27 results
Search Results
2. МОДИФІКАЦІЇ АЛГОРИТМУ ВИЯВЛЕННЯ РУХУ КАМЕРИ
- Author
-
Кордюк, В. В. and Лебедєва, О. Ю.
- Subjects
- *
OPTICAL flow , *CAMERA movement , *VIDEO surveillance , *MOTION capture (Human mechanics) , *DIGITAL cameras , *VIRTUAL reality , *TRACK & field - Abstract
Video analysis is a very important tool in video surveillance systems with one or more cameras. Among the most promising features are tracking the movement of objects - tracking. The current state of development in the field of tracking is considered in the work. There are several types of trekking. Pixel Tracking is the tracking of the movement of a specific point (pixel) or group of points on the original video sequence. The result of this process is the trajectory of the pixel, corresponding to the movement of an object in the frame. Matchmoving is a complex process that allows you to create a three-dimensional scene with a digital camera based on the available video sequence, which exactly repeats the movement of a real camera. Motion Capture is a technology designed to determine the position and orientation of a real object in a virtual environment, determining the position and orientation of a real object in space is carried out using special sensors and markers. Each of these types of tracking can be used on its own or as part of more complex processes. The paper develops a modification of the camera motion detection algorithm, which works in the field of Pixel Tracking. The description of the main approaches to motion estimation is given, namely recursive raster algorithms, frequency domain algorithms, optical flow algorithms and block matching methods. The urgency of the work, its purpose and objectives are given. The paper describes a method of arranging blocks in a video sequence frame, which are used to calculate the movement of the camera. Similarity metrics are used to estimate the similarity of the blocks, namely the correlation coefficient. The paper describes the steps of the developed modification of the camera motion detection algorithm. The results of the modification of the camera motion detection algorithm are presented. The result of this work is an indicator of the visual quality of tracking in the form of a 2D image of the camera motion vector. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
3. МОДИФІКАЦІЯ МЕТОДУ ХЕШ-СТЕГАНОГРАФІЇ, ЗАСНОВАНОГО НА ПЕРЕДАЧІ ПОСЛІДОВНОСТІ ЦИФРОВИХ ЗОБРАЖЕНЬ
- Author
-
Зоріло, В. В., Лебедєва, О. Ю., and Бохонько, М. В.
- Subjects
IMAGE analysis ,TEXT messages ,DIGITAL images ,CRYPTOGRAPHY ,ALGORITHMS ,HASHING - Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
4. УСОВЕРШЕНСТВОВАНИЕ СТЕГАНОГРАФИЧЕСКОГО АЛГОРИТМА, ОСНОВАННОГО НА SIGN-НЕЧУВСТВИТЕЛЬНОСТИ СИНГУЛЯРНЫХ ВЕКТОРОВ БЛОКОВ МАТРИЦЫ ИЗОБРАЖЕНИЯ
- Author
-
Кобозева, А. А., Мокрицкий, В. А., Батиене, Л. Е. М., and Бобок, И. И.
- Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2017
5. Complex method of detection and localization of cloning areas in digital images.
- Author
-
Zorilo, V. V. and Lebedeva, Ye. Yu.
- Abstract
Developing methods aiming at identification of digital images integrity violation is an important problem of complex system of information security. Cloning method, realized in the most of graphic editors, is often used to compromise the integrity of the image related to unauthorized changes. Therefore, the task of cloning identification is a relevant one. In addition to the cloning identification it is also important to clarify the contours of the cloned area. In this paper we propose a polynomial comprehensive method to identify areas of cloning as a falsification of the digital image. It allows to locate the cloned areas with a higher precision compared to modern analogues. Complex method is based on two modern clone detection techniques, using a common approach to the analysis of the state and technology of the information system functioning. It includes two stages: "fast rough" cloning area identification and a "slow" identification of the contour of the cloning area using a limited image subarea containing a clone. The method proposed can be adapted for the digital video. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
6. A basis of common approach to the development of universal steganalysis methods for digital images.
- Author
-
Kobozeva, A. A.
- Abstract
In this paper a new common approach to the organization of steganalysis in digital images is developed. New features of formal parameters defining the image are identified, theoretically grounded and practically tested. For the first time characteristics of mutual disposition of the left and right singular vectors corresponding to the largest singular value of the matrix (block of matrix) of an image and the vector composed of the singular values obtained as a result of normal singular decomposition of the matrix (block matrix) are obtained. It is shown that for the majority of the blocks of the original image (regardless of the storage format -- lossy, lossless) the angle between the left (right) singular vector and the vector composed of singular numbers is determined by the angle between the n-optimal vector and the standard space basis of the corresponding dimension. It is shown that the discovered feature is violated for the mentioned formal parameters in the disturbed image. This is an indicator of integrity violation, particularly steganotransformation, and it can be used to develop new universal steganalysis methods and algorithms. Their efficiency does not depend on the specifics of steganoalgorithm used for insertion of additional information. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
7. ОБНАРУЖЕНИЕ И ЛОКАЛИЗАЦИЯ ФАЛЬСИФИКАЦИИ ЦИФРОВОГО ИЗОБРАЖЕНИЯ В РАЗЛИЧНЫХ УСЛОВИЯХ ЕЁ ПРОВЕДЕНИЯ
- Author
-
Нариманова, Е. В., Пархуц, Л. Т., and Чумаченко, Ю. В.
- Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2012
8. Color triangle color separation system for colorimetric research in microscopy
- Author
-
Vera L. Zhbanova
- Subjects
color ,chromaticity ,color triangle ,physiological rgb ,digital image ,microscopy ,Optics. Light ,QC350-467 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The paper presents studies of the color separation system based on the developed color triangle for conducting scientific research in microscopy which will allow identifying genetic or chemical deviations of the samples under study by an accurate change in color. The color triangle covers the entire visible range and is focused on the physiological RGB and XYZ colorimetric systems. Based on the method of converting color spaces, the addition curves of the developed systems were found. Based on the curves, sets of color separating light filters were selected to fit the shapes of these curves based on the selected monochrome camera. Three sets are presented. An analytical study of these sets was carried out and one optimal set was selected. An analytical study of this system is presented in the form of mathematical modeling with 14 control colors from the Munsell atlas. The selected set of the system was experimentally studied on the developed optoelectronic setup placed in a black box to exclude light and color flare. One important part of the setup is the reflective screen: the location follows the lighting/observation recommendations of the International Commission on Illumination for colorimetric measurement of samples. For an objective analysis of measurements, reference test objects were selected — standardized colored optical glasses. The study was based on the evaluation of glass groups: yellow, yellow-green, green, blue-green, since the work has expanded the color space in the direction of the selected colors to obtain color accuracy. Previously, the author, in an analytical study of modern color separation systems, obtained results where the best value was found with a wide color triangle of 0.009, the worst 0.04 — with a small one. Thus, it has been proven: the larger the coverage of the color triangle, the smaller the change in color. The obtained values of the developed KZS system are better than modern ones –0.0088 on average. During the mathematical modeling of the experiment, the change in color was obtained 0.016 on average, the practical result — 0.027 on average. The obtained parameters and characteristics will be taken into account when introducing the developed color separation system into a monochrome digital microscope to improve color rendering in microscopy.
- Published
- 2023
- Full Text
- View/download PDF
9. The Sufficient Condition for Ensuring the Reliability of Perception of the Steganographic Message in the Walsh-Hadamard Transform Domain
- Author
-
Kobozeva A.A. and Sokolov A.V.
- Subjects
steganographic communication channel ,steganographic message perception reliability ,digital image ,walsh-hadamard transform ,sequence ,discrete cosine transform ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 ,Production of electric energy or power. Powerplants. Central stations ,TK1001-1841 ,Renewable energy sources ,TJ807-830 - Abstract
In view of the high compatibility of the Walsh-Hadamard transform to the architecture of mod-ern computing facilities, it is sensible to use it in methods of steganography and steganalysis. Now, there are some efficient steganographic methods that use the Walsh-Hadamard transform domain for information embedding presented in the literature. It is known that to ensure the reli-ability of the steganographic message perception, information should be embedded in its high-frequency components; nevertheless, the issues of the correspondence of the Walsh-Hadamard transformants to the frequency components of the original matrix of the cover image are poorly researched. The purpose of this paper is to develop a formal sufficient condition for ensuring the reliability of perception of steganographic messages in the Walsh-Hadamard transform do-main. This purpose was achieved by establishing the relationship between the Walsh-Hadamard transformants and the discrete cosine transform transformants, which was theoretically substan-tiated in two ways, and experimentally confirmed. Based on the established relationship between the Walsh-Hadamard transform and the discrete cosine transform, as well as the components of the singular value decomposition of the corresponding matrices, a sufficient condition has been developed to ensure the reliability of the perception of steganographic messages in the Walsh-Hadamard transform domain. The sufficient condition consists in the fact that after embedding of additional information using any steganographic method, those Walsh-Hadamard trans-formants that correspond to the singular triples of the matrix corresponding to small (smallest) in value singular numbers, should change.
- Published
- 2022
- Full Text
- View/download PDF
10. ОСНОВЫ НОВОГО ПОДХОДА К ВЫЯВЛЕНИЮ РЕЗУЛЬТАТОВ КЛОНИРОВАНИЯ В ЦИФРОВОМ ИЗОБРАЖЕНИИ В УСЛОВИЯХ ВОЗМУЩАЮЩИХ ВОЗДЕЙСТВИЙ.
- Author
-
Кобозева, А. А. and Григоренко, С. Н.
- Abstract
In this paper it is proposed basics of a new approach to identify cloning results, conducted in digital images, in additional disturbing influences conditions in a digital image after cloning, that may be considered as lossy compression, add noise, blur, etc. The approach is based on identifying the comparability of the surface parts, which is put into correspondence the analyzed image appropriate clones and its preimage. The surface is determined by the graph of the interpolation spline, approaching the function of the image, and the elements of the image are regarded as the interpolation nodes. It is proved that as the main quantitative characteristics of such comparability is advisable to use the volume of a cylindrical body with generator parallel to the axis OZ, bounded from above corresponding part of the interpolation function graph, bounded below - plane XOY. [ABSTRACT FROM AUTHOR]
- Published
- 2015
11. INVESTIGATION OF POSITION ESTIMATION ACCURACY OF CELESTIAL OBJECTS ON THE CCD FRAMES.
- Author
-
Bezkrovniy, Mihail, Savanevych, Vadim, Sokovikova, Nataliia, Movsesian, Iana, Pogorelov, Artem, Dashkova, Anna, Dikhtyar, Mykola, Bryukhovetskiy, Alexandr, and Mykhailova, Liubov
- Abstract
High position estimation accuracy of objects is needed for better detection of celestial objects with nonzero apparent motion, and further clarification of the motion parameters of objects by a small number of measurements. However, the studies of the accuracy of currently used methods for position estimation of objects at the moment have not been carried out. The estimation accuracy of equatorial coordinates of thirty most productive observatories in the world was investigated in the paper. The analysis was conducted by comparing the estimates with their predicted values, obtained on the Minor Planet Center website. Mean values of residuals by right ascension and declination, estimates of the standard deviations of the position estimates of objects, the average module of the measurement residual were calculated for each observatory. The study has shown a significant advantage of observatories, which use CoLiTec software for processing the observation results. According to the average module of residuals and standard deviation in pixels, CoLiTec observatories-partners have taken a leading position among the small aperture telescopes. High measurement accuracy indexes were obtained using sub-pixel Gaussian model. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
12. THE SYSTEM TO ANALYZE OF STABILITY OF ROBUST STEGANOGRAPHIC ALGORITHMS.
- Author
-
Andrushchenko, Dmytro
- Abstract
When building steganographic system for copyright protection, two requirements are presented to the algorithms. First of all, robustness requirement is presented: the resistance level of the data embedded into image to intentional or unintentional container distortion. Second, the requirement of minimal visible container changes when embedding data into an image. These requirements contradict one another; this is due to the fact that the smaller is value of distortion included into image while information imbedding, the less built-in data capability will be. Almost all the algorithms proposed allow to vary resistance parameters and the amount of included changes by changing a so-called embedding force coefficient P. Besides this, the data capability depends on format, size, and image palette, as well as on types and degree of distortion (attacks), to which the image may be exposed. Therefore, a compromise is needed between these two parameters for constructing a reliable and effective steganographic system. This paper describes the software solution developed for a practical evaluation of the stability of steganographic methods for hiding information in digital images. The results received allow us, when creating the system of steganographic data embedding into digital images, to reasonably choose the most appropriate methods and parameters of algorithms that provide the needed capability level to certain container distortions simultaneously with possible "invisibility" of embedded messages. Implementation of the most appropriate methods and parameters of algorithm obtained with the help of system developed into information security area will improve the existing steganographic systems efficiency [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
13. Reconstruction of functions and digital images using sign representations
- Author
-
Vladislav Myasnikov
- Subjects
pairwise comparisons ,sign representation ,utility function ,preference function ,preferences elicitation ,decision making ,machine learning ,digital image ,Information theory ,Q350-390 ,Optics. Light ,QC350-467 - Abstract
The paper deals with the reconstruction of implicitly defined functions or digital images. Functions are defined using observations, each of which is the result of a pairwise comparison of the function values for two random arguments. The analysis of the current state of research for particular statements of this problem is presented: the method of pairwise comparisons used in decision-making for a finite set of alternatives; reconstruction of preference/utility function in multicriteria tasks; sign representations of images used for the description and analysis of digital images. A unified approach to reconstructing functions and images according to their sign representations is proposed, based on mapping in a high-dimensional space and constructing a linear (when reconstructing a function and images) or non-linear (including non-parametric) classifier (when reconstructing preferences). For a number of classification algorithms, experimental studies have been conducted to evaluate the effectiveness of the proposed approach using the example of the reconstruction of the utility function in problems of decision theory and reconstruction of the brightness function of real images.
- Published
- 2019
- Full Text
- View/download PDF
14. Efficiency of object identification for binary images
- Author
-
Radik Magdeev and Alexander Tashlinskii
- Subjects
digital image ,object recognition ,pattern recognition ,correlation-extreme algorithm ,stochastic gradient identification ,incorrect identification probability ,Information theory ,Q350-390 ,Optics. Light ,QC350-467 - Abstract
In this paper, a comparative analysis of the correlation-extreme method, the method of contour analysis and the method of stochastic gradient identification in the objects identification for a binary image is carried out. The results are obtained for a situation where possible deformations of an identified object with respect to a pattern can be reduced to a similarity model, that is, the pattern and the object may differ in scale, orientation angle, shift along the base axes, and additive noise. The identification of an object is understood as the recognition of its image with an estimate of the strain parameters relative to the template.
- Published
- 2019
- Full Text
- View/download PDF
15. Steganoanalytical Method Based on the Analysis of Singular Values of Digital Image Matrix Blocks
- Author
-
Kobozeva A.A., Bobok I.I., and Batiene L.Е.
- Subjects
steganalysis ,digital image ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 ,Production of electric energy or power. Powerplants. Central stations ,TK1001-1841 ,Renewable energy sources ,TJ807-830 - Abstract
The rapid development of digital steganography over the past decade involving numerous scien-tific publications in the open press, devoted to the new steganomethods and algorithms, have led to the possibility of wide use of the results obtained. At the same time, the organization of a ste-ganographic channel can lead to various kinds and degrees of negative consequences both for individuals and for society as a whole. Because of this, the need and relevance of providing ef-fective digital image steganalysis is currently increasing. One of the most widely used ste-ganographic methods today is the LSB-method. The specific area of its application is in the or-ganization of a hidden low bandwidth communication channel. Under these conditions, the ex-isting steganalitic methods turn out to be ineffective. The aim of this paper is to increase the ef-ficiency of image steganalysis in the conditions of low bandwidth of a covert channel organized by the LSB-method. Achieving this aim is carried out by developing a new method based on the analysis of the normalized separation of the maximum singular numbers of the image matrix blocks. The algorithmic implementation of the developed method is superior in efficiency when compared to the existing modern analogues, in terms of the covert channel for bandwidth values of less than 0.1 bpp. An important information component of the results of the proposed meth-od is its ability to determine the cover-image quality factor of the primary lossy compression.
- Published
- 2018
- Full Text
- View/download PDF
16. Improved Method of Detection Falsification Results the Digital Image in Conditions of Attacks
- Author
-
Kobozeva A.A. and Grigorenko S.N.
- Subjects
digital image ,cloning ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 ,Production of electric energy or power. Powerplants. Central stations ,TK1001-1841 ,Renewable energy sources ,TJ807-830 - Abstract
The modern level of information technologies development has led to unheard ease embodiments hitherto unauthorized modifications of digital content. At the moment, very important question is the effective expert examination of authenticity of digital images, video, audio, development of the methods for identification and localization of violations of their integrity using these contents for purposes other than entertainment. Present paper deals with the improvement of the detection method of the cloning results in digital images - one of the most frequently used in the software tools falsification realized in all modern graphics editors. The method is intended for clone detection areas and pre-image in terms of additional disturbing influences in the image after the cloning operation for "masking" of the results, which complicates the search process. The improvement is aimed at reducing the number of "false alarms", when the area of the clone / pre-image detected in the original image or the localization of the identified areas do not correspond to the real clone and pre-image. The proposed improvement, based on analysis of different sizes per-pixel image blocks with the least difference from each other, has made it possible efficient functioning of the method, regardless of the specificity of the analyzed digital image.
- Published
- 2016
17. Image processing method based on aerospace monitoring
- Author
-
A. I. Mitsiukhin and I. I. Pikirenya
- Subjects
algorithm ,TK7800-8360 ,Remote sensing application ,business.industry ,Computer science ,redundancy ,Grid ,Discrete Hartley transform ,spectrum ,Digital image ,Transmission (telecommunications) ,efficiency ,Digital image processing ,Redundancy (engineering) ,code length ,Computer vision ,Artificial intelligence ,image ,ecology ,conversion ,Electronics ,business ,entropy ,Decoding methods - Abstract
The paper considers a digital image processing method that provides efficient transmission, redistribution and storage of aerospace environmental monitoring videographic information. The requirement to increase the monitoring efficiency, if necessary, to carry out regular monitoring of changes in the image field of the observed object is especially relevant when describing spatially aligned sets of images obtained after multi-zone, multi-time and multi-polarization shooting. In many remote sensing applications, the processing efficiency reflects the degree of reduction in the volume of transmitted, described, analyzed and stored videographic information. The computational processing of digital images based on the coordinate survey scheme is presented. The method can be used to perform the procedure for decoding images in order to solve the problem of classifying objects of interest, analyzing images. Such characteristics of binary objects as a spatial boundary and a contour were used as deciphering signs. These features make it possible to describe the shape of an object, its geometric parameters and search for images with specific spatial structures. The processing method is realized by executing efficient algorithms for coding an image on a discrete grid by means of a chain code and spectral coding based on the fast discrete Hartley transform. The result of processing comes down to minimizing the number of such basic computational operations as multiplication, addition, transferring, as well as reducing the time and capacitive complexity of the program, and reducing the redundancy of the initial data. An example of an effective representation and description of a segmented image of an object is given. The proposed method makes it possible to expand the technical capabilities of more efficient transmission and processing of images for solving problems in the field of remote sensing.
- Published
- 2021
18. Complex method of detecting and localization of cloning areas in digital images
- Author
-
Viktoriya V. Zorilo and Yelena Yu. Lebedeva
- Subjects
image falsification ,cloning ,digital image ,General Works - Abstract
Developing methods aiming at identification of digital images integrity violation is an important problem of complex system of information security. Cloning method, realized in the most of graphic editors, is often used to compromise the integrity of the image related to unauthorized changes. Therefore, the task of cloning identification is a relevant one. In addition to the cloning identification it is also important to clarify the contours of the cloned area. In this paper we propose a polynomial comprehensive method to identify areas of cloning as a falsification of the digital image. It allows to locate the cloned areas with a higher precision compared to modern analogues. Complex method is based on two modern clone detection techniques, using a common approach to the analysis of the state and technology of the information system functioning. It includes two stages: “fast rough” cloning area identification and a “slow” identification of the contour of the cloning area using a limited image subarea containing a clone. The method proposed can be adapted for the digital video.
- Published
- 2015
- Full Text
- View/download PDF
19. Discrete Fourier transform as a basis for steganographic method
- Author
-
Maria O. Kozina
- Subjects
steganography method ,digital image ,discrete Fourier transformation ,reliability perception the stegano message ,General Works - Abstract
Actuality of developing of new steganographic methods doesn’t cause doubts due to the rapid development of information technologies and considerable minuses of existing steganomethods. It is presented a steganographic method based on the embedding of confidential information to the frequency domain container (digital image in grayscale) in this paper. The transition from the spatial to the frequency domain and vice versa takes place by using a discrete Fourier transform. Matrix of frequency coefficients is constructed to the blocks 2x2 for the original matrix of digital image. By choosing the block of such size it increases not only the carrying capacity compared with the standard partition, but also it leads to non complexity frequency coefficients. Proposed steganographic method allows establishing of authenticity of the image. Further the theoretical results can be used as a basis for the development of a new stable steganographic algorithm.
- Published
- 2014
- Full Text
- View/download PDF
20. A basis of common approach to the development of universal steganalysis methods for digital images
- Author
-
Alla А. Kobozeva
- Subjects
digital image ,matrix ,singular value ,singular vector ,n-optimal vector ,normal singular decomposition ,image integrity ,steganalysis method ,General Works - Abstract
In this paper a new common approach to the organization of steganalysis in digital images is developed. New features of formal parameters defining the image are identified, theoretically grounded and practically tested. For the first time characteristics of mutual disposition of the left and right singular vectors corresponding to the largest singular value of the matrix (block of matrix) of an image and the vector composed of the singular values obtained as a result of normal singular decomposition of the matrix (block matrix) are obtained. It is shown that for the majority of the blocks of the original image (regardless of the storage format — lossy, lossless) the angle between the left (right) singular vector and the vector composed of singular numbers is determined by the angle between the n-optimal vector and the standard space basis of the corresponding dimension. It is shown that the discovered feature is violated for the mentioned formal parameters in the disturbed image. This is an indicator of integrity violation, particularly steganotransformation, and it can be used to develop new universal steganalysis methods and algorithms. Their efficiency does not depend on the specifics of steganoalgorithm used for insertion of additional information.
- Published
- 2014
- Full Text
- View/download PDF
21. MULTISCALE DIFFERENTIAL METHOD FOR DIGITAL IMAGE SHARPENING
- Author
-
Vitaly V. Bezzubik, Nickolai R. Belashenkov, Gleb V. Vdovin, Nikolai S. Karmanovsky, and Oleg A. Soloviev
- Subjects
digital image ,image contrast ,sharpness ,blur kernel ,deconvolution ,Optics. Light ,QC350-467 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
We have proposed and tested a novel method for digital image sharpening. The method is based on multi-scale image analysis, calculation of differential responses of image brightness in different spatial scales, and the subsequent calculation of a restoration function, which sharpens the image by simple subtraction of its brightness values from those of the original image. The method features spatial transposition of the restoration function elements, its normalization, and taking into account the sign of the brightness differential response gradient close to the object edges. The calculation algorithm for the proposed method makes use of integer arithmetic that significantly reduces the computation time. The paper shows that for the images containing small amount of the blur due to the residual aberrations of an imaging system, only the first two scales are needed for the calculation of the restoration function. Similar to the blind deconvolution, the method requires no a priori information about the nature and magnitude of the blur kernel, but it is computationally inexpensive and is much easier in practical implementation. The most promising applications of the method are machine vision and surveillance systems based on real-time intelligent pattern recognition and decision making.
- Published
- 2014
22. Factors Infl uencing the Formation of a Favourable Digital Image of Municipal Employees in Today’s Internet Spacer
- Author
-
Nikitina, A. S.
- Subjects
ЦИФРОВОЙ ИМИДЖ ,МУНИЦИПАЛЬНЫЕ СЛУЖАЩИЕ ,DIGITALIZATION ,MUNICIPAL EMPLOYEES ,MUNICIPAL GOVERNMENT ,ИНТЕРНЕТ-ПРОСТРАНСТВО ,INTERNET SPACE ,DIGITAL IMAGE ,МУНИЦИПАЛЬНОЕ УПРАВЛЕНИЕ ,ЦИФРОВИЗАЦИЯ - Abstract
Received: 11.09.2020. Accepted: 28.09.2020. Рукопись поступила в редакцию: 11.09.2020. Принята к публикации: 28.09.2020. Nowadays, the digital transformation of the system of state and municipal government is gaining importance and relevance. Under these conditions, the image of a new, “digital official” is being formed, and appears on the Internet increasingly. Research interest in the problems of building a positive digital image of municipal employees in the modern Internet space is growing more and more. The article describes the results of a sociological survey of residents of the city of Yekaterinburg. The research methods included a questionnaire as well as an expert interview. The study revealed the factors influencing the build-up of a favourable image of municipal employees in the modern Internet space. The leaders were the “live” presence of the municipal employees themselves on the media Internet space, information openness, confidential communication between Internet users and municipal employees, open interaction, and active virtual participation of officials in the life of the city, as well as in solving the problems of citizens (including on social networks). It is also important to publish enticing, attractive content about the specific results of the professional activities of municipal employees. The paper formulates the problems arising in the formation of a favourable digital image of municipal employees in the modern Internet space and analyzes ways to solve them. They are: lack of information in the legal field, lack of a unified local government policy in this area, misunderstanding and fear on the part of employees. These challenges reduce the possibilities of the Internet as a tool for shaping the image not only of employees but also of the authority they represent. Skilful use of the Internet can create an atmosphere of respect and trust on the part of residents of the city of Yekaterinburg to the City Administration and municipal service, bring the level of dialogue between citizens and employees to a new level. В настоящее время цифровая трансформация системы государственного и муниципального управления приобретает большую значимость и актуальность. В этих условиях формируется образ нового, «цифрового», чиновника, который всё чаще появляется на просторах сети Интернет. Всё больше возрастает научно-исследовательский интерес к проблемам формирования позитивного цифрового имиджа муниципальных служащих в современном интернет-пространстве. В статье на основе проведенного методом анкетирования социологического опроса жителей города Екатеринбурга, а также экспертного интервью были выявлены факторы, влияющие на формирование позитивного имиджа муниципальных служащих в современном интернет-пространстве. Ведущими оказались: «живое» присутствие самих муниципальных служащих в медийном интернет-пространстве, информационная открытость, доверительная коммуникация между интернет-пользователями и муниципальными служащими, открытое взаимодействие и активное виртуальное со-участие чиновников в жизни города, а также в решении проблем горожан (в том числе в социальных сетях). Вдобавок стоит отметить важность публикации интересного, привлекательного контента о конкретных результатах профессиональной деятельности муниципальных служащих. Анализируются проблемы, возникающие в процессе формирования позитивного цифрового имиджа муниципальных служащих в современном интернет-пространстве: недостаточность информации в правовом поле, отсутствие единой политики органа местного самоуправления в данной сфере, непонимание и страх со стороны служащих. Все эти проблемы снижают возможности Интернета как инструмента формирования имиджа не только служащих, но и органа власти, который они представляют. Умелое использование Интернета может сформировать атмосферу уважения и доверия со стороны жителей города Екатеринбурга к Администрации города и муниципальной службе, вывести диалог между гражданами и служащими на новый уровень.
- Published
- 2020
23. О вычислении функционалов Минковского четырехмерных цифровых изображений
- Author
-
Богоявленская, O.А.
- Subjects
функционалы Минковского ,computing geometry ,Digital image ,Computer science ,Computer graphics (images) ,морфология пористых сред ,Minkowskii functionals ,morphology of porous media ,вычислительная геометрия - Abstract
Функционалы Минковского являются важным инструментом для изучения морфологии пористых сред. Настоящая работа посвящена построению алгоритма вычисления функционалов Минковского четырехмерных цифровых изображений, возникающих, в частности, при описании динамики изменения порового пространства среды. В работе впервые программно реализован алгоритм вычисления функционалов Минковского четырехмерных цифровых изображений., The Minkowskii functionals are important for studying the morphology of porous media. This paper is devoted to constructing an algorithm for computing the Minkowskii functionals for four-dimensional digital images used to describe the dynamics of porous media. This algorithm is implemented as a software package., ВЫЧИСЛИТЕЛЬНЫЕ МЕТОДЫ И ПРОГРАММИРОВАНИЕ: НОВЫЕ ВЫЧИСЛИТЕЛЬНЫЕ ТЕХНОЛОГИИ, Выпуск 2 2020
- Published
- 2020
- Full Text
- View/download PDF
24. Steganoanalytical Method Based on the Analysis of Singular Values of Digital Image Matrix Blocks
- Author
-
Kobozeva, A.A., Bobok, I.I., and Batiene, L.Е.
- Subjects
low bandwidth ,least significant bit ,covert channel ,lcsh:TJ807-830 ,lcsh:Renewable energy sources ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Data_CODINGANDINFORMATIONTHEORY ,lcsh:Production of electric energy or power. Powerplants. Central stations ,stego-message ,digital image ,lcsh:TK1001-1841 ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,steganalysis ,cover ,lcsh:TK1-9971 - Abstract
The rapid development of digital steganography over the past decade involving numerous scien-tific publications in the open press, devoted to the new steganomethods and algorithms, have led to the possibility of wide use of the results obtained. At the same time, the organization of a ste-ganographic channel can lead to various kinds and degrees of negative consequences both for individuals and for society as a whole. Because of this, the need and relevance of providing ef-fective digital image steganalysis is currently increasing. One of the most widely used ste-ganographic methods today is the LSB-method. The specific area of its application is in the or-ganization of a hidden low bandwidth communication channel. Under these conditions, the ex-isting steganalitic methods turn out to be ineffective. The aim of this paper is to increase the ef-ficiency of image steganalysis in the conditions of low bandwidth of a covert channel organized by the LSB-method. Achieving this aim is carried out by developing a new method based on the analysis of the normalized separation of the maximum singular numbers of the image matrix blocks. The algorithmic implementation of the developed method is superior in efficiency when compared to the existing modern analogues, in terms of the covert channel for bandwidth values of less than 0.1 bpp. An important information component of the results of the proposed meth-od is its ability to determine the cover-image quality factor of the primary lossy compression.
- Published
- 2018
- Full Text
- View/download PDF
25. Интеллектуальная программная поддержка в задачах анализа случайных цифровых изображений
- Subjects
Numerical Analysis ,Computer Networks and Communications ,business.industry ,Applied Mathematics ,Computational Mathematics ,Digital image ,software analytical analysis ,Computational Theory and Mathematics ,вероятность безошибочного считывания ,random image ,программные аналитические выкладки ,Computer vision ,случайное изображение ,Artificial intelligence ,probability of error-free reading ,business ,Software ,Mathematics - Abstract
Описаны специализированные методы, разработанные авторами для решения задач обработки случайных точечных изображений, в основе которых лежат построение программных систем для проведения трудоемких аналитических выкладок и использование различных расширений классических чисел Каталана. Приведены примеры эффективного применения предложенных методов для расчета точных аналитических формул, описывающих вероятность безошибочного считывания случайных дискретных полей и цифровых изображений, проводимого сканирующей апертурой с ограниченным числом пороговых уровней., During the digital registration and subsequent processing of fast dynamic processes which have different physical nature, determination for the unknown coordinates of the point-pulse sources becomes one of the most time-consuming and algorithmically complex problems. It happens since it is necessary to satisfy the requirements for accuracy and reliability of registration in such tasks. Finding the exact analytical relationships connecting reliability of the registration with the characteristics of the physical process and the output parameters of the processing system is a problematic and very difficult task in most practically important cases, for example in the case of power of random radiation source and the size of the analyzed field. This paper proposes the methods developed by the authors for calculating the exact analytical formulas and relationships that describe the probability of error-free readout of a random point-pulse field when registration procedure is performed by a scanning aperture with a limited number of threshold levels. The specialized methods, based on the construction of software systems for laborious analytical calculations and the use of various extensions of the classical Catalan numbers are offered. In particular, procedures have been built for multidimensional integration over convex polyhedral areas with freely movable boundaries in n-dimensional space. Two probabilistic problems are also formulated, leading to an extension of the classical Catalan numbers, which turned out to be more convenient to formulate and solve in a symbolic-linguistic form., №5(23) (2018)
- Published
- 2018
- Full Text
- View/download PDF
26. Hyperspectral remote sensing data compression and protection
- Author
-
Mikhael Valeryevich Gashnikov, Vitaly Mitekin, Nikolay Ivanovich Glumov, V. V. Sergeyev, Andrey Kuznetsov, and Vladislav Myasnikov
- Subjects
Image formation ,business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Hyperspectral imaging ,020206 networking & telecommunications ,Image processing ,02 engineering and technology ,digital image processing, image analysis, hyperspectral images, data compression, hierarchical grid interpolation method, digital watermarks ,Atomic and Molecular Physics, and Optics ,Computer Science Applications ,Digital image ,Digital image processing ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Computer vision ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,Digital watermarking ,Feature detection (computer vision) ,Data compression ,Remote sensing - Abstract
In this paper, we consider methods for hyperspectral image processing, required in systems of image formation, storage, and transmission and aimed at solving problems of data compression and protection. A modification of the digital image compression method based on a hierarchical grid interpolation is proposed. Methods of active (on the basis of digital watermarking) and passive (on the basis of artificial image distortion detection) data protection against unauthorized dissemination are developed and investigated.
- Published
- 2016
27. The system to analyze of stability of robust steganographic algorithms
- Subjects
УДК 004.056 ,стеганография ,сокрытие информации ,цифровое изображение ,защита авторского права ,анализ стойкости ,steganography ,concealment of information ,digital image ,copyright protection ,analyze of robustness ,стеганографія ,приховування інформації ,цифрове зображення ,захист авторського права ,аналіз стійкості - Abstract
Приводится описание разработанного программного комплекса для практической оценки устойчивости стеганографических методов сокрытия информации в цифровых изображениях. Программа может использоваться для выбора наиболее эффективного стеганографического алгоритма, если известны характеристики изображений такие как формат, размер, палитра и др., а также атаки, которым может быть подвергнут контейнер со встроенной информацией., Наводиться опис розробленого програмного комплексу для практичної оцінки стійкості стеганографічних методів приховування інформації в цифрових зображеннях. Програма може використовуватися для вибору найбільш ефективного стеганографічного алгоритму, якщо відомі характеристики зображень такі як формат, розмір, палітра та ін., а також атаки, яким може бути підданий контейнер з вкрапленою інформацією., When building steganographic system for copyright protection, two requirements are presented to the algorithms. First of all, robustness requirement is presented: the resistance level of the data embedded into image to intentional or unintentional container distortion. Second, the requirement of minimal visible container changes when embedding data into an image. These requirements contradict one another; this is due to the fact that the smaller is value of distortion included into image while information imbedding, the less built-in data capability will be. Almost all the algorithms proposed allow to vary resistance parameters and the amount of included changes by changing a so-called embedding force coefficient P. Besides this, the data capability depends on format, size, and image palette, as well as on types and degree of distortion (attacks), to which the image may be exposed. Therefore, a compromise is needed between these two parameters for constructing a reliable and effective steganographic system.This paper describes the software solution developed for a practical evaluation of the stability of steganographic methods for hiding information in digital images.The results received allow us, when creating the system of steganographic data embedding into digital images, to reasonably choose the most appropriate methods and parameters of algorithms that provide the needed capability level to certain container distortions simultaneously with possible "invisibility" of embedded messages. Implementation of the most appropriate methods and parameters of algorithm obtained with the help of system developed into information security area will improve the existing steganographic systems efficiency.
- Published
- 2013
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.