scispace - formally typeset
Search or ask a question

Showing papers on "Image file formats published in 2023"


Journal ArticleDOI
TL;DR: In this article , the drawbacks of direct storage of small files according to the characteristics of power grid image files are discussed, and the architecture design and function design of the grid image small file storage are carried out, and function implementation is carried out.
Abstract: With the advancement of technology and the development of the electric power business, power enterprises have generated a large amount of image data, which contains rich potential information, and it is urgent to store massive-scale image data for further mining and analysis. Starting from the storage requirements of power grid image data, this paper expounds on the drawbacks of direct storage of small files according to the characteristics of power grid image files. Then, the architecture design and function design of the grid image small file storage are carried out, and the function implementation is carried out. Finally, the grid image small file storage method based on the SequenceFile file format is briefly summarized.

Journal ArticleDOI
TL;DR: In this article , the authors present a methodology to develop JPEG Snack Player, which is based on the instructions in the Snack file and renders media objects on the background JPEG file according to the instructions.
Abstract: The advancement in mobile communication and technologies has led to the usage of short-form digital content increasing daily. This short-form content is mainly based on images that urged the joint photographic experts’ group (JPEG) to introduce a novel international standard, JPEG Snack (International Organization for Standardization (ISO)/ International Electrotechnical Commission (IEC) IS, 19566-8). In JPEG Snack, the multimedia content is embedded into a main background JPEG file, and the resulting JPEG Snack file is saved and transmitted as a .jpg file. If someone does not have a JPEG Snack Player, their device decoder will treat it as a JPEG file and display a background image only. As the standard has been proposed recently, the JPEG Snack Player is needed. In this article, we present a methodology to develop JPEG Snack Player. JPEG Snack Player uses a JPEG Snack decoder and renders media objects on the background JPEG file according to the instructions in the JPEG Snack file. We also present some results and computational complexity metrics for the JPEG Snack Player.

Journal ArticleDOI
TL;DR: In this article , the color differences between different file formats of dental shade tab images with and without white balance were evaluated with an image software program and a gray reference card with known color coordinates, and the color coordinates were analyzed by Kruskal-Wallis and Bonferroni post hoc tests.
Abstract: How the color parameters obtained from digital photographs may be influenced by illumination, file format, and subject color is unclear.The purpose of this in vitro study was to evaluate color differences (ΔE00) and CIELab color coordinates among different types of file formats of dental shade tab images with and without white balance.Different shade tab colors (n=10) were photographed with a digital camera under standard conditions. The photographs were stored in RAW, JPEG, and TIFF file formats and evaluated with and without white balance (WB) adjustment by using an image software program and a gray reference card with known color coordinates. CIEDE2000 color differences between each image file format and the control group (RAW WB) were calculated, and interpreted by the visual perceptibility (PT00=0.8) and acceptability (AT00=1.8) thresholds. The ΔE00 color shift was defined according to CIEDE2000 lightness, chroma, and hue and interpreted by the following respective visual acceptability thresholds: 2.92, 2.52, and 1.90. The differences among the color coordinates were analyzed by Kruskal-Wallis and Bonferroni post hoc tests (α=.05).The color coordinates presented statistically significant differences between the file formats and control group (P<.001). Excellent matches (ΔE00 ≤0.8) were observed on TIFF and JPEG saved from RAW-WB. Images without WB presented unacceptable mismatches (ΔE00 >5.4). ΔE00 color shift of images without WB were predominantly influenced by ΔH00, while JPEG, WB, and TIFF WB were mostly influenced by ΔC00.Only compressed JPEG or TIFF files of dental shade tabs derived from original RAW WB photographs were able to achieve color differences within the limits of the 50:50% perceptibility threshold, providing excellent color matches with the RAW WB files.

Book ChapterDOI
01 Jan 2023
TL;DR: In this article , an image is displayed on a web page by referencing the JPEG, GIF, or PNG file directly and then converted to a file containing the image data, with the file format dependent on the display device.
Abstract: An image is displayed on a web page by referencing the JPEG, GIF (Graphics Interchange Format), or PNG file directly. In contrast, to display an image on an OLED screen or an LCD screen, the image JPEG, GIF, or PNG file is converted to a file containing the image data, with the file format dependent on the display device. For a black-and-white OLED (Organic Light-Emitting Diode) screen, each image pixel is represented by a zero or a one. For n-color image displayed on an LCD (Liquid Crystal Display) screen, information on the red, green, and blue components of each pixel is required. This chapter describes formatting images for display on an OLED screen and on an LCD screen. Displaying an image on a web page, with the image held directly in SPIFFS (Serial Peripheral Interface Flash File System) or the image data stored in the sketch, is also described.

Journal ArticleDOI
TL;DR: In this article , the color differences between different file formats of dental shade tab images with and without white balance were evaluated with an image software program and a gray reference card with known color coordinates, and the color coordinates were analyzed by Kruskal-Wallis and Bonferroni post hoc tests.

Proceedings ArticleDOI
26 Apr 2023
TL;DR: In this article , the authors present a system to integrate image steganography and cryptography techniques to enhance the security of file sharing in the digital world, where confidential information must be protected from unauthorized access.
Abstract: Secure file sharing is a critical aspect in the digital world, where confidential information must be protected from unauthorized access. This research study presents a system to integrate image steganography and cryptography techniques to enhance the security of file sharing. The system uses image steganography to hide the secret file within an image cover file, and then applies cryptography algorithms to encrypt the image cover file. The encrypted image cover file is then shared securely between the sender and receiver. The receiver can retrieve secret file by first decrypting the encrypted image cover file and then extracting the secret file from the image cover file using steganography techniques. This system provides high security for file sharing by combining the strengths of both steganography and cryptography.

Proceedings ArticleDOI
23 Jan 2023
TL;DR: In this article , a reversible concealment of data in digital photographs has been proposed by using text files and cover image files, where each individual piece of the secret text is embedded.
Abstract: Protecting sensitive data in public networks from prying eyes of unauthorised users has emerged as a critical concern in recent years. To safeguard the confidentiality of digital media, one of the most difficult methods to implement is data concealing. Techniques for the reversible concealment of data in digital photographs have been proposed by us. Textual information, such as that pertaining to weapon designs, map layouts, and satellite specifications, must be sent to and received by the majority of research and defence institutions. In order to complete this task, you will need a text file as well as an image file. In addition to the message, we will have a cover image file. After then, the number of pixels contained within the cover image will be taken into account. That is where each individual piece of the secret text will be embedded. This method will be repeated until the final snippet of the secret text is found. Following this procedure, the data will be masked by the image. After that, we will give this picture file to our client, who will be provided with a reverse process to use in order to extract the original text from the image. In the realm of cyber security, there are a plethora of innovative procedures and algorithms that can hide data. Each method has its own significance, and the least significant bit method is the one that was utilised for this method (LSB).

Journal ArticleDOI
TL;DR: In this article , a single algorithm was proposed to analyze the best file type of image for essential criteria of image steganography, such as Payload, Robustness, Imperceptibility, etc., to challenge the weakness of the current algorithms.
Abstract: The Internet and Big Data expansion have motivated the requirement for more generous stockpiling to hold and share information. Against the current era of information, guaranteeing protection and security to individuals sending data to each other is of utmost importance. The only file type that is instantly and widely used is the image. Therefore, to secure transmission, it is necessary to develop a mechanism to safeguard user data transmission. Considering this thought, it is necessary to analyze the best file type of image for essential criteria of image steganography, such as Payload, Robustness, Imperceptibility, etc., to challenge the weakness of the current algorithms. The widely used image formats are PNG, TIFF, JPEG, BMP, and GIF, which is the cause of existing methods. However, in this case, the critical softness is the credibility of the steganography, which plays a vital role in these format images to ensure the end users communicate. In this paper, a single algorithm provides several advantages for various types of images used as cover objects. However, after the critical and comparative analysis of different perspectives and some assessment metrics, the experimental results prove the importance, significance, and promising limits for these image formats by accomplishing a 4.4450% normal higher score for PSNR correlation than the next best existing methodology. Besides, in PSNR with a variable measure of code implanted in similar pictures of similar aspects, the proposed approach accomplished a 6.33% better score. Encrypting similar code sizes in pictures of various dimensions brought about a 4.23% better score. Embedding the same message size into the same dimension of different images resulted in a 3.222% better score.