Topic
Lossless JPEG
About: Lossless JPEG is a research topic. Over the lifetime, 2415 publications have been published within this topic receiving 51110 citations. The topic is also known as: Lossless JPEG & .jls.
Papers published on a yearly basis
Papers
More filters
••
01 Nov 2006
TL;DR: The proposed framework is applied to design several new recursive pre-/post- processing methods, and experimental results show that the proposed new recursive methods can perform outside of the existing methods.
Abstract: Pre-/post- processing method is well-know and very effective approach for improving the compression of image. In this paper, we provide a survey and analysis of the recursive pre-/post- methods, and then proposed a new generalized recursive pre-/post- processing framework for near lossless image compression. The proposed framework is then applied to design several new recursive pre-/post- processing methods, and experimental results show that the proposed new recursive methods can perform outside of the existing methods.
••
TL;DR: This article examines an original process to code signals from two different sources mixed together, and coded within a single coding process (DCT-based JPEG codec) in order to generate a single data stream at its output, instead of two as in the usual multimedia applications.
Abstract: This article examines an original process to code signals from two different sources (data e.g. audio- and video) mixed together, and coded within a single coding process (DCT-based JPEG codec), in order to generate a single data stream at its output, instead of two as in the usual multimedia applications.
••
08 Dec 2009TL;DR: Experimental results show that the proposed scheme can produce a stego-image with acceptable quality and the capability of withstanding statistical detection.
Abstract: Previous proposed steganographic schemes based on tolerable error range (TER) can restrict the distortion caused by data hiding within an acceptable range, but both the stego-image and the original image are necessary for extracting the secret message. This paper presents a novel TER-based steganographic scheme, in which JPEG compression under a certain quality factor is regarded as TER, and the modification caused by data hiding on each pixel is less than that caused by JPEG compression. A verification mechanism is introduced to embed the quality factor which is used in JPEG compression. Furthermore, the JPEG version of the stego-image based on the novel scheme is the same as that of the corresponding original one while embedding secret bits. On the receiver side, the hidden message can be obtained by subtracting the stego-image from its JPEG version, and the original cover image is not needed. Experimental results show that the proposed scheme can produce a stego-image with acceptable quality and the capability of withstanding statistical detection.
••
01 Aug 2004TL;DR: Several types of wavelets are utilized to identify the best wavelet to deliver a lossless compression scheme for mammographic images, and results for different mammograms are presented.
Abstract: Transmission of mammographic images in real time and of sufficient accuracy to render accurate diagnosis is under demand. This requires efficient lossless image compression schemes. Image compression has been a major research area for the past few decades despite the massive growth in data storage and transmission speeds. Moreover, wavelets have become the cutting edge techniques in image compression. Thus the work presented in this paper is to address some of the questions. Several types of wavelets are utilized to identify the best wavelet to deliver a lossless compression scheme for mammographic images. Compression results for different mammograms are presented.
•
04 Oct 2009TL;DR: The proposed access control method is resilient to collusion attack and manages only one key, and reduces the length of managed key in comparison with the conventional methods satisfying above two requirements.
Abstract: —This paper proposes an efficient access control method for JPEG 2000 coded images with multiple dimensions of hierarchical scalability. An access control method is required to 1) be resilient to collusion attack and 2) manages less number keys from the perspective of the key management cost. The proposed method is resilient to collusion attack and manages only one key. Moreover, the proposed method reduces the length of managed key in comparison with the conventional methods satisfying above two requirements. This feature serves an efficient key management.