We present a new integrity watermark based on hologram techniques for document authentication. We focus on ID-Card watermarks. The main goal is to illustrate the use of computer-generated hologram coding techniques, t...
详细信息
ISBN:
(纸本)0769510620
We present a new integrity watermark based on hologram techniques for document authentication. We focus on ID-Card watermarks. The main goal is to illustrate the use of computer-generated hologram coding techniques, to produce content-related data to be embedded into the personal data printed on an identification card with watermarking techniques. We call this special application of an integrity watermark technique a hologram watermark.
The article describes some of the security issues in streaming video over the Internet. If high quality video sequences are to be delivered to computers and digital television systems over the Internet in our "di...
详细信息
ISBN:
(纸本)0769510620
The article describes some of the security issues in streaming video over the Internet. If high quality video sequences are to be delivered to computers and digital television systems over the Internet in our "digital future", this material must be protected.
The traditional approach to coding of noisy and distorted images assumes preliminary enhancement and restoring of images and only then in fact their coding. A novel technique is proposed, where the indicated procedure...
详细信息
ISBN:
(纸本)0769510620
The traditional approach to coding of noisy and distorted images assumes preliminary enhancement and restoring of images and only then in fact their coding. A novel technique is proposed, where the indicated procedures are combined in optimum algebraic coding. At the heart of the approach is the optimization of coordinate basis of an image representation. It is shown, that the required optimum properties have the eigenfunctions of Fisher's information operator known in the statistical theory of estimation. These functions satisfying defined criteria of a selection are called Principal information Components (PIC). The PIC-projection technique for improvement of an arbitrary image decomposition is proposed. The given technique allows primary physical representation of an image to decrease a statistical error of its coding on noisy data.
JPEG2000 is the latest ISO/IEC image compression standard. It is distinct from previous standards in that it is more than an input-output filter. JPEG2000 enables decompression of many image products from a single com...
详细信息
ISBN:
(纸本)0769510620
JPEG2000 is the latest ISO/IEC image compression standard. It is distinct from previous standards in that it is more than an input-output filter. JPEG2000 enables decompression of many image products from a single compressed file and offers several opportunities for compressed domain processing. This paper describes the feature set of the JPEG2000 compression standard, followed by a high level description of the algorithm.
A speech content integrity verification scheme integrated with ITU G.723.1 speech coding to minimize the total computational cost is proposed in this research. Speech features relevant to the semantic meaning are extr...
详细信息
ISBN:
(纸本)0769510620
A speech content integrity verification scheme integrated with ITU G.723.1 speech coding to minimize the total computational cost is proposed in this research. Speech features relevant to the semantic meaning are extracted, encrypted and attached as the header information. This scheme is not only much faster than cryptographic bitstream integrity algorithms, but also more compatible with a variable of applications. The speech signal could go through recompression, amplification, transcoding, re-sampling, D/A and A/D conversion and minor white noise pollution without triggering the verification alarm.
Describes several object-based encoding issues and provides solutions based on the MPEG-4 coding standard. Specifically, we first consider the general problem of object-based rate control and the allocation of bits am...
详细信息
ISBN:
(纸本)0769510620
Describes several object-based encoding issues and provides solutions based on the MPEG-4 coding standard. Specifically, we first consider the general problem of object-based rate control and the allocation of bits among each object. Going a step further, we then discuss the issues related to the allocation of bits between shape and texture, and propose a method to model the rate distortion characteristics of the shape. Finally, we describe some preliminary work that we have been doing towards optimizing the tradeoff in spatial and temporal quality. For object-based coding, it is believed that significant coding gains can be achieved.
One of the expected application areas for the practical use of the watermarking technology is for protecting contents from illegal distribution and/or copying, such as for DVD copy protection. In such application area...
详细信息
ISBN:
(纸本)0769510620
One of the expected application areas for the practical use of the watermarking technology is for protecting contents from illegal distribution and/or copying, such as for DVD copy protection. In such application areas, the watermarked contents should be robust with regards to various kinds of post-processing, such as digital-to-analog or analog-to-digital (D/A, A/D) conversion, MPEG compression, and VHS recording. This paper introduces a watermark embedding method that maximizes the strength of the detected watermark signal, an embedding method robust against MPEG compression, and an embedding method robust against VHS recording, without affecting the fidelity of the watermarked contents.
Multimedia processing is becoming increasingly important with a range of applications. Existing approaches for processing multimedia data can be broadly classified into two categories, namely: (i) microprocessors with...
详细信息
ISBN:
(纸本)0769510620
Multimedia processing is becoming increasingly important with a range of applications. Existing approaches for processing multimedia data can be broadly classified into two categories, namely: (i) microprocessors with extended media processing capabilities; and (ii) dedicated implementations (ASICs). The complexity, variety of techniques and tools associated with multimedia processing points to the opportunities for reconfigurable computing devices which will be able to adapt the underlying hardware dynamically in response to changes in the input data or processing environment. The paper proposes a novel approach to design a dynamically reconfigurable processor by performing hardware software co-design for a media processing application. As an example, the analysis of the shape coding module of MPEG-4 is chosen to demonstrate the potential for reconfigurability.
暂无评论