16 results
Search Results
2. МОДИФІКАЦІЇ АЛГОРИТМУ ВИЯВЛЕННЯ РУХУ КАМЕРИ
- Author
-
Кордюк, В. В. and Лебедєва, О. Ю.
- Subjects
- *
OPTICAL flow , *CAMERA movement , *VIDEO surveillance , *MOTION capture (Human mechanics) , *DIGITAL cameras , *VIRTUAL reality , *TRACK & field - Abstract
Video analysis is a very important tool in video surveillance systems with one or more cameras. Among the most promising features are tracking the movement of objects - tracking. The current state of development in the field of tracking is considered in the work. There are several types of trekking. Pixel Tracking is the tracking of the movement of a specific point (pixel) or group of points on the original video sequence. The result of this process is the trajectory of the pixel, corresponding to the movement of an object in the frame. Matchmoving is a complex process that allows you to create a three-dimensional scene with a digital camera based on the available video sequence, which exactly repeats the movement of a real camera. Motion Capture is a technology designed to determine the position and orientation of a real object in a virtual environment, determining the position and orientation of a real object in space is carried out using special sensors and markers. Each of these types of tracking can be used on its own or as part of more complex processes. The paper develops a modification of the camera motion detection algorithm, which works in the field of Pixel Tracking. The description of the main approaches to motion estimation is given, namely recursive raster algorithms, frequency domain algorithms, optical flow algorithms and block matching methods. The urgency of the work, its purpose and objectives are given. The paper describes a method of arranging blocks in a video sequence frame, which are used to calculate the movement of the camera. Similarity metrics are used to estimate the similarity of the blocks, namely the correlation coefficient. The paper describes the steps of the developed modification of the camera motion detection algorithm. The results of the modification of the camera motion detection algorithm are presented. The result of this work is an indicator of the visual quality of tracking in the form of a 2D image of the camera motion vector. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
3. МОДИФІКАЦІЯ МЕТОДУ ХЕШ-СТЕГАНОГРАФІЇ, ЗАСНОВАНОГО НА ПЕРЕДАЧІ ПОСЛІДОВНОСТІ ЦИФРОВИХ ЗОБРАЖЕНЬ
- Author
-
Зоріло, В. В., Лебедєва, О. Ю., and Бохонько, М. В.
- Subjects
IMAGE analysis ,TEXT messages ,DIGITAL images ,CRYPTOGRAPHY ,ALGORITHMS ,HASHING - Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
4. УСОВЕРШЕНСТВОВАНИЕ СТЕГАНОГРАФИЧЕСКОГО АЛГОРИТМА, ОСНОВАННОГО НА SIGN-НЕЧУВСТВИТЕЛЬНОСТИ СИНГУЛЯРНЫХ ВЕКТОРОВ БЛОКОВ МАТРИЦЫ ИЗОБРАЖЕНИЯ
- Author
-
Кобозева, А. А., Мокрицкий, В. А., Батиене, Л. Е. М., and Бобок, И. И.
- Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2017
5. Complex method of detection and localization of cloning areas in digital images.
- Author
-
Zorilo, V. V. and Lebedeva, Ye. Yu.
- Abstract
Developing methods aiming at identification of digital images integrity violation is an important problem of complex system of information security. Cloning method, realized in the most of graphic editors, is often used to compromise the integrity of the image related to unauthorized changes. Therefore, the task of cloning identification is a relevant one. In addition to the cloning identification it is also important to clarify the contours of the cloned area. In this paper we propose a polynomial comprehensive method to identify areas of cloning as a falsification of the digital image. It allows to locate the cloned areas with a higher precision compared to modern analogues. Complex method is based on two modern clone detection techniques, using a common approach to the analysis of the state and technology of the information system functioning. It includes two stages: "fast rough" cloning area identification and a "slow" identification of the contour of the cloning area using a limited image subarea containing a clone. The method proposed can be adapted for the digital video. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
6. Color triangle color separation system for colorimetric research in microscopy
- Author
-
Vera L. Zhbanova
- Subjects
color ,chromaticity ,color triangle ,physiological rgb ,digital image ,microscopy ,Optics. Light ,QC350-467 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The paper presents studies of the color separation system based on the developed color triangle for conducting scientific research in microscopy which will allow identifying genetic or chemical deviations of the samples under study by an accurate change in color. The color triangle covers the entire visible range and is focused on the physiological RGB and XYZ colorimetric systems. Based on the method of converting color spaces, the addition curves of the developed systems were found. Based on the curves, sets of color separating light filters were selected to fit the shapes of these curves based on the selected monochrome camera. Three sets are presented. An analytical study of these sets was carried out and one optimal set was selected. An analytical study of this system is presented in the form of mathematical modeling with 14 control colors from the Munsell atlas. The selected set of the system was experimentally studied on the developed optoelectronic setup placed in a black box to exclude light and color flare. One important part of the setup is the reflective screen: the location follows the lighting/observation recommendations of the International Commission on Illumination for colorimetric measurement of samples. For an objective analysis of measurements, reference test objects were selected — standardized colored optical glasses. The study was based on the evaluation of glass groups: yellow, yellow-green, green, blue-green, since the work has expanded the color space in the direction of the selected colors to obtain color accuracy. Previously, the author, in an analytical study of modern color separation systems, obtained results where the best value was found with a wide color triangle of 0.009, the worst 0.04 — with a small one. Thus, it has been proven: the larger the coverage of the color triangle, the smaller the change in color. The obtained values of the developed KZS system are better than modern ones –0.0088 on average. During the mathematical modeling of the experiment, the change in color was obtained 0.016 on average, the practical result — 0.027 on average. The obtained parameters and characteristics will be taken into account when introducing the developed color separation system into a monochrome digital microscope to improve color rendering in microscopy.
- Published
- 2023
- Full Text
- View/download PDF
7. The Sufficient Condition for Ensuring the Reliability of Perception of the Steganographic Message in the Walsh-Hadamard Transform Domain
- Author
-
Kobozeva A.A. and Sokolov A.V.
- Subjects
steganographic communication channel ,steganographic message perception reliability ,digital image ,walsh-hadamard transform ,sequence ,discrete cosine transform ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 ,Production of electric energy or power. Powerplants. Central stations ,TK1001-1841 ,Renewable energy sources ,TJ807-830 - Abstract
In view of the high compatibility of the Walsh-Hadamard transform to the architecture of mod-ern computing facilities, it is sensible to use it in methods of steganography and steganalysis. Now, there are some efficient steganographic methods that use the Walsh-Hadamard transform domain for information embedding presented in the literature. It is known that to ensure the reli-ability of the steganographic message perception, information should be embedded in its high-frequency components; nevertheless, the issues of the correspondence of the Walsh-Hadamard transformants to the frequency components of the original matrix of the cover image are poorly researched. The purpose of this paper is to develop a formal sufficient condition for ensuring the reliability of perception of steganographic messages in the Walsh-Hadamard transform do-main. This purpose was achieved by establishing the relationship between the Walsh-Hadamard transformants and the discrete cosine transform transformants, which was theoretically substan-tiated in two ways, and experimentally confirmed. Based on the established relationship between the Walsh-Hadamard transform and the discrete cosine transform, as well as the components of the singular value decomposition of the corresponding matrices, a sufficient condition has been developed to ensure the reliability of the perception of steganographic messages in the Walsh-Hadamard transform domain. The sufficient condition consists in the fact that after embedding of additional information using any steganographic method, those Walsh-Hadamard trans-formants that correspond to the singular triples of the matrix corresponding to small (smallest) in value singular numbers, should change.
- Published
- 2022
- Full Text
- View/download PDF
8. ОСНОВЫ НОВОГО ПОДХОДА К ВЫЯВЛЕНИЮ РЕЗУЛЬТАТОВ КЛОНИРОВАНИЯ В ЦИФРОВОМ ИЗОБРАЖЕНИИ В УСЛОВИЯХ ВОЗМУЩАЮЩИХ ВОЗДЕЙСТВИЙ.
- Author
-
Кобозева, А. А. and Григоренко, С. Н.
- Abstract
In this paper it is proposed basics of a new approach to identify cloning results, conducted in digital images, in additional disturbing influences conditions in a digital image after cloning, that may be considered as lossy compression, add noise, blur, etc. The approach is based on identifying the comparability of the surface parts, which is put into correspondence the analyzed image appropriate clones and its preimage. The surface is determined by the graph of the interpolation spline, approaching the function of the image, and the elements of the image are regarded as the interpolation nodes. It is proved that as the main quantitative characteristics of such comparability is advisable to use the volume of a cylindrical body with generator parallel to the axis OZ, bounded from above corresponding part of the interpolation function graph, bounded below - plane XOY. [ABSTRACT FROM AUTHOR]
- Published
- 2015
9. Reconstruction of functions and digital images using sign representations
- Author
-
Vladislav Myasnikov
- Subjects
pairwise comparisons ,sign representation ,utility function ,preference function ,preferences elicitation ,decision making ,machine learning ,digital image ,Information theory ,Q350-390 ,Optics. Light ,QC350-467 - Abstract
The paper deals with the reconstruction of implicitly defined functions or digital images. Functions are defined using observations, each of which is the result of a pairwise comparison of the function values for two random arguments. The analysis of the current state of research for particular statements of this problem is presented: the method of pairwise comparisons used in decision-making for a finite set of alternatives; reconstruction of preference/utility function in multicriteria tasks; sign representations of images used for the description and analysis of digital images. A unified approach to reconstructing functions and images according to their sign representations is proposed, based on mapping in a high-dimensional space and constructing a linear (when reconstructing a function and images) or non-linear (including non-parametric) classifier (when reconstructing preferences). For a number of classification algorithms, experimental studies have been conducted to evaluate the effectiveness of the proposed approach using the example of the reconstruction of the utility function in problems of decision theory and reconstruction of the brightness function of real images.
- Published
- 2019
- Full Text
- View/download PDF
10. Efficiency of object identification for binary images
- Author
-
Radik Magdeev and Alexander Tashlinskii
- Subjects
digital image ,object recognition ,pattern recognition ,correlation-extreme algorithm ,stochastic gradient identification ,incorrect identification probability ,Information theory ,Q350-390 ,Optics. Light ,QC350-467 - Abstract
In this paper, a comparative analysis of the correlation-extreme method, the method of contour analysis and the method of stochastic gradient identification in the objects identification for a binary image is carried out. The results are obtained for a situation where possible deformations of an identified object with respect to a pattern can be reduced to a similarity model, that is, the pattern and the object may differ in scale, orientation angle, shift along the base axes, and additive noise. The identification of an object is understood as the recognition of its image with an estimate of the strain parameters relative to the template.
- Published
- 2019
- Full Text
- View/download PDF
11. Steganoanalytical Method Based on the Analysis of Singular Values of Digital Image Matrix Blocks
- Author
-
Kobozeva A.A., Bobok I.I., and Batiene L.Е.
- Subjects
steganalysis ,digital image ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 ,Production of electric energy or power. Powerplants. Central stations ,TK1001-1841 ,Renewable energy sources ,TJ807-830 - Abstract
The rapid development of digital steganography over the past decade involving numerous scien-tific publications in the open press, devoted to the new steganomethods and algorithms, have led to the possibility of wide use of the results obtained. At the same time, the organization of a ste-ganographic channel can lead to various kinds and degrees of negative consequences both for individuals and for society as a whole. Because of this, the need and relevance of providing ef-fective digital image steganalysis is currently increasing. One of the most widely used ste-ganographic methods today is the LSB-method. The specific area of its application is in the or-ganization of a hidden low bandwidth communication channel. Under these conditions, the ex-isting steganalitic methods turn out to be ineffective. The aim of this paper is to increase the ef-ficiency of image steganalysis in the conditions of low bandwidth of a covert channel organized by the LSB-method. Achieving this aim is carried out by developing a new method based on the analysis of the normalized separation of the maximum singular numbers of the image matrix blocks. The algorithmic implementation of the developed method is superior in efficiency when compared to the existing modern analogues, in terms of the covert channel for bandwidth values of less than 0.1 bpp. An important information component of the results of the proposed meth-od is its ability to determine the cover-image quality factor of the primary lossy compression.
- Published
- 2018
- Full Text
- View/download PDF
12. Improved Method of Detection Falsification Results the Digital Image in Conditions of Attacks
- Author
-
Kobozeva A.A. and Grigorenko S.N.
- Subjects
digital image ,cloning ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 ,Production of electric energy or power. Powerplants. Central stations ,TK1001-1841 ,Renewable energy sources ,TJ807-830 - Abstract
The modern level of information technologies development has led to unheard ease embodiments hitherto unauthorized modifications of digital content. At the moment, very important question is the effective expert examination of authenticity of digital images, video, audio, development of the methods for identification and localization of violations of their integrity using these contents for purposes other than entertainment. Present paper deals with the improvement of the detection method of the cloning results in digital images - one of the most frequently used in the software tools falsification realized in all modern graphics editors. The method is intended for clone detection areas and pre-image in terms of additional disturbing influences in the image after the cloning operation for "masking" of the results, which complicates the search process. The improvement is aimed at reducing the number of "false alarms", when the area of the clone / pre-image detected in the original image or the localization of the identified areas do not correspond to the real clone and pre-image. The proposed improvement, based on analysis of different sizes per-pixel image blocks with the least difference from each other, has made it possible efficient functioning of the method, regardless of the specificity of the analyzed digital image.
- Published
- 2016
13. Complex method of detecting and localization of cloning areas in digital images
- Author
-
Viktoriya V. Zorilo and Yelena Yu. Lebedeva
- Subjects
image falsification ,cloning ,digital image ,General Works - Abstract
Developing methods aiming at identification of digital images integrity violation is an important problem of complex system of information security. Cloning method, realized in the most of graphic editors, is often used to compromise the integrity of the image related to unauthorized changes. Therefore, the task of cloning identification is a relevant one. In addition to the cloning identification it is also important to clarify the contours of the cloned area. In this paper we propose a polynomial comprehensive method to identify areas of cloning as a falsification of the digital image. It allows to locate the cloned areas with a higher precision compared to modern analogues. Complex method is based on two modern clone detection techniques, using a common approach to the analysis of the state and technology of the information system functioning. It includes two stages: “fast rough” cloning area identification and a “slow” identification of the contour of the cloning area using a limited image subarea containing a clone. The method proposed can be adapted for the digital video.
- Published
- 2015
- Full Text
- View/download PDF
14. Discrete Fourier transform as a basis for steganographic method
- Author
-
Maria O. Kozina
- Subjects
steganography method ,digital image ,discrete Fourier transformation ,reliability perception the stegano message ,General Works - Abstract
Actuality of developing of new steganographic methods doesn’t cause doubts due to the rapid development of information technologies and considerable minuses of existing steganomethods. It is presented a steganographic method based on the embedding of confidential information to the frequency domain container (digital image in grayscale) in this paper. The transition from the spatial to the frequency domain and vice versa takes place by using a discrete Fourier transform. Matrix of frequency coefficients is constructed to the blocks 2x2 for the original matrix of digital image. By choosing the block of such size it increases not only the carrying capacity compared with the standard partition, but also it leads to non complexity frequency coefficients. Proposed steganographic method allows establishing of authenticity of the image. Further the theoretical results can be used as a basis for the development of a new stable steganographic algorithm.
- Published
- 2014
- Full Text
- View/download PDF
15. A basis of common approach to the development of universal steganalysis methods for digital images
- Author
-
Alla А. Kobozeva
- Subjects
digital image ,matrix ,singular value ,singular vector ,n-optimal vector ,normal singular decomposition ,image integrity ,steganalysis method ,General Works - Abstract
In this paper a new common approach to the organization of steganalysis in digital images is developed. New features of formal parameters defining the image are identified, theoretically grounded and practically tested. For the first time characteristics of mutual disposition of the left and right singular vectors corresponding to the largest singular value of the matrix (block of matrix) of an image and the vector composed of the singular values obtained as a result of normal singular decomposition of the matrix (block matrix) are obtained. It is shown that for the majority of the blocks of the original image (regardless of the storage format — lossy, lossless) the angle between the left (right) singular vector and the vector composed of singular numbers is determined by the angle between the n-optimal vector and the standard space basis of the corresponding dimension. It is shown that the discovered feature is violated for the mentioned formal parameters in the disturbed image. This is an indicator of integrity violation, particularly steganotransformation, and it can be used to develop new universal steganalysis methods and algorithms. Their efficiency does not depend on the specifics of steganoalgorithm used for insertion of additional information.
- Published
- 2014
- Full Text
- View/download PDF
16. MULTISCALE DIFFERENTIAL METHOD FOR DIGITAL IMAGE SHARPENING
- Author
-
Vitaly V. Bezzubik, Nickolai R. Belashenkov, Gleb V. Vdovin, Nikolai S. Karmanovsky, and Oleg A. Soloviev
- Subjects
digital image ,image contrast ,sharpness ,blur kernel ,deconvolution ,Optics. Light ,QC350-467 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
We have proposed and tested a novel method for digital image sharpening. The method is based on multi-scale image analysis, calculation of differential responses of image brightness in different spatial scales, and the subsequent calculation of a restoration function, which sharpens the image by simple subtraction of its brightness values from those of the original image. The method features spatial transposition of the restoration function elements, its normalization, and taking into account the sign of the brightness differential response gradient close to the object edges. The calculation algorithm for the proposed method makes use of integer arithmetic that significantly reduces the computation time. The paper shows that for the images containing small amount of the blur due to the residual aberrations of an imaging system, only the first two scales are needed for the calculation of the restoration function. Similar to the blind deconvolution, the method requires no a priori information about the nature and magnitude of the blur kernel, but it is computationally inexpensive and is much easier in practical implementation. The most promising applications of the method are machine vision and surveillance systems based on real-time intelligent pattern recognition and decision making.
- Published
- 2014
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.