History of Image Digital Formats Using in Information Technology
##semicolon##
https://doi.org/10.25212/lfu.qzj.6.2.41##semicolon##
Formats, supports, image, digital, history.پوختە
An important type of digital media is images, and in this article, we are going to review how images are represented and how they can be manipulated with simple mathematics. This is useful general knowledge for anyone who has a digital camera and a computer, but for many scientists, it is an essential tool. Printed publications use different formats to specify the properties of the information published; Thus, the uses that each type of each publication have been defined. Also, the formats of the digital images have been developed for use with a certain type of images and this article presents the benefits and uses of the different digital image formats.
##plugins.generic.usageStats.downloads##
سەرچاوەکان
Al-Alkawi, H. J., Hanfesh, A. O., & Rauof, S. M. N. M. (2019). Development of High Performance (Mechanical and Wear Properties) of AA 6061-Hybrid Nano Composites Via Liquid Metallurgy Route. Al-Nahrain Journal for Engineering Sciences, 22(2), 143-150.
Al-Yousuf, F. Q. A., & Din, R. (2020). Review on secured data capabilities of cryptography, steganography, and watermarking domain. Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), 17(2), 1053-1059.
Ali, M. S., & Yahiya, T. A. (2018, October). Performance Analysis of Native Ipv4/Ipv6 Networks Compared to 6to4 Tunnelling Mechanism. In 2018 International Conference on Advanced Science and Engineering (ICOASE) (pp. 250-255). IEEE.
Altaay, A. A. J., Sahib, S. B., & Zamani, M. (2012). An introduction to image steganography techniques. Paper presented at the 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).
Altaay, A. A. J. S., Shahrin Bin Zamani, Mazdak. (2012). An introduction to image steganography techniques. Paper presented at the 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).
Alyousuf, F. Q. A., Din, R., & Qasim, A. J. (2020). Analysis review on spatial and transform domain technique in digital steganography. Bulletin of Electrical Engineering and Informatics, 9(2), 573-581. doi:10.11591/eei.v9i2.2068.
Awasthi, Y., Sharma, A., & Husein, S. T. (2018). A Critical Analysis of Internal and External Sorting Algorithms through MATLAB. Journal of Advanced Research in Dynamical and Control Systems, 9, 2789–2799.
Banik, B. G., & Bandyopadhyay, S. K. (2015). Review on Steganography in Digital Media.
Chang, C.-C., & Tseng, H.-W. (2004). A steganographic method for digital images using side match. Pattern Recognition Letters, 25(12), 1431-1437.
Din, R., Mahmuddin, M., Qasim, A. J. J. I. J. o. E., & Technology. (2019). Review on steganography methods in multimedia domain. 8(1.7), 288-292.
Din, R., Qasim, A. J. J. B. o. E. E., & Informatics. (2019). Steganography analysis techniques applied to audio and image files. 8(4), 1297–1302.
Goel, P. (2008). Data Hiding in Digital Images: A Steganographic Paradigm. Indian Institute of Technology Kharagpur.
Gowsic, K., Manikandan, V., Sharma, A., Sivaram, M., & Porkodi, V. (2019). Design of a Hybrid Logic Based A daboost Decision Tree Model for Identifying Web Attacks. International Journal of Advanced Trends in Computer Science and Engineering, 8(1.2), 52-58.
Gunjal, B. L., & Manthalkar, R. (2010). An overview of transform domain robust digital image watermarking algorithms. Journal of Emerging Trends in Computing and Information Sciences, 2(1), 37-42.
Hanizan Shaker Hussain, R. D., Mohd Hanif Ali, Nor Balqis. (2018). The Embedding Performance of StegSVM Model in Image Steganography. Indonesian Journal of Electrical Engineering and Computer Science, Vol. 12.
Hussain, M., Wahab, A. W. A., Idris, Y. I. B., Ho, A. T., & Jung, K.-H. (2018). Image steganography in spatial domain: A survey. Signal Processing: Image Communication, 65, 46-66.
Jansirani, A., Rajesh, R., Balasubramanian, R., & Eswaran, P. (2011). Hi-tech authentication for pslette images using digital signature and data hiding. Int. Arab J. Inf. Technol., 8(2), 117-123.
Kh., T. I., & Hamarash, I. I. (2020). Model-Based Quality Assessment of Internet of Things Software Applications: A Systematic Mapping Study. International Journal of Interactive Mobile Technologies (iJIM), 14.
Liao, X., Wen, Q.-y., & Zhang, J. (2011). A steganographic method for digital images with four-pixel differencing and modified LSB substitution. Journal of Visual Communication and Image Representation, 22(1), 1-8.
Megalingam, R. K., Nair, M. M., Srikumar, R., Balasubramanian, V. K., & Sarma, V. S. V. (2010). A Comparative Study on Performance of Novel, Robust Spatial Domain Digital Image Watermarking with DCT Based Watermarking. International Journal of Computer Theory and Engineering, 2(4), 647.
Miran, A., & Kadir, G. (2019a). Enhancing AODV routing protocol to support QoS. International Journal of Advanced Trends in Computer Science and Engineering, 8(5), 1824–1830.
Neeta, D., Snehal, K., & Jacobs, D. (2006). Implementation of LSB steganography and its evaluation for various bits. Paper presented at the 2006 1st International Conference on Digital Information Management.
Poljicak, A., Botella, G., Garcia, C., Kedmenec, L., & Prieto-Matias, M. (2018). Portable real-time DCT-based steganography using OpenCL. Journal of Real-Time Image Processing, 14(1), 87-99.
Qasim, A. J., Din, R., & Alyousuf, F. Q. A. (2020). Review on techniques and file formats of image compression. Bulletin of Electrical Engineering and Informatics, 9(2), 602-610. doi:10.11591/eei.v9i2.2085
QASSIM, A. J., & SUDHAKAR, Y. (2015). Information Security with Image through Reversible Room by using Advanced Encryption Standard and Least Significant Bit Algorithm.
Rafael C. Gonzalez , R. E. W. (2008). Digital Image Processing. Pearson Education, Inc.
Raja, K., Chowdary, C., Venugopal, K., & Patnaik, L. (2005). A secure image steganography using LSB, DCT and compression techniques on raw images. Paper presented at the 2005 3rd international conference on intelligent sensing and information processing.
Roshidi Din, O. G., Alaa Jabbar Qasim. (2018). Analytical Review on Graphical Formats Used in Image Steganographic Compression. Indonesian Journal of Electrical Engineering and Computer Science, Vol 12, No 2, pp. 441~446. doi: 10.11591
Sharda, S., & Budhiraja, S. (2013). Image steganography: A review. International Journal of Emerging Technology and Advanced Engineering, 3(1), 707-710.
Swain, G. (2014). Digital image steganography using nine-pixel differencing and modified LSB substitution. Indian Journal of Science and Technology, 7(9), 1444-1450.
##submission.downloads##
بڵاو کرایەوە
چۆنییەتی بەکارهێنانی سەرچاوە
ژمارە
بەش
##submission.license##
##submission.copyrightStatement##
##submission.license.cc.by-nc-sa4.footer##Qalaai Zanist Journal allows the author to retain the copyright in their articles. Articles are instead made available under a Creative Commons license to allow others to freely access, copy and use research provided the author is correctly attributed.
Creative Commons is a licensing scheme that allows authors to license their work so that others may re-use it without having to contact them for permission