scholarly journals Differential Pixel Value Coding for HEVC Lossless Compression

Author(s):  
Jung-Ah Choi ◽  
Yo-Sung Ho
2020 ◽  
Vol 6 (6) ◽  
pp. 38
Author(s):  
Zhuocheng Jiang ◽  
W. David Pan ◽  
Hongda Shen

To achieve efficient lossless compression of hyperspectral images, we design a concatenated neural network, which is capable of extracting both spatial and spectral correlations for accurate pixel value prediction. Unlike conventional neural network based methods in the literature, the proposed neural network functions as an adaptive filter, thereby eliminating the need for pre-training using decompressed data. To meet the demand for low-complexity onboard processing, we use a shallow network with only two hidden layers for efficient feature extraction and predictive filtering. Extensive simulations on commonly used hyperspectral datasets and the standard CCSDS test datasets show that the proposed approach attains significant improvements over several other state-of-the-art methods, including standard compressors such as ESA, CCSDS-122, and CCSDS-123.


Author(s):  
Ben Seymour ◽  
Ivo Vlaev ◽  
Irma Kurniawan ◽  
Julia Trommerhauser ◽  
Ray Dolan ◽  
...  

Reproduction ◽  
2000 ◽  
pp. 311-323 ◽  
Author(s):  
JL Hilton ◽  
GE Sarty ◽  
GP Adams ◽  
RA Pierson

The magnetic resonance images and maps of bovine ovaries acquired at defined phases of follicular development and regression were studied to determine whether magnetic resonance image attributes of the follicular antrum reflect the physiological status of dominant and subordinate ovarian follicles. Ovariectomies were performed at day 3 of wave one, day 6 of wave one, day 1 of wave two and at >/= day 17 after ovulation. The timings of ovariectomies were selected to acquire growing, early static, late static and regressing follicles of the first wave and preovulatory follicles of the ovulatory wave. Pre-selection and subordinate follicles were also available for analysis. Serum samples were taken on the day of ovariectomy and follicular fluid samples were taken after imaging. Numerical pixel value and pixel heterogeneity in a spot representing approximately 95% of the follicular antrum were quantified in T(1)- and T(2)-weighted images. T(1) and T(2) relaxation rates (T(1) and T(2)), proton density, apparent diffusion coefficients and their heterogeneities were determined from the computed magnetic resonance maps. The antra of early atretic dominant follicles showed higher T(2)-weighted mean pixel value (P < 0.008) and heterogeneity (P < 0. 01) and lower T(2) heterogeneity (P < 0.008) than growing follicles. Subordinate follicles in the presence of a preovulatory dominant follicle had higher T(1), T(1) heterogeneity, proton density, proton density heterogeneity, and lower mean pixel value in T(1)-weighted images than subordinate follicles of the anovulatory wave (P < 0.04). T(1) relaxation rate heterogeneity and proton density heterogeneity were positively correlated with follicular fluid oestradiol concentration (r = 0.4 and 0.3; P < 0.04). T(2) relaxation rate heterogeneity was positively correlated with follicular fluid progesterone concentration (r = 0.4; P < 0.008). Quantitative differences in magnetic resonance image attributes of the antrum observed among phases of follicular development and regression coincided with changes in the ability of the dominant follicle to produce steroid hormones and ovulate, and thus were indicative of physiological status and follicular health.


2019 ◽  
Vol 2019 (1) ◽  
pp. 331-338 ◽  
Author(s):  
Jérémie Gerhardt ◽  
Michael E. Miller ◽  
Hyunjin Yoo ◽  
Tara Akhavan

In this paper we discuss a model to estimate the power consumption and lifetime (LT) of an OLED display based on its pixel value and the brightness setting of the screen (scbr). This model is used to illustrate the effect of OLED aging on display color characteristics. Model parameters are based on power consumption measurement of a given display for a number of pixel and scbr combinations. OLED LT is often given for the most stressful display operating situation, i.e. white image at maximum scbr, but having the ability to predict the LT for other configurations can be meaningful to estimate the impact and quality of new image processing algorithms. After explaining our model we present a use case to illustrate how we use it to evaluate the impact of an image processing algorithm for brightness adaptation.


Author(s):  
Seok Lee ◽  
Juyong Park ◽  
Dongkyung Nam

In this article, the authors present an image processing method to reduce three-dimensional (3D) crosstalk for eye-tracking-based 3D display. Specifically, they considered 3D pixel crosstalk and offset crosstalk and applied different approaches based on its characteristics. For 3D pixel crosstalk which depends on the viewer’s relative location, they proposed output pixel value weighting scheme based on viewer’s eye position, and for offset crosstalk they subtracted luminance of crosstalk components according to the measured display crosstalk level in advance. By simulations and experiments using the 3D display prototypes, the authors evaluated the effectiveness of proposed method.


Author(s):  
Agung Lestari ◽  
Abdul Sani Sembiring ◽  
Taronisokhi Zebua

Optimization of data security techniques is very necessary so that the data or information that is secured is really safe from attack. Data that has been encrypted based on cryptographic techniques very quickly raises suspicion that the data is confidential or important. Therefore, this technique is better combined with steganography techniques. Utilization of steganography techniques can minimize the attacker's suspicion of data that is secured, because by using steganography data techniques can be hidden on certain objects. This study discusses how to encode a text based on the Merkle-Hellman Knapsack algorithm and the resulting password is hidden in a grayscale digital image as a hiding object based on the pixel value differencing algorithm. This is done to minimize suspicion and make it difficult for attackers to find out confidential or important data.Keywords: cryptography,steganography, merkle-hellmankanpsack, PVD, image


Sign in / Sign up

Export Citation Format

Share Document