期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Target acquisition performance in the presence of JPEG image compression
1
作者 Boban Bondzulic Nenad Stojanovic +3 位作者 Vladimir Lukin Sergey A.Stankevich Dimitrije Bujakovic Sergii Kryvenko 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期30-41,共12页
This paper presents an investigation on the effect of JPEG compression on the similarity between the target image and the background,where the similarity is further used to determine the degree of clutter in the image... This paper presents an investigation on the effect of JPEG compression on the similarity between the target image and the background,where the similarity is further used to determine the degree of clutter in the image.Four new clutter metrics based on image quality assessment are introduced,among which the Haar wavelet-based perceptual similarity index,known as HaarPSI,provides the best target acquisition prediction results.It is shown that the similarity between the target and the background at the boundary between visually lossless and visually lossy compression does not change significantly compared to the case when an uncompressed image is used.In future work,through subjective tests,it is necessary to check whether this presence of compression at the threshold of just noticeable differences will affect the human target acquisition performance.Similarity values are compared with the results of subjective tests of the well-known target Search_2 database,where the degree of agreement between objective and subjective scores,measured through linear correlation,reached a value of 90%. 展开更多
关键词 jpeg compression Target acquisition performance Image quality assessment Just noticeable difference Probability of target detection Target mean searching time
在线阅读 下载PDF
Detecting JPEG image forgery based on double compression 被引量:1
2
作者 Wang Junwen Liu Guangjie Dai Yuewei Wang Zhiquan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第5期1096-1103,共8页
Detecting the forgery parts from a double compressed image is very important and urgent work for blind authentication. A very simple and efficient method for accomplishing the task is proposed. Firstly, the probabilis... Detecting the forgery parts from a double compressed image is very important and urgent work for blind authentication. A very simple and efficient method for accomplishing the task is proposed. Firstly, the probabilistic model with periodic effects in double quantization is analyzed, and the probability of quantized DCT coefficients in each block is calculated over the entire iraage. Secondly, the posteriori probability of each block is computed according to Bayesian theory and the results mentioned in first part. Then the mean and variance of the posteriori probability are to be used for judging whether the target block is tampered. Finally, the mathematical morphology operations are performed to reduce the false alarm probability. Experimental results show that the method can exactly locate the doctored part, and through the experiment it is also found that for detecting the tampered regions, the higher the second compression quality is, the more exact the detection efficiency is. 展开更多
关键词 image forgery jpeg double compression QUANTIZATION posteriori probability.
在线阅读 下载PDF
Passive detection of copy-paste forgery between JPEG images 被引量:5
3
作者 李香花 赵于前 +2 位作者 廖苗 F.Y.Shih Y.Q.Shi 《Journal of Central South University》 SCIE EI CAS 2012年第10期2839-2851,共13页
A blind digital image forensic method for detecting copy-paste forgery between JPEG images was proposed.Two copy-paste tampering scenarios were introduced at first:the tampered image was saved in an uncompressed forma... A blind digital image forensic method for detecting copy-paste forgery between JPEG images was proposed.Two copy-paste tampering scenarios were introduced at first:the tampered image was saved in an uncompressed format or in a JPEG compressed format.Then the proposed detection method was analyzed and simulated for all the cases of the two tampering scenarios.The tampered region is detected by computing the averaged sum of absolute difference(ASAD) images between the examined image and a resaved JPEG compressed image at different quality factors.The experimental results show the advantages of the proposed method:capability of detecting small and/or multiple tampered regions,simple computation,and hence fast speed in processing. 展开更多
关键词 image forensic jpeg compression copy-paste tbrgery passive detection tampered image compressed image
在线阅读 下载PDF
Degradation algorithm of compressive sensing
4
作者 Chunhui Zhao Wei Liu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第5期832-839,共8页
The compressive sensing (CS) theory allows people to obtain signal in the frequency much lower than the requested one of sampling theorem. Because the theory is based on the assumption of that the location of sparse... The compressive sensing (CS) theory allows people to obtain signal in the frequency much lower than the requested one of sampling theorem. Because the theory is based on the assumption of that the location of sparse values is unknown, it has many constraints in practical applications. In fact, in many cases such as image processing, the location of sparse values is knowable, and CS can degrade to a linear process. In order to take full advantage of the visual information of images, this paper proposes the concept of dimensionality reduction transform matrix and then se- lects sparse values by constructing an accuracy control matrix, so on this basis, a degradation algorithm is designed that the signal can be obtained by the measurements as many as sparse values and reconstructed through a linear process. In comparison with similar methods, the degradation algorithm is effective in reducing the number of sensors and improving operational efficiency. The algorithm is also used to achieve the CS process with the same amount of data as joint photographic exports group (JPEG) compression and acquires the same display effect. 展开更多
关键词 compressive sensing (CS) dimensionality reduction transform matrix accuracy control matrix degradation algorithm joint photographic exports group jpeg compression.
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部