Research on Halftone Technique of Digital Images

2014 ◽  
Vol 989-994 ◽  
pp. 4082-4085
Author(s):  
Wen Bo Dai ◽  
Liang Chen ◽  
Xin Wei Zhang ◽  
Le Wang ◽  
Shi Yue Nie ◽  
...  

Halftone is the key technique for low-resolution equipment like fax machines and printers to reconstruct grayscale images with black and white binary data. Images produced by classic error diffusion algorithm have more abundant color than those made by ordered dithering method. But the problems still exits that there can distortions and false contour phenomenon and fuzzy edges. This paper puts forward an advanced error diffusion algorithm based on bidirectional feedback and improves its feedback type through adding correction factors. The simulation results show that the bidirectional feedback error diffusion algorithm with correction factors better inhibited the phenomenon of distortions and false contour. Directional texture is also improved greatly.

2014 ◽  
Vol 602-605 ◽  
pp. 3434-3437
Author(s):  
Yu Kun Chen ◽  
Ke Yin Wang ◽  
Hai Ying Huang ◽  
Pai Hang Zhao

This paper analyzed the formula for calculating the velocity and scatter radius of water mist droplets after detonation. Through establishing model, calculating by the formula and simulation of theoretical model, the reasons of deviation between calculation and simulation results were found out. In order to make theoretical calculation more accurate and applicable, new formula was created by introducing correction factors.


Entropy ◽  
2021 ◽  
Vol 23 (12) ◽  
pp. 1581
Author(s):  
Haiju Fan ◽  
Chenjiu Zhang ◽  
Heng Lu ◽  
Ming Li ◽  
Yanfang Liu

Recently, a new chaotic image encryption technique was proposed based on multiple discrete dynamic maps. The authors claim that the scheme can provide excellent privacy for traditional digital images. However, in order to minimize the computational cost, the encryption scheme adopts one-round encryption and a traditional permutation–diffusion structure. Through cryptanalysis, there is no strong correlation between the key and the plain image, which leads to the collapse of cryptosystem. Based on this, two methods of chosen-plaintext attacks are proposed in this paper. The two methods require 3 pairs and 258 pairs of plain and cipher images, respectively, to break the original encryption system. The simulation results show the effectiveness of the two schemes.


2013 ◽  
pp. 691-712
Author(s):  
Dumitru Dan Burdescu ◽  
Liana Stanescu ◽  
Marian Cristian Mihaescu

The rapid growth of digital multimedia technologies brings tremendous attention to the field of digital authentication. Digital watermarking has become widely recognized as an effective measure for copyright protection of multimedia data. The owner or the distributor of the digital images can insert a unique watermark into copies for different customers or receivers, which will be helpful to identify the source of illegal copies. In this chapter the authors present two original spatial authentication techniques for digital images. These new algorithms yield an invisible watermark that is robust to various kinds of attacks. The main principle is the utilization of a virtual (2D or 3D) graph embedded into the digital images. Then, the colors of some vertices of the virtual graph are slightly modified for obtaining the watermark. The proposed techniques modify pixels or voxels of the object by a spatial watermark insertion scheme. These techniques can be used for all kinds of digital images, color or black and white, and the new algorithms produce an invisible robust watermark. The techniques lower the computational complexity that normally rises with the traditional watermarking algorithms. This approach reduces computation and implementation complexity of the algorithms. These techniques seem to replace advantages of the transform domain techniques with those of the spatial domain techniques.


Author(s):  
Leonardo Rezende Costa

The halftone technique is a process that employs patterns formed by black and white dots to reduce the number of gray levels in an image. Due to the tendency of the human visual system to soften the distinction between points with different shades, the patterns of black and white dots produce a visual effect as if the image were composed of shades of gray and dark. This technique is quite old and is widely used in printing images in newspapers and magazines, in which only black (ink) and white (paper) levels are needed. There are several methods for generating halftone images. In this article we explore dithering with error diffusion and an analysis of different halftone techniques is presented using error diffusion to change the depth of the image. The results showed that the depth of the image changes 1/8 per channel, this halftone technique can be used to reduce an image weight, losing information but achieving good results, depending on the context. ontext.


2020 ◽  
Vol 2 ◽  
pp. 178-182
Author(s):  
L.Y. Karpenko ◽  
◽  
A.A. Pogodaeva ◽  
A.A. Bakhta ◽  
◽  
...  

The article discusses the results of the dy-namics of indicators of innate immunity of cattle throughout pregnancy. The research topic is relevant, since receiving healthy offspring is certainly associated with the natural resistance of the cow. The aim of the study is to study the non-specific immunity of cows in different months of pregnan-cy. The work was performed on the farm of JSC Krasnoselskoye PZ (Leningrad Oblast). During the experiment, 2 groups of cows of Holstein black-and-white breeds were formed: the experimental group – 10 preg-nant cows and the control group-10 not steel cows. Blood was taken once a month throughout pregnancy. Indicators of phago-cytosis, bactericidal and lysozyme activities were determined in the blood. During the study, the authors noted a decrease in lyso-zyme, bactericidal activity relative to the indicators of the control group, however, the difference did not reach significant differences. Also observed a sig-nificant inhibition of the functional state of the number of blood neutrophils: a decrease in phagocytic activity reliably observed from 5 months by 27.02%, from 7 month by 41.9% to 9 month, the index decreased by 50,66% as compared to control; at the phag-ocytic number of reliable decrease was ob-served at 4 months 11.3% at 6 months had decreased by 24.86%, and the 9 month preg-nancy reduction made up 28.81%, the phag-ocytic index, starting with the 5th month of pregnancy was significantly decreased by 32.05%, to 8 month decreased by 48.31% and for 9 months had decreased by 50% compared to control. Therefore, in the period of pregnancy in the organism of cows, the development of sec ondary immunodeficiency is noted, which is directly associated with fetal gestation. The data obtained can be useful in correction factors of natural resistance during pregnancy of cows.


Author(s):  
Noriaki Suetake ◽  
◽  
Rumiko Hashiba ◽  

We propose error diffusion based on threshold control using fuzzy inference. In the proposed method, the same black or white pixels along a periphery that lowers image quality, is decreased without loss of edge enhancement using threshold control. We applied the method to standard digital images and confirmed that the method is superior to the conventional.


Author(s):  
Noriaki Suetake ◽  
◽  
Masanori Togashi ◽  

We propose a new multi-level error diffusion method employing the fuzzy inference, which realizes half toning with high quality. In the proposed method, dissimilar textures around quantization levels, which are the cause of the low image quality and obtained by a conventional method, are decreased by using fuzzy inference. In this paper, we apply the proposed method to various standard digital images. The image quality of the result using the proposed method is higher than those of other methods without noise-add filtering, and it is almost same as them with filtering in 2 or 3 times faster processing.


1992 ◽  
Vol 14 (4) ◽  
pp. 287-292 ◽  
Author(s):  
K. Parthenis ◽  
C. Metaxaki-Kossionides

2020 ◽  
Vol 10 (19) ◽  
pp. 6854 ◽  
Author(s):  
Jae-Eun Lee ◽  
Young-Ho Seo ◽  
Dong-Wook Kim

Digital watermarking has been widely studied as a method of protecting the intellectual property rights of digital images, which are high value-added contents. Recently, studies implementing these techniques with neural networks have been conducted. This paper also proposes a neural network to perform a robust, invisible blind watermarking for digital images. It is a convolutional neural network (CNN)-based scheme that consists of pre-processing networks for both host image and watermark, a watermark embedding network, an attack simulation for training, and a watermark extraction network to extract watermark whenever necessary. It has three peculiarities for the application aspect: The first is the host image resolution’s adaptability. This is to apply the proposed method to any resolution of the host image and is performed by composing the network without using any resolution-dependent layer or component. The second peculiarity is the adaptability of the watermark information. This is to provide usability of any user-defined watermark data. It is conducted by using random binary data as the watermark and is changed each iteration during training. The last peculiarity is the controllability of the trade-off relationship between watermark invisibility and robustness against attacks, which provides applicability for different applications requiring different invisibility and robustness. For this, a strength scaling factor for watermark information is applied. Besides, it has the following structural or in-training peculiarities. First, the proposed network is as simple as the most profound path consists of only 13 CNN layers, which is through the pre-processing network, embedding network, and extraction network. The second is that it maintains the host’s resolution by increasing the resolution of a watermark in the watermark pre-processing network, which is to increases the invisibility of the watermark. Also, the average pooling is used in the watermark pre-processing network to properly combine the binary value of the watermark data with the host image, and it also increases the invisibility of the watermark. Finally, as the loss function, the extractor uses mean absolute error (MAE), while the embedding network uses mean square error (MSE). Because the extracted watermark information consists of binary values, the MAE between the extracted watermark and the original one is more suitable for balanced training between the embedder and the extractor. The proposed network’s performance is confirmed through training and evaluation that the proposed method has high invisibility for the watermark (WM) and high robustness against various pixel-value change attacks and geometric attacks. Each of the three peculiarities of this scheme is shown to work well with the experimental results. Besides, it is exhibited that the proposed scheme shows good performance compared to the previous methods.


Sign in / Sign up

Export Citation Format

Share Document