scispace - formally typeset
Search or ask a question

Showing papers on "Image file formats published in 2014"


Journal ArticleDOI
TL;DR: A demystifying overview of the major file formats currently used in medical imaging: Analyze, Neuroimaging Informatics Technology Initiative, Minc, and Digital Imaging and Communications in Medicine (Dicom) is presented.
Abstract: Image file format is often a confusing aspect for someone wishing to process medical images. This article presents a demystifying overview of the major file formats currently used in medical imaging: Analyze, Neuroimaging Informatics Technology Initiative (Nifti), Minc, and Digital Imaging and Communications in Medicine (Dicom). Concepts common to all file formats, such as pixel depth, photometric interpretation, metadata, and pixel data, are first presented. Then, the characteristics and strengths of the various formats are discussed. The review concludes with some predictive considerations about the future trends in medical image file formats.

171 citations


Proceedings ArticleDOI
23 May 2014
TL;DR: A new Steganography technique is being developed to hide large data in Bitmap image using filtering based algorithm, which uses MSB bits for filtering purpose, which is an improvement of Least Significant Bit (LSB) method for hiding information in images.
Abstract: In Steganography, the total message will be invisible into a cover media such as text, audio, video, and image in which attackers don't have any idea about the original message that the media contain and which algorithm use to embed or extract it. In this paper, the proposed technique has focused on Bitmap image as it is uncompressed and convenient than any other image format to implement LSB Steganography method. For better security AES cryptography technique has also been used in the proposed method. Before applying the Steganography technique, AES cryptography will change the secret message into cipher text to ensure two layer security of the message. In the proposed technique, a new Steganography technique is being developed to hide large data in Bitmap image using filtering based algorithm, which uses MSB bits for filtering purpose. This method uses the concept of status checking for insertion and retrieval of message. This method is an improvement of Least Significant Bit (LSB) method for hiding information in images. It is being predicted that the proposed method will able to hide large data in a single image retaining the advantages and discarding the disadvantages of the traditional LSB method. Various sizes of data are stored inside the images and the PSNR are also calculated for each of the images tested. Based on the PSNR value, the Stego image has higher PSNR value as compared to other method. Hence the proposed Steganography technique is very efficient to hide the secret information inside an image.

76 citations


Journal ArticleDOI
TL;DR: This paper uses customized parsers to extract all file format structures of videos from overall 19 digital camera models, 14 mobile phone models, and 6 video editing toolboxes and reports considerable differences in the choice of container formats, audio and video compression algorithms, acquisition parameters, and internal file structure.

48 citations


Patent
14 Mar 2014
TL;DR: In this article, a computer-based system for idea capture, organization and management is presented, where the system presents a creation template for capturing ideas and building digital content onto electronic notes.
Abstract: A computer-based system for idea capture, organization and management is shown. The system presents a creation template for capturing ideas and building digital content onto electronic notes. The e-notes may be migrated over on to an electronic board in an organization template. In the latter case, e-notes may be grouped, repositioned, deleted, or copied. Multiple users can access the e-board, and it can be saved or sent as a converted image file or PDF. The e-board has multiple layers, allowing for marking directly on the e-board. Various other features and aspects of the system designed to facilitate group collaboration and team development are disclosed.

41 citations


Patent
24 Apr 2014
TL;DR: In this paper, a method of providing personal emoticons by applying one or more image processing filters and/or algorithms on a self-portrait image for performing at least one of the following tasks: enhancing said provided image, recognizing the face expression, and emphasizing the face expressions represented by the provided image.
Abstract: The present invention relates to a method of providing personal emoticons by applying one or more image processing filters and/or algorithms on a self-portrait image for performing at least one of the following tasks: enhancing said provided image, recognizing the face expression, and/or emphasizing the face expression represented by the provided image, and converting said process image into one or more emoticon/s format such that the image file is standardize into a pixel array of uniform dimensions to be used as personal emoticons in one or more applications and/or operating system based platforms by a software component that allows a user to enter characters on a computer based device.

39 citations


Patent
23 Jan 2014
TL;DR: In this paper, a method of creating an electronic file corresponding to a printed artifact may include receiving an image file of a document page and automatically performing a search to identify an actual form that corresponds to the potential form identifier.
Abstract: A method of creating an electronic file corresponding to a printed artifact may include receiving an image file of a document page. The method may include analyzing the image file to detect a potential form identifier on the document page and automatically (without human intervention) performing a search to identify an actual form that corresponds to the potential form identifier. The method may further include validating that the image file is of a document page that corresponds to the actual form, locating a probable fill-in field on the document page and mapping the probable fill-in field to an actual fill-in field of the actual form.

36 citations


Patent
Jun Xu1, Rangaraju Iyengar1
13 Jun 2014
TL;DR: In this paper, a method of bootstrapping from a remote image file comprising loading, by a processor, an initial bootloader, employing the initial bootloaders to download a final bootloader from the remote image via a network, and employing the final boot loader to mount the file as a block device, downloading a kernel and root file system mounting data from the file, and executing the kernel to bootstrap the processor based on the file mounting data.
Abstract: A method of bootstrapping from a remote image file comprising loading, by a processor, an initial bootloader, employing the initial bootloader to download a final bootloader from the remote image file via a network, employing the final bootloader to mount the remote image file as a block device, downloading a kernel and root file system mounting data from the remote image, and executing the kernel to bootstrap the processor based on the root file system mounting data.

33 citations


Journal ArticleDOI
TL;DR: The prospect of chaotic image encryption is promising and the security test results indicate the proposed methods have high security, and the speed of the algorithm is faster than classical solutions.

33 citations


Journal ArticleDOI
TL;DR: This article introduces PsyPad, a customizable, open-source platform for configuring and conducting visual psychophysics experiments on iPads without the need for any code development for the iPad.
Abstract: This article introduces PsyPad, a customizable, open-source platform for configuring and conducting visual psychophysics experiments on iPads without the need for any code development for the iPad. Stimuli for experiments are created off-line as a library of images. The PsyPad app (obtainable from the Apple App Store) presents the images according to either built-in, customizable staircase or method of constant stimuli procedures, mapping stimuli levels to images based on the image file names. On-screen buttons for responses are configurable and matched to "correct" using the image file name of any given stimulus. All actions are logged into a text file and sent to a specified server at the end of the test if an Internet connection is available. If the iPad is not connected, the results are uploaded the next time the iPad is online. We provide a secure server for this purpose, but the server-side software is also open source if researchers choose to run their own server.

30 citations


Patent
25 Feb 2014
TL;DR: In this article, a mechanism for automatic installation and scaling of application resources in a multi-tenant PaaS environment in a cloud computing system is disclosed, which includes creating, by a processing device of an Infrastructure-as-a-Service (IaaS) platform, an image package corresponding to a node host on a multitenant Platform-asa-service (PaaS).
Abstract: A mechanism for automatic installing and scaling of application resources in a multi-tenant Platform-as-a-Service (PaaS) environment in a cloud computing system is disclosed. A method includes creating, by a processing device of an Infrastructure-as-a-Service (IaaS) platform, an image package corresponding to a node host on a multi-tenant Platform-as-a-Service (PaaS) system. The image package comprises an image file including a script file having a plurality of software updates and run time configuration files. The image package is stored in a storage memory of the IaaS platform and is accessible by a virtual machine (VM) instance. The method also includes retrieving, from the storage memory, the script file from the image package and causing a boot process of the VM instance to download the script file into the PaaS system.

26 citations


Journal ArticleDOI
TL;DR: A survey on digital images steganography and covering its fundamental concepts is delivered, the development of image steganographic methods in spatial representation, in JPEG format is discussed and significant research developments are also discussed.
Abstract: Steganography is an important technique for information hiding in any digital object. Steganography technique is the science that includes communicating secret information in an appropriate digital multimedia cover objects such as audio, video and image files. The main objective of steganography is to hide the existence of the embedded data. Steganography technique has improved the security of existing data hiding techniques by the outstanding development in computational power. Objectives of steganography are Undetectability, robustness and capacity of the concealed data, these key factors that separate it from related techniques like cryptography and watermarking. This paper delivers a survey on digital images steganography and covering its fundamental concepts. The development of image steganographic methods in spatial representation, in JPEG format and also discuss the recent development in the field of image steganography. Specific generally used approaches for increasing steganographic security are summarized and significant research developments are also discussed.

Patent
29 Jan 2014
TL;DR: In this paper, the authors describe an expansion developing method and device for an Android custom control, which comprises the steps that a custom control source code is encoded to generate a custom controller source code package; image resources are added and a system view data package is generated; a corresponding custom control plug-in package is created according to the custom control and the system view resource package.
Abstract: The invention discloses an expansion developing method and device for an Android custom control. The method comprises the steps that a custom control source code is encoded to generate a custom control source code package; image resources are added and a system view data package is generated; a corresponding custom control plug-in package is generated according to the custom control source code package and the system view resource package. When a simulator is started, system configuration definition is conducted through a system initialing configuration file, and a custom control source code package in a simulator mirror image file is loaded; when a Java virtual machine of an Android platform is started, the system view resource package in the simulator mirror image file is pre-loaded; an application installing package runs, the custom control source code is called, image resources are read, and the developing of the custom control is accomplished. All resources in the custom control can be called when an application package is analyzed, and therefore the efficiency and flexibility of Android custom control expansion development are improved.

Patent
24 Apr 2014
TL;DR: In this paper, the color depth of a light field image may be reduced through the use of a bit reduction algorithm such as a K-means algorithm, and the image may then be retiled to group pixels of similar intensities and/or colors.
Abstract: RAW images and/or light field images may be compressed through the use of specialized techniques. The color depth of a light field image may be reduced through the use of a bit reduction algorithm such as a K-means algorithm. The image may then be retiled to group pixels of similar intensities and/or colors. The retiled image may be padded with extra pixel rows and/or pixel columns as needed, and compressed through the use of an image compression algorithm. The compressed image may be assembled with metadata pertinent to the manner in which compression was done to form a compressed image file. The compressed image file may be decompressed by following the compression method in reverse.

Patent
28 May 2014
TL;DR: In this article, a mobile terminal for processing a power generation field operation is presented, which consists of a two-ticket management module, which is used for looking up a work ticket, carrying out remote permission and issuing of the work tickets, checking an operation ticket, and enabling the operation ticket to execute a power failure operation according to steps.
Abstract: The invention provides a mobile terminal for processing a power generation field operation The mobile terminal comprises: a two-ticket management module, which is used for looking up a work ticket, carrying out remote permission and issuing of the work ticket, checking an operation ticket, and enabling the operation ticket to execute a power failure operation according to steps; a work form module, which is used for receiving an electronic signature and a form content and returning the electronic signature and the form content to a security production management system; a defect management module, which is used for tracking and recording a security defect, providing a function of security defect record checking, returning the security defect and a corresponding image attachment to the security production management system in real time; and an image file resource module, which is used for enabling a power generation field operation worker to check the image file resource According to the invention, with the mobile terminal, the file operation worker does not need to carry lots of paper sheets and resources and only one piece of mobile terminal equipment is needed for carrying, so that all filed work can be completed with high efficiency

Journal ArticleDOI
TL;DR: This study proposes a novel multi-image threshold sharing scheme based on Chinese remainder theorem and Lagrange interpolation that works efficiently and reduces computation cost in case it needs to recover only one image from shares.

Proceedings ArticleDOI
10 Mar 2014
TL;DR: In this work, texture based Content Based Image Retrieval (CBIR) algorithm is used for efficient image retrieval and various performance metrics such as reliability, accuracy, interoperability, confidentiality and security are improved with the use of Hadoop.
Abstract: In the last few years there has been tremendous increase in the storage and processing of data, with significant speed and storage space requirements. Medical image storage and retrieval is one such application which requires huge storage space and not easily solved by computers. The researchers who work in the area of medical image processing deal with a high degree of storage and retrieval of medical images. Digitizing medical images and computer based image retrieval replaces the use of hard copies and provides efficient remote access. The proposed grid architecture implemented in this work uses Apache Hadoop framework. Hadoop is an open source grid architecture, complies with various image formats and can be established among various hospitals to store, share and retrieve images. Various performance metrics such as reliability, accuracy, interoperability, confidentiality and security are improved as with the use of Hadoop. The user authentication and patient confidentiality is also achieved. In this work, texture based Content Based Image Retrieval (CBIR) algorithm is used for efficient image retrieval. The performance of the proposed image retrieval system using Hadoop is tested with three current operative nodes. Experimental results obtained show that the retrieval time of the proposed system, Hadoop-CBIR, is considerably less with large number of images in the database.

Patent
Sekiguchi Tomohiro1
15 May 2014
TL;DR: In this article, an image processing apparatus for processing a plurality of moving image files each including moving image data relating to continuity of time between the moving image and other moving image file is presented.
Abstract: An image processing apparatus for processing a plurality of moving image files each including moving image data relating to continuity of time between the moving image data other moving image file, performs an editing process for deleting a portion of the moving image data of one scene including a plurality of the moving image files, and changes the identification information of the moving image file in accordance with the editing process, wherein in accordance with the editing process for deleting a portion of the moving image data of the one scene being performed, the identification information of at least one of the plurality of moving image files included in the one scene is changed.

Patent
06 Jun 2014
TL;DR: In this article, an image processing device includes: a parameter generating unit configured to receive supply of raw moving image data, which is moving images in an undeveloped state, and generate a development parameter as to a target frame of the raw moving images.
Abstract: An image processing device includes: a parameter generating unit configured to receive supply of raw moving image data which is moving image data in an undeveloped state, and generate a development parameter as to a target frame of the raw moving image data; and a recording control unit configured to perform control so as to record the supplied raw moving image data, and the development parameter generated by the parameter generating unit in a predetermined recording medium in a correlated manner with each other. Thus, raw moving image data which is moving image data before development processing can be suitably employed.

Journal Article
TL;DR: This study focuses on restoration of degraded images which have been blurred by known or unknown degradation function on the basis of various performance metrics like PSNR(Peak Signal to Noise Ratio), MSE(Mean Square Error) , RMSE( Root Mean Square Error).
Abstract: Image Restoration is a field of Image Processing which deals with recovering an original and sharp image from a degraded image using a mathematical degradation and restoration model. This study focuses on restoration of degraded images which have been blurred by known or unknown degradation function. On the basis of knowledge of degradation function image restoration techniques can be divided into two categories: blind and non-blind techniques. Three different image formats viz..jpg(Joint Photographic Experts Group), .png(Portable Network Graphics) and .tif(Tag Index Format) are considered for analyzing the various image restoration techniques like Deconvolution using Lucy Richardson Algorithm (DLR), Deconvolution using Weiner Filter (DWF), Deconvolution using Regularized Filter (DRF) and Blind Image Deconvolution Algorithm (BID).The analysis is done on the basis of various performance metrics like PSNR(Peak Signal to Noise Ratio), MSE(Mean Square Error) , RMSE( Root Mean Square Error).

Journal ArticleDOI
TL;DR: The proposed method treats a file frag­ment as a grayscale image, and uses image classification method to classify file fragment and two models based on file-unbiased and type- unbiased are proposed to verify the validity of the proposed method.
Abstract: File fragment classification is an important and difficult problem in digital forensics. Previous works in this area mainly relied on specific byte sequences in file headers and footers, or statistical analysis and machine learning algorithms on data from the middle of the file. This paper introduces a new approach to classify file fragment based on grayscale image. The proposed method treats a file frag­ment as a grayscale image, and uses image classification method to classify file fragment. Furthermore, two models based on file-unbiased and type-unbiased are proposed to verify the validity of the proposed method. Compared with previous works, the experimental results are promising. An average classification accuracy of 39.7% in file-unbiased model and 54.7% in type-unbiased model are achieved on 29 file types.

Patent
12 Feb 2014
TL;DR: In this paper, a preparation technology of a gravure plate roller is described, which consists of the following steps: preparing a printing plate base body, carrying out copper coating processing on a printed plate roller, preparing an original image file, and chroming the printing plate roller.
Abstract: The invention discloses a preparation technology of a gravure plate roller. The preparation technology comprises the following steps: preparing a printing plate base body; carrying out copper coating processing on a printing plate roller; preparing an original image file; electronically engraving and preparing a printing plate image; chroming the printing plate roller. When the printing plate roller is prepared, the utilization rate of steel products is high, the working allowance of steel is low, the preparation cost of the roller is reduced, the prepared plate roller accords with the operating requirement, and the service life is long.

Journal ArticleDOI
TL;DR: A hybrid model which uses a combination of two symmetric algorithms enhanced AES and Blowfish for data confidentiality, Message Digest-5 for data integrity, Elliptic Curve Diffie Hellman algorithm-ECDHA for key exchange and ElliptIC Curve Digital signature algorithmECDSA is used for digital signature.
Abstract: The AES and ECC are the best two algorithms of symmetric encryption technology and asymmetric encryption technology. The paper presents a hybrid model which uses a combination of two symmetric algorithms enhanced AES and Blowfish for data confidentiality, Message Digest-5 for data integrity, Elliptic Curve Diffie Hellman algorithm-ECDHA for key exchange and Elliptic Curve Digital signature algorithmECDSA is used for digital signature. AES is enhanced by modifying the S-boxes columns, and then combination of enhanced AES and blowfish is used for data confidentiality. Performance of this system is evaluated on different configurations on the basis of encryption/decryption time, throughput and memory usage for different data formats like text file, image file, audio file and video file.

Patent
14 Apr 2014
TL;DR: In this article, each of the image files associated with a user to a computing device of the user from a distributed backup system is associated with popularity score that is determined as a function of a user-related access pattern and a group-related accessing pattern of the images.
Abstract: Technology is disclosed for downloading image files associated with a user to a computing device of the user from a distributed backup system. Each of the image files is associated with a popularity score that is determined as a function of a user-related access pattern and a group-related access pattern of the image files. While the user-related access pattern is determined based on an access of the image files by the user, the group-related access pattern is determined based on an access by a group of users. The image files are categorized into priority files and non-priority files based on the popularity score of the image files. The priority files are downloaded in an original format and the non-priority files are downloaded in one or more image qualities that minimize the consumption of computing resources in downloading the image files.

Patent
Nakase Yuichi1
18 Dec 2014
TL;DR: An image reproducing apparatus as discussed by the authors includes a determination unit configured to determine images from a selection of recorded images, where the images are a still image and a portion of a moving image, and a reproduction control unit is configured to sequentially reproduce the determined plurality of image.
Abstract: An image reproducing apparatus including a determination unit configured to determine images (from a selection of recorded images), where the images are a still image and a portion of a moving image, and a reproduction control unit configured to sequentially reproduce the determined plurality of image. The still image and the moving image are stored in a recording medium and the determination unit does not reproduce the still image and the portion of the moving image in which the still image is inserted. The apparatus may include a still image camera and a video recorder to record a video associated with the photo. The apparatus may also attach object information to each of the images and the determination unit uses that information to determine the images to be reproduced. The images produced may be stored as a moving image file, that can be distinguishable from each other, possibly being divided into chapters. The apparatus advantageously does not reproduce the still image to be inserted and the portion of the moving image that is overlapped by the still image.

Patent
22 Jan 2014
TL;DR: In this article, an automatic online virtual machine software installation method and system is proposed. But the method is not suitable for large-scale software installation, as it requires a large number of automated online software installation tests.
Abstract: The invention relates to an automatic online virtual machine software installing method and system. The automatic online virtual machine software installing method comprises the steps that for a Windows system, an installation file, a configuration file and a keyboard and mouse operation script are obtained through automatic online software installation tests, when an automatic software installation task arrives, a start-up running script is generated and the installation file, the start-up running script and/or the keyboard and mouse operation scrip are implanted into a virtual machine image file; for a Linux system, an installation file, a configuration file and a keyboard and mouse operation script for automatic and correct software installation are obtained through a plurality of automatic online software installation tests based on a software package local image repository mode or a script installation mode, and when an automatic software installation task arrives, the installation file and/or a start-up running script and/or the keyboard and mouse operation script are or is implanted into the virtual machine image file; automatic online virtual machine software installation is completed during starting up of a virtual machine. By means of the automatic online virtual machine software installing method and system, large-scale automatic virtual machine software installation can be realized at the beginning of virtual machine starting up.

Patent
24 Dec 2014
TL;DR: In this article, a virtual machine mirror image file storage and distribution method and device is presented, where the storage method comprises the steps of segmenting mirror image files into length-fixed mirror image block; storing the mirror image blocks.
Abstract: The invention provides a virtual machine mirror image file storage and distribution method and device. The storage method comprises the steps of segmenting mirror image files into length-fixed mirror image file blocks; storing the mirror image file blocks. The length-fixed blocking and storage are performed on the mirror image files, so that a storage space for the virtual machine mirror image files can be effectively saved, and meanwhile high compression ratio is ensured. The distribution method comprises the steps of determining the mirror image file blocks belonging to a client-side node virtual machine; establishing connection between the client-side node virtual machine and other client-side nodes; obtaining the mirror image file blocks from other client-side nodes when the mirror image file blocks required by the client-side node virtual machine exist in other client-side nodes, and obtaining the required mirror image file blocks from a data server if the mirror image file blocks do not exist in other client-side nodes; or sending the mirror image file blocks when the mirror image file blocks required by other client-side nodes exist in the client-side node virtual machine. Mirror image file distribution of virtual machine client-sides is achieved by adopting a P2P protocol, and virtual machine mirror image file distribution efficiency and speed are effectively improved.

Patent
09 Jul 2014
TL;DR: In this paper, a method for enabling a mobile phone to be connected to a WiFi network is described by including the first step of generating all compressed files at a host computer end according to a bootloader of the compression algorithm lzma.
Abstract: The invention provides a method for enabling a mobile phone to be connected to a WiFi network If the method is used for establishment of wireless connection, can the same effect be achieved It is a pity that the answer is no The method for enabling the mobile phone to be connected to the WiFi network is characterized by including the first step of generating all compressed files at a host computer end according to a bootloader of the compression algorithm lzma, the second step of compiling a merging program and merging all the compressed files into a mirror image file, the third step of running the mirror image file in the bootloader according to the compression algorithm lzma and providing a corresponding interface, and the fourth step of decompressing mirror images cured in flash in the bootloader and starting a system The method is used for enabling the mobile phone to be connected to the WiFi network

Patent
06 Aug 2014
TL;DR: In this paper, a virtual machine template IVF storage method is presented, where different application types of virtual machines, such as Web service, database service and load balance, are mounted on an established virtual platform according to a requirement, and a VM operating system, an application program, a configuration environment and the like are mounted.
Abstract: The invention provides a virtual machine template IVF storage method. Different application types of virtual machines, such as WEB service, database service and load balance, are mounted on an established virtual platform according to a requirement, and a virtual machine operating system, an application program, a configuration environment and the like are mounted. After an environment is established, a function demand of a user in a certain aspect, such as website construction, is basically met. A system comprises a virtual machine template configuration file (1), a completeness checking file (2) and a virtual machine magnetic disk mirror image file (3). If the user still needs to deploy a similar environment, the user only needs to configure the current virtual machine into a use template so as to avoid repeated operation of the previous work, and then a virtual machine is established according to the template, so that the similar environment can be established quickly.

Patent
19 Feb 2014
TL;DR: In this paper, a method for remotely and automatically updating family gateway software is presented, where a private key pair is generated through an OpenSSL, a mirror image file is signed through the private key pairs, and a signature is added to the tail portion of the corresponding mirror image to form an updating file; an updating condition validation file is stored in a folder where the updating file was stored by a server; a digital certificate, including a public key, issued by a CA is imported into a family gateway; updating function module is triggered regularly by the family gateway through a crond
Abstract: The invention discloses a method for remotely and automatically updating family gateway software. A private key pair is generated through an OpenSSL, a mirror image file is signed through the private key pair, and a signature is added to the tail portion of the corresponding mirror image file to form an updating file; an updating condition validation file is stored in a folder where the updating file is stored by a server; a digital certificate, including a public key, issued by a CA is imported into a family gateway; an updating function module is triggered regularly by the family gateway through a crond command, the condition validation file is downloaded from the server, whether updating conditions are met or not is judged, if yes, the corresponding updating file will be downloaded from the server, the signature will be verified, and updating will be carried out if the signature passes the verification, and otherwise updating will not be carried out. According to the method for remotely and automatically updating the family gateway software, the crond command is used for automatically downloading the updating file from the server regularly, it is ensured that the mirror image file is not tampered with through signing and signature verification, manual updating is not needed, and working efficiency is improved.

Patent
02 Jul 2014
TL;DR: In this article, a deploying method and system of a virtual machine system is described, which includes the steps that corresponding operation system template files and software template files of software under an operation system are selected respectively according to the requirement of the operation system and the software of the VM.
Abstract: The invention discloses a deploying method and system of a virtual machine system. The method includes the steps that corresponding operation system template files and software template files of software under an operation system are selected respectively according to the requirement of the operation system and the software of the virtual machine system to be established, the software template files and the operation system template files are copied and combined on virtual disc space which is newly built, combined mirror image files are formed, the combined mirror image files are operated, the virtual machine system is established, so that the operation system template files and all the software template files are combined as required, and the virtual machine system needed by a user is established. According to the deploying method and system of the virtual machine system, customization and deployment of virtual machines can be achieved flexibly, fast and efficiently as required, and the personalized virtual machine system is obtained.