scholarly journals Digital Image Automatic Recognition and Tracking Based on Electronic Derotation Algorithm

2021 ◽  
Vol 2021 ◽  
pp. 1-7
Author(s):  
Meirong Gao

With the continuous development of my country’s social economy, the ways to acquire images have become more and more abundant. How to effectively process, manage, and mine images has become a major and difficult problem in research. In view of the difficult problem of image recognition, the electronic derotation algorithm is introduced in this study, by combing and monitoring the edge features, establishing a corresponding sample database, analyzing the edge features of the image, and performing effective and stable tracking, so as to realize the automatic recognition and tracking of the digital image. The simulation experiment results show that the electronic derotation algorithm is effective and can support the automatic recognition and tracking of digital images.

Author(s):  
D. P. Gangwar ◽  
Anju Pathania

This work presents a robust analysis of digital images to detect the modifications/ morphing/ editing signs by using the image’s exif metadata, thumbnail, camera traces, image markers, Huffman codec and Markers, Compression signatures etc. properties. The details of the whole methodology and findings are described in the present work. The main advantage of the methodology is that the whole analysis has been done by using software/tools which are easily available in open sources.


Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


2021 ◽  
Vol 10 (2) ◽  
pp. 85
Author(s):  
Juan Reinoso-Gordo ◽  
Antonio Gámiz-Gordo ◽  
Pedro Barrero-Ortega

Suitable graphic documentation is essential to ascertain and conserve architectural heritage. For the first time, accurate digital images are provided of a 16th-century wooden ceiling, composed of geometric interlacing patterns, in the Pinelo Palace in Seville. Today, this ceiling suffers from significant deformation. Although there are many publications on the digital documentation of architectural heritage, no graphic studies on this type of deformed ceilings have been presented. This study starts by providing data on the palace history concerning the design of geometric interlacing patterns in carpentry according to the 1633 book by López de Arenas, and on the ceiling consolidation in the 20th century. Images were then obtained using two complementary procedures: from a 3D laser scanner, which offers metric data on deformations; and from photogrammetry, which facilitates the visualisation of details. In this way, this type of heritage is documented in an innovative graphic approach, which is essential for its conservation and/or restoration with scientific foundations and also to disseminate a reliable digital image of the most beautiful ceiling of this Renaissance palace in southern Europe.


2020 ◽  
Vol 30 (1) ◽  
pp. 240-257
Author(s):  
Akula Suneetha ◽  
E. Srinivasa Reddy

Abstract In the data collection phase, the digital images are captured using sensors that often contaminated by noise (undesired random signal). In digital image processing task, enhancing the image quality and reducing the noise is a central process. Image denoising effectively preserves the image edges to a higher extend in the flat regions. Several adaptive filters (median filter, Gaussian filter, fuzzy filter, etc.) have been utilized to improve the smoothness of digital image, but these filters failed to preserve the image edges while removing noise. In this paper, a modified fuzzy set filter has been proposed to eliminate noise for restoring the digital image. Usually in fuzzy set filter, sixteen fuzzy rules are generated to find the noisy pixels in the digital image. In modified fuzzy set filter, a set of twenty-four fuzzy rules are generated with additional four pixel locations for determining the noisy pixels in the digital image. The additional eight fuzzy rules ease the process of finding the image pixels,whether it required averaging or not. In this scenario, the input digital images were collected from the underwater photography fish dataset. The efficiency of the modified fuzzy set filter was evaluated by varying degrees of Gaussian noise (0.01, 0.03, and 0.1 levels of Gaussian noise). For performance evaluation, Structural Similarity (SSIM), Mean Structural Similarity (MSSIM), Mean Square Error (MSE), Normalized Mean Square Error (NMSE), Universal Image Quality Index (UIQI), Peak Signal to Noise Ratio (PSNR), and Visual Information Fidelity (VIF) were used. The experimental results showed that the modified fuzzy set filter improved PSNR value up to 2-3 dB, MSSIM up to 0.12-0.03, and NMSE value up to 0.38-0.1 compared to the traditional filtering techniques.


2018 ◽  
Vol 29 (12) ◽  
pp. 2467-2470 ◽  
Author(s):  
Måns Ekelöf ◽  
Kenneth P. Garrard ◽  
Rika Judd ◽  
Elias P. Rosen ◽  
De-Yu Xie ◽  
...  

2020 ◽  
Vol 1 (3) ◽  
pp. 284
Author(s):  
Josua Alfiandi Sinuhaji

Digital imagery is currently very widely used, so it is very vulnerable to data theft by unauthorized parties. In order to maintain the security of digital images can be done by using cryptographic techniques. Cryptographic techniques can encode digital images by encrypting them in the form of passwords that are not understood. ICE is a block cipher published by Kwan in 1997. This algorithm has a structure similar to DES, but with additional bit permutations that do not depend on the key in the rotation function. There are various types of ICE variants, namely Thin-ICE, ICE standard, and ICE-n. The difference between the three is the length of the keyword used and the number of rounds. The Thin-ICE algorithm uses 64 bits and 8 turns. The ICE standard uses 64 bits and 16 round keys. The ICE-n algorithm uses keys 64n bits and 16n turns. The use of this type of algorithm can be adjusted to the needs of users where Thin-ICE has the lowest level of security among the three, while ICE-n is the highest. This algorithm does not become the subject of a patent and the source code can be used freely.Keywords : Cryptography, Digital Image,Algorithm,ICE.


2021 ◽  
pp. 32-47
Author(s):  
Katherine Thomson-Jones

In this chapter, I consider whether digital images are digital in the strongest sense; namely, qua images. Assuming that a digital image is one that is made and screened digitally, there is a further question as to whether the representational scheme to which the image belongs has a fundamentally digital structure. Answering this question requires close analysis of Nelson Goodman’s classical account of the analog/digital distinction. It also requires a response to Goodman’s insistence on the essential analogicity of the pictorial. Such a response points to the uses of digital sampling and quantization technology to impose digital structure on encoded, replicable images.


Sign in / Sign up

Export Citation Format

Share Document