The aim of MPEG (Multi-Platforms Emitter Geolocation) is to use several measurements Angle Of Arrival (AOA) or Time Of Arrival/Frequency Of Arrival (TOA/FOA) from different Electronic Support Measures (ESM) platforms ...
详细信息
The aim of MPEG (Multi-Platforms Emitter Geolocation) is to use several measurements Angle Of Arrival (AOA) or Time Of Arrival/Frequency Of Arrival (TOA/FOA) from different Electronic Support Measures (ESM) platforms to determine an accurate emitter location. Sensors are geographically dispersed, and to combine the information that they acquire requires the information to be communicated to some location(s) where the data integration process occurs. The data link between the ESM platforms is expected to permit only very low data rates with a high latency. This means that the platforms can only exchange very restricted amounts of data. A potentially optimal way to compress the information when the measurements are noisy is to extract from the measurements an exhaustive statistic that summarizes all the information content at the local ESM. How to provide an exhaustive statistics for practical measurements system in the case of information fusion is presented. It is done either on Information Matrix form or based on a Taylor series expansion of the measurement in time or space.
Dynamic personalization of media content is the latest challenge for media content producers and distributors. The idea is to adapt in near real time the content of a video stream to the viewer's profile. This con...
详细信息
Dynamic personalization of media content is the latest challenge for media content producers and distributors. The idea is to adapt in near real time the content of a video stream to the viewer's profile. This concept encompasses any type of context-awareness customisation, expressed preferences and viewer profiling. To achieve this goal we propose a multi tier framework composed of a content production tier, a content distribution tier and a content consumption tier, representing producers, distributors and viewers, plus an artefact brokerage tier, implemented as an agent-based e-brokerage platform, to support the dynamic selection of the content to be inserted in the video stream of each viewer.
In the field of medicine, storing images in a secure way has become a challenge. In order to face this challenge of security, we propose an algorithm based on visual cryptography for black and white medical images. He...
详细信息
In the field of medicine, storing images in a secure way has become a challenge. In order to face this challenge of security, we propose an algorithm based on visual cryptography for black and white medical images. Here, we bring out a new approach to visual cryptography. The main advantage of this system is that there is no necessity for post processing of the image without which a good quality of the image is obtained. More security is provided by using the JPEG Ghost technique, which performs forgery checking on the reconstructed medical image. This paper proposes a technique of processing the medical image and dividing it into two shares in an unpredictable format. These two shares can be overlaid on which the original image is retrieved. This reconstructed medical image undergoes a forgery detection checking and determines whether the obtained image is forged one or not. This technique can be implemented in the medical field for storing images of X-ray, MRI scan, CT scan and Ultrasound scan in a secure way. Research is going on to import these images over networks in a compressed and secure manner.
In this paper we present several approaches to browsing large image databases. The fundamental idea of how to arrange images is based on their visual similarity so that images that are similar get placed close to each...
详细信息
ISBN:
(纸本)9781612847719
In this paper we present several approaches to browsing large image databases. The fundamental idea of how to arrange images is based on their visual similarity so that images that are similar get placed close to each other in the navigation environment. A hierarchical structure of the database coupled with arrangement of images on a regular lattice both avoids images overlapping and allows efficient and effective access to large image collections.
The luminance of an image is the measurement of the perceived brightness levels. Intuitively, if two images are taken from different cameras with different lighting, some sort of discrepancy may occur in those areas, ...
详细信息
The luminance of an image is the measurement of the perceived brightness levels. Intuitively, if two images are taken from different cameras with different lighting, some sort of discrepancy may occur in those areas, which were copied and pasted. In particular, analyzing areas in a forged image which are approximately the same distance away from the lens but have different luminance levels. This analysis is heavily dependent on the skill level of the person creating the forgery and the resources available to perform the manipulation. Newer versions of image processing software make it easy for even a novice user to create forgeries based on automated "auto-brightness" adjustments. We succeeded to identify such image forgeries.
JPEG compression artefacts are among the most prominent features in the forensic analysis of digital images. Here, we focus on the spectral analysis of histograms of single- and multi-quantised DCT coefficients. We pr...
详细信息
JPEG compression artefacts are among the most prominent features in the forensic analysis of digital images. Here, we focus on the spectral analysis of histograms of single- and multi-quantised DCT coefficients. We present a model of the frequency response of finite-support histograms, which explains position and magnitude of characteristic quantisation peaks with reasonable precision and gives valuable insights into the formation of quantisation artefacts in general. We derive a set of practical rules for the efficient analysis of single- and multi-compressed images and discuss applications in the estimation of quantisation tables.
Discrete cosine transform (DCT) is widely used in image and video compression standards. This paper presents distributed arithmetic (DA) based VLSI architecture of DCT for low hardware circuit cost as well as low powe...
详细信息
Discrete cosine transform (DCT) is widely used in image and video compression standards. This paper presents distributed arithmetic (DA) based VLSI architecture of DCT for low hardware circuit cost as well as low power consumption. Low hardware cost is achieved by exploiting redundant computational units in recent literature. A technique to reduce error introduced by sign extension is also presented. The proposed 1-D DCT architecture is implemented in both the Xilinx FPGA and Synopsys DC using TSMC CLN65GPLUS 65nm technology library. For power and hardware cost comparisons, recent DA based DCT architecture is also implemented. The comparison results indicate the considerable power as well as hardware savings in presented architecture. 2-D DCT is implemented using row column decomposition by the proposed 1-D DCT architecture.
The increase of IEEE 802.11's bandwidth led to a deployment of many multimedia applications over wireless networks. Nevertheless, these applications impose rigorous discipline constraints in QoS. To support the va...
详细信息
The increase of IEEE 802.11's bandwidth led to a deployment of many multimedia applications over wireless networks. Nevertheless, these applications impose rigorous discipline constraints in QoS. To support the varying Quality-of-Service (QoS) requirements of emerging applications, the QoS-capable standard IEEE 802.11e has been specified. Digital video delivered over wired-to-wireless networks is expected to suffer quality degradation from packet loss. Video traffic is widely expected to account for a large portion of the traffic in future hybrid network, as multimedia applications are becoming increasingly popular. Initially this paper attempted to discover optimal parameters such as bandwidth utilization and packet size in order to enhance video stream quality and proposed New Adaptive Crosslayer Algorithm, a novel scheme for QoS enhancement for IEEE 802.11 wireless networks.
In this paper, we propose a low-complexity priority based packet scheduling algorithm for streaming MPEG-4 Scalable to Lossless (SLS) encoded audio. In the proposed system, the SLS encoded frames are partitioned into ...
详细信息
In this paper, we propose a low-complexity priority based packet scheduling algorithm for streaming MPEG-4 Scalable to Lossless (SLS) encoded audio. In the proposed system, the SLS encoded frames are partitioned into data units of different quality layers, which are transmitted according to their quality contribution to the final decoded audio and their urgency relative to the playback progress. Experimental results show that the proposed scheduling algorithm has an even lower compared to traditional greedy algorithm for packet scheduling, while outperforms them by a significant margin in for terms of quality of the streamed audio.
In this paper, a robust multiplicative video watermarking scheme is presented. We segment the video signal into 3-D blocks like cubes, and then apply 3-D wavelet transform to each block. The watermark is inserted thro...
详细信息
In this paper, a robust multiplicative video watermarking scheme is presented. We segment the video signal into 3-D blocks like cubes, and then apply 3-D wavelet transform to each block. The watermark is inserted through multiplying the low frequency wavelet coefficients by a constant parameter that controls the power of the watermark. The proposed watermark extraction procedure is based on the maximum likelihood rule applied to the watermarked wavelet coefficients.
暂无评论