De-noising remotely sensed digital imagery

Author(s):  
S. Chettri ◽  
W. Campbell
2018 ◽  
Vol 8 (4) ◽  
pp. 15
Author(s):  
David Kulhavy ◽  
Daniel Unger ◽  
I-Kuai Hung

A student led evaluation of desire paths (e.g., paths created by pedestrians on an open landscape) across the Stephen F. Austin State University (SFASU) campus was performed within a senior level spatial science course in order to create a method for mitigation of desire paths and for campus beautification.  Each desire path on campus was identified with the length of each path measured in the field and categorized by the condition of the path in order to assess and determine a necessary solution for each path identified. In addition, Pictometry® high spatial resolution digital imagery was used to determine if the categorization of the conditions of the desire paths, as well as the length of each desire path, could be identified and quantified without the need to measure each individual desire path in the field.  Students, within an interactive hands-on classroom environment, compared in-field desire path measurements with Pictometry® on-screen measurements to determine the effectiveness of remotely sensed Pictometry® imagery to identify and quantify desire path location and length respectfully.


1991 ◽  
Vol 17 (6) ◽  
pp. 759-775 ◽  
Author(s):  
Steven E Franklin ◽  
Derek R Peddle ◽  
Bradley A Wilson ◽  
Clayton F Blodgett

1982 ◽  
Author(s):  
Betty P. Chao ◽  
Robert J. Beaton ◽  
Harry L. Snyder
Keyword(s):  

2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Sherly Gina Supratman

AbstrakJaringan Komunikasi seperti Internet� merupakan jaringan yang tidak aman untuk mentransmisi data, seperti teks, audio,video dan citra digital. Salah satu cara untuk pengamanan data dapat dilakukan dengan menggunakan proses kriptografi dan �steganografi. Penggunaan ini dengan tujuan untuk merahasiakan pesan yang dikirim dan sekaligus menghindarkan pesan tersebut dari kecurigaan pihak lain yang tidak berkepentingan.Pesan yang digunakan dalam makalah ini adalah berupa text dengan menyisipkannya pada gambar. Pada proses kriptografi, pesan yang berupa text akan dienkrip dengan algoritma Hill Chiper, dan kemudian pesan yang telah dienkrip akan dilakukan proses steganografi pada citra digital� 8 bit dengan skala 0 � 255, dengan metode Least Significant Bit ( LSB ).�Kata kunci: Kriptografi, Hill Chiper, Steganografi, Least Significant Bit�AbstractCommunication Networks such as the Internet are unsafe networks for transmitting data, such as text, audio, video and digital imagery. One way to secure data can be done by using cryptography and steganography process. This use is for the purpose of concealing messages being transmitted and avoiding such messages from the suspicion by others who are not interested.The message used in this paper is text by inserting it in the image. In the cryptographic process, text messages will be encrypted with the Hill Chiper algorithm, and then the encrypted message will be steganographed on 8-bit digital images on a scale of 0-255, using the Least Significant Bit (LSB) method.�Keywords: Cryptography, Hill Chiper, Steganography, Least Significant Bit


Data Series ◽  
10.3133/ds566 ◽  
2010 ◽  
Author(s):  
John A. Barras ◽  
John C. Brock ◽  
Robert A. Morton ◽  
Laurinda J. Travers

Sign in / Sign up

Export Citation Format

Share Document