Monday, September 30, 2019

Advertising and Behavior Control Essay

In the article â€Å"Advertising and Behavior Control† there were many arguments for and against advertising. The first and the biggest problem Robert L. Arrington has against advertising is â€Å"puffery.† The reason/reasons why Arrington has a problem with puffery is due to the fact that the seller makes exaggerated, or suggestive claims about a product. His overall argument on puffery is that it isn’t just â€Å"bragging† but it is bragging that is designed to persuade you to want the item or product being sold. The bragging goes so far as they convince the viewer (of the advertisement) they need the product. Puffery ultimately leads to manipulation, exploitation, and control over what people think of the product. Although Arrington has reasons against puffery, he also points out examples as to why puffery is good for advertising. As stated on page 284 â€Å"businesses just give the consumer what he/she wants; if they didn’t they wouldn’t stay in business very long. Proof that consumer wants the precuts advertised is given by the fact that he bus them, and indeed often returns to by them again and again.† Puffery ultimately leads to the customer purchasing the product. If puffery is not used then as Arrington states businesses would go out of business very quickly. Puffery is not the only argument for or against advertising Arrington had but definitely was is strongest one. Another argument against advertising that Arrington had was credibility of an advertisement. He uses Philip Nelson’s ideas and theories to better explain his thoughts. His argument states that even when the message is not credible, we as a society give it validity by allowing ourselves to see the advertisement, and the fact that we constantly see them makes us believe that things are true. Simply put as stated on page 285 â€Å"advertised frequently, is valuable indirect information for the consumer. The reason for this is that the brands advertised most are more likely to be better buys-â€Å" Although the constant streaming of false or indirect information from advertisements makes us believe something that may be untrue, there is a counter argument as to why this form of advertising is legitimate, One of the counter arguments is in the form of a thought provoking question on page 285 â€Å"do the advertising techniques we have discussed involve a violation of human autonomy and a manipulation and control of consumer behavior, or do they simply provide an efficient and cost effective means of giving the consumer information on the basis of which he or she makes a free choice.† This may seem like a lot to grasp, but in essence the meaning of that thought provoking question is: is advertising information, or is advertising there for us to create wants and desi res in our life? These are just a couple of the arguments for and against advertising, and Arrington continues with many more thought provoking and legitimate arguments. All in all, Arrington makes claims for and against advertising, and eventually comes to the conclusion that he does not know what is right. If advertising is indeed good or bad as he says on page 289 â€Å"I do not pretend to have the answer. I only hope that the above discussion, in showing some of the kinds of harm that can be done by advertising and by indicating the likely limits of this harm, will put us in a better position to grapple with the question.† In my own opinion I don’t think that advertising should be controlled anymore than it is now. My reason for thinking this way is because products are made to be sold and along with that products are also made for us (the customer) to use, and enjoy. If products weren’t marketed/advertised to the customer as enjoyable, or brings you a higher satisfaction in life what would be the point of any person buying the product? Sure puffery may seem like it is a scam by â€Å"extending the truth† but at the same time if you had the money, and the time, and the friends to live a life like a commercial then it is very well possible to achieve that fulfillment from a product. Unfortunately not everyone is capable of doing this, but a product that is advertised is always going to be represented better than it actually is, due to the fact it is there to make a profit, and to be sold. My next point is the fact that advertisement falls into our liberties. We all have the right to freedom of speech. By advertising, or marketing one is free to say, promote, speak, etc. how they would like as long it is not in an offensive or demeaning way. This is why I believe there should be no more restrictions or limitations (if any) on advertising/marketing.

Sunday, September 29, 2019

The Evolution of the Mba

Reading List for Technology and Innovation Strategy: 463 – Management and Strategy, Kellogg School of Management Professor Shane Greenstein Students will be held accountable for all required readings. These must be read ahead of class discussion. Related readings are relevant background. These are included for the interested student. I highly recommend them for a fuller perspective on the topic. Topic 1: Basic Frameworks and Toolkits Topic 1a. Adoption and Evolution Required reading: Geoffrey Moore. Chapters 1 and 2, High Tech Marketing Illusion, High Tech marketing Enlightenment, Crossing the Chasm, Harper Business, 2006. Not in reading packet. Please purchase book. ) Rosenberg, Nathan, â€Å"Innovation’s Uncertain Terrain. † McKinsey Quarterly, pp. 170-185, Issue 3, 1995. In class video: Interview with Dan Bricklin, founder of Visicalc, from Triumph of the Nerds, An Irreverent History of the PC Industry, By Bob Cringely. Ambrose Video, RM Associates. 1996 Relat ed reading: Geoffrey Moore, To Succeed in the Long Term, Focus on the Middle Term, Harvard Business Review, July 2007. Wolter Lemstra, Vic Hayes and John Groenewegen, â€Å"Crossing the Chasm: the Apple AirPort. † Chapter 4 of The Innovation Journey of Wi-Fi: The Road o Global Success, Cambridge Press. Greenstein, â€Å"Virulent Word of Mouse. † And â€Å"An Earful about Zvi’s Email. † http://www. kellogg. northwestern. edu/faculty/greenstein/images/columns-older. html â€Å"Early Adopter, Enthusiast or Pioneer? A User’s guide to Technology Lingo. † http://virulentwordofmouse. wordpress. com/ 1b: Capturing value in value chains: the basics. Greg Linden, Kenneth L. Kraemer, and Jason Dedrick, â€Å"Who Captures Value from innovation in global value chains? A Study of the iPod and Notebook PC. Industrial and Corporate Change, June, 2009. Greg Linden, Kenneth L.Kraemer, and Jason Dedrick, The Distribution of Value in the Mobile Phone Supply Ch ain Related reading Francesco Zirpoli and Markus C. Becker, â€Å"What Happens When you Outsource too Much? † SMR 374, Winter 2011. Topic 1c: Attackers’ advantage during diffusion Required reading: â€Å"The Crisis at Encyclopeadia Britannica,† Kellogg Teaching Case, Revised version, August, 2009. Joseph Bower and Clayton Christensen, â€Å"Disruptive Technologies: Catching the Wave† in (Ed) John Seely Brown, Seeing Differently: Insights on Innovation, Harvard Business Review Book, 1997See class page on Blackboard, under the Assignment folder. Related reading: John Hagel III, John Seeley Brown, Lang Davison, â€Å"Shaping Strategy in a World of Constant Disruption,† Harvard Business Review, October 2008. Greenstein, â€Å"Creative Destruction and Deconstruction. † http://virulentwordofmouse. wordpress. com/, October, 2004. Topic 1d: Installed Base and Standards Required Reading: Carl Shapiro and Hal Varian, Information Rules, Chapters 5, 6, 7 & 8. Recognizing Lock-in, Managing Lock-in, Networks and Positive Feedback, Cooperation and Compatibility, Harvard Business School Press, 1998. Not in case packet. Please purchase book. ) In class video: Interview with the founders of McAfee Associates, from Nerds 2. 0. 1, A Brief History of the Internet, Bob Cringely, PBS Home Video, 1998. Related Reading: â€Å"Bleeding Edge Mass Market Standards,† and â€Å"Bird Watching for Nerds: Splintering the Internet,† and â€Å"The Grocery Scanner and Bar Code Economy,† http://virulentwordofmouse. wordpress. com/ Topic 1e: Attackers Advantage versus Installed Base: Microsoft and Netscape Required Reading: Browser Wars, 1994-98, HBS Case 9-798-094 In class video:Interview with Andreeson, Clark, Gates, Ballmer, Metcalfe, from Nerds 2. 0. 1, A Brief History of the Internet, Bob Cringely, PBS Home Video, 1998. Related Reading: Timothy Bresnahan and Pai-Ling Yin, â€Å"Standard Setting in Markets: The Browser Wars,† in Greenstein and Stango, Standards and Public Policy, Cambridge University Press, pp. 18-59. See class page on Blackboard, under the Assignment folder. Greenstein, â€Å"The Long Arc Behind Bill Gates’ Wealth, Part I and Part II,† http://virulentwordofmouse. wordpress. com/ Topic 2: Systems and Platforms Topic 2a. Classic frameworks and new approachesRequired reading: Andrei Hagiu, Note on Multi-sided Platforms: Economic Foundations and Strategy, HBS Case, 9-709-484 Related reading: Michael Cusumano and Annabelle Gawer, Elements of Platform Leadership, Sloan Management Review. Spring 2002, (43) 3, pp 51- 58. â€Å"Gateway Economics,† and â€Å"The Lexicon of Network Economics,† and â€Å"Managing Complements,† http://virulentwordofmouse. wordpress. com/ Topic 2b: Developing a multi-sided platform at Google Required reading: Google Inc, HBS Case 9-910-036 In class video: Hal Varian, Introduction to the Google Ad Auction, Made for YouTube. Related Reading:Andrei Hagiu and David Yoffie, â€Å"What’s your Google Strategy? † Harvard Business Review. R0904. Greenstein, â€Å"A Big Payoff,† â€Å"The Next Chapter at Google,† and â€Å"Did one invention lead to the decline of newspapers? † http://virulentwordofmouse. wordpress. com/ Topic 2c: Entrepreneurial product development for a platform Required reading: â€Å"Developing an App for That,† HBS Case 9-711-415, August 2, 2011. Related reading: Bhide, Amar (1996). â€Å"The Questions Every Entrepreneur Must Answer,† Harvard Business Review, HBS Reprint 96603-PDF-ENG â€Å"Google’s Android: Will it shake up the Wireless Industry in 2009 and Beyond? Case SM-176. â€Å"Gaming Structure,† http://virulentwordofmouse. wordpress. com/ Topic 3: Commercialization Topic 3a: Commercialization Strategy Required reading: Joshua Gans and Scott Stern, â€Å"The Product Market and the Market for Ideas: Commercialization Strategies for Technology Entrepreneurs. † Research Policy, In class video: Interview with Rod Cannon, in Triumph of the Nerds by Bob Cringely. 1996 Related reading: Seabrook, J. , â€Å"The Flash of Genius,† The New Yorker. Greenstein, â€Å"Imitation Happens,† http://virulentwordofmouse. wordpress. com/ Topic 3b: Merger for knowledge transfer: Cisco SystemsRequired reading: â€Å"Cisco: Early if Not Elegant (A) and (B), Darden Case, UV 1632. Recommended reading: Bunnell and Brate, Making the Cisco Connection, Chapter 6, The Benevolent Predator. Geoffrey A. Moore, 2008, Dealing with Darwin, How Great Companies Innovate at Every Phase of Their Evolution, Penguin Group, pp 100-109, 159-167, and 181 -191 Ironport, Stanford GSB Case, E-334. Topic 3c: Commercialization experiments: Markets for intellectual property Required Reading: â€Å"Intellectual Ventures,† Case 9-710-423, Related reading: Nathan Myhrvold, Funding Eureka! HBR article, March, 2010. â€Å"When Pate nts Attack. † Originally aired on WBEZ/This American Life on 7. 22. 2011. http://www. thisamericanlife. org/radio-archives/episode/441/when-patents-attack Davis, Lee (2008). â€Å"Licensing Strategies of the New Intellectual Property Vendors,† California Management Review Greenstein, â€Å"Smart Phone patents and Platform Wars,† http://virulentwordofmouse. wordpress. com/ Topic 3d. Commercialization Experiments: Online without intellectual property. Required reading: RadioHead: Music at your own price (A) and (B), Case 9-508-110, 9-508-111Related reading: â€Å"Pandora Radio: Fire Unprofitable customers? † HBS case 5-610-078, April 2011. â€Å"Digitization and Value creation,† http://virulentwordofmouse. wordpress. com/ Topic 4: Firm boundary and scope Topic 4a: Extending functionality: Intel Required reading: â€Å"Intel Centrino in 2007: A new Platform Strategy for Growth. † SM-156. Related reading: Shane Greenstein â€Å"Economic Experime nts and the Development of Wi-Fi. † Edited by Steven Kahl, Michael Cusumano, and Brian Silverman. Advances in Strategic Managements, V 29. Chapter 1, pp. 3-33. Emerald Group Publishing; Bingley, UK.Greenstein, February 2007, â€Å"The High Costs of a Cheap Lesson,† http://virulentwordofmouse. wordpress. com/ 4b: Climbing the value chain Required reading Flextronics International, LTD, 9-604-063, April, 2010. HTC Corp. in 2012, HBS case 9-712-423, September, 2012. Related reading Greenstein, â€Å"Outsourcing and Two Views for Climbing the Value Chain,† http://virulentwordofmouse. wordpress. com/ Topic 4c: User-contributed content Required Reading: â€Å"Wikipedia in the Spotlight,† Kellogg Teaching Case. August, 2009. Recommended Reading: â€Å"Wagging Wikipedia’s Long Tail. â€Å"Another Venerable Establishment Surrenders to Wikipedia,† and â€Å"The Range of Linus’ Law. † http://virulentwordofmouse. wordpress. com/ Topic 4d: Entrepreneurship and user participation Required reading: â€Å"Triumph of the Commons: Wikia and the Commercialization of Open Source Communities in 2009. † Kellogg Teaching case, October, 2009. Yelp, Case 9-709-412 MentorMob and the Reinvention of Learning, August, 2011. Related Reading: Eric Raymond, The Cathedral and the Bazaar, First Monday. www. firstmonday. dk See class page on Blackboard, under the Assignment folder. Foursquare, HBS Case 9-711-418

Saturday, September 28, 2019

Comparison Essay: Susan Glaspell’s “the Jury of Her Peers”

Susan Glaspell’s â€Å"The Jury of Her Peers† and Eudora Welty’s â€Å"A Worn Path† are great examples of the use of symbolism in short story literature. â€Å"The Jury of Her Peers† tells the story of a murder investigation that takes place in Dickson County in the 1910’s, in which Minnie Wright is the main suspect. Welty’s piece, on the other hand, is a narration of an old black woman’s long journey to get her sick grandson a Christmas present, a selfless deed on Phoenix’s behalf. In both stories, the use of symbolism is clearly reproduced, in a similar manner, to develop the character and the situation.However, the depth and the complexity of those symbols, provides â€Å"A Worn Path† with a much better content-symbol relationship, which in turn, works better for the plot of the story. A character’s personality and main traits are amongst the most important elements in any literary piece and the use of sy mbolism is an excellent tool toward accomplishing roundness in a character. In â€Å"The Jury of Her Peers†, the bird (a canary) is the symbol used to describe Minnie’s character as â€Å"Real sweet and pretty, but kind of timid and – fluttery† (208).This symbol embodies Minnie before she got married and was taken away by her husband to live in total isolation. Although the symbol is well presented in the story, it is done so in a literal way, which takes away from the meaning and interpretation to be given by the reader. The female characters in the story make allusion, in parts of their speech, to this symbol. This can be observed when one of the characters (the sheriff’s wife) says â€Å"She [Minnie] – come to think of it, she was kind of like a bird herself† (208), which covers in a few words, the meaning of the bird symbol.In contrast, in â€Å"A Worn Path†, the meaning of the symbol proposed to define the main character, is implied rather than literarily presented. Phoenix, which is the protagonist’s name, is also a mythical bird that is characterized by its strength, long life and the ability to rise from its own ashes after it dies. This interpretation, or any other that can be drawn in accordance to different mythologies, is not mentioned in any way along the story. It is implied and can only be deduced through the knowledge of the protagonist’s determination and drive.As she travels â€Å"up through pines† (6) and â€Å"down through oaks† (6), this old lady never even considers giving up and returning home empty handed. Similarly, the situation presented in both stories is also exposed through the use of symbolism. In â€Å"The Jury of Her Peers†, this symbolism is introduced in the form of a cage, which is home to Minnie’s canary but, at the same time, represents her current situation. The symbol in this case is used to show the isolation and confinemen t in which Minnie is living â€Å"down in a hollow†¦ lonesome place† (198). It is a universal symbol and, as such, can be easily interpreted. However, it is not a very deep one; it is does not take much effort for a reader to realize its meaning. In contrast, â€Å"A Worn Path† uses an authorial symbol, which only applies to the context of the story. This in no way means a better way of presenting the situation, but the way the symbol is put in the story does give it a deeper meaning. The paper windmill is, in this context, set to represent Phoenix’s situation.She is a â€Å"very old and small† (1) woman, frail and poor, which is exactly what the paper windmill is used to symbolize, a very fragile and cheap object. This symbolism can also be analyzed from Phoenix’s grandson’s point of view, as to him, it would be a symbol of generosity and kindness. No matter how poor they are, his grandmother spent money and effort to surprise him. As old Phoenix told the nurse in town, â€Å"He going to find hard to believe there such a thing in the world†, such is his perception of his grandmother.As shown before, symbolism is a great tool that, when used properly, can provide a short story with a lot of meaning and depth. It is an excellent way to imply significance to a simple element in a story and to provide a deeper sense of the reality to the reader. Welty’s piece, â€Å"A Worn Path†, achieves a higher level of connotation than Glaspell does in â€Å"The Jury of Her Peers†, where the meaning of the elements used as symbols are either explained within the piece, or too simple to have a deep meaning.Also, the combination of universal and authorial symbols provides â€Å"A Worn Path† with more ideas and conclusions to be drawn from the symbols presented. In conclusion, Welty makes better use of symbolism to accomplish a more complete piece. â€Å"A Worn Path† is an excellent example of the proper use of symbolism to deliver a story that is both deep and interesting. It provides the reader with an attention-grabbing plot as well as, implied ideas that give the reader a better sense of the significance of the symbols used without actually explaining them.WORK CITED Glaspell, Susan. â€Å"The Jury of Her Peers†. Literature: An Introduction to Reading and Writing. Ed. Edgar V. Roberts and Robert Zweig. 5th Compact ed. Toronto: Pearson Longman, 2012. 170. Print. Welty, Eudora. â€Å"A Worn Path†. Literature: An Introduction to Reading and Writing. Ed. Edgar V. Roberts and Robert Zweig. 5th Compact ed. Toronto: Pearson Longman, 2012. 270. Print. APPENDICES OUTLINE I. Introduction: Thesis statement the use of symbolism is clearly reproduced, in a similar manner, to develop the character and the situation.However, the depth and the complexity of those symbols, provides â€Å"A Worn Path† with a much better content-symbol relationship, which in turn , works better for the plot of the story. II. Body: A. First paragraph * Key idea: use of symbolism to define the protagonist. * â€Å"The Jury of Her Peers† * â€Å"A Worn Path† B. Second paragraph * Key idea: use of symbolism to set the situation in the story. * â€Å"The Jury of Her Peers† * â€Å"A Worn Path† C. Third paragraph * Key idea: Personal opinion on which story uses symbolism best. III. Conclusion The essay is summarized and a conclusion is presented from the points exposed throughout its content.

Friday, September 27, 2019

Trace Evidence Essay Example | Topics and Well Written Essays - 750 words

Trace Evidence - Essay Example The main biological molecule of target for forensic analysis is deoxyribonucleic acid (DNA), which is present in all cells of all organisms. Biological evidences at the scene of the crime thus serve as essential resources for DNA that could be employed in the forensic analysis of a criminal case. DNA from cells of both the victim(s) and the assailant(s) may be extracted from biological materials that are collected from the crime scene. With the proper application of molecular biology techniques, DNA could be extracted from forensic samples and subjected to DNA analysis. The main procedure employed in the analysis of DNA is the polymerase chain reaction, which is an enzymatic process that generates several copies of DNA based on the sequence of a template DNA (Giardina et al., 2009). The reaction involves a bacterial enzyme that has the capacity to withstand high temperatures that are required for DNA amplification. The amplified DNA fragments are then subjected to a separation assay called agarose gel electrophoresis, which mainly involves running the DNA according to its molecular weight in the presence of an electric field. The fragments are then expected to migrate through the gel and stop at its corresponding molecular size. Both the victim and the suspect's DNA samples are subjected to the polymerase chain reaction, as this will allow the identification of the source of each biological material that is collected at the crime scene. The most common DNA sequences involved in forensic analysis are the short tandem repeats (STRs), which are usually between 20 to 100 nucleotides in length and highly variable in the human population. It is thus expected that every individual in the human society may carry a different sequence in the STRs and the only other individuals that could have a match with a person are those of his parents or his children. Other biological materials that could be collection from the scene of a crime include insects, as well as pollen, that may be present on and within the body of the victim. It should be understood that a human body immediately undergoes the process of decomposition within the first hour after the individual dies. Insects deposit eggs within the first few hours of death and these develop into larvae, or maggots, that are often observed in a body that has been left in the open for a couple of days (Nazni et al., 2008). Forensic entomology allows the researcher to identify the species of the larvae, as well as to determine the age of the larvae in terms of developmental stages or instars. This estimation plays a critical role in determining the time of death of the victim. The presence of pollen on the body of the victim of a criminal case may also provide information on whether the victim was murdered at the site or was otherwise transferred from one place to another. Every place has a specific collection of pollen, and this is mainly based from the types of plants and trees that are present in the area. If a crime was performed within a forest, then the pollen that could be collected on the body of the victim should be of those that were derived from the plants and trees of that same forest. If the pollen collected from the body of

Thursday, September 26, 2019

Identify and describe the principles of Edwin Sutherland Differential Research Paper

Identify and describe the principles of Edwin Sutherland Differential Association Theory . Select and exaple and apply the Theory - Research Paper Example Legislators could use these theories for introducing legal rules that will prohibit people from crime. An indicative example is the theory of Differential Association of Edwin Sutherland. This theory is based on a series of principles, which are analytically described below referring to studies published in the academic literature. Sutherland first introduced the Differential Association Theory in 1924. The above theorist has been strongly influenced by the sociological theories of that time. He was mostly influenced by the views of Thomas and his theory of ‘the definition of the situation’. The above concept has been the theoretical basis on which the work of Sutherland was based. Sutherland developed his ‘generic theory of crime, the differential association theory, based on specific explanations of ‘law’ and ‘crime’’ (DeLisi et al. 216). This has been the main point at which the theory of crime of Sutherland – or else the differential association theory – has been differentiated from the work of other theorists in the specific field. A key characteristic of the theory of Sutherland is that it is not a concept that can be used periodically, independently from the life conditions, for the explanation of criminal behavior. It is rather involved in the course of life (DeLisi et al. 217). Another important element of the specific theory is its extensive reference to terms, like ‘attitudes and self-concepts’ (DeLisi et al. 217). In accordance with the theory of Sutherland, the criminal behavior cannot be characterized as a personal characteristic, i.e. it is not a type of behaviour inherited. Instead, it is learned, through the social interaction. In other words, the theory of Sutherland emphasizes on the importance of the social environment for the potential development of criminal behavior (DeLisi et al. 217). However, through this point of view, it can be assumed

Reactio paper 1 Research Example | Topics and Well Written Essays - 750 words

Reactio 1 - Research Paper Example A Warm December aggrandizes the mystical and hidden understanding of the transcendental feeling of love and ameliorates one’s perception about being human. He was intelligent, grown up, tall, impressive and a tender natured father. She was a sweet, gentle and soft spoken single. However there was one contrast that he was as a whole ardent in nature: on contrary she was very reserved and stand-off-ish. She had a reason for being reserved and the reason was the Sickle Cell Anemia. Unlike Bette Davis and Ali MacGraw and all the other diminishing personas of Hollywood, this story is a timelier segment of a rare blood disease of this girl which remained imprinted in the hearts of the public for a long time. This film attenuated and switched the then discernment of love among the minds of the people and made an altogether new mystical and amusing version of love. The story engulfed the public from the very start as it will be explained in the upcoming context. The actual motivations and the objectives of the movie, "A Warm December" (besides gaining a good reputation) are friendliness with your kids and understanding them, domestic and homely care, affections and virtues, sentimental and emotionally embedded sex, touristic and inspiring and striking personality. It is like a very few hidden and unexpressed emotions which lay in the clandestine veil of the human emotions, which may or may not be understood, but cannot be told for sure. Dr. Matt Younger came to England for the sake of rest and relaxation and to show his daughter the dirt motorbike race. Catherine was also there with her uncle who was an African ambassador. They met, feelings developed Catherine always had a reserved attitude towards the happening around her despite her other capabilities and qualities. That was because she had this disease’s secret. Matt, on the other hand also had some secrets. The craving to live an ordinary life and to forget the bitterest fact that Catherine would liv e not much was so much impregnated in her. After their meeting the same wish mounted further in her heart. Dr. Matt Younger, however on the other hand was a compassionate person, an avid dancer and a racer also, who tried his best to be a good father, and succeeded in his goal. In the movie "A Warm December" the story line inclined towards the originality in expressions and reality. The movie depicts the very capital of west as well as a tour to the African art gallery and some formal musical presentations. The movie is an integration of different experiences, specially parents and children’, the rich and the poor, and the intellectual and the physical. At last when she is free , she cried in a joyous shriek that, â€Å"May I cook?, do all households, spend time with Stefanie?, and not to waste the left precious moments of her life in vain. The story depicts full and positive blend of fine people and set of realities about the Africans, blacks and the American-African tribes . It shows that the anachronistic prejudices and the racism against blacks have long been vanished but the biological effects remained. The fatal facts is the disease which was found to be common in Blacks, but still it was very promising to develop relations between man and a woman regardless of the severity of the illness, which does not count when it comes to the question of love, care and affections. For the romance part in the movie, the director Sidney Poitier, who

Wednesday, September 25, 2019

Learning Environment Research Paper Example | Topics and Well Written Essays - 4500 words

Learning Environment - Research Paper Example Then, there is something called the honor code. "From 1913 to World War II, the honor system expanded to all academics, including problem sets, lab reports, and essays. After the war, with perhaps some influence from the military, the treatment of [school] property and the theft of personal belongings became an important part of honor [in school]" (History of the Honor System, 2002, p. 1). With the honor code, the responsibility for maintaining honor lies with the students. "One element of an integrity strategyis the use of an honor code, which has been related to a reduction in academic dishonestyHonor codes typically have some of the following characteristics: unproctored examinations, a pledge students sign on exams and assignmentsin which students are encouraged to reporttheir peers' academic dishonesty" (Konheim-Kalkstein, 2006, p. 169). Conversely, if students are furtive or are trying to cheat, most likely the fact is that they are simply dishonest. Simply put, academic honesty in the classroom can be difficult to maintain, especially if there is no way to assess the standards put in place by the teacher. Integrity is typically categorized as character. ... 169). The honor code may work, or it may not, depending upon the individual students' level of honesty. If they are generally morally-abiding students, they are less likely to cheat or lie. Conversely, if students are furtive or are trying to cheat, most likely the fact is that they are simply dishonest. Simply put, academic honesty in the classroom can be difficult to maintain, especially if there is no way to assess the standards put in place by the teacher. III. Implications of Different Theories in Integrity Integrity is typically categorized as character. "Integrity is one of the most important and oft-cited of virtue terms," and here four types of integrity will be discussed: integrity as standing for something; integrity as moral purpose; integrity as virtue; and integrity in relation to social and political conditions (Integrity, 2008, p. 1). Cheshire Calhoun, in his piece Standing for Something, notes that "integrity hinges on acting on one's own views, not the right views (as those might be determined independently of the agent's own opinion)" (Calhoun, 1995, p. 250). Standing for something is typically seen as weak in some circles. However, having the courage to stick to one's morals or values in life is commonly seen globally as a strength. There is the old saying which many know, "Stand for something or you'll fall for anything." Many times people have to rely on their gut instinct in order to know what to do in a particular situation. Let's take a particular situation, where a student is faced with the opportunity to cheat off another student's work in class. Realistically, the student may just cheat. However, perhaps the student may

Tuesday, September 24, 2019

A summative assignment based on the use a self analysis tool as a Essay

A summative assignment based on the use a self analysis tool as a Clinical Manager of an Acute Medical Ward - Essay Example Jung, its first publishing was done in 1921. The initial questionnaire that developed in into the MBTI Indicator was published 1962. The MBTI mainly focuses normal populations and emphasizes on naturally occurring differences that exist ( Capraro, 2002 p. 590). Origins of the theory Jung's theory publishing was done in 1921 and it was not tested or verified under the controlled studies scientifically but it included clinical observation and introspection as well as anecdote method which are inconclusive in the modern psychology which argue that for the theory to be published it must be studied scientifically. Validity of the theory The statistical validity of this theory and use of psychometric instrument (MBTI) has found criticism in many aspects. It has been argued that there lack critical scrutiny since most of the published material on this MBTI tool was for conferences. About a third or half have been estimated that material used were for the conferences or journals which were e dited by its advocates (Capraro, 2002, p.595). Researchers expected bimodal distribution on the peaks almost at the end of the scales but these scores on subscales individually were centrally peaked distributed which was the same as the normal distribution. At the center to subscale a cutoff existed in away that the one score is classified one type while the other as an opposite type. This does not support the concept of type. Reliability of the theory Interpreted reliability from the studies has indicated the test is low. Researchers found that thirty nine percent and seventy six per cent of the test is different types. CONCEPTS As the Manual states this indicator is designed for implementing a hypothesis or a theory. Therefore the hypothesis should be comprehended so as to understand the Myers Briggs Type Indicator. Theory of psychological type is fundamental to the Myers Briggs Type Indicator as originally it was developed by Jung. He proposed an existence of two cognitive functi oning dichotomous pairs: these are judging (rational) which has functions of feeling as well as thinking and perceiving (irrational) which has functions of intuition and sensing. These functions are in introverted form or extraverted form in expression. From this concept of Jung others such as Briggs and Myers came up with their own theory for psychological type and this became the base of MBTI (Capraro, 2002, p. 598). Jung's typological model regards left handedness or right handedness as similar to psychological type. This means that individuals may be born with or may develop a certain way of thinking and acting depending on preference. MBTI is on these psychological differences and put them into four pairs that are opposite to each other with 16 possible combinations psychological types. None of these psychological types are better or even worse than the other. But Briggs and Myers developed a theory that individuals prefer one combination overall with the type differences. In t his case, writing using the left hand may be hard for a right handed people

Monday, September 23, 2019

Physical Exercise Essay Example | Topics and Well Written Essays - 500 words

Physical Exercise - Essay Example Today, man is slowly realising the importance of good health, hygiene and fitness, due to the absence of which, his life has been plagued by ill-health! Physical activity can take numerous forms, depending on the aim. Simple forms of exercise include healthy breathing exercises, walking, jogging, bending and stretching. However, when one take on the aim to conquer one's overweight body or to attain higher levels of fitness, one takes the decision to take professional guidance, by joining institutes or gyms, where higher forms of exercise like lifting weights, cardio exercises, muscle-building, etc. is taught. Thus, exercises range over a great variety and it depends on the lifestyle, aim and interest-levels of an individual, in terms of the exercises he can adopt in his day-to-day activities. However, some form of exercise and physical activity is mandatory to lead a healthy life! On contacting professionals for help in helping attain greater levels of fitness and health, they often reassure our apprehensions by saying, "You are not alone"! It

Sunday, September 22, 2019

Japan Westernization Paper Essay Example for Free

Japan Westernization Paper Essay Prompt: Discuss possible reasons why Japan was the only non-western state to nationalize and win recognition as an equal and how it managed to accomplish this in a mere half century. Thesis: Being aware of recent Western invasions in China, Japan had recognized the need to transform their institutions and its society, therefore, Japan embraced nationalism. By 1649, Japan had shut down contact with the European world with the exception of a Dutch outpost on Deshima Island in Nagaski harbor (this outpost however, was only allowed to receive one ship all year). The Japanese also allowed the Chinese to trade at Nagasaki (only under severe restrictions) and Korea could trade through the islands of Tusushima. Other than this however, Japan was isolated. In 1853, the U.S sent Commodore Matthew Perry (with 3 steam frigates) to force Japan into opening its ports to trade. Japan had lacked the technology to fight against the U.S and the European powers that soon followed. Slowly (while being under pressure however), Japan opened more ports granted extraterritorial rights and where able to determine Japan’s tariff polices. Like China, Japan seemed to be getting controlled by the European powers. However, young, vigorous leaders took control of the government of Japan forcing a dramatic reconstruction of the nations polices, administration, class structure, economy, technology and culture. These leaders tended to be young samurai warriors in the han (feudal estates) of Choshu and Satsuma. The samurai were able to employ some of the technological information introduced by the Dutch from their station in Nagasaki harbor (the shogunate had established an office for translating Dutch material in 1811) and by 1840, some of the Japanese were already casting Western guns and artillery. A new leader, Sakuma Zozan (one of the advocates of adopting Western military methods) believed that opening the country was necessary and beneficial. However, not everyone had agreed. In 1860 a group of samurai (from the conservative han of Mito) argued a different opinion and eventually, Mito loyalists assassinated Sakuma. In 1868, forces of Choshu and Satusma (along with several more remote hans) took control of the emperor’s palace in Kyoto and declared the end of shogunate. The emperor was put back into imperial power.

Saturday, September 21, 2019

Image Based Steganographyusing LSB Insertion Technique

Image Based Steganographyusing LSB Insertion Technique ABSTRACT Steganography is a technique used to hide the message in vessel data by embedding it. The Vessel Data which is visible is known as external information and the data which is embedded is called as internal information.The extrenal information is not much useful to the data owner. The techniques used in Steganography makes hard to detect hidden message within an image file. By this technique we are not only sending a message but also we are hiding the message. Steganography system is designed to encode and decode a secret file embedded in image file with a random Least Significant Bit(LSB) insertion technique. By using this technique the secret data are spread out among the image data in a random manner with the help of a secret key. The key generates pseudorandom numbers and identifies where and in which order hidden message is laid out. The advantage of using this method is that it includes cryptography. In cryptography, diffusion is applied to secret message. INTRODUCTION: The information communicated comes in number of forms and is used in various number of applications. In large number of these applications, it is desired that the communication has to be done in secrete. Such secret communication ranges from the obvious cases of bank transfers, corporate communications, and credit card purchases,and large percentage of everyday e-mail. Steganography is an ancient art of embedding a message in such a way that no one,except the sender and the recipient,suspects the existence of the message. Most of the newer applications use Steganography as a watermark, to protect a copy right on information. The forms of Steganography vary, but unsurprisingly, innocuous spam messages are turning up more often containing embedded text. A new transform domain technique for embedding the secret information in the integer wavelet which is transformed on a cover image is implemented here. A technique which is used to scramble a secrete or a confidential message in order to make it unreadable for a third party is known as the Cryptography.Now-a-days its commonly used in the internet communications.cryptography can hide the content of the message but it cant hide the location of the secrete message.This is how the attackers can target even an encrypted message.Water marking is the another information of hiding the digital data or a picture or musical sound.The main purpose of this watermarking information is to protect the copyright or the ownership of the data.In this technique the robustness of the embedded evidence,that can be very small, is the most important.The external information which is visible is the valuable information in the watermarking technique. steganography is a technique which is used to make the confidential information imperceptible to the human eyes by embedding the message in some dummy data such as the digital image or a speech sound.There is a research topic about the steganography known as the steganalysis.The main objective of this steganalysis is to find out the stego file among the given files.It is a technique which is used to detect the suspicious image or sound file which is embedded with the crime related information.So,we need to make a sniffer-dog-program to break the steganography.However,it is too difficult to make a program that really works. All the traditional steganography techniques have very limited information-hiding capacity.They can hide only 10% (or less) of the data amounts of the vessel.This is because the principle of those techniques which were either to replace a special part of the frequency components of the vessel image, or to replace all the least significant bits which are present in a multivalued image with the secrete information.In the new steganography which we are using uses an image as the vesel data, and we need to embed the secrete information in to the bit planes of the vessel.The percentage of information hiding capacity of a true color image is around 50.All the noise-like regions in the bit planes of the vessel image can be replaced with the secret data without deteriorating the quality of the image,which is known as BPCS-Steganography, which stands for Bit-Plane Complexity Segmentation Steganography. BACKGROUND HISTORY: The word Steganography is of Greek origin and means â€Å"covered, or hidden writing†. Its ancient origins can be traced back to 440BC. THEORY: Steganography is a technique which is used now a days to make confidential information imperceptible to the human eyes by embedding it in to some innocent looking vessel data or a dummy data such as a digital image or a speech sound.In a multi bit data structure a typical vessel is defined as a color image having Red,Green and blue components in it.By using a special extracting program and a key the embedded information can be extracted,the technique of steganography is totally different from file deception or file camouflage techniques. A technique to hide the secrete data in a computer file which almost looks like a steganography is known as a file deception or file camouflage.But actually, it is defined as a trick which is used to disguise a secret-data-added file as a normal file.This can be done as most of the computer file formats have some dont-care portion in one file.For instance if we take some file formats as jpeg,mpeg3 or some word file these looks like the original image,sound or document respectively on the computer.Some of them could have misunderstood that such a trick is a type of Steganography.However,such files can have an extra lengthy file sizes, and they can be easily detected by most of the computer engineers.So, by this we can understand that the file deception is totally different from that of the steganographic techinque which we are discussing here. Many of the Steganography software which is in the market today is based on the file decepetion.If we find a steganography program that increases the output file size just by the amount we have embedded, then the program is obviously a file deception.If there is some secrete data then we should encrypt in such a way that it is not readable for the third party.A solution to Keep secrete information very safe is known as Data Encryption.It is totally based on scrambling the data by using some type of the secrete key. However,encrypting the data will draw more attention of the people who have not encrypted the data.So, it is very to the owner to know whether the data is encrypted or not.By, this we can know that the encrypting is not enough. There is another solution which is known steganography. There are two types of data in steganography, one is the secret data that is very valuable and the other is a type of media data vessel or carrier or dummy data.Vessel data is essential, but it is not so valuable.It is defined as the data in which the valuable data is embedded. The data which is already embedded in the vessel data is called stego data.By using the stego data we can extract the secret or the valuable data. For embedding and extracting the data we need a special program and a key. A typical vessel is an image data with Red, Green, and Blue color components present in it in a 24 bits pixel structure. The illustration below shows a general scheme of Steganography. Steganography is a technique which is used to hide secret data by embedding it in some innocent looking media data like Mona lisa in the above picture.The data which is embedded is very safe because Steganography hides both the content and the location of the secret information.In the media data there are many different methods to embed the data.It is highly impossible to detect which method is used for embedding the data.Steganography can co-operate with cryptography in the sense that it can embed the encrypted secret data and make it much safer. The most important point in the steganography technique is that the stego data does not have any evidence that some extra data is embedded there.In other way, the vessel data and the stego data must be very similar.The user of the steganography should discard the original vessel data after embedding,so that no one can compare the stego and the original data. It is also important that the capacity for embedding the data is large.As it is larger it is better.Of all the currently available steganography methods the BPCS method is the best. LEAST SIGNIFICANT BIT INSERTION One of the most common techniques used in Steganographytoday is called least significant bit (LSB) insertion. This method is exactly what it sounds like; the least significant bits of the cover-image are altered so that they form the embeddedinformation. The following example shows how the letter A can be hidden in the first eight bytes of three pixels in a 24-bit image. Pixels: (00100111 11101001 11001000) (00100111 11001000 11101001) (11001000 00100111 11101001) A: 01000001 Result: (00100110 11101001 11001000) (00100110 11001000 11101000) (11001000 00100111 11101001) The three underlined bits are the only three bits that were actually altered. LSB insertion requires on average that only half the bits in an image be changed. Since the 8-bit letter A only requires eight bytes to hide it in, the ninth byte of the three pixels can be used to begin hiding the next character of the hidden message. A slight variation of this technique allows for embedding the message in two or more of the least significant bits per byte. This increases the hidden information capacity of the cover-object, but the cover-object is degraded more, and therefore it is more detectable. Other variations on this technique include ensuring that statistical changes in the image do not occur. Some intelligent software also checks for areas that are made up of one solid color. Changes in these pixels are then avoided because slight changes would cause noticeable variations in the area .While LSB insertion is easy to implement, it is also easily attacked. Slight modifications in the color palette and simple image manipulations will destroy the entire hidden message. Some examples of these simple image manipulations include image resizing and cropping. Applications of Steganography : Steganography is applicable to, but not limited to, the following areas. Confidential communication and secret data storing. Protection of data alteration Access control system for digital content distribution. Media Database systems. The area differs in what feature of the Steganography is utilized in each system. 1. Confidential communication and secret data storing: The â€Å"secrecy† of the embedded data is essential in this area. Historically, Steganography have been approached in this area.Steganography provides us with: (A).Potential capacity to hide the existence of confidential data. (B).Hardness of detecting the hidden (i.e., embedded ) data. (C).Strengthening of the secrecy of the encrypted data. In practice , when you use some Steganography, you must first select a vessel data according to the size of the embedding data.The vessel should be innocuous.Then,you embed the confidential data by using an embedding program (which is one component of the Steganography software ) together with some key .When extracting , you (or your party ) use an extracting program (another component) to recover the embedded data by the same key (â€Å"common key â€Å" in terms of cryptography ).In this case you need a â€Å"key negotiation â€Å" before you start communication. 2. Protection of data alteration: We take advantage of the fragility of the embedded data in this application area. The embedded data can rather be fragile than be very robust. Actually, embedded data are fragile in most steganography programs. However, this fragility opens a new direction toward an information-alteration protective system such as a Digital Certificate Document System. The most novel point among others is that no authentication bureau is needed. If it is implemented, people can send their digital certificate data to any place in the world through Internet. No one can forge, alter, nor tamper such certificate data. If forged, altered, or tampered, it is easily detected by the extraction program. 3. Access control system for digital content distribution: In this area embedded data is hidden, but is explained to publicize the content. Today, digital contents are getting more and more commonly distributed by Internet than ever before. For example, music companies release new albums on their Webpage in a free or charged manner. However, in this case, all the contents are equally distributed to the people who accessed the page. So, an ordinary Web distribution scheme is not suited for a case-by-case and selective distribution. Of course it is always possible to attach digital content to e-mail messages and send to the customers. But it will takes a lot of cost in time and labor. If you have some valuable content, which you think it is okay to provide others if they really need it, and if it is possible to upload such content on the Web in some covert manner. And if you can issue a special access key to extract the content selectively, you will be very happy about it. A steganographic scheme can help realize a this type of system. We have developed a prototype of an Access Control System for digital content distribution through Internet. The following steps explain the scheme. (1) A content owner classify his/her digital contents in a folder-by-folder manner, and embed the whole folders in some large vessel according to a steganographic method using folder access keys, and upload the embedded vessel (stego data) on his/her own Webpage. (2) On that Webpage the owner explains the contents in depth and publicize worldwide. The contact information to the owner (post mail address, e-mail address, phone number, etc.) will be posted there. (3) The owner may receive an access-request from a customer who watched that Webpage. In that case, the owner may (or may not) creates an access key and provide it to the customer (free or charged). In this mechanism the most important point is, a selective extraction is possible or not. 4. Media Database systems: In this application area of steganography secrecy is not important, but unifying two types of data into one is the most important. Media data (photo picture, movie, music, etc.) have some association with other information. A photo picture, for instance, may have the following. The title of the picture and some physical object information. The date and the time when the picture was taken. The camera and the photographers information. DIGITAL IMAGE PROCESSING BACKGROUND: Digital image processing is an area that is characterized by the need for extensive experimental work to establish the viability of the proposed solutions to a given problem. An important characteristic which is underlying in the design of image processing systems is the significant level of testing the experimentation that normally required before arriving at an acceptable solution. This characteristic implies that the ability to formulate approaches quickly prototype candidate solutions generally plays a major role in reducing the cost time required to arrive at a viable system implementation. What is DIP? An image is defined as a two-dimensional function f(x, y), where x y are the spatial coordinates, the amplitude of function â€Å"f† at any pair of coordinates (x, y) is called the intensity or gray level of the image at that particular point. When both the coordinates x and y the amplitude values of function â€Å"f† all have finite discrete quantities, then we call that image as a digital image. The field DIP refers to processing a digital image by the means of a digital computer. A image which is composed of finite number of elements,each element has particular location and value is named as a digital image.These elements are called as pixels. As we know that vision is the most advanced of our sensor,so image play the single most important role in human perception.However, humans are limited to the visual band of the EM spectrum but the imaging machines cover almost the entire EM specturm,ranging from the gamma waves to radio waves.These can operate also on the images generated by the sources that humans are not accustomed to associating with the image. There is no agreement among the authors regarding where the image processing stops and other related areas such as the image analysis and computer vision start.Sometimes a difference is made by defining image processing as a discipline in which both the input output at a process are the images. This is limiting somewhat artificial boundary.The area which is present in between the image processing and computer vision is image analysis(Understanding image). There are no clear-cut boundaries in the continuum from the image processing at one end to complete vision at the other end . However, one useful paradigm is to consider the three types of computerized processes in this continuum: low-level, mid-level, the high-level processes.The Low-level process involves the primitive operations such as image processing which is used to reduce noise, contrast enhancement image sharpening. A low- level process is characterized by the fact that both the inputs outputs are images. Tasks such as segmentation, description of an object to reduce them to a form suitable for computer processing classification of individual objects is the Mid level process on images. A mid-level process is characterized by the fact that the inputs given to the image are generally images but the outputs are attributes extracted from those images. Finally the higher- level processing involves â€Å"Making sense† of an ensemble of recognized objects, as in image an alysis at the far end of the continuum performing the cognitive functions normally associated with human vision. As already defined Digital image processing, is used successfully in broad range of areas of exceptional social economic value. What is an image? An image is defined as a two-dimensional function f(x, y), where x y are the spatial coordinates, the amplitude of function â€Å"f† at any pair of coordinates (x, y) is called the intensity or gray level of the image at that particular point. Gray scale image: A grayscale image can be defined as a function I (xylem) of the two spatial coordinates of the image plane. Assume I(x, y)as the intensity of the image at the point (x, y) on the image plane. I (xylem) takes all non-negative values assume that the image is bounded by a rectangle [0, a]  ´[0, b]I: [0, a]  ´ [0, b]  ® [0, info) Color image: It can be represented by the three functions, as R (xylem) for red, G (xylem) for green andB (xylem) for blue. An image may be continuous with respect to x and y coordinates of the plane and also in the amplitude.Converting such an image into a digital form requires the coordinates and the amplitude to be digitized.Digitizing the values of the coordinates is called sampling. Digitizing the values of the amplitude is called quantization. Coordinate convention: The result which is generated by using sampling and quantization is a matrix of real numbers.There are two principal ways to represent the digital images.Assume that an image with function f(x,y) is sampled in such a way that the resulting image has M rows and N columns.then the size of the image is MXN.The values of coordinates (xylem) are the discrete quantites.For the notational clarity and convenience, we can use the integer values for these discrete coordinates. In many of the image processing books, the image origin is defined at (xylem)=(0,0).The values of the next coordinate along with the first row of the image are (xylem)=(0,1).It is very important to keep in our mind that the notation (0,1) is used to signify the second sample along with the first row. It does not mean that these are the actual values of the physical coordinates,when the image was sampled.The figure below shows the coordinates convention. Note that the x ranges from 0 to M-1 and y ranges from 0 to N-1 in i nteger increments. The coordinate convention which is used in the toolbox to denote arrays is different from that of the preceding paragraph in two minor ways. Firstly, instead of using (xylem) in the toolbox it uses the notation (race) to indicate the rows and the columns. Note:However,the order of coordinates are the same as in the previous paragraph, in the sense the first element of the coordinate topples, (alb), refers to a row and the second one to a column. The other difference is that the origin of the coordinate system is at (r, c) = (1, 1); r ranges from 1 to M and c from 1 to N in the integer increments.The documentation of the IPT refers to the coordinates. Less frequently toolbox also employs another coordinate convention called spatial coordinates, which uses x to refer to column and y to refer to row. This is the quite opposite of our use of variables x and y. Image as Matrices: The discussion which we have done leads to the following representation for a digitized image function: f (0,0) f(0,1) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. f(0,N-1) f(1,0) f(1,1) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ f(1,N-1) f(xylem)= . . . . . . f(M-1,0) f(M-1,1) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ f(M-1,N-1) The right side of this equation represents a digital image by the definition. Each element which is in this array is called an image element, picture element, pixel or a pel. The terms image or pixel are used throughout the our discussions from now to denote a digital image and its elements. A digital image can be represented by a MATLAB matrix naturally as : f(1,1) f(1,2) †¦Ã¢â‚¬ ¦. f(1,N) f(2,1) f(2,2) †¦Ã¢â‚¬ ¦.. f(2,N) . . . f = . . . f(M,1) f(M,2) †¦Ã¢â‚¬ ¦.f(M,N) Where f(1,1) = f(0,0) (note use of a monoscope font to denote the MATLAB quantities). We can see clearly that the two representations are identical, except for the shift in the origin. The notation f(p ,q) denotes that the element is located in row p and the column q. For example f(6,2) denotes that the element is in the sixth row and second column of the matrix f. Typically here we use the letters M and N to denote the number of rows and columns respectively in a matrix. A 1xN matrix is known as a row vector whereas an Mx1 matrix is known as a column vector. A 11 matrix is a scalar matrix. Matrices in the MATLAB are stored in variables with different names such as A, a, RGB, real array etc All variables in Matlab must begin with a letter and can contain only letters, numerals and underscores. As noted previously,all the MATLAB quantities are written using the mono-scope characters. We use the conventional Roman or italic notation such as f(x ,y), for the mathematical expressions Reading Images: Using the function imread the images are read into the MATLAB environment. The syntax for this is: imread(‘filename) Format name Description recognized extension TIFF Tagged Image File Format .tif, .tiff JPEG Joint Photograph Experts Group .jpg, .jpeg GIF Graphics Interchange Format .gif BMP Windows Bitmap .bmp PNG Portable Network Graphics .png XWD X Window Dump .xwd Here filename is a string containing the complete image file(including applicable extensions if any).For example the command line >> f = imread (‘8. jpg); reads the JPEG (in the above table) image chestxray into image array f. Note that the use of the single quotes (‘) is to delimit the string filename. The semicolon at the end of a command line is used for suppressing output in the MATLAB. If the semicolon is not includedthen the MATLAB displays the results of the operation(s) specified only in that line. The prompt symbol(>>) says that it is the beginning of the command line, as it appears in the MATLAB command window. When in the preceding command line there is no path included in the filename, imread reads the file from current directory and if that fails then it tries to find the file in MATLAB search path. An easy way to read an image from a specified directory is to include a full or relative path to that directory in filename. For example, >> f = imread ( ‘E:myimageschestxray.jpg); This reads an image from a folder called myimages on the E: drive, whereas >> f = imread(‘ . myimageschestxray .jpg); It reads an image from myimages subdirectory of the current of the current working directory. Current directory window on the MATLAB desktop toolbar displays the MATLABs current working directory and provides a simple and a manual way to change it. The table above lists some of the most popular image/graphics formats supported by imread and imwrite. Function size gives the row and the column dimensions of an image: >> size (f) ans = 1024 * 1024 The above function is particularly useful in programming when used in the following form to automatically determine the size of an image: >>[M,N]=size(f); The syntax above returns the number of rows(M) and columns(N) present in the image. On whole the function displays the additional information about an array. For instance ,the statement >> whos f gives Name size Bytes Class F 1024*1024 1048576 unit8 array Grand total is 1048576 elements using 1048576 bytes The unit8 entry shown refers to one of the several MATLAB data classes. A semicolon at the end of a line has no effect ,so normally one is not used. Displaying Images: To diplay images on the MATLAB desktop we can use a function called imshow, which has the basic syntax: imshow(f,g) Where f is referred as an image array, and g as the number of intensity levels which are used to display it. If g is omitted here ,then by default it takes 256 levels .using the syntax imshow(f,{low high}) By using the above syntax it displays an image as black all values less than or equal to low and as white all values greater than or equal to high. The values which are in between are displayed as intermediate intensity values using the default number of levels .The final syntax is Imshow(f,[ ]) Sets the variable low to the minimum value of array f and high to its maximum value. This form of imshow is useful in displaying the images that have a low dynamic range or that have positive and negative values. Function named â€Å"pixval† is used frequently in order to display the intensity values of the individual pixels interactively. This function displays a cursor which is overlaid on an image. As and when the cursor is moved over the particular image with the mouse the coordinates of the cursor position and the corresponding intensity values are shown on the display that appears below the figure window .When working with the color images, the coordinates as well as the red, green and blue components are also displayed. If the left button of the mouse is clicked and then held pressed, pixval displays the Euclidean distance between the initial and the current cursor locations. The syntax form of interest here is Pixval which shows a cursor on the last image displayed. Clicking the button X on the cursor window turns it off. The following statements read from a disk an image called rose_512.tif extract basic information about that image and display it using imshow : >>f=imread(‘rose_512.tif); >>whos f Name Size Bytes Class F 512*512 262144 unit8 array Grand total is 262144 elements using 262144 bytes >>imshow(f) A semicolon at the end of an imshow line has no effect, so normally it is not used. If another image named g, is displayed using imshow, MATLAB replaces the image which is in the screen with the new image. To keep the first image and output the second image, we use a function figure as follows: >>figure ,imshow(g) Using the statement >>imshow(f),figure ,imshow(g) displays both the images. Keep in mind that more than one command can be written on a line ,as long as different commands are properly delimited by commas or semicolons. As mentioned, a semicolon is normally used whenever it is desired to suppress screen outputs from a command line. Suppose that we have just read an image h and find that using imshow produces an image. It is clearly understood that this image has a low dynamic range, which can be remedied for display purposes by using the statement. >>imshow(h,[ ]) WRITING IMAGES: By using the function imwrite images are written to disk ,which has the following basic syntax: Imwrite (f,filename) With the above syntax, the string which is contained in the filename must include a recognized file format extension.Alternatively, a desired format can be specified explicitly with a third input argument. >>imwrite(f,patient10_run1,tif) Or >>imwrite(f,patient10_run1.tif) In the above example the command writes f to a TIFF file named patient10_run1: If filename contains no information on the path of the file, then imwrite saves the file in the current working directory. The imwrite function can have some other parameters depending up on the e file format selected. Most of the work in the following chapter deals either with JPEG or TIFF images ,so we focus attention here on these formats. More general imwrite syntax which is applicable only to JPEG images is imwrite(f,filename.jpg,,quality,q) where q is an integer which is in between 0 and 100(the lower the number higher the degradation due to JPEG compression). For example, for q=25 the applicable syntax is >> imwrite(f,bubbles25.jpg,quality,25) The image for q=15 has false contouring which is barely visible, but this effect becomes quite applicable for q=5 and q=0.Thus, an expectable solution with some margin for error is to compress all the images with q=25.In order to get an idea of compression achieved and to obtain other image file details, we can use the function imfinfo which has syntax. Imfinfo filename Here filename implies the complete file name of the image stored in the disk. For example, >> imfinfo bubbles25.jpg outputs the following information(note that some fields contain no information in this case): Filename: ‘bubbles25.jpg FileModDate: 04-jan-2003 12:31:26 FileSize: 13849 Format: ‘jpg Format Version: ‘ ‘ Width: 714 Height: 682 Bit Depth: 8 Color Depth: ‘grayscale Format Signature: ‘ ‘ Comment: { } Where size of the file is in bytes. The number of bytes in the original image is simply corrupted by multiplying width by height by bit depth and then dividing the result by 8. The result is 486948.Dividing file size gives the compression ratio:(486948/13849)=35.16.This compression ratio was achieved. While maintaining the image quality consistent with the requirements of the appearance. In addition to obvious advantages in storage space, this reduction allows the transmission of approximately 35 times the amount of uncompressed data per unit time. The information fields which are displayed by imfinfo can be captured to a so called structure variable that can be for the subsequent computations. Using the receding example and assigning the n Image Based Steganographyusing LSB Insertion Technique Image Based Steganographyusing LSB Insertion Technique ABSTRACT Steganography is a technique used to hide the message in vessel data by embedding it. The Vessel Data which is visible is known as external information and the data which is embedded is called as internal information.The extrenal information is not much useful to the data owner. The techniques used in Steganography makes hard to detect hidden message within an image file. By this technique we are not only sending a message but also we are hiding the message. Steganography system is designed to encode and decode a secret file embedded in image file with a random Least Significant Bit(LSB) insertion technique. By using this technique the secret data are spread out among the image data in a random manner with the help of a secret key. The key generates pseudorandom numbers and identifies where and in which order hidden message is laid out. The advantage of using this method is that it includes cryptography. In cryptography, diffusion is applied to secret message. INTRODUCTION: The information communicated comes in number of forms and is used in various number of applications. In large number of these applications, it is desired that the communication has to be done in secrete. Such secret communication ranges from the obvious cases of bank transfers, corporate communications, and credit card purchases,and large percentage of everyday e-mail. Steganography is an ancient art of embedding a message in such a way that no one,except the sender and the recipient,suspects the existence of the message. Most of the newer applications use Steganography as a watermark, to protect a copy right on information. The forms of Steganography vary, but unsurprisingly, innocuous spam messages are turning up more often containing embedded text. A new transform domain technique for embedding the secret information in the integer wavelet which is transformed on a cover image is implemented here. A technique which is used to scramble a secrete or a confidential message in order to make it unreadable for a third party is known as the Cryptography.Now-a-days its commonly used in the internet communications.cryptography can hide the content of the message but it cant hide the location of the secrete message.This is how the attackers can target even an encrypted message.Water marking is the another information of hiding the digital data or a picture or musical sound.The main purpose of this watermarking information is to protect the copyright or the ownership of the data.In this technique the robustness of the embedded evidence,that can be very small, is the most important.The external information which is visible is the valuable information in the watermarking technique. steganography is a technique which is used to make the confidential information imperceptible to the human eyes by embedding the message in some dummy data such as the digital image or a speech sound.There is a research topic about the steganography known as the steganalysis.The main objective of this steganalysis is to find out the stego file among the given files.It is a technique which is used to detect the suspicious image or sound file which is embedded with the crime related information.So,we need to make a sniffer-dog-program to break the steganography.However,it is too difficult to make a program that really works. All the traditional steganography techniques have very limited information-hiding capacity.They can hide only 10% (or less) of the data amounts of the vessel.This is because the principle of those techniques which were either to replace a special part of the frequency components of the vessel image, or to replace all the least significant bits which are present in a multivalued image with the secrete information.In the new steganography which we are using uses an image as the vesel data, and we need to embed the secrete information in to the bit planes of the vessel.The percentage of information hiding capacity of a true color image is around 50.All the noise-like regions in the bit planes of the vessel image can be replaced with the secret data without deteriorating the quality of the image,which is known as BPCS-Steganography, which stands for Bit-Plane Complexity Segmentation Steganography. BACKGROUND HISTORY: The word Steganography is of Greek origin and means â€Å"covered, or hidden writing†. Its ancient origins can be traced back to 440BC. THEORY: Steganography is a technique which is used now a days to make confidential information imperceptible to the human eyes by embedding it in to some innocent looking vessel data or a dummy data such as a digital image or a speech sound.In a multi bit data structure a typical vessel is defined as a color image having Red,Green and blue components in it.By using a special extracting program and a key the embedded information can be extracted,the technique of steganography is totally different from file deception or file camouflage techniques. A technique to hide the secrete data in a computer file which almost looks like a steganography is known as a file deception or file camouflage.But actually, it is defined as a trick which is used to disguise a secret-data-added file as a normal file.This can be done as most of the computer file formats have some dont-care portion in one file.For instance if we take some file formats as jpeg,mpeg3 or some word file these looks like the original image,sound or document respectively on the computer.Some of them could have misunderstood that such a trick is a type of Steganography.However,such files can have an extra lengthy file sizes, and they can be easily detected by most of the computer engineers.So, by this we can understand that the file deception is totally different from that of the steganographic techinque which we are discussing here. Many of the Steganography software which is in the market today is based on the file decepetion.If we find a steganography program that increases the output file size just by the amount we have embedded, then the program is obviously a file deception.If there is some secrete data then we should encrypt in such a way that it is not readable for the third party.A solution to Keep secrete information very safe is known as Data Encryption.It is totally based on scrambling the data by using some type of the secrete key. However,encrypting the data will draw more attention of the people who have not encrypted the data.So, it is very to the owner to know whether the data is encrypted or not.By, this we can know that the encrypting is not enough. There is another solution which is known steganography. There are two types of data in steganography, one is the secret data that is very valuable and the other is a type of media data vessel or carrier or dummy data.Vessel data is essential, but it is not so valuable.It is defined as the data in which the valuable data is embedded. The data which is already embedded in the vessel data is called stego data.By using the stego data we can extract the secret or the valuable data. For embedding and extracting the data we need a special program and a key. A typical vessel is an image data with Red, Green, and Blue color components present in it in a 24 bits pixel structure. The illustration below shows a general scheme of Steganography. Steganography is a technique which is used to hide secret data by embedding it in some innocent looking media data like Mona lisa in the above picture.The data which is embedded is very safe because Steganography hides both the content and the location of the secret information.In the media data there are many different methods to embed the data.It is highly impossible to detect which method is used for embedding the data.Steganography can co-operate with cryptography in the sense that it can embed the encrypted secret data and make it much safer. The most important point in the steganography technique is that the stego data does not have any evidence that some extra data is embedded there.In other way, the vessel data and the stego data must be very similar.The user of the steganography should discard the original vessel data after embedding,so that no one can compare the stego and the original data. It is also important that the capacity for embedding the data is large.As it is larger it is better.Of all the currently available steganography methods the BPCS method is the best. LEAST SIGNIFICANT BIT INSERTION One of the most common techniques used in Steganographytoday is called least significant bit (LSB) insertion. This method is exactly what it sounds like; the least significant bits of the cover-image are altered so that they form the embeddedinformation. The following example shows how the letter A can be hidden in the first eight bytes of three pixels in a 24-bit image. Pixels: (00100111 11101001 11001000) (00100111 11001000 11101001) (11001000 00100111 11101001) A: 01000001 Result: (00100110 11101001 11001000) (00100110 11001000 11101000) (11001000 00100111 11101001) The three underlined bits are the only three bits that were actually altered. LSB insertion requires on average that only half the bits in an image be changed. Since the 8-bit letter A only requires eight bytes to hide it in, the ninth byte of the three pixels can be used to begin hiding the next character of the hidden message. A slight variation of this technique allows for embedding the message in two or more of the least significant bits per byte. This increases the hidden information capacity of the cover-object, but the cover-object is degraded more, and therefore it is more detectable. Other variations on this technique include ensuring that statistical changes in the image do not occur. Some intelligent software also checks for areas that are made up of one solid color. Changes in these pixels are then avoided because slight changes would cause noticeable variations in the area .While LSB insertion is easy to implement, it is also easily attacked. Slight modifications in the color palette and simple image manipulations will destroy the entire hidden message. Some examples of these simple image manipulations include image resizing and cropping. Applications of Steganography : Steganography is applicable to, but not limited to, the following areas. Confidential communication and secret data storing. Protection of data alteration Access control system for digital content distribution. Media Database systems. The area differs in what feature of the Steganography is utilized in each system. 1. Confidential communication and secret data storing: The â€Å"secrecy† of the embedded data is essential in this area. Historically, Steganography have been approached in this area.Steganography provides us with: (A).Potential capacity to hide the existence of confidential data. (B).Hardness of detecting the hidden (i.e., embedded ) data. (C).Strengthening of the secrecy of the encrypted data. In practice , when you use some Steganography, you must first select a vessel data according to the size of the embedding data.The vessel should be innocuous.Then,you embed the confidential data by using an embedding program (which is one component of the Steganography software ) together with some key .When extracting , you (or your party ) use an extracting program (another component) to recover the embedded data by the same key (â€Å"common key â€Å" in terms of cryptography ).In this case you need a â€Å"key negotiation â€Å" before you start communication. 2. Protection of data alteration: We take advantage of the fragility of the embedded data in this application area. The embedded data can rather be fragile than be very robust. Actually, embedded data are fragile in most steganography programs. However, this fragility opens a new direction toward an information-alteration protective system such as a Digital Certificate Document System. The most novel point among others is that no authentication bureau is needed. If it is implemented, people can send their digital certificate data to any place in the world through Internet. No one can forge, alter, nor tamper such certificate data. If forged, altered, or tampered, it is easily detected by the extraction program. 3. Access control system for digital content distribution: In this area embedded data is hidden, but is explained to publicize the content. Today, digital contents are getting more and more commonly distributed by Internet than ever before. For example, music companies release new albums on their Webpage in a free or charged manner. However, in this case, all the contents are equally distributed to the people who accessed the page. So, an ordinary Web distribution scheme is not suited for a case-by-case and selective distribution. Of course it is always possible to attach digital content to e-mail messages and send to the customers. But it will takes a lot of cost in time and labor. If you have some valuable content, which you think it is okay to provide others if they really need it, and if it is possible to upload such content on the Web in some covert manner. And if you can issue a special access key to extract the content selectively, you will be very happy about it. A steganographic scheme can help realize a this type of system. We have developed a prototype of an Access Control System for digital content distribution through Internet. The following steps explain the scheme. (1) A content owner classify his/her digital contents in a folder-by-folder manner, and embed the whole folders in some large vessel according to a steganographic method using folder access keys, and upload the embedded vessel (stego data) on his/her own Webpage. (2) On that Webpage the owner explains the contents in depth and publicize worldwide. The contact information to the owner (post mail address, e-mail address, phone number, etc.) will be posted there. (3) The owner may receive an access-request from a customer who watched that Webpage. In that case, the owner may (or may not) creates an access key and provide it to the customer (free or charged). In this mechanism the most important point is, a selective extraction is possible or not. 4. Media Database systems: In this application area of steganography secrecy is not important, but unifying two types of data into one is the most important. Media data (photo picture, movie, music, etc.) have some association with other information. A photo picture, for instance, may have the following. The title of the picture and some physical object information. The date and the time when the picture was taken. The camera and the photographers information. DIGITAL IMAGE PROCESSING BACKGROUND: Digital image processing is an area that is characterized by the need for extensive experimental work to establish the viability of the proposed solutions to a given problem. An important characteristic which is underlying in the design of image processing systems is the significant level of testing the experimentation that normally required before arriving at an acceptable solution. This characteristic implies that the ability to formulate approaches quickly prototype candidate solutions generally plays a major role in reducing the cost time required to arrive at a viable system implementation. What is DIP? An image is defined as a two-dimensional function f(x, y), where x y are the spatial coordinates, the amplitude of function â€Å"f† at any pair of coordinates (x, y) is called the intensity or gray level of the image at that particular point. When both the coordinates x and y the amplitude values of function â€Å"f† all have finite discrete quantities, then we call that image as a digital image. The field DIP refers to processing a digital image by the means of a digital computer. A image which is composed of finite number of elements,each element has particular location and value is named as a digital image.These elements are called as pixels. As we know that vision is the most advanced of our sensor,so image play the single most important role in human perception.However, humans are limited to the visual band of the EM spectrum but the imaging machines cover almost the entire EM specturm,ranging from the gamma waves to radio waves.These can operate also on the images generated by the sources that humans are not accustomed to associating with the image. There is no agreement among the authors regarding where the image processing stops and other related areas such as the image analysis and computer vision start.Sometimes a difference is made by defining image processing as a discipline in which both the input output at a process are the images. This is limiting somewhat artificial boundary.The area which is present in between the image processing and computer vision is image analysis(Understanding image). There are no clear-cut boundaries in the continuum from the image processing at one end to complete vision at the other end . However, one useful paradigm is to consider the three types of computerized processes in this continuum: low-level, mid-level, the high-level processes.The Low-level process involves the primitive operations such as image processing which is used to reduce noise, contrast enhancement image sharpening. A low- level process is characterized by the fact that both the inputs outputs are images. Tasks such as segmentation, description of an object to reduce them to a form suitable for computer processing classification of individual objects is the Mid level process on images. A mid-level process is characterized by the fact that the inputs given to the image are generally images but the outputs are attributes extracted from those images. Finally the higher- level processing involves â€Å"Making sense† of an ensemble of recognized objects, as in image an alysis at the far end of the continuum performing the cognitive functions normally associated with human vision. As already defined Digital image processing, is used successfully in broad range of areas of exceptional social economic value. What is an image? An image is defined as a two-dimensional function f(x, y), where x y are the spatial coordinates, the amplitude of function â€Å"f† at any pair of coordinates (x, y) is called the intensity or gray level of the image at that particular point. Gray scale image: A grayscale image can be defined as a function I (xylem) of the two spatial coordinates of the image plane. Assume I(x, y)as the intensity of the image at the point (x, y) on the image plane. I (xylem) takes all non-negative values assume that the image is bounded by a rectangle [0, a]  ´[0, b]I: [0, a]  ´ [0, b]  ® [0, info) Color image: It can be represented by the three functions, as R (xylem) for red, G (xylem) for green andB (xylem) for blue. An image may be continuous with respect to x and y coordinates of the plane and also in the amplitude.Converting such an image into a digital form requires the coordinates and the amplitude to be digitized.Digitizing the values of the coordinates is called sampling. Digitizing the values of the amplitude is called quantization. Coordinate convention: The result which is generated by using sampling and quantization is a matrix of real numbers.There are two principal ways to represent the digital images.Assume that an image with function f(x,y) is sampled in such a way that the resulting image has M rows and N columns.then the size of the image is MXN.The values of coordinates (xylem) are the discrete quantites.For the notational clarity and convenience, we can use the integer values for these discrete coordinates. In many of the image processing books, the image origin is defined at (xylem)=(0,0).The values of the next coordinate along with the first row of the image are (xylem)=(0,1).It is very important to keep in our mind that the notation (0,1) is used to signify the second sample along with the first row. It does not mean that these are the actual values of the physical coordinates,when the image was sampled.The figure below shows the coordinates convention. Note that the x ranges from 0 to M-1 and y ranges from 0 to N-1 in i nteger increments. The coordinate convention which is used in the toolbox to denote arrays is different from that of the preceding paragraph in two minor ways. Firstly, instead of using (xylem) in the toolbox it uses the notation (race) to indicate the rows and the columns. Note:However,the order of coordinates are the same as in the previous paragraph, in the sense the first element of the coordinate topples, (alb), refers to a row and the second one to a column. The other difference is that the origin of the coordinate system is at (r, c) = (1, 1); r ranges from 1 to M and c from 1 to N in the integer increments.The documentation of the IPT refers to the coordinates. Less frequently toolbox also employs another coordinate convention called spatial coordinates, which uses x to refer to column and y to refer to row. This is the quite opposite of our use of variables x and y. Image as Matrices: The discussion which we have done leads to the following representation for a digitized image function: f (0,0) f(0,1) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. f(0,N-1) f(1,0) f(1,1) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ f(1,N-1) f(xylem)= . . . . . . f(M-1,0) f(M-1,1) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ f(M-1,N-1) The right side of this equation represents a digital image by the definition. Each element which is in this array is called an image element, picture element, pixel or a pel. The terms image or pixel are used throughout the our discussions from now to denote a digital image and its elements. A digital image can be represented by a MATLAB matrix naturally as : f(1,1) f(1,2) †¦Ã¢â‚¬ ¦. f(1,N) f(2,1) f(2,2) †¦Ã¢â‚¬ ¦.. f(2,N) . . . f = . . . f(M,1) f(M,2) †¦Ã¢â‚¬ ¦.f(M,N) Where f(1,1) = f(0,0) (note use of a monoscope font to denote the MATLAB quantities). We can see clearly that the two representations are identical, except for the shift in the origin. The notation f(p ,q) denotes that the element is located in row p and the column q. For example f(6,2) denotes that the element is in the sixth row and second column of the matrix f. Typically here we use the letters M and N to denote the number of rows and columns respectively in a matrix. A 1xN matrix is known as a row vector whereas an Mx1 matrix is known as a column vector. A 11 matrix is a scalar matrix. Matrices in the MATLAB are stored in variables with different names such as A, a, RGB, real array etc All variables in Matlab must begin with a letter and can contain only letters, numerals and underscores. As noted previously,all the MATLAB quantities are written using the mono-scope characters. We use the conventional Roman or italic notation such as f(x ,y), for the mathematical expressions Reading Images: Using the function imread the images are read into the MATLAB environment. The syntax for this is: imread(‘filename) Format name Description recognized extension TIFF Tagged Image File Format .tif, .tiff JPEG Joint Photograph Experts Group .jpg, .jpeg GIF Graphics Interchange Format .gif BMP Windows Bitmap .bmp PNG Portable Network Graphics .png XWD X Window Dump .xwd Here filename is a string containing the complete image file(including applicable extensions if any).For example the command line >> f = imread (‘8. jpg); reads the JPEG (in the above table) image chestxray into image array f. Note that the use of the single quotes (‘) is to delimit the string filename. The semicolon at the end of a command line is used for suppressing output in the MATLAB. If the semicolon is not includedthen the MATLAB displays the results of the operation(s) specified only in that line. The prompt symbol(>>) says that it is the beginning of the command line, as it appears in the MATLAB command window. When in the preceding command line there is no path included in the filename, imread reads the file from current directory and if that fails then it tries to find the file in MATLAB search path. An easy way to read an image from a specified directory is to include a full or relative path to that directory in filename. For example, >> f = imread ( ‘E:myimageschestxray.jpg); This reads an image from a folder called myimages on the E: drive, whereas >> f = imread(‘ . myimageschestxray .jpg); It reads an image from myimages subdirectory of the current of the current working directory. Current directory window on the MATLAB desktop toolbar displays the MATLABs current working directory and provides a simple and a manual way to change it. The table above lists some of the most popular image/graphics formats supported by imread and imwrite. Function size gives the row and the column dimensions of an image: >> size (f) ans = 1024 * 1024 The above function is particularly useful in programming when used in the following form to automatically determine the size of an image: >>[M,N]=size(f); The syntax above returns the number of rows(M) and columns(N) present in the image. On whole the function displays the additional information about an array. For instance ,the statement >> whos f gives Name size Bytes Class F 1024*1024 1048576 unit8 array Grand total is 1048576 elements using 1048576 bytes The unit8 entry shown refers to one of the several MATLAB data classes. A semicolon at the end of a line has no effect ,so normally one is not used. Displaying Images: To diplay images on the MATLAB desktop we can use a function called imshow, which has the basic syntax: imshow(f,g) Where f is referred as an image array, and g as the number of intensity levels which are used to display it. If g is omitted here ,then by default it takes 256 levels .using the syntax imshow(f,{low high}) By using the above syntax it displays an image as black all values less than or equal to low and as white all values greater than or equal to high. The values which are in between are displayed as intermediate intensity values using the default number of levels .The final syntax is Imshow(f,[ ]) Sets the variable low to the minimum value of array f and high to its maximum value. This form of imshow is useful in displaying the images that have a low dynamic range or that have positive and negative values. Function named â€Å"pixval† is used frequently in order to display the intensity values of the individual pixels interactively. This function displays a cursor which is overlaid on an image. As and when the cursor is moved over the particular image with the mouse the coordinates of the cursor position and the corresponding intensity values are shown on the display that appears below the figure window .When working with the color images, the coordinates as well as the red, green and blue components are also displayed. If the left button of the mouse is clicked and then held pressed, pixval displays the Euclidean distance between the initial and the current cursor locations. The syntax form of interest here is Pixval which shows a cursor on the last image displayed. Clicking the button X on the cursor window turns it off. The following statements read from a disk an image called rose_512.tif extract basic information about that image and display it using imshow : >>f=imread(‘rose_512.tif); >>whos f Name Size Bytes Class F 512*512 262144 unit8 array Grand total is 262144 elements using 262144 bytes >>imshow(f) A semicolon at the end of an imshow line has no effect, so normally it is not used. If another image named g, is displayed using imshow, MATLAB replaces the image which is in the screen with the new image. To keep the first image and output the second image, we use a function figure as follows: >>figure ,imshow(g) Using the statement >>imshow(f),figure ,imshow(g) displays both the images. Keep in mind that more than one command can be written on a line ,as long as different commands are properly delimited by commas or semicolons. As mentioned, a semicolon is normally used whenever it is desired to suppress screen outputs from a command line. Suppose that we have just read an image h and find that using imshow produces an image. It is clearly understood that this image has a low dynamic range, which can be remedied for display purposes by using the statement. >>imshow(h,[ ]) WRITING IMAGES: By using the function imwrite images are written to disk ,which has the following basic syntax: Imwrite (f,filename) With the above syntax, the string which is contained in the filename must include a recognized file format extension.Alternatively, a desired format can be specified explicitly with a third input argument. >>imwrite(f,patient10_run1,tif) Or >>imwrite(f,patient10_run1.tif) In the above example the command writes f to a TIFF file named patient10_run1: If filename contains no information on the path of the file, then imwrite saves the file in the current working directory. The imwrite function can have some other parameters depending up on the e file format selected. Most of the work in the following chapter deals either with JPEG or TIFF images ,so we focus attention here on these formats. More general imwrite syntax which is applicable only to JPEG images is imwrite(f,filename.jpg,,quality,q) where q is an integer which is in between 0 and 100(the lower the number higher the degradation due to JPEG compression). For example, for q=25 the applicable syntax is >> imwrite(f,bubbles25.jpg,quality,25) The image for q=15 has false contouring which is barely visible, but this effect becomes quite applicable for q=5 and q=0.Thus, an expectable solution with some margin for error is to compress all the images with q=25.In order to get an idea of compression achieved and to obtain other image file details, we can use the function imfinfo which has syntax. Imfinfo filename Here filename implies the complete file name of the image stored in the disk. For example, >> imfinfo bubbles25.jpg outputs the following information(note that some fields contain no information in this case): Filename: ‘bubbles25.jpg FileModDate: 04-jan-2003 12:31:26 FileSize: 13849 Format: ‘jpg Format Version: ‘ ‘ Width: 714 Height: 682 Bit Depth: 8 Color Depth: ‘grayscale Format Signature: ‘ ‘ Comment: { } Where size of the file is in bytes. The number of bytes in the original image is simply corrupted by multiplying width by height by bit depth and then dividing the result by 8. The result is 486948.Dividing file size gives the compression ratio:(486948/13849)=35.16.This compression ratio was achieved. While maintaining the image quality consistent with the requirements of the appearance. In addition to obvious advantages in storage space, this reduction allows the transmission of approximately 35 times the amount of uncompressed data per unit time. The information fields which are displayed by imfinfo can be captured to a so called structure variable that can be for the subsequent computations. Using the receding example and assigning the n