The proceedings contain 25 papers. The topics discussed include: reduced memory JPEG decompression for mobile devices;an efficient real-time video compression algorithm with high feature preserving capability;an imagi...
详细信息
ISBN:
(纸本)081946306X
The proceedings contain 25 papers. The topics discussed include: reduced memory JPEG decompression for mobile devices;an efficient real-time video compression algorithm with high feature preserving capability;an imaging toolbox for smart phone applications;performance evaluation of wavelet-based face verification on a PDA recorded database;audio-visual imposture;secure steganography designed for mobile platforms;a new JPEG-based steganographic algorithm for mobile devices;on mobile wireless ad hoc IP video transports;enhancement of node connectivity for mobile ad hoc networks;robust image transmission over MIMO space-time coded wireless systems;secure image communication for network applications;privacy enabling technology for video surveillance;a logarithmic measure of image enhancement;and content-based video indexing and searching with wavelength transformation.
The proceedings contain 24 papers. The topics discussed include: recent advances in multiview distributed video coding;super-resolution-based enhancement for real-time ultra-low-bit-rate video coding;signal compressio...
详细信息
ISBN:
(纸本)0819467014
The proceedings contain 24 papers. The topics discussed include: recent advances in multiview distributed video coding;super-resolution-based enhancement for real-time ultra-low-bit-rate video coding;signal compression via logic transforms;a prompt informatoin retrieval system on handheld devices;detecting and isolating malicious nodes in wireless ad hoc networks;switching theory-based steganographic system for JPEG images;new quantization matrices for JPEG steganography;a mesh-based robust digital watermarking technique against geometric attacks;multi-level signature based biometric authentication using watermarking;the problems of using ROC curve as the sole criterion in positive biometrics identification;secure access control to hidden data by biometric features;and a robust digital watermarking scheme by use of integral imaging technique.
image enhancement performance is currently judged subjectively, with no reliable manner of quantifying the results of an enhancement. Current quantitative measures rely on linear algorithms to determine contrast, leav...
详细信息
ISBN:
(纸本)081946306X
image enhancement performance is currently judged subjectively, with no reliable manner of quantifying the results of an enhancement. Current quantitative measures rely on linear algorithms to determine contrast, leaving room for improvement. With the introduction of more complex enhancement algorithms, there is a need for an effective method of quantifying performance to select optimal parameters. In this paper, we present a logarithmic based image enhancement measure. We demonstrate its performance on real world images. The results will show the effectiveness of our measures to select optimal enhancement parameters for the enhancement algorithms.
The paper presents a Digital imageprocessing toolbox for cellular phones. It is intended for users dealing with imaging algorithms and allows the processing of real images taken by the camera phones. For example, use...
详细信息
ISBN:
(纸本)081946306X
The paper presents a Digital imageprocessing toolbox for cellular phones. It is intended for users dealing with imaging algorithms and allows the processing of real images taken by the camera phones. For example, users are able to analyze the images and selected regions of interest using different transforms including Discrete Fourier, Hartley, and Cosine Transforms. One can apply different filters such as median and moving average. Simple image enhancement techniques are also included in the toolbox. A handy user interface allows a suitable browsing through the images and operators. The toolbox is designed to be expandable and more operations will be included in the future targeting military and securityapplications. The toolbox is implemented using Series 60 Platform SDK for Symbian (TM) OS, for C++. It allows developers to quickly and efficiently run and test applications for devices that are compatible with the Series 60 Platform. The algorithms are first implemented on Series 60 Platform device emulator on the PC and then installed on the cell phone.
In this contribution, we present a novel technique for imperceptible and robust watermarking of digital images. It is based on the host image 2-th level decomposition using the Fibonacci-Haar Transform (FHT) and on th...
详细信息
ISBN:
(纸本)9780819467010
In this contribution, we present a novel technique for imperceptible and robust watermarking of digital images. It is based on the host image 2-th level decomposition using the Fibonacci-Haar Transform (FHT) and on the Singular Value Decomposition (SVD) of the transformed subbands. The main contributions of this approach are the use of the FHT for hiding purposes, the flexibility in data hiding capacity, and the key-dependent secrecy of the used transform. The experimental results show the effectiveness of the proposed approach both in perceived quality of the watermarked image and in robustness against the most common attacks.
In this paper we introduce a new chaotic stream cipher Mmohocc which utilizes the fundamental chaos characteristics. The designs of the major components of the cipher are given. Its cryptographic properties of period,...
详细信息
ISBN:
(纸本)9780819467010
In this paper we introduce a new chaotic stream cipher Mmohocc which utilizes the fundamental chaos characteristics. The designs of the major components of the cipher are given. Its cryptographic properties of period, auto- and cross-correlations, and the mixture of Markov processes and spatiotemporal effects are investigated. The cipher is resistant to the related-key-IV, Time/Memory/Data tradeoff, algebraic, and chosen-text attacks. The keystreams successfully passed two batteries of statistical tests and the encryption speed is comparable with RC4.
In this paper, a novel authentications system combining biometric cryptosystems with digital watermarking is presented. One of the main vulnerabilities of the existing data hiding systems is the public knowledge of th...
详细信息
ISBN:
(纸本)9780819467010
In this paper, a novel authentications system combining biometric cryptosystems with digital watermarking is presented. One of the main vulnerabilities of the existing data hiding systems is the public knowledge of the embedding domain. We propose the use of biometric data, minutiae fingerprint set, for generating the encryption key, needed to decompose an image in the Tree structured Haar transform. The uniqueness of the biometrics key together with other, embedded, biometric information guarantee the authentication of the user. Experimental tests show the effectiveness of the proposed system.
This paper presents a new method which enhances the quality-of-service (QoS) and hence the response time and queuing delay of real-time interactive multimedia over the Internet. A service class based on differentiated...
详细信息
ISBN:
(纸本)9780819467010
This paper presents a new method which enhances the quality-of-service (QoS) and hence the response time and queuing delay of real-time interactive multimedia over the Internet. A service class based on differentiated services mechanism has been developed. Evaluation of response time under different traffic conditions has been conducted via simulation. Specifically, the impact on routers performance at the boundary of a DS-enabled domain was evaluated using OPNET and the results are presented. Since audio and video traffic have different needs, priority schemes for different types of interactive multimedia traffic have been studied to provide control and predictable service, and therefore, better quality of service.
A secure image transmission scheme based on JPEG2000 codec is proposed in this paper, which combines encryption with encoding and is suitable for real-time applications. In this scheme, the sensitive data are self-aut...
详细信息
ISBN:
(纸本)081946306X
A secure image transmission scheme based on JPEG2000 codec is proposed in this paper, which combines encryption with encoding and is suitable for real-time applications. In this scheme, the sensitive data are self-authenticated, then partial-encrypted during compression process, and the compressed data are encrypted by the lightweight encryption algorithm combined with error-correction codec. The self-authentication process can detect malicious tampering or transmission errors. The encryption process obtains suitable tradeoff between security and time-efficiency through encrypting data adaptively, and keeps the original system's error-robustness. The decryption process is symmetric to the encryption process. Experimental results show that this scheme obtains high perception security and time efficiency, and is thus suitable for secure image transmission over network.
Steganalysis has many challenges;which include the accurate and efficient detection of hidden content within digital images. This paper focuses on the development of a new multi pixel comparison method used for the de...
详细信息
ISBN:
(纸本)081946306X
Steganalysis has many challenges;which include the accurate and efficient detection of hidden content within digital images. This paper focuses on the development of a new multi pixel comparison method used for the detection of steganographic content within digital images transmitted over mobile channels. The sensitivity of detecting hidden information within a digital image can be increased or decreased to determine if slight changes have been made to the digital image for the target of blind steganalysis. The key thought of the presented method is to increase the sensitivity of features when alterations are made within the bit planes of a digital image. The differences between the new method and existing pixel comparison methods are;multiple masks of different sizes are used to increase the sensitivity and weighted features are used to improve the classification of the feature sets. Weights are also used with the various pixel comparisons to ensure proper sensitivity when detecting small changes. The article also investigates the reliability of detection and estimation length of hidden data within wireless digital images with potential for militaryapplications emphasizing on defense and security.
暂无评论