Space And Time Requirements For Two Image Data Structures

1989 ◽  
Author(s):  
G. A. Baraghimian ◽  
A. Klinger
Author(s):  
MARCOS CORDEIRO D'ORNELLAS ◽  
REIN VAN DEN BOOMGAARD

The goal of this paper is to establish the fundamental requirements of any morphological software in such a way as to produce reliable, precise, and generic algorithm representations in order to overcome the combinatorial explosion of the code needed to deal with all possible kinds of data structures and image types. Algorithms should be built with the guarantee that the desired implementation is written once, process data in an abstract way, and is efficient at the same time. Requirements are derived from a review of some of the most used software packages and image libraries with respect to mathematical morphology including [Formula: see text], [Formula: see text], [Formula: see text] and [Formula: see text]. Such a review makes it possible to characterize their advantages and drawbacks. These aspects call for software for mathematical morphology that has to be generic and should support a large variety of data types.


Author(s):  
Michiharu Niimi ◽  
Hideki Noda

This chapter reviews information hiding methods, with a focus on steganography and steganalysis. First, the authors summarize image data structures and image formats required by computers and the Internet. They then introduce several information hiding methods based on image formats including lossless (non-compression based), limited color-based image data, JPEG, and JPEG2000. The authors describe a steganographic method in detail, which is based on image segmentation using a complexity measure. They also introduce a method for applying this to palette-based image formats, reversible information hiding for grayscale images, and JPEG2000 steganography. The steganographic methods for JPEG and JPEG2000 described in this chapter give particular consideration to the naturalness of cover data. In the steganalysis section, the authors introduce two methods, i.e., a specific steganalysis method for LSB steganography and Bit-Plane Complexity Segmentation (BPCS) stegnography.


Author(s):  
Natasha Alechina ◽  
Piergiorgio Bertoli ◽  
Chiara Ghidini ◽  
Mark Jago ◽  
Brian Logan ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document