Most H.264 watermarking schemes only embed the watermarks on I-frames, and are therefore extremely fragile under temporal attacks (e.g., frame dropping). To obtain the robustness under temporal attacks for H.264 water...
详细信息
Most H.264 watermarking schemes only embed the watermarks on I-frames, and are therefore extremely fragile under temporal attacks (e.g., frame dropping). To obtain the robustness under temporal attacks for H.264 watermarking systems, this paper presents a robust perceptual image hashing based temporal synchronization method. We extract robust geometric information from the 4times4 block mean map of the luminance values using a Singular Value Decomposition (SVD) basedimage hash algorithm. By searching frames with the minimum hash distances from the original watermarked I-frames, the video at the detector is synchronized with the watermark signal, which thus avoids invalid detections on unwatermarked frames. Experimental results demonstrate that our synchronization method can maintain reliable detection performances on the watermarked video with dropping frames even when common spatial attacks like Gaussian noises and recompressions also exist.
The NOMA driven industrial internet of Things (IIOT) is considered now as one of the emerging areas of internet of things. There are several applications domain of Industrial internet of things. In the upcoming smart ...
详细信息
ISBN:
(纸本)9781665476485
The NOMA driven industrial internet of Things (IIOT) is considered now as one of the emerging areas of internet of things. There are several applications domain of Industrial internet of things. In the upcoming smart and secure societies, a large portion of infrastructure is relied on Industrial Control System (ICS). Among all the energy sector is perhaps the most demanding one on the use of IOT based control systems for the potential and explicit applications like smart grid, Intelligent Transportation systems, e-health etc. To achieve the mentioned applications in IIOT at low energy, different methods have been proposed for energy harvested industrial control systems. Among them RF energy harvesting techniques have been thoroughly researched and studied. Unfortunately, RF energy harvesting has severe drawback of consuming enough energy particularly at the switching side. To overcome the drawback, we have proposed a novel method of design of a Bi-stable MEMS RF switch (Bimorph clamped) for RF energy harvesting in industrial informatics and automation. The proposed system has been designed and simulated using Comsol Multiphysics and ef43ws succeeds between 1.5-3.0 V output voltage for operating frequency at 1.9 and 2.45 GHz from RF input power at -20 dBm with revealing approximately 100% improvement over other existing designs.
based on a novel generalized chaotic synchronization system (GCSS), this paper introduces a steganography scheme to secret multimedia information. Firstly a sender uses the chaotic stream generated by the GCSS to mask...
详细信息
based on a novel generalized chaotic synchronization system (GCSS), this paper introduces a steganography scheme to secret multimedia information. Firstly a sender uses the chaotic stream generated by the GCSS to mask a secret image and a secrete text according to prescribed rules. Secondly he uses the least significant bit (LSB) embedding method to embed the masked pseudo-liked messages into an unsuspicious video frequency file frame-by-frame for two times. A receiver can use nonsymmetric keys and the GCSS to decrypt the secrete information from the video frequency file and confirm the data origin authentication, without knowing any knowledge of the cover video and communicating with the sender. The key space of the scheme can reach 10 326 . The analysis of the key space, sensitivity of key parameters imply that this scheme has good security. The scheme can be applied in the multimedia covert internet communications
This paper proposes a passive range estimator by estimating the distance between a sensor or seeker from an object. The proposed approach works based on the changes of the object size due to the changes of object dist...
详细信息
This paper proposes a passive range estimator by estimating the distance between a sensor or seeker from an object. The proposed approach works based on the changes of the object size due to the changes of object distance within a scene captures by the sensor. In this method we use an Extended Kalman Filter (EKF) to estimate the size of the object (physical dimension). The estimated size of the object and the information gathered from the sensed scene over time is used to passively estimate the object range. The results show more general and extended passive range estimation (by one camera) than other methods with less relative errors.
The fuzzy c-means clustering algorithm has been successfully applied to a wide variety of problems. However, the image may be corrupted by noise, which leads to inaccuracy with segmentation. In the paper, a local fuzz...
详细信息
The fuzzy c-means clustering algorithm has been successfully applied to a wide variety of problems. However, the image may be corrupted by noise, which leads to inaccuracy with segmentation. In the paper, a local fuzzy clustering regularization model is introduced in the objective function of the standard fuzzy c-means (FCM) algorithm. It can allow the membership of a pixel to be influenced by the memberships of its immediate neighborhood. Such schemes are useful for partition data sets affected by noise. Experimental results on both synthetic images and real image are given to demonstrate the effectiveness of the proposed algorithm.
Due to light scattering by air particles, images taken under bad lighting conditions (such as haze, fog, mist, or smog) have a reduced level of visibility. One blurry image can be made visible again using single image...
详细信息
Content-basedimage retrieval (CBIR) is a task of retrieving images from their contents. Since retrieval process is a time-consuming task in large image databases, acceleration methods can be very useful. This paper p...
详细信息
ISBN:
(数字)9781728153506
ISBN:
(纸本)9781728153513
Content-basedimage retrieval (CBIR) is a task of retrieving images from their contents. Since retrieval process is a time-consuming task in large image databases, acceleration methods can be very useful. This paper presents a novel method to speed up CBIR systems. In the proposed method, first Zernike moments are extracted from query image and an interval is calculated for that query. images in database which are out of the interval are ignored in retrieval process. Therefore, a database reduction occurs before retrieval which leads to speed up. It is shown that in reduced database, relevant images to query image are preserved and irrelevant images are throwed away. Therefore, the proposed method speed up retrieval process and preserve CBIR accuracy, simultaneously.
The following topics are dealt with: parallel and distributed computing; software metrics and project management; communication systems and networks; data mining; data warehousing; information management systems; Inte...
The following topics are dealt with: parallel and distributed computing; software metrics and project management; communication systems and networks; data mining; data warehousing; information management systems; internet; mobile computing; wireless computing; software engineering; information engineering; management information systems; image processing and pattern recognition; computer architecture and software testing; artificial intelligence; intelligent agent technology; Web engineering
The photographic map is one important kind of maps with the ground digital photographic map. There are many researchers do the research on digital vector map but very few about photographic map. And these photographic...
详细信息
The photographic map is one important kind of maps with the ground digital photographic map. There are many researchers do the research on digital vector map but very few about photographic map. And these photographic map watermark algorithms are based on improved image features digital watermark algorithms, which have some faults influencing the watermark information. To resolve this problem a new Photographic map information hiding algorithm based on wave band fusion is proposed. In this algorithm multi-wave band data fusion technique and pixel value interpolation are employed. Experimental results demonstrate that the proposed algorithm has good preference.
Low-complexity error concealment techniques for missing macroblock (MB) recovery based on the boundary matching principle are extensively studied and evaluated. In this paper, an improved boundary matching algorithm (...
详细信息
Low-complexity error concealment techniques for missing macroblock (MB) recovery based on the boundary matching principle are extensively studied and evaluated. In this paper, an improved boundary matching algorithm (BMA) using adaptive search is presented to conceal channel errors in inter-frames of video images. The proposed scheme adaptively selects proper candidate regions to conceal the artifact of a lost block. The candidate regions are examined based on analyzing motion activity of the neighboring MBs. Simulations show that the proposed scheme outperforms both on PSNR and visual quality obviously of about 1-4dB compared to existing methods.
暂无评论