image file
Recently Published Documents


TOTAL DOCUMENTS

185
(FIVE YEARS 51)

H-INDEX

7
(FIVE YEARS 2)

2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Watermarking is the process of embedding specific data to prove ownership copyright authentication. It is needed whenever media-files are used without proper permission is granted. The current watermarking challenge comes from the ownership proof especially as slight tampering occurs on the multimedia-file which injure the watermarking causing difficulty in its copyright proof. This paper proposes utilizing counting-based secret sharing strategy to allow validation of ownership RGB watermarking even if some of the image-file is interfered. We validate image watermarking partially as lightweight semi-complete verification, which is not possible in the normal random-stream watermarking schemes. Although the work is still in its early stage, it is promising research showing real attractive contribution opportunities. The work is tested and compared to other strategies in aspects of robustness, capacity, and security, providing attractive remarks worth noting. The study evaluation results showed interesting contribution believed to be pioneering.


2021 ◽  
Author(s):  
Nehal M. Atallah ◽  
Michael S. Toss ◽  
Clare Verrill ◽  
Manuel Salto-Tellez ◽  
David Snead ◽  
...  

AbstractUsing digitalized whole slide images (WSI) in routine histopathology practice is a revolutionary technology. This study aims to assess the clinical impacts of WSI quality and representation of the corresponding glass slides. 40,160 breast WSIs were examined and compared with their corresponding glass slides. The presence, frequency, location, tissue type, and the clinical impacts of missing tissue were assessed. Scanning time, type of the specimens, time to WSIs implementation, and quality control (QC) measures were also considered. The frequency of missing tissue ranged from 2% to 19%. The area size of the missed tissue ranged from 1–70%. In most cases (>75%), the missing tissue area size was <10% and peripherally located. In all cases the missed tissue was fat with or without small entrapped normal breast parenchyma. No missing tissue was identified in WSIs of the core biopsy specimens. QC measures improved images quality and reduced WSI failure rates by seven-fold. A negative linear correlation between the frequency of missing tissue and both the scanning time and the image file size was observed (p < 0.05). None of the WSI with missing tissues resulted in a change in the final diagnosis. Missing tissue on breast WSI is observed but with variable frequency and little diagnostic consequence. Balancing between WSI quality and scanning time/image file size should be considered and pathology laboratories should undertake their own assessments of risk and provide the relevant mitigations with the appropriate level of caution.


Different image formats are available in the world today which are used for various purposes, this paper elaborates the Ontology of different Image File Formats and their various applications. Digital images are saved in various Image File Formats which have different properties and features which are ideal for a particular use. A digital image is primarily classified into two types, raster or vector type. Image format elucidate how the information in the image will be stored. Image file format is a systematic way of storing and arranging digital images. Image file format can store data in compressed format (which may be lossy or lossless), uncompressed format or a vector format. Some Image format are suitable for a particular purpose while some are not. TIFF Image type is good for printing whereas PNG or JPG, are best for web. Analysis of the basic Image File Format have been carried out practically and the result is displayed in the coming section


Author(s):  
Pritam Patange

Abstract: Cloud computing has experienced significant growth in the recent years owing to the various advantages it provides such as 24/7 availability, quick provisioning of resources, easy scalability to name a few. Virtualization is the backbone of cloud computing. Virtual Machines (VMs) are created and executed by a software called Virtual Machine Monitor (VMM) or the hypervisor. It separates compute environments from the actual physical infrastructure. A disk image file representing a single virtual machine is created on the hypervisor’s file system. In this paper, we analysed the runtime performance of multiple different disk image file formats. The analysis comprises of four different parameters of performance namely- bandwidth, latency, input-output operations performed per second (IOPS) and power consumption. The impact of the hypervisor’s block and file sizes is also analysed for the different file formats. The paper aims to act as a reference for the reader in choosing the most appropriate disk file image format for their use case based on the performance comparisons made between different disk image file formats on two different hypervisors – KVM and VirtualBox. Keywords: Virtualization, Virtual disk formats, Cloud computing, fio, KVM, virt-manager, powerstat, VirtualBox.


2021 ◽  
Vol 14 (2) ◽  
pp. 99
Author(s):  
Dewa Ayu Indah Cahya Dewi ◽  
I Made Oka Widyantara

Through image compression, can save bandwidth usage on telecommunication networks, accelerate image file sending time and can save memory in image file storage. Technique to reduce image size through compression techniques is needed. Image compression is one of the image processing techniques performed on digital images with the aim of reducing the redundancy of the data contained in the image so that it can be stored or transmitted efficiently. This research analyzed the results of image compression and measure the error level of the image compression results. The analysis to be carried out is in the form of an analysis of JPEG compression techniques with various types of images. The method of measuring the compression results uses the MSE and PSNR methods. Meanwhile, to determine the percentage level of compression using the compression ratio calculation. The average ratio for JPEG compression was 0.08605, the compression rate was 91.39%. The average compression ratio for the DWT method was 0.133090833, the compression rate was 86.69%. The average compression ratio of the SVD method was 0.101938833 and the compression rate was 89.80%.


Author(s):  
Lizbardo Orellano Benancio ◽  
◽  
Ricardo Muñoz Canales ◽  
Paolo Rodriguez Leon ◽  
Enrique Lee Huamaní

Abstract—During various court hearings, the thesis that every authentic digital file has precise metadata of its creation date was questioned.In this way, the problem was raised which indicates, if the metadata of a digital file (Image) whose label records the date of creation by the recording device of a digital image file are accurate and reliable.For this reason, during the forensic analysis carried out in this work, a record of the metadata of five (05) digital image files from known sources is shown and where their characteristics have been detailed, in addition a record of the metadata of the images used that were later manipulated with image editing software with which metadata comparisons were made to show the labels that suffered modifications in their content.Finally, the obtaining of HASH code with the SHA - 256 algorithm is shown, for digital assurance, of the edited and original files whose comparison allows observing the changes in the content at a binary level. Keywords—Crime; Cybercrime; Digital Image; HASH; Metadata


Author(s):  
C Vijaya Kumar ◽  
G S Udaya Kiran Babu
Keyword(s):  

Steganography is a way of hiding data in the context of an image, preventing a person from finding it by mistake. This is an explicit text file with an image file. Due to the need for steganography, we have proposed a new algorithm called the use of steganography. In our algorithm, we should have a cover and a message. It can be pixel-for-pixel in an image. In it, we will have to use every bit of encryption. This process will continue until the final track of encryption. After this step, the data is hidden in the image. We will send the image file to the client, and the client will need to change the process to download the source code to the image.


2021 ◽  
Vol 5 (3) ◽  
pp. 277
Author(s):  
Ade Davy Wiranata ◽  
Rima Tamara Aldisa

The research objective is to hide messages through images using the LSB (Least Significant Bit) method and Caesar Chipper and Rivest Code 4 encryption. The LSB (Least Significant Bit) method is used as a message hiding technique in steganography where hiding hidden messages is done by changing a few bits in the segment. image with a secret message. The results of this study resulted in an implementation using the Least Significant Bit (LSB) to be applied to institutions with an interest in maintaining the confidentiality of encrypted image output, changing the image file size and sound (audio) file size.Keywords:Steganography, Least Significant Bit (LSB), Caesar Chiper and RC4.


Sign in / Sign up

Export Citation Format

Share Document