scispace - formally typeset
Search or ask a question

Showing papers on "Image file formats published in 2017"


Journal ArticleDOI
TL;DR: AstroImageJ (AIJ) as discussed by the authors is a GUI-driven, public domain, Java-based, software package for general image processing traditionally used mainly in life sciences fields.
Abstract: ImageJ is a graphical user interface (GUI) driven, public domain, Java-based, software package for general image processing traditionally used mainly in life sciences fields. The image processing capabilities of ImageJ are useful and extendable to other scientific fields. Here we present AstroImageJ (AIJ), which provides an astronomy specific image display environment and tools for astronomy specific image calibration and data reduction. Although AIJ maintains the general purpose image processing capabilities of ImageJ, AIJ is streamlined for time-series differential photometry, light curve detrending and fitting, and light curve plotting, especially for applications requiring ultra-precise light curves (e.g., exoplanet transits). AIJ reads and writes standard Flexible Image Transport System (FITS) files, as well as other common image formats, provides FITS header viewing and editing, and is World Coordinate System aware, including an automated interface to the astrometry.net web portal for plate solving images. AIJ provides research grade image calibration and analysis tools with a GUI driven approach, and easily installed cross-platform compatibility. It enables new users, even at the level of undergraduate student, high school student, or amateur astronomer, to quickly start processing, modeling, and plotting astronomical image data with one tightly integrated software package.

291 citations


Journal ArticleDOI
TL;DR: AstroImageJ (AIJ) as discussed by the authors is a GUI-driven, public domain, Java-based, software package for general image processing traditionally used mainly in life sciences fields.
Abstract: ImageJ is a graphical user interface (GUI) driven, public domain, Java-based, software package for general image processing traditionally used mainly in life sciences fields. The image processing capabilities of ImageJ are useful and extendable to other scientific fields. Here we present AstroImageJ (AIJ), which provides an astronomy specific image display environment and tools for astronomy specific image calibration and data reduction. Although AIJ maintains the general purpose image processing capabilities of ImageJ, AIJ is streamlined for time-series differential photometry, light curve detrending and fitting, and light curve plotting, especially for applications requiring ultra-precise light curves (e.g., exoplanet transits). AIJ reads and writes standard FITS files, as well as other common image formats, provides FITS header viewing and editing, and is World Coordinate System (WCS) aware, including an automated interface to the this http URL web portal for plate solving images. AIJ provides research grade image calibration and analysis tools with a GUI driven approach, and easily installed cross-platform compatibility. It enables new users, even at the level of undergraduate student, high school student, or amateur astronomer, to quickly start processing, modeling, and plotting astronomical image data with one tightly integrated software package.

112 citations


Reference BookDOI
31 Mar 2017
TL;DR: This volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field of secure image sharing.
Abstract: With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information. Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive datasuch as medical records, financial transactions, and electronic voting systemsthe methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files. An exploration of the most prominent topics in digital imaging security, this book discusses: Potential for sharing multiple secrets Visual cryptography schemesbased either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared images Inclusion of pictures in the distributed shares Contrast enhancement techniques Color-image visual cryptography Cheating prevention Alignment problems for image shares Steganography and authentication In the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field.

86 citations


Journal ArticleDOI
TL;DR: The proposed RDH scheme for encrypted palette images adopts a color partitioning method to use the palette colors to construct a certain number of embeddable color triples, whose indexes are self-embedded into the encrypted image so that a data hider can collect the usable color tri doubles to embed the secret data.
Abstract: Reversible data hiding (RDH) into encrypted images is of increasing attention to researchers as the original content can be perfectly reconstructed after the embedded data are extracted while the content owner’s privacy remains protected. The existing RDH techniques are designed for grayscale images and, therefore, cannot be directly applied to palette images. Since the pixel values in a palette image are not the actual color values, but rather the color indexes, RDH in encrypted palette images is more challenging than that designed for normal image formats. To the best knowledge of the authors, there is no suitable RDH scheme designed for encrypted palette images that has been reported, while palette images have been widely utilized. This has motivated us to design a reliable RDH scheme for encrypted palette images. The proposed method adopts a color partitioning method to use the palette colors to construct a certain number of embeddable color triples, whose indexes are self-embedded into the encrypted image so that a data hider can collect the usable color triples to embed the secret data. For a receiver, the embedded color triples can be determined by verifying a self-embedded check code that enables the receiver to retrieve the embedded data only with the data hiding key. Using the encryption key, the receiver can roughly reconstruct the image content. Experiments have shown that our proposed method has the property that the presented data extraction and image recovery are separable and reversible. Compared with the state-of-the-art works, our proposed method can provide a relatively high data-embedding payload, maintain high peak signal-to-noise ratio values of the decrypted and marked images, and have a low computational complexity.

86 citations


Journal ArticleDOI
01 Jan 2017-Methods
TL;DR: This paper describes a machine learning workflow that identifies phenotypes in imaging flow cytometry using open-source software and does not require computational expertise.

73 citations


Journal ArticleDOI
S. C. Ng1
TL;DR: Experimental results showed that PCA technique effectively reduces the dimension of image data while still maintaining the principal properties of the original image, and achieved 35.3% for the file size reduction for the best feature reduced quality.

61 citations


Journal ArticleDOI
TL;DR: The first data hiding algorithm for OpenEXR HDR images offering a high embedding rate and producing high visual quality of the stego images is presented, and an adaptive data hiding approach for concealing more secret messages in pixels with low luminance is introduced.
Abstract: In this paper, we propose a novel data hiding algorithm for high dynamic range (HDR) images encoded by the OpenEXR file format. The proposed algorithm exploits each of three 10-bit mantissa fields as an embedding unit in order to conceal k bits of a secret message using an optimal base which produces the least pixel variation. An aggressive bit encoding and decomposition scheme is recommended, which offers a high probability to convey ( k + 1) bits without increasing the pixel variation caused by message concealment. In addition, we present a bit inversion embedding strategy to further increase the capacities when the probability of appearance of secret bit “1” is greater than 0.5. Furthermore, we introduce an adaptive data hiding approach for concealing more secret messages in pixels with low luminance, exploiting the features of the human visual system to achieve luminance-aware adaptive data hiding. The stego HDR images produced by our algorithm coincide with the HDR image file format, causing no suspicion from malicious eavesdroppers. The generated stego HDR images and their tone-mapped low dynamic range (LDR) images reveal no perceptual differences when subjected to quantitative testing by visual difference predictor. Our algorithm can resist steganalytic attacks from the HDR and LDR RS and SPAM steganalyzers. We present the first data hiding algorithm for OpenEXR HDR images offering a high embedding rate and producing high visual quality of the stego images. Our algorithm outperforms the current state-of-the-art works.

57 citations


Journal ArticleDOI
TL;DR: In this paper, the authors reported the application of machine learning to smartphone-based colorimetric detection of pH values and used the strip images as the training set for Least Squares-Support Vector Machine (LS-SVM) classifier algorithms that were able to successfully classify the distinct pH values.
Abstract: We report the application of machine learning to smartphone based colorimetric detection of pH values. The strip images were used as the training set for Least Squares-Support Vector Machine (LS-SVM) classifier algorithms that were able to successfully classify the distinct pH values. The difference in the obtained image formats was found not to significantly affect the performance of the proposed machine learning approach. Moreover, the influence of the illumination conditions on the perceived color of pH strips was investigated and further experiments were carried out to study effect of color change on the learning model. Test results on JPEG, RAW and RAW-corrected image formats captured in different lighting conditions lead to perfect classification accuracy, sensitivity and specificity, which proves that the colorimetric detection using machine learning based systems is able to adapt to various experimental conditions and is a great candidate for smartphone based sensing in paper-based colorimetric assays.

44 citations


Proceedings ArticleDOI
06 Apr 2017
TL;DR: This paper presents the implementation of image to text conversion and considers the shortcomings of various image processing applications available and works on overcoming them by employing variable level of image processing and filtration.
Abstract: This paper presents the implementation of image to text conversion The paper describes various steps required to extract text from any image file (jpeg/png) and create a separate text file consisting of information extracted from image file It considers the shortcomings of various image processing applications available and works on overcoming them by employing variable level of image processing and filtration The CV2 OpenCV library using Python language is used for image processing and Tessaract is used for text extraction from the processed image The variable level of image processing ensures that different images get different levels of treatment in order to produce optimized text results After the image processing step is employed the output text file are formatted by filtering out commas, semicolons, apostrophes, colons and other such characters using ASCII filtering as these characters are not part of any standard license plate

39 citations


Journal ArticleDOI
TL;DR: This work proposes a deep tree-structured network that generates for every pixel multiple color hypotheses, as opposed to a single color produced by most prior colorization approaches, and shows how to leverage the multimodal output of the model to reproduce with high fidelity the true colors of an image by storing very little additional information.

35 citations


Journal ArticleDOI
TL;DR: Experimental results show that the proposed image encryption algorithm can meet multiple cryptographic criteria and obtain good image encryption effect.
Abstract: The development of the computer network makes image files transportation via network become more and more convenient. This paper is concerned with the image encryption algorithm design based on the chaotic S-box mechanism. This paper proposes an Image Encryption algorithm involving both chaotic dynamic S-boxes and DNA sequence operation(IESDNA). The contribution of this paper is three folded: Firstly, we design an external 256-bit key to get large key space; secondly, we design a chaotic system to scramble image pixels; thirdly, DNA sequence operations are adopted to diffuse the scrambled image pixels. Experimental results show that our proposed image encryption algorithm can meet multiple cryptographic criteria and obtain good image encryption effect.

Proceedings ArticleDOI
30 Oct 2017
TL;DR: It is shown how approximate TPE can be an effective tool to thwart inference attacks by machine-learning image classifiers, which have shown to be effective against other image obfuscation techniques.
Abstract: Thumbnail preserving encryption (TPE) was suggested by Wright et al. [Information Hiding & Multimedia Security Workshop 2015] as a way to balance privacy and usability for online image sharing. The idea is to encrypt a plaintext image into a ciphertext image that has roughly the same thumbnail as well as retaining the original image format. At the same time, TPE allows users to take advantage of much of the functionality of online photo management tools, while still providing some level of privacy against the service provider.In this work we present two new approximate TPE encryption schemes. In our schemes, ciphertexts and plaintexts have perceptually similar, but not identical, thumbnails. Our constructions are the first TPE schemes designed to work well with JPEG compression. In addition, we show that they also have provable security guarantees that characterize precisely what information about the plaintext is leaked by the ciphertext image. We empirically evaluate our schemes according to the similarity of plaintext & ciphertext thumbnails, increase in file size under JPEG compression, preservation of perceptual image hashes, among other aspects. We also show how approximate TPE can be an effective tool to thwart inference attacks by machine-learning image classifiers, which have shown to be effective against other image obfuscation techniques.

Journal ArticleDOI
TL;DR: The experimental results showed that this proposed Region of Non-Interest (RONI) based visible watermarking for medical image authentication reduces the computational complexity and improves the PSNR when compared to many existing schemes.
Abstract: Nowadays medical data in terms of image files are often exchanged between different hospitals for use in telemedicine and diagnosis. Visible watermarking being extensively used for Intellectual Property identification of such medical images, leads to serious issues if failed to identify proper regions for watermark insertion. In this paper, the Region of Non-Interest (RONI) based visible watermarking for medical image authentication is proposed. In this technique, to RONI of the cover medical image is first identified using Human Visual System (HVS) model. Later, watermark logo is visibly inserted into RONI of the cover medical image to get watermarked medical image. Finally, the watermarked medical image is compared with the original medical image for measurement of imperceptibility and authenticity of proposed scheme. The experimental results showed that this proposed scheme reduces the computational complexity and improves the PSNR when compared to many existing schemes.

Journal ArticleDOI
TL;DR: Results show that the proposed method provides a near lossless image reconstruction, a controllable level of storage overhead, and a good degree of privacy protection and subjective pleasantness.
Abstract: Thanks to advancements in smart mobile devices and social media platforms, sharing photos and experiences has significantly bridged our lives, allowing us to stay connected despite distance and other barriers. However, concern on privacy has also been raised, due to not only mistakes or ignorance of impact of careless sharing but also complex infrastructures and cross-use of social media content. In this paper, we present secure JPEG Transmorphing, a flexible framework for protecting image visual privacy in a secure, reversible, fun and personalized manner. With secure JPEG Transmorphing, the protected image is also backwards compatible with JPEG, the most commonly used image format. Experiments have been performed and results show that the proposed method provides a near lossless image reconstruction, a controllable level of storage overhead, and a good degree of privacy protection and subjective pleasantness.

Journal ArticleDOI
TL;DR: A new reversible data hiding scheme for encrypted images by using homomorphic and probabilistic properties of Paillier cryptosystem that can effectively avoid preprocessing operations before encryption and can efficiently embed and extract data in encrypted domain is proposed.
Abstract: This paper proposes a new reversible data hiding scheme for encrypted images by using homomorphic and probabilistic properties of Paillier cryptosystem. The proposed method can embed additional data directly into encrypted image without any preprocessing operations on original image. By selecting two pixels as a group for encryption, data hider can retrieve the absolute differences of groups of two pixels by employing a modular multiplicative inverse method. Additional data can be embedded into encrypted image by shifting histogram of the absolute differences by using the homomorphic property in encrypted domain. On the receiver side, legal user can extract the marked histogram in encrypted domain in the same way as data hiding procedure. Then, the hidden data can be extracted from the marked histogram and the encrypted version of original image can be restored by using inverse histogram shifting operations. Besides, the marked absolute differences can be computed after decryption for extraction of additional data and restoration of original image. Compared with previous state-of-the-art works, the proposed scheme can effectively avoid preprocessing operations before encryption and can efficiently embed and extract data in encrypted domain. The experiments on the standard image files also certify the effectiveness of the proposed scheme.

Journal ArticleDOI
TL;DR: In this study, the close range images compressed at the different levels were investigated to define the compression effect on photogrammetric results, such as orientation parameters and 3D point cloud, and show that lower compression ratios are acceptable in photogramMETric process when moderate accuracy is sufficient.
Abstract: Digital photogrammetry, using digital camera images, is an important low-cost engineering method to produce precise three-dimensional model of either an object or the part of the earth depending on the image quality. Photogrammetry which is cheaper and more practical than the new technologies such as LIDAR, has increased point cloud generation capacity during the past decade with contributions of computer vision. Images of new camera technologies needs huge storage space due to larger image file sizes. Moreover, this enormousness increases image process time during extraction, orientation and dense matching. The Joint Photographic Experts Group (JPEG) is one of the most commonly used methods as lossy compression standard for the storage purposes of the oversized image file. Particularly, image compression at different rates causes image deteriorations during the processing period. Therefore, the compression rates affect accuracy of photogrammetric measurements. In this study, the close range images compressed at the different levels were investigated to define the compression effect on photogrammetric results, such as orientation parameters and 3D point cloud. The outcomes of this study show that lower compression ratios are acceptable in photogrammetric process when moderate accuracy is sufficient.

Patent
28 Apr 2017
TL;DR: In this paper, the authors present a system and method for automatically updating firmware of components of a server system, such as OS image files from a vendor, mounting downloaded OS image file to the server system via a virtual media (VM) A, automatically generating a universal serial bus (USB) read/write image containing a firmware image for VM B use, mounting the USB read and write image to a VM B, sending a command to a controller of the server System to set a boot disk via the VM A, rebooting the server systems, and enabling an update service to
Abstract: The present disclosure provides a system and method for automatically updating firmware of components of a server system. For example, the method may include: downloading OS image file from a vendor, mounting downloaded OS image file to the server system via a virtual media (VM) A, automatically generating a universal serial bus (USB) read/write image containing a firmware image for VM B use, mounting the USB read/write image to a VM B, sending a command to a controller of the server system to set a boot disk via the VM A, rebooting the server system, and enabling an update service to automatically mount updated firmware image to the VM B.

Proceedings ArticleDOI
07 Jun 2017
TL;DR: A method for lossless compression of subaperture image stacks obtained by rectifying light-field images captured by a plenoptic camera is proposed and shows improved performance compared to the state-of-the-art encoders.
Abstract: The paper proposes a method for lossless compression of subaperture image stacks obtained by rectifying light-field images captured by a plenoptic camera We exploit the similarities between two subaperture images using a predictive coding algorithm, where the current view is predicted from one reference view Context modeling is the main technique used to reduce the image file size A suitable image segmentation and a template context are used by the context tree algorithm for encoding up to the smallest detail in each subaperture image Entropy coding is configured by a residual analysis module The results show improved performance compared to the state-of-the-art encoders

Patent
13 Jun 2017
TL;DR: In this paper, a real-time dish identification method is proposed, which comprises the following steps of 1) obtaining a web request, and obtaining a corresponding image by a server according to the corresponding web request; 2) storing the image, obtaining an input data stream, generating an image file name and storing image file in a disk; 3) preprocessing the image and performing size adjustment and normalization on the input image; and 4) performing processing by using a pre-trained convolutional neural network, detecting and classifying objects on the image.
Abstract: The invention provides a dish identification method. The method comprises the following steps of 1) obtaining a web request, and obtaining a corresponding image by a server according to the corresponding web request; 2) storing the image, obtaining an input data stream, generating an image file name and storing the image file name in a disk; 3) preprocessing the image, and performing size adjustment and normalization on the input image; and 4) performing processing by using a pre-trained convolutional neural network, detecting and classifying objects on the image, if dishes are not detected, ending the process, and if the dishes are detected, outputting corresponding dish information in combination with a classification result. According to the method, the defects in the prior art are overcome and a more accurate result can be output in real time.

Patent
07 Jul 2017
TL;DR: In this article, a realization method for fast deploying a containerized cloud computing test platform is presented, which comprises the following steps: S1, describing basic information of a file configuration deployment node by use of a virtual machine of Vagrant, running a vagrant up command to get a preinstalled Linux operation system from a public warehouse, and running in a Virtual Box; installing a Docker in the deployment node and creating a private container warehouse by using of the Docker; manufacturing a container mirror image file of each service of Openstack by using the Kolla, saving the container mirror
Abstract: The invention provides a realization method for fast deploying a containerized cloud computing test platform. The method comprises the following steps: S1, describing basic information of a file configuration deployment node by use of a virtual machine of Vagrant, running a vagrant up command to get a preinstalled Linux operation system from a public warehouse, and running in a Virtual Box; installing a Docker in the deployment node and creating a private container warehouse by use of the Docker; manufacturing a container mirror image file of each service of Openstack by use of Kolla, saving the container mirror image file to the private container warehouse; and S2, traversing the process of executing the step S1 so as to deploy the container mirror image file to a target node. By use of the method provided by the invention, the deployment step of the cloud computing test platform is simplified, the deployment efficiency and the flexibility in the deployment process are improved, the compatibility of the Openstack and the Linux operation system in different versions published by different manufacturers is improved, and the flexible capacity expansion can be performed as required after the deployment is finished.

Patent
08 Mar 2017
TL;DR: In this paper, the authors proposed a method and devices for obtaining a mirror image in a cloud environment, which comprises the steps of obtaining description information of an appointed mirror image from a remote mirror image center.
Abstract: The invention relates to a method and devices for obtaining a mirror image in a cloud environment. The method comprises the steps of obtaining description information of an appointed mirror image from a remote mirror image center, wherein the description information of the appointed mirror image comprises identifiers of mirror image layers contained in the appointed mirror image and indication information of whether each mirror image layer of the appointed mirror image is the mirror image layer allowing to be shared or not; determining the condition that a storage address of a first mirror image layer file does not exist in a mirror image layer information table of a virtual machine according to the description information of the appointed mirror image, wherein the first mirror image layer is the mirror image layer which is contained in the appointed mirror image and allows to be shared; obtaining a storage address of the first mirror image layer file in a shared memory of a host physical machine from the host physical machine, and recording the identifier of the first mirror image layer and the storage address of the first mirror image layer file in the shared memory of the host physical machine to the mirror image layer information table of the virtual machine. According to the method for obtaining the mirror image, the virtual machine on the physical machine is effectively prevented from downloading the mirror image file repeatedly, and the deployment speed of a container is improved.

Proceedings ArticleDOI
24 Feb 2017
TL;DR: The shrimp quantity getting from the image processing technique is comparable and corresponding to the real shrimp quantity counting by manual with error is less than 7% of real quantity.
Abstract: The aim of this research is to investigate the method of detecting and counting baby shrimps by image processing technique. The experimental devices consist of a 1920x1080 pixels color image processing system and a light box. This light box is used as an indirect lighting source to avoid the bright spot from the target if the direct light technique is used. The shrimps are taken by a video camcorder, then the real time video is executed from the moving video to images and recorded them as the image files. The images are considered and converted to binary data types. Blob detection algorithm is used to detect the difference properties of color within the regions in the digital image. After that, the results from the image processing methodology are compared with the real value. It found that the shrimp quantity getting from the image processing technique is comparable and corresponding to the real shrimp quantity counting by manual with error is less than 7% of real quantity.

Proceedings ArticleDOI
01 Sep 2017
TL;DR: A survey has been done on various visual cryptography schemes based on the number of secret, pixel expansion, type of share generated, image format, and number ofsecret image.
Abstract: Visual cryptography is a powerful technique in which a secret image can be divided into two or more shares and the decryption can be done using human visual system Visual cryptography has wide range of applications like in biometrics, print online banking, cloud computing, internet voting, etc The basic method of visual cryptography is a secret image is hidden into two or more shares which on superimposing will recover the hidden image During the recovery it is not possible to get the original image due to various reasons like pixel expansion, contrast, storage, security, image types Therefore various techniques have been developed to address these issues A survey has been done on various visual cryptography schemes based on the number of secret, pixel expansion, type of share generated, image format, and number of secret image

Journal ArticleDOI
TL;DR: A technical demonstration whereby storage and read/write times are improved 10× at a dose rate of 1 e-/pix/frame for data from a Gatan K2 direct-detection device by combination of integer decimation and lossless compression.

Patent
Luo Binji1
27 Jun 2017
TL;DR: In this article, a picture file processing method and device, and a system consisting of a sending end generates a picture head data segment of a picture files according to an original picture file and converts each image in the picture file into YUV data.
Abstract: Embodiments of the invention disclose a picture file processing method and device, and a system. The method comprises the following steps that a sending end generates a picture head data segment of a picture file according to an original picture file and converts each image in the picture file into YUV data; the sending end encodes the YUV data to generate stream data; the sending end generates compressed image data and sends the compressed image data to a receiving end, wherein the compressed image data includes the picture head information data segment and the stream data; the receiving end receives the compressed image data transmitted by the sending end, and analyzes the compressed image data to obtain the picture head information data segment and the stream data; and the receiving end generates the YUV data based on the stream data and processes the YUV data based on the picture head information data segment to generate the picture file. According to the present invention, it is possible to reduce the file data amount of the image file during transmission and reduce the bandwidth cost.

Patent
Chen Huamin1, Jay Vyas
20 Apr 2017
TL;DR: In this paper, the authors reveal the infrastructure of containers with a unified data volume and reveal how a host includes a first memory, and an orchestrator requests a persistent storage to be provisioned in a second memory located across a network from the host based an image file and/or metadata associated with the image file.
Abstract: Instantiating containers with a unified data volume is disclosed. For example, a host includes a first memory, and an orchestrator requests a persistent storage to be provisioned in a second memory located across a network from the host based an image file and/or metadata associated with the image file. The persistent storage is mounted to the host. The image file is copied to the first memory as a lower system layer of an isolated guest based on the image file, where the lower system layer is write protected. An upper system layer is constructed in the first persistent storage based on the image file. A baseline snapshot of the persistent storage is captured, including the upper system layer after the upper system layer is constructed. The isolated guest is launched while attached to the lower system layer and the upper system layer.

Patent
31 May 2017
TL;DR: In this paper, an encrypted traffic identification method and device based on characteristic self-learning was proposed. But the method was used for improving an identification rate of encrypted traffic in the prior art, and the method comprises the steps of converting obtained current network traffic data packets into normalized numerical values or normalized gray values, storing the normalized numerical value corresponding to the current network data packets in a text file, or generating a gray image according to the normalized gray value corresponding to the network traffic packets and storing the gray image in an image file, taking the text file or the image file as
Abstract: The invention discloses an encrypted traffic identification method and device based on characteristic self-learning and is used for improving an identification rate of encrypted traffic in the prior art. The method comprises the steps of converting obtained current network traffic data packets into normalized numerical values or normalized gray values; storing the normalized numerical values corresponding to the current network traffic data packets in a text file; or generating a gray image according to the normalized gray values corresponding to the current network traffic data packets and storing the gray image in an image file; taking the text file or the image file as pre-trained test input of an encrypted traffic classifier; and identifying a traffic type of the current network traffic data packets through the encrypted traffic classifier.

Patent
21 Jul 2017
TL;DR: In this paper, a system for capturing and assembling panoramic image data has been proposed, which consists of a PANORAMA image capture device with image assembly parameters and configured to capture image content data.
Abstract: The present invention is a system for capturing and assembling panoramic image data having a panoramic image capture device with image assembly parameters and configured to capture image content data, an encoding device coupled to the panoramic image capture device and configured to combine the image content data and the image assembly parameters into a panoramic image file, and a decoding device configured to receive the panoramic image file and assemble, based on the image assembly parameters, at least a portion of the image content data into an output image.

Proceedings ArticleDOI
01 Jan 2017
TL;DR: This review on the different water marking techniques gives the clear concept of the watermarking scheme.
Abstract: Watermarking the image files has recently become the focus of much attention. The transmission rate of the data over internet has played the major challenge that allows the illegal proliferation of the digital images. The difficulties in image watermarking relies on the desire to preserve the file quality and also the damaging of the files need to be prevented. This review on the different watermarking techniques gives the clear concept of the watermarking scheme.

Patent
15 Feb 2017
TL;DR: In this paper, an automatic response script file corresponding to an image file can be generated automatically, so that the workload of users is reduced, unified management is facilitated and manpower resources are eased.
Abstract: The invention provides an installing method and device for an operating system The method comprises the steps of acquiring an image file of an operating system and obtaining the system type by analyzing the image file; acquiring a response script template corresponding to the system type and acquiring a preconfigured configuration file; generating an automatic response script file corresponding to the image file by using the response script template and the configuration file; adding the automatic response script file to the image file and supplying the modified image file to a server which installs the operating system by using the modified image file According to the invention, an automatic response script file corresponding to an image file can be generated automatically, so that the workload of users is reduced, unified management is facilitated and manpower resources are eased