The scenario of using Automatic Repeat reQuest (ARQ) retransmission for two-way low bit-rate video communications over wireless Rayleigh fading channels is studied. In this kind of channel, the packets inevitably expe...
详细信息
The scenario of using Automatic Repeat reQuest (ARQ) retransmission for two-way low bit-rate video communications over wireless Rayleigh fading channels is studied. In this kind of channel, the packets inevitably experience errors during deep fades. The retransmissions can be used to re-send such packets. During retransmissions, the video encoder buffer fills up quickly and may cause the rate-control algorithm to skip frames or allocate less number of bits to encode the video frame. To reduce the number of frames skipped and improve bit allocation, we propose a content-based rate-control scheme using simplified block-based segmentation to intelligently allocate more bits to the foreground region. In addition, our proposed scheme also takes into consideration the effects of the video buffer fill-up, an a priori channel model, channel feedback information. The simulation results indicate that our proposed scheme encodes the video sequences with higher quality on the foreground region and much fewer frame skipping as compared to H.263 TMN8.
Due to its portability and popularity for Internet applications, Java has become one of the major programming languages. The similar syntax inherited from the C language and the pure object oriented features, compared...
详细信息
Due to its portability and popularity for Internet applications, Java has become one of the major programming languages. The similar syntax inherited from the C language and the pure object oriented features, compared to the non-pure object-oriented C++ language, have caused Java to be a good candidate as a tool in designing object oriented systems, especially in database servers. However the performance of the Java Virtual Machine (JVM) is the reason that several database designers, such as Oracle, IBM, Sybase and Informix, have not fully transferred their database management system (DBMS) into Java. One of the performance indices is the responsiveness for online transaction processing (OLTP) which may be dominated by the garbage collection system inside the JVM. In this paper eight Java programs, jess, javac, mtrt, compress, db, db4o, smallDB and ozone, are used to study the dynamic memory behavior. The latter four programs are Java object-oriented database management systems and their object behaviors are compared to those of the four regular Java programs. Simulation results such as object size distribution, average object size, object live distribution and total garbage collection cycle are reported.
An important parameter in evaluating data hiding methods is hiding capacity (Cohen et al., 1999) i.e. the amount of data that a certain algorithm can "hide" until reaching allowable distortion limits. One fu...
详细信息
An important parameter in evaluating data hiding methods is hiding capacity (Cohen et al., 1999) i.e. the amount of data that a certain algorithm can "hide" until reaching allowable distortion limits. One fundamental difference between watermarking (Cox et al., 1997; 1999) and generic data hiding resides exactly in the main applicability and descriptions of the two domains. In the digital framework, watermarking algorithms that make use of information hiding techniques have been developed and hiding capacity was naturally used as a metric in evaluating their power to hide information. Whereas the maximal amount of information that a certain algorithm can "hide" (while keeping the data within allowable distortion bounds) is certainly related to the ability to assert ownership in court, it is not directly measuring its power of persuasion, in part also because it does not consider directly the existence and power of watermarking attacks. We show why, due to its particularities, watermarking requires a different metric, more closely related to its ultimate purpose, claiming ownership in a court of law. We define one suitable metric (watermarking power) and show how it relates to derivates of hiding capacity. We prove that there are cases where considering hiding capacity is sub-optimal as a metric in evaluating watermarking methods whereas the metric of watermarking power delivers good results.
The proceedings contain 85 papers. The topics discussed include: searching and filtering of audio-visual information: technologies, standards, and applications;dequantization bias for JPEG decompression;a probabilisti...
ISBN:
(纸本)0769505406
The proceedings contain 85 papers. The topics discussed include: searching and filtering of audio-visual information: technologies, standards, and applications;dequantization bias for JPEG decompression;a probabilistic image model for smoothing and compression;application specific image compression forvirtual conferencing;media-independent watermarking classification and the need for combining digital video and audio watermarking for media authentication;a spatial digital video watermark that survives MPEG;overview of interference cancellation for CDMA wireless systems;wireless multimedia communication through multichannel multipoint distribution service;advanced signal processing for wireless multimedia communications;simple collosion-secure fingerprinting schemes for images;and digital watermarking using inter-block correlation: extension to JPEG coded domain.
A speech content integrity verification scheme integrated with ITU G 723.1 speech coding to minimize the total computational cost is proposed in this research. Speech features relevant to the semantic meaning are extr...
详细信息
ISBN:
(纸本)0769510620
A speech content integrity verification scheme integrated with ITU G 723.1 speech coding to minimize the total computational cost is proposed in this research. Speech features relevant to the semantic meaning are extracted, encrypted and attached as the header information. This scheme is not only much faster than cryptographic bitstream integrity algorithms, but also more compatible with a variety of applications. The speech signal could go through recompression, amplification, transcoding, re-sampling, D/A and A/D conversion and minor white noise pollution without triggering the verification alarm.
The traditional approach to coding of noisy and distorted images assumes preliminary enhancement and restoring of images and only then in fact their coding. In the given work novel technique is proposed, where the ind...
详细信息
ISBN:
(纸本)0769510620
The traditional approach to coding of noisy and distorted images assumes preliminary enhancement and restoring of images and only then in fact their coding. In the given work novel technique is proposed, where the indicated procedures are combined in the optimum algebraic coding. At the heart of the offered approach is the optimization of coordinate basis of an image representation. If is shown, that the required optimum properties have the. eigenfunctions of the Fisher's information operator known in thc statistical theory of estimation. These functions satisfying defined criterions of a selection are called in the paper as Principal Iinformative Components (PIC). PIC-projection technique for improvement of an arbitrary image decomposition is proposed. The given technique allows at anyone primary physical representation of an image to decrease a statistical errror or of its coding oil a noisy data.
The amount of structured information available in Internet sources is rapidly increasing. This information includes commercial databases on product information and information on e-services forming the so-called e-sho...
详细信息
ISBN:
(纸本)0769510620
The amount of structured information available in Internet sources is rapidly increasing. This information includes commercial databases on product information and information on e-services forming the so-called e-shops. However. the process of using this information has become more complicated, and can sometimes be tedious for users with different goals, interests, levels of expertise, abilities and preferences. This paper deals with the definition of an architectural framework for intelligent, adaptive and personalised navigation within large hypertext Electronic Commerce environments.
Applications like multimedia databases or enterprise-wide information management systems have to meet the challenge of efficiently retrieving best matching objects from vast collections of data. We present a new algor...
详细信息
ISBN:
(纸本)0769510620
Applications like multimedia databases or enterprise-wide information management systems have to meet the challenge of efficiently retrieving best matching objects from vast collections of data. We present a new algorithm Stream-Combine for processing multi-feature queries on heterogeneous data sources. Stream-Combine is self-adapting to different data distributions and to the specific kind of the combining function. Furthermore we present a new retrieval strategy that will essentially speed rtp the output of relevant objects.
We address the problem of robust transmission of compressed visual information over unreliable networks. Our approach employs the principle of multiple-descriptions, through pre- and post-processing of the image data,...
详细信息
ISBN:
(纸本)0769510620
We address the problem of robust transmission of compressed visual information over unreliable networks. Our approach employs the principle of multiple-descriptions, through pre- and post-processing of the image data, without modification to the source or channel codecs. We employ oversampling to add redundancy to the original image data followed by a partitioning of the oversampled image into "equal" sub-images which can be coded and transmitted over separate channels. Simulations using two descriptors show that this approach yields exceptional performance when only one descriptor is received and outperforms other popular multiple description approaches.
暂无评论