By Topic

IEEE Transactions on Image Processing

Issue 12 • Date Dec. 2004

Filter Results

Displaying Results 1 - 18 of 18
  • Table of contents

    Publication Year: 2004, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • IEEE Transactions on Image Processing publication information

    Publication Year: 2004, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • A multiple-substream unequal error-protection and error-concealment algorithm for SPIHT-coded video bitstreams

    Publication Year: 2004, Page(s):1547 - 1553
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1320 KB) | HTML iconHTML

    This work presents a coordinated multiple-substream unequal error-protection and error-concealment algorithm for SPIHT-coded bitstreams transmitted over lossy channels. In the proposed scheme, we divide the video sequence corresponding to a group of pictures into two subsequences and independently encode each subsequence using a three-dimensional SPIHT algorithm. We use two different partitioning ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast-searching algorithm for vector quantization using projection and triangular inequality

    Publication Year: 2004, Page(s):1554 - 1558
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    In this paper, a new and fast-searching algorithm for vector quantization is presented. Two inequalities, one used for terminating the searching process and the other used to delete impossible codewords, are presented to reduce the distortion computations. Our algorithm makes use of a vector's features (mean value, edge strength, and texture strength) to reject many unlikely codewords that cannot ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding axes of symmetry from potential fields

    Publication Year: 2004, Page(s):1559 - 1566
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1129 KB) | HTML iconHTML

    This paper addresses the problem of detecting axes of bilateral symmetry in images. In order to achieve robustness to variation in illumination, only edge-gradient information is used. To overcome the problem of edge breaks, a potential field is developed from the edge map which spreads the information in the image plane. Pairs of points in the image plane are made to vote for their axes of symmet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Grayscale level connectivity: theory and applications

    Publication Year: 2004, Page(s):1567 - 1580
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1828 KB) | HTML iconHTML

    A novel notion of connectivity for grayscale images is introduced, defined by means of a binary connectivity assigned at image-level sets. In this framework, a grayscale image is connected if all level sets below a prespecified threshold are connected. The proposed notion is referred to as grayscale level connectivity and includes, as special cases, other well-known notions of grayscale connectivi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient computation of the Hutchinson metric between digitized images

    Publication Year: 2004, Page(s):1581 - 1588
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1157 KB) | HTML iconHTML

    The Hutchinson metric is a natural measure of the discrepancy between two images for use in fractal image processing. An efficient solution to the problem of computing the Hutchinson metric between two arbitrary digitized images is considered. The technique proposed here, based on the shape of the objects as projected on the digitized screen, can be used as an effective way to establish the error ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of signal-adapted multidimensional lifting scheme for lossy coding

    Publication Year: 2004, Page(s):1589 - 1603
    Cited by:  Papers (35)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1683 KB) | HTML iconHTML

    This paper proposes a new method for the design of lifting filters to compute a multidimensional nonseparable wavelet transform. Our approach is stated in the general case, and is illustrated for the 2-D separable and for the quincunx images. Results are shown for the JPEG2000 database and for satellite images acquired on a quincunx sampling grid. The design of efficient quincunx filters is a diff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Locally optimum nonlinearities for DCT watermark detection

    Publication Year: 2004, Page(s):1604 - 1617
    Cited by:  Papers (48)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (522 KB) | HTML iconHTML

    The issue of copyright protection of digital multimedia data has attracted a lot of attention during the last decade. An efficient copyright protection method that has been gaining popularity is watermarking, i.e., the embedding of a signature in a digital document that can be detected only by its rightful owner. Watermarks are usually blindly detected using correlating structures, which would be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient and anonymous buyer-seller watermarking protocol

    Publication Year: 2004, Page(s):1618 - 1626
    Cited by:  Papers (51)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB) | HTML iconHTML

    For the purpose of deterring unauthorized duplication and distribution of multimedia contents, a seller may insert a unique digital watermark into each copy of the multimedia contents to be sold. When an illegal replica is found in the market sometime later, the seller can determine the responsible distributor by examining the watermark embedded. However, the accusation against the charged distrib... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust image-adaptive data hiding using erasure and error correction

    Publication Year: 2004, Page(s):1627 - 1639
    Cited by:  Papers (57)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1806 KB) | HTML iconHTML

    Information-theoretic analyses for data hiding prescribe embedding the hidden data in the choice of quantizer for the host data. We propose practical realizations of this prescription for data hiding in images, with a view to hiding large volumes of data with low perceptual degradation. The hidden data can be recovered reliably under attacks, such as compression and limited amounts of image tamper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Edge detection in ultrasound imagery using the instantaneous coefficient of variation

    Publication Year: 2004, Page(s):1640 - 1655
    Cited by:  Papers (40)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1894 KB) | HTML iconHTML

    The instantaneous coefficient of variation (ICOV) edge detector, based on normalized gradient and Laplacian operators, has been proposed for edge detection in ultrasound images. In this paper, the edge detection and localization performance of the ICOV-squared (ICOVS) detector are examined. First, a simplified version of the ICOVS detector, the normalized gradient magnitude squared, is scrutinized... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • List of Reviewers

    Publication Year: 2004, Page(s):1656 - 1661
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • IEEE Transactions on Image Processing Edics

    Publication Year: 2004, Page(s): 1662
    Request permission for commercial reuse | PDF file iconPDF (31 KB) | HTML iconHTML
    Freely Available from IEEE
  • IEEE Transactions on Image Processing Information for authors

    Publication Year: 2004, Page(s):1663 - 1664
    Request permission for commercial reuse | PDF file iconPDF (45 KB) | HTML iconHTML
    Freely Available from IEEE
  • 2004 Index

    Publication Year: 2004, Page(s):1665 - 1681
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • Special issue on molecular and cellular bioimaging

    Publication Year: 2004, Page(s): 1682
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2004, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Transactions on Image Processing focuses on signal-processing aspects of image processing, imaging systems, and image scanning, display, and printing.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Scott Acton
University of Virginia
Charlottesville, VA, USA
E-mail: acton@virginia.edu 
Phone: +1 434-982-2003