Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.
The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show MoreImage compression is an important tool to reduce the bandwidth and storage
requirements of practical image systems. To reduce the increasing demand of storage
space and transmission time compression techniques are the need of the day. Discrete
time wavelet transforms based image codec using Set Partitioning In Hierarchical
Trees (SPIHT) is implemented in this paper. Mean Square Error (MSE), Peak Signal
to Noise Ratio (PSNR) and Maximum Difference (MD) are used to measure the
picture quality of reconstructed image. MSE and PSNR are the most common picture
quality measures. Different kinds of test images are assessed in this work with
different compression ratios. The results show the high efficiency of SPIHT algori
E-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas
... Show MoreMathematical integration techniques rely on mathematical relationships such as addition, subtraction, division, and subtraction to merge images with different resolutions to achieve the best effect of the merger. In this study, a simulation is adopted to correct the geometric and radiometric distortion of satellite images based on mathematical integration techniques, including Brovey Transform (BT), Color Normalization Transform (CNT), and Multiplicative Model (MM). Also, interpolation methods, namely the nearest neighborhood, Bi-linear, and Bi-cubic were adapted to the images captured by an optical camera. The evaluation of images resulting from the integration process was performed using several types of measures; the first type depend
... Show MoreIn this review paper, several studies and researches were surveyed for assisting future researchers to identify available techniques in the field of classification of Synthetic Aperture Radar (SAR) images. SAR images are becoming increasingly important in a variety of remote sensing applications due to the ability of SAR sensors to operate in all types of weather conditions, including day and night remote sensing for long ranges and coverage areas. Its properties of vast planning, search, rescue, mine detection, and target identification make it very attractive for surveillance and observation missions of Earth resources. With the increasing popularity and availability of these images, the need for machines has emerged to enhance t
... Show MoreA new approach presented in this study to determine the optimal edge detection threshold value. This approach is base on extracting small homogenous blocks from unequal mean targets. Then, from these blocks we generate small image with known edges (edges represent the lines between the contacted blocks). So, these simulated edges can be assumed as true edges .The true simulated edges, compared with the detected edges in the small generated image is done by using different thresholding values. The comparison based on computing mean square errors between the simulated edge image and the produced edge image from edge detector methods. The mean square error computed for the total edge image (Er), for edge regio
... Show MoreImage processing is an important source for the image
analytical in order to get variable parameters such as the
intensity .In present work it has been found a relation between the tensity and number of pixd in the image , and from this relation we have got in this paper the inten
... Show More