In order to improve the video watermark embedding strength and balance the transparency of the watermark system, this paper proposes a combination of all phase Biorthogonal Transform and watermark embedding to complet...
详细信息
In order to improve the video watermark embedding strength and balance the transparency of the watermark system, this paper proposes a combination of all phase Biorthogonal Transform and watermark embedding to complete the experiment. Firstly, the all phase biorthogonal transform is described. Referring to the construction process of APBT, combined with APDF and DST, a new all phase biorthogonal transform, all phase discrete sinusoidal biorthogonal transform (APDSBT), is proposed. This paper makes full use of MPEG-2 compression format to embed watermark directly in DCT domain. The low-frequency coefficients in the DCT block of the brightness space of I frame are selected as the watermark embedding space. The brightness component of each image block is transformed by two-dimensional DCT in the unit of 8x8 image blocks. By introducing the idea of energy receiver into the detection of digital watermark, the following correlation detector can be obtained. Implemented with MATIAB and VC + +. In the experiment, the foreman video test sequence is used as the watermark carrier, and the copyright logo image designed by ourselves is used as the watermark image to test the video watermarking system. The results show that when the coding rate is 3Mvps, the accuracy of each plane is 100%, 98.48%, 98.12% and 96.27% respectively. When the coding rate is 2.6Mvps, the accuracy of each plane is 100%, 96.38%, 94.87% and 95.21% respectively. This algorithm selects the frame of video to embed watermark. On the premise of ensuring video quality, this algorithm is robust to common video watermark attacks (MPEG compression, frame loss, frame clipping and frame rearrangement).
Automatic defect detection is of great significance in steel manufacturing industry. In this paper, we present a new detection algorithm for defects of scale-covered steel billets. Features of surface images such as b...
详细信息
Automatic defect detection is of great significance in steel manufacturing industry. In this paper, we present a new detection algorithm for defects of scale-covered steel billets. Features of surface images such as brightness and textures are non-uniform because the billet surface is partially covered with scale. In order to discriminate between defects and pseudo defects due to scales and to improve the accuracy of defect detection, a new detection method based on morphological top-hat filter is proposed. Experimental results conducted on billets surface image from actual steel production line show that the proposed algorithm is capable of detecting defects on billet surface.
In this paper, we investigate the problem of detecting-time epochs when zero-velocity updates can be applied in a foot-mounted inertial navigation (motion-tracking) system. We examine three commonly used detectors: th...
详细信息
In this paper, we investigate the problem of detecting-time epochs when zero-velocity updates can be applied in a foot-mounted inertial navigation (motion-tracking) system. We examine three commonly used detectors: the acceleration-moving variance detector, the acceleration-magnitude detector, and the angular rate energy detector. We demonstrate that all detectors can be derived within the same general likelihood ratio test (LRT) framework, given the different prior knowledge about the sensor signals. Further, by combining all prior knowledge, we derive a new LRT detector. Subsequently, we develop a methodology to evaluate the performance of the detectors. Employing the developed methodology, we evaluate the performance of the detectors using leveled ground, slow (approximately 3 km/h) and normal (approximately 5 km/h) gait data. The test results are presented in terms of detection versus false-alarm probability. Our preliminary results show that the new detector performs marginally better than the angular rate energy detector that outperforms both the acceleration-moving variance detector and the acceleration-magnitude detector.
Aiming at the situation that normal detection means is hard to find the airborne moving target that has a small RCS and rapid moving speed characteristics, the algorithm of moving target detection is presented bas...
详细信息
Aiming at the situation that normal detection means is hard to find the airborne moving target that has a small RCS and rapid moving speed characteristics, the algorithm of moving target detection is presented based on atmospheric wind field disturbing data detected by lidar. First, through receiving atmospheric wind field disturbance information that is produced by the airborne moving target moving on the air, and the excellent characteristics that lidar has in the detection atmosphere, atmospheric wind field disturbing retrieval model is established to acquire moving target space field distribution condition. Moving target space field change data is acquired based on filtering background air disturbance information, Moving target detection is carried out based on moving target detectionalgorithm. The result shows there is consistent between moving target detected by the algorithm and experimental result. An effective approach of greatly improving moving target detection ability for the low_detectable target is supplied.
Based on the characteristics study of binary decision diagrams (BDDs) of logic functions,a method using the characteristic triangle (CT) to detect logic functions suitable for XOR logic implementation is presented and...
详细信息
Based on the characteristics study of binary decision diagrams (BDDs) of logic functions,a method using the characteristic triangle (CT) to detect logic functions suitable for XOR logic implementation is presented and a corresponding algorithm is *** proposed algorithm is implemented in C and tested on MCNC *** experimental results show that the proposed algorithm is efficient compared with published results.
Based on the disjointed cubes of the logic functions, a method by searching majority cubes and Hamming distance to detect logic functions suitable for XOR logic implementation is presented. Some special covers of func...
详细信息
Based on the disjointed cubes of the logic functions, a method by searching majority cubes and Hamming distance to detect logic functions suitable for XOR logic implementation is presented. Some special covers of functions which meet the majority cubes will be expressed as a m-dimension cube and other offset cubes. After majority cubes searching, another logic detection method with hamming distance is used to incorporate those products whose hamming distances are 1 or 2. The proposed algorithm is implemented in C and tested on MCNC benchmarks. The experimental results show that the proposed algorithm is efficient compared with published results.
The overlapped time-frequency two dimensional multiplexing system (OvHDM, Overlapped Hybrid Division Multiplexing) can significantly improve the spectrum efficiency of communication system. The system can be described...
详细信息
ISBN:
(纸本)9781424458219;9781424458240
The overlapped time-frequency two dimensional multiplexing system (OvHDM, Overlapped Hybrid Division Multiplexing) can significantly improve the spectrum efficiency of communication system. The system can be described as a vector convolutional encoding constraint model and the optimum detection algorithm is maximum likelihood sequence detection (MLSD), but the algorithm causes large detection delay due to high complexity. In this paper, a mathematic model similar to M1MO system is derived for OvHDM system and sphere decoding algorithm is applied to fast detect the received signal. Simulation results show that the algorithm based on sphere decoding obtains the same performance of the optimum detection but the computational complexity is significantly *** performance of OvHDM system is better than that of QAM modulation with the same spectrum efficiency at a high signal to noise ratio. This shows that improving the transmission rate with overlapped signals can achieve greater gains than using high-order QAM modulation with the same spectrum efficiency.
Taxi plays an important role in the urban passenger transport system. Good taxi service quality will help increase the happiness of urban residents. However, the issue of no-load taxis has always been one of the most ...
详细信息
Taxi plays an important role in the urban passenger transport system. Good taxi service quality will help increase the happiness of urban residents. However, the issue of no-load taxis has always been one of the most concerned issues for urban managers. This paper uses the improved DBSCAN method to carry on the cluster analysis to the taxi trajectory, prompts the taxi driver to avoid the no-load area, and achieves the purpose that to raise the taxi utilization factor. The improved DBSCAN method introduces two distance metrics, segment feature distance and dynamic space-time distortion distance. The feature distances of the segment include the vertical distance, horizontal distance, and angular distance, which can effectively measure the distance between trajectory segments. The dynamic space-time distortion distance introduces spatial factors on the basis of the dynamic distortion distance, and successfully overcomes the similarity error problem caused by different trajectory lengths. At the same time, using the GPS data set of Nanjing taxi to carry out experiments, the results show that the algorithm has higher accuracy and stability than the algorithms in the literature.
Real estate is one of the most important forms of portfolio, which plays an essential role in the economy of Hong Kong. Extensive investigations indicate that jump points in the private domestic price indices are subj...
详细信息
Real estate is one of the most important forms of portfolio, which plays an essential role in the economy of Hong Kong. Extensive investigations indicate that jump points in the private domestic price indices are subject to various factors such as international events, regional incidents, and government policies. Detecting jump points and identifying their relationships with these factors are indispensable since such findings can facilitate policymakers and investors to look forward. In this paper, we propose a novel two-stage variational methodology using the total variation minimization algorithm and derivative-based detector with the thresholding function for detecting jump points in the Hong Kong private domestic price indices. Our algorithm can weaken statistical fluctuation of the price indices via the total variation formulation and accurately detect jump points based on its rate of change. Comparative experimental results based on the monthly private domestic price indices from January 2010 to July 2020 reveal that the proposed method can detect 40 jump points corresponding to the aforementioned factors whereas the current state-of-the-art empirical mode decomposition approach can only detect 29 jump points, which indicates the superior performance of the proposed method.
The communication between vehicles (V2V) and vehicles to infrastructure (V2I) plays a crucial role in the Vehicular Ad-hoc Network (VANET). Its aim is to enhance road safety, reduce traffic accidents, and improve traf...
详细信息
ISBN:
(纸本)9798350343427;9798350343434
The communication between vehicles (V2V) and vehicles to infrastructure (V2I) plays a crucial role in the Vehicular Ad-hoc Network (VANET). Its aim is to enhance road safety, reduce traffic accidents, and improve traffic efficiency. This necessitates the exchange of critical information among vehicles, static roadside units (RSUs), and traffic control centers. This integration gives rise to Cooperative Intelligent Transport Systems (C-ITS). However, the latency in wireless communication can have adverse effects on safety. To address this, vehicle advancements have led to the formation of platoons, enabling better latency control and safer driving. Nonetheless, platooning also exposes vehicles to significant risks, such as Man-In-The-Middle (MITM) attacks. These attacks can result in message delays, juggling, and drop-offs, particularly affecting time-sensitive messages like accident notifications. This research paper focuses on analyzing the impact of MITM attacks that cause message delays and proposes measures to detect and sever connections with malicious vehicles. By establishing secure paths, this solution aims to enhance VANET security and optimize network performance.
暂无评论