphics. In this paper, we will concentrate on a new, algorithmic complexity-based metric called Normalized Compression Distance. It is a universal distance used to compare strings. This measure has also been used in computer graphics for image registration or viewpoint selection. However, there is no previous study on how the measure should be used: which compressor and image format are the most suitable. This paper presents a practical study of the Normalized Compression Distance (NCD) applied to color images. The questions we try to answer are: Is NCD a suitable metric for image comparison? How robust is it to rotation, translation, and scaling? Which are the most adequate image formats and compression algorithms? The results of our study show that NCD can be used to address some of the selected image comparison problems, but care must be taken on the compressor and image format selected.

Book ChapterDOI
27 Aug 2012
TL;DR: This paper compares multiple approaches for pre-provisioning and shows that a reduction of 60% in service time is achievable, based on usage data collected from an enterprise cloud, and through simulation.
Abstract: One of the key metrics of performance in an infrastructure cloud is the speed of provisioning a virtual machine (or a virtual appliance) on request. A VM is instantiated from an image file stored in the image repository. Since the image files are large, often GigaBytes in size, transfer of the file from the repository to a compute node running the hypervisor can take time in the order of minutes. In addition to it, booting an image file can be a time consuming process if several applications are pre-installed. Use of caching to pre-fetch items that may be requested in future is known to reduce service latency. In order to overcome the delays in transfer and booting time, we prepare a VM a priori, and save it in a standby state in a "cache" space collocated with the compute nodes. On receiving a matching request, the VM from the cache is instantly served to the user, thereby reducing service time. In this paper, we compare multiple approaches for pre-provisioning and evaluate their benefits. Based on usage data collected from an enterprise cloud, and through simulation, we show that a reduction of 60% in service time is achievable.

Patent
25 Aug 2012
TL;DR: In this article, the authors propose a method of transmitting digital content via a communication network, which comprises receiving by a computer a request for a uniform resource identifier (URI), determining by the computer based on the request for the uniform resource identifiers a communication service provider associated with a communication device, and when the communication service providers is affiliated with a digital content custom delivery offer building system, transmitting by a computers an image file to be presented by the communication device.
Abstract: A method of transmitting digital content via a communication network. The method comprises receiving by a computer a request for a uniform resource identifier (URI), determining by a computer based on the request for the uniform resource identifier a communication service provider associated with a communication device, and when the communication service provider is affiliated with a digital content custom delivery offer building system, transmitting by a computer an image file to be presented by the communication device.

Journal ArticleDOI
TL;DR: A novel steganographic technique that combines both the spatial domain as well as the transform domain approach to achieve greater security and achieves moderate embedding capacity with high level of security is proposed.
Abstract: Steganography is the art of hiding data inside a carrier file in such a way that an intruder or unwanted personnel is unable to detect the presence of data inside the carrier file. Audio, Video and Images are the different possible carrier files that can be used. This paper describes a steganographic technique which makes use of an image file as a carrier to hold the secret message and transfer it over the communication medium. There are two popular schemes used for image steganography: spatial domain embedding and transform domain embedding. Most of the steganographic techniques discussed in literature either use spatial domain or transform domain to embed the secret message. Here we have proposed a novel steganographic technique that combines both the spatial domain as well as the transform domain approach to achieve greater security. We have chosen LSB substitution technique for spatial domain embedding and Discrete Wavelet Transform (DWT) for transform domain embedding. The paper also proposes technique to combine cryptography with the proposed image steganography technique. Here we make use of the S-DES also known as the simplified DES algorithm for encryption. Our experimental results show that the proposed steganographic technique achieves moderate embedding capacity with high level of security.

Proceedings ArticleDOI
TL;DR: An architecture to achieve backward compatible HDR technology with JPEG is provided and efficiency of a simple implementation of this framework when compared to the state of the art HDR image compression is demonstrated.
Abstract: High Dynamic Range (HDR) imaging is expected to become one of the technologies that could shape next generation of consumer digital photography. Manufacturers are rolling out cameras and displays capable of capturing and rendering HDR images. The popularity and full public adoption of HDR content is however hindered by the lack of standards in evaluation of quality, file formats, and compression, as well as large legacy base of Low Dynamic Range (LDR) displays that are unable to render HDR. To facilitate wide spread of HDR usage, the backward compatibility of HDR technology with commonly used legacy image storage, rendering, and compression is necessary. Although many tone-mapping algorithms were developed for generating viewable LDR images from HDR content, there is no consensus on which algorithm to use and under which conditions. This paper, via a series of subjective evaluations, demonstrates the dependency of perceived quality of the tone-mapped LDR images on environmental parameters and image content. Based on the results of subjective tests, it proposes to extend JPEG file format, as the most popular image format, in a backward compatible manner to also deal with HDR pictures. To this end, the paper provides an architecture to achieve such backward compatibility with JPEG and demonstrates efficiency of a simple implementation of this framework when compared to the state of the art HDR image compression.

Journal Article
TL;DR: The proposed method, SD-AIES is an upgraded version of SD-AEI Image Encryption Technique and is tested on different image files and the results were far more than satisfactory.
Abstract: The security of digital information in modern times is one of the most important factors to keep in mind. For this reason, in this paper, the author has proposed a new standard method of image encryption. The proposed method consists of 4 different stages: 1) First, a number is generated from the password and each pixel of the image is converted to its equivalent eight binary number, and in that eight bit number, the number of bits, which are equal to the length of the number generated from the password, are rotated and reversed; 2) In second stage, extended hill cipher technique is applied by using involutory matrix, which is generated by same password used in second stage of encryption to make it more secure; 3) In third stage, generalized modified Vernam Cipher with feedback mechanism is used on the file to create the next level of encryption; 4) Finally in fourth stage, the whole image file is randomized multiple number of times using modified MSA randomization encryption technique and the randomization is dependent on another number, which is generated from the password provided for encryption method. SD-AIES is an upgraded version of SD-AEI Image Encryption Technique. The proposed method, SD-AIES is tested on different image files and the results were far more than satisfactory.

Patent
18 Dec 2012
TL;DR: In this article, an electronic point of purchase (POP) advertising apparatus includes a sensor for detecting a person and also includes an electronic advertising unit presenting a predetermined POP advertisement in response to detection by the sensor.
Abstract: An information playback apparatus includes a storage memory removably attached to a main unit and in which compressed moving image file data are electrically stored; an MPEG decoder in the main unit for reading the data and decompressing it; an NTSC encoder in the main unit for converting playback image data obtained by decompressing the moving image file data into image data in a predetermined output format; an LCD on the main unit or outside of the main unit for displaying the image data in a predetermined display area; an a microcomputer for repeatedly playing back the image data in predetermined units of the compressed moving image file data. An electronic point of purchase (POP) advertising apparatus includes a sensor for detecting a person and also includes an electronic advertising unit presenting a predetermined POP advertisement in response to detection by the sensor. The electronic advertising unit includes a section for storing POP advertisements, a section for selecting a particular POP advertisement of the POP advertisements stored, and a section for outputting the particular POP advertisement in response to a detection signal output from the sensor.

Patent
Ji Hye Jung1
03 Jan 2012
TL;DR: In this paper, a method for synchronizing background images within a multi-environment operating system is presented, where a processor running a first operating system environment will utilize a first background image for a first graphical user interface 12 on the device 10.
Abstract: A device 10 and method for synchronizing background images within a multi-environment operating system is provided herein. During operation, a processor 22 running a first operating system environment will utilize a first background image for a first graphical user interface 12 on the device 10. The first operating system will save the first background image to a shared image file. A second operating system environment being run by the processor 24 will access the shared image file and utilize the first background image for a second GUI 1303 on an external display 1301.

Patent
15 Sep 2012
TL;DR: In this article, a computer based, digital image management system that visually presents an entire archive in a manner that facilitates easy, non-textual, searching for specific images is presented.
Abstract: A computer based, digital image management system that visually presents an entire archive in a manner that facilitates easy, non-textual, searching for specific images. In one embodiment, the system includes two elements: a file management methodology and a graphical user interface. The file management method utilizes reference files that contain multiple properties (metadata) relating to each image file. Image files are grouped into a multiplicity of collections based on user-defined associations of the properties. The graphical user interface visually represents the groups of image files on 2-dimensional or 3-dimensional graphic metaphors. In addition, the graphical interface uses multiple display variables such as icons, mnemonics, size, movement, color, and luminance to signify relationships between groups, and/or communicate key properties of individual or groups of images.

Proceedings ArticleDOI
15 Mar 2012
TL;DR: Describing of various image formats and image compression algorithms which will be helpful for researcher in the field of medical image processing are provided.
Abstract: The Digital Imaging and Communications in Medicine (DICOM) standard was created to aid the distribution and viewing of medical images, such as CT scans, MRIs, and ultrasound by the National Electrical Manufacturers Association (NEMA). This paper includes description of various image formats and image compression algorithms which will be helpful for researcher in the field of medical image processing. The comparison of described formats and compression techniques is also provided in this paper. DICOM is the most common standard for receiving scans from a hospital. The DICOM standard is an evolving standard and it is maintained in accordance with the procedures of the DICOM standards committee. The features, which are extracted from DICOM images, are included in this paper.

Journal ArticleDOI
TL;DR: In this article, the authors present a comparison of results from other open source multi-ray matching software to handle the issue of the described flight conditions, which can be applied to other flights.
Abstract: . Several flights have been undertaken with PAMS (Photogrammetric Aerial Mapping System) by Germap, Germany, which is briefly introduced. This system is based on the SmartPlane fixed-wing UAV and a CANON IXUS camera system. The plane is equipped with GPS and has an infrared sensor system to estimate attitude values. A software has been developed to link the PAMS output to a standard photogrammetric processing chain built on Trimble INPHO. The linking of the image files and image IDs and the handling of different cases with partly corrupted output have to be solved to generate an INPHO project file. Based on this project file the software packages MATCH-AT, MATCH-T DSM, OrthoMaster and OrthoVista for digital aerial triangulation, DTM/DSM generation and finally digital orthomosaik generation are applied. The focus has been on investigations on how to adapt the "usual" parameters for the digital aerial triangulation and other software to the UAV flight conditions, which are showing high overlaps, large kappa angles and a certain image blur in case of turbulences. It was found, that the selected parameter setup shows a quite stable behaviour and can be applied to other flights. A comparison is made to results from other open source multi-ray matching software to handle the issue of the described flight conditions. Flights over the same area at different times have been compared to each other. The major objective was here to see, on how far differences occur relative to each other, without having access to ground control data, which would have a potential for applications with low requirements on the absolute accuracy. The results show, that there are influences of weather and illumination visible. The "unusual" flight pattern, which shows big time differences for neighbouring strips has an influence on the AT and DTM/DSM generation. The results obtained so far do indicate problems in the stability of the camera calibration. This clearly requests a usage of GCPs for all projects, independent on the application. The effort is estimated to be even higher as expected, as also self-calibration will be an issue to handle a possibly instable camera calibration. To overcome some of the encountered problems with the very specific features of UAV flights a software UAVision was developed based on Open Source libraries to produce input data for bundle adjustment of UAV images by PAMS. The empirical test results show a considerable improvement in the matching of tie points. The results do, however, show that the Open Source bundle adjustment was not applicable to this type of imagery. This still leaves the possibility to use the improved tie point correspondences in the commercial AT package.