In the last two decades, Chaos theory has received a great deal of attention from the cryptographic community. This paper presents two ideas. First idea is using chaotic functions to overcome the weaknesses of the cla...
详细信息
In the last two decades, Chaos theory has received a great deal of attention from the cryptographic community. This paper presents two ideas. First idea is using chaotic functions to overcome the weaknesses of the classical Hill cipher. The second idea is proposing a new encoder-decoder architecture, called ChaoEncoDeco, for securing JPEG images. An extra stage of encryption is embedded within the traditional JPEG codec to improve security level of such system. This security stage uses one of the chaotic functions called Logistic Map. This map is used to enhance the Hill cipher and achieve more secure encryption key. The properties of both chaotic system and of the Hill cipher encryption key are all utilized to obtain ultimate secure systems. The proposed encryption algorithm is crypto-analyzed and compared to the standard Hill cipher algorithm. Complete evaluation for the proposed architecture is also performed which indicates the effectiveness of the proposed system.
In this paper, we propose a novel perceptual image coding scheme via adaptive block-based super-resolution directed down-sampling. At the encoder side, for each macroblock of a given image, Rate Distortion Optimizatio...
详细信息
In this paper, we propose a novel perceptual image coding scheme via adaptive block-based super-resolution directed down-sampling. At the encoder side, for each macroblock of a given image, Rate Distortion Optimization (RDO) determines whether it is encoded at the original or down-sampled resolution. The down-sampling process is directed by super-resolution, which generates the down-sampled block by minimizing the reconstruction errors between the original macroblock and the one restored by the corresponding super-resolution method. At the decoder side, in order to reduce the complexity, the super-resolution method reconstructs the full-resolution macroblock in the DCT domain together with the inverse DCT. Experimental results have demonstrated that the proposed method can produce higher quality images in terms of both PSNR and visual quality compared with the existing methods.
The intrinsic deficiencies of traditional client-server networks lead that P2P networks become scalable successors for video streaming in today networks. However, the performance of P2P networks is deeply dependable o...
详细信息
The intrinsic deficiencies of traditional client-server networks lead that P2P networks become scalable successors for video streaming in today networks. However, the performance of P2P networks is deeply dependable on the contribution of peers. In fact, some peers only consume services but provide little or nothing into the network; this phenomenon which is called free riding seriously affects the performance of P2P networks. In order to motivate peers to contribute their resources into the P2P networks, using incentive mechanisms is compulsory. In this paper we designed and proposed an incentive mechanism for mesh based P2P video streaming. The proposed approach includes two parts. In the first part, the contribution of the peers in the P2P network is measured and maintained in a distributed fashion, and in the second part, differentiated service is provided for the peers based on their contribution. We simulated the proposed approach and the results show the efficiency of the proposed mechanism to improve the overall quality of the perceived video in the group.
We propose a new method for blockiness distortions identification and quality assessment of JPEG images in the absence of any reference images using Haar wavelet decomposition. Blockiness artifacts contaminating JPEG ...
详细信息
We propose a new method for blockiness distortions identification and quality assessment of JPEG images in the absence of any reference images using Haar wavelet decomposition. Blockiness artifacts contaminating JPEG encoded images can be modeled as a particular edge structure that transforms into another when subjected to edge detection algorithm. Some features that give meaningful information for blockiness distortions and quality assessment are subsequently derived from edge detected image by means of 3-level Haar wavelet transform. The validity of our quality assessment technique was tested against publicly available images quality assessment database whilst the proposed blockiness detector was evaluated subjectively using our own subjective test. Our experiments show that the proposed quality metric and blockiness distortions detector demonstrate satisfying performances.
This paper presents a novel change detection algorithm for the compressed domain. Many video surveillance systems in practical use transmit their video data over a network by using the Real-time Transport Protocol (RT...
详细信息
This paper presents a novel change detection algorithm for the compressed domain. Many video surveillance systems in practical use transmit their video data over a network by using the Real-time Transport Protocol (RTP). Therefore, the presented algorithm concentrates on analyzing RTP streams to detect major changes within contained video content. The paper focuses on a reliable preselection for further analysis modules by decreasing the number of events to be investigated. The algorithm is designed to work on scenes with mainly static background, like in indoor video surveillance streams. The extracted stream elements are RTP timestamps and RTP packet sizes. Both values are directly accessible by efficient byte-reading operations without any further decoding of the video content. Hence, the proposed approach is codec-independent, while at the same time its very low complexity enables the use in extensive video surveillance systems. About 40,000 frames per second of a single RTP stream can be processed on an Intel ® Core™ 2 Duo CPU at 2 GHz and 2 GB RAM, without decreasing the efficiency of the algorithm.
Multi-view video consists of multiple views which are taken by multiple cameras from different positions and angles. It allows the users to freely change their viewpoints. Typical applications of multi-view video incl...
详细信息
Multi-view video consists of multiple views which are taken by multiple cameras from different positions and angles. It allows the users to freely change their viewpoints. Typical applications of multi-view video include Free Viewpoint TV, remote medical surgery, wireless multimedia sensor networks and so on. However, the traffic of multi-view video is also several times larger than traditional multimedia, which brings much more increment in the bandwidth requirement. To overcome this problem, Simulcast and MVC (Multi-view Video coding) can be used to decrease the traffic for multi-view video. However, although Simulcast removes redundant information within each view, it still contains a large amount of inter-view redundant information. MVC further removes the correlation between the views, but all the views should be encoded and transmitted. So the bit-rates are still too high in these schemes. In this paper, in order to reduce the bit-rate for multi-view video transmission, we analyze the user's motion which is classified into random access model and successive motion model. We find that in the successive motion model only part of frames are possible to be displayed in a period of time. According to the analytical result, we propose a user dependent system to decrease the bit-rate of multi-view video transmission. The proposed system only encodes and transmits those frames that are possible to be displayed according to the user's motion. Further, in order to support the proposed system, we also propose a prediction structure as a substitute of the prediction structure in MVC. Performance evaluation proves that the proposed system reduces the average bit-rate for the transmission of multi-view video and is to be more effective when the number of views is large.
The Photo-Response Non-Uniformity (PRNU) has been recently introduced as a powerful tool to detect image forgeries. In spite of its effectiveness in many scenarios, the proposed method fails to detect small manipulati...
详细信息
The Photo-Response Non-Uniformity (PRNU) has been recently introduced as a powerful tool to detect image forgeries. In spite of its effectiveness in many scenarios, the proposed method fails to detect small manipulations. In this work we propose a modified version of the detection algorithm described in, based on a preliminary segmentation of the image, which guarantees a better detection performance for small size additive forgeries.
In this paper we present several approaches to browsing large image databases. The fundamental idea of how to arrange images is based on their visual similarity so that images that are similar get placed close to each...
详细信息
ISBN:
(纸本)9781612847719
In this paper we present several approaches to browsing large image databases. The fundamental idea of how to arrange images is based on their visual similarity so that images that are similar get placed close to each other in the navigation environment. A hierarchical structure of the database coupled with arrangement of images on a regular lattice both avoids images overlapping and allows efficient and effective access to large image collections.
Discrete cosine transform (DCT) is widely used in image and video compression standards. This paper presents distributed arithmetic (DA) based VLSI architecture of DCT for low hardware circuit cost as well as low powe...
详细信息
Discrete cosine transform (DCT) is widely used in image and video compression standards. This paper presents distributed arithmetic (DA) based VLSI architecture of DCT for low hardware circuit cost as well as low power consumption. Low hardware cost is achieved by exploiting redundant computational units in recent literature. A technique to reduce error introduced by sign extension is also presented. The proposed 1-D DCT architecture is implemented in both the Xilinx FPGA and Synopsys DC using TSMC CLN65GPLUS 65nm technology library. For power and hardware cost comparisons, recent DA based DCT architecture is also implemented. The comparison results indicate the considerable power as well as hardware savings in presented architecture. 2-D DCT is implemented using row column decomposition by the proposed 1-D DCT architecture.
JPEG compression artefacts are among the most prominent features in the forensic analysis of digital images. Here, we focus on the spectral analysis of histograms of single- and multi-quantised DCT coefficients. We pr...
详细信息
JPEG compression artefacts are among the most prominent features in the forensic analysis of digital images. Here, we focus on the spectral analysis of histograms of single- and multi-quantised DCT coefficients. We present a model of the frequency response of finite-support histograms, which explains position and magnitude of characteristic quantisation peaks with reasonable precision and gives valuable insights into the formation of quantisation artefacts in general. We derive a set of practical rules for the efficient analysis of single- and multi-compressed images and discuss applications in the estimation of quantisation tables.
暂无评论