scispace - formally typeset
Search or ask a question
Topic

Lossless JPEG

About: Lossless JPEG is a research topic. Over the lifetime, 2415 publications have been published within this topic receiving 51110 citations. The topic is also known as: Lossless JPEG & .jls.


Papers
More filters
Proceedings ArticleDOI
01 Nov 2006
TL;DR: The proposed framework is applied to design several new recursive pre-/post- processing methods, and experimental results show that the proposed new recursive methods can perform outside of the existing methods.
Abstract: Pre-/post- processing method is well-know and very effective approach for improving the compression of image. In this paper, we provide a survey and analysis of the recursive pre-/post- methods, and then proposed a new generalized recursive pre-/post- processing framework for near lossless image compression. The proposed framework is then applied to design several new recursive pre-/post- processing methods, and experimental results show that the proposed new recursive methods can perform outside of the existing methods.
Journal ArticleDOI
TL;DR: This article examines an original process to code signals from two different sources mixed together, and coded within a single coding process (DCT-based JPEG codec) in order to generate a single data stream at its output, instead of two as in the usual multimedia applications.
Abstract: This article examines an original process to code signals from two different sources (data e.g. audio- and video) mixed together, and coded within a single coding process (DCT-based JPEG codec), in order to generate a single data stream at its output, instead of two as in the usual multimedia applications.
Proceedings ArticleDOI
08 Dec 2009
TL;DR: Experimental results show that the proposed scheme can produce a stego-image with acceptable quality and the capability of withstanding statistical detection.
Abstract: Previous proposed steganographic schemes based on tolerable error range (TER) can restrict the distortion caused by data hiding within an acceptable range, but both the stego-image and the original image are necessary for extracting the secret message. This paper presents a novel TER-based steganographic scheme, in which JPEG compression under a certain quality factor is regarded as TER, and the modification caused by data hiding on each pixel is less than that caused by JPEG compression. A verification mechanism is introduced to embed the quality factor which is used in JPEG compression. Furthermore, the JPEG version of the stego-image based on the novel scheme is the same as that of the corresponding original one while embedding secret bits. On the receiver side, the hidden message can be obtained by subtracting the stego-image from its JPEG version, and the original cover image is not needed. Experimental results show that the proposed scheme can produce a stego-image with acceptable quality and the capability of withstanding statistical detection.
Proceedings ArticleDOI
01 Aug 2004
TL;DR: Several types of wavelets are utilized to identify the best wavelet to deliver a lossless compression scheme for mammographic images, and results for different mammograms are presented.
Abstract: Transmission of mammographic images in real time and of sufficient accuracy to render accurate diagnosis is under demand. This requires efficient lossless image compression schemes. Image compression has been a major research area for the past few decades despite the massive growth in data storage and transmission speeds. Moreover, wavelets have become the cutting edge techniques in image compression. Thus the work presented in this paper is to address some of the questions. Several types of wavelets are utilized to identify the best wavelet to deliver a lossless compression scheme for mammographic images. Compression results for different mammograms are presented.
Proceedings Article
04 Oct 2009
TL;DR: The proposed access control method is resilient to collusion attack and manages only one key, and reduces the length of managed key in comparison with the conventional methods satisfying above two requirements.
Abstract: —This paper proposes an efficient access control method for JPEG 2000 coded images with multiple dimensions of hierarchical scalability. An access control method is required to 1) be resilient to collusion attack and 2) manages less number keys from the perspective of the key management cost. The proposed method is resilient to collusion attack and manages only one key. Moreover, the proposed method reduces the length of managed key in comparison with the conventional methods satisfying above two requirements. This feature serves an efficient key management.

Network Information
Related Topics (5)
Image segmentation
79.6K papers, 1.8M citations
82% related
Feature (computer vision)
128.2K papers, 1.7M citations
82% related
Feature extraction
111.8K papers, 2.1M citations
82% related
Image processing
229.9K papers, 3.5M citations
80% related
Convolutional neural network
74.7K papers, 2M citations
79% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202321
202240
20215
20202
20198
201815