Face recognition is considered as a high dimensionality problem. To handle high dimensionality, a numerous methods have been proposed in literature. In this paper, we propose a novel face recognition method that effic...
详细信息
Face recognition is considered as a high dimensionality problem. To handle high dimensionality, a numerous methods have been proposed in literature. In this paper, we propose a novel face recognition method that efficiently solves that problem using MPEG-7 edge histogram descriptor. To the authors' knowledge, this is the first attempt to use edge histogram descriptor in face recognition. Although MPEG-7 standard represents only local edge histogram we use global and semi-global edge histogram also. We find that local edge histogram mostly helpful for face recognition. We test our system not only using the entire face image as input but also dividing the image into different sub-divisions. PCA is then applied to the edge histogram descriptors of sub-divisions in-stead of raw pixel intensity values of images which traditional methods do. Since we use normalized edge histogram, our face recognition method becomes scale, translation and rotation invariant. Furthermore, our proposed method does not necessarily require all images to be of same resolution as input. We evaluate the proposed method using ORL, Yale and Face94 face databases and achieve superior performance.
The proxy is one of the important parts of the Internet. The proxy can reduce the data flow and release the load of the servers. Because of the unpredictable problem of the network, the proxies have great influence on...
详细信息
The proxy is one of the important parts of the Internet. The proxy can reduce the data flow and release the load of the servers. Because of the unpredictable problem of the network, the proxies have great influence on the video QoS. Through the perfect algorithm, within the acceptable scope, the proxy can improve the performance of the system. In the video service system, the proxy can improve the scalability of the system and improve the QoS. In this paper, a new cache replace strategy based on AFEC is proposed, which can employee the characteristics of the proxy and can improve the system performance within the normal resource.
Multiprocessor systems-on-chip (MPSoC) are required to fulfill the performance demand of modern real-life embedded applications. These MPSoCs are employing Network-on-Chip (NoC) for reasons of efficiency and scalabili...
详细信息
Multiprocessor systems-on-chip (MPSoC) are required to fulfill the performance demand of modern real-life embedded applications. These MPSoCs are employing Network-on-Chip (NoC) for reasons of efficiency and scalability. Additionally, these systems need to support run-time reconfiguration of their components to cater to dynamically changing demands of the system. Designing and programming such systems for real-life applications prove to be a major challenge. This paper demonstrates the designing of reconfigurable NoC-based MPSoC and programming it for real-life applications. The NoC is reconfigured at run-time to support different combinations of multiple applications at different times. The platform is verified with a case study executing the parallelized C-codes of a simple producer-consumer and JPEG decoder applications on a NoC-based MPSoC on a Xilinx FPGA. Based on our investigations to map the applications on a 3 × 3 platform, we show that the NoC reconfiguration overhead is kept at a minimum and the platform utilizes 85% of the total available slices of Virtex-5 FPGA. Moreover, we show that the proposed approach is highly scalable when targeting for large number of applications.
Fast evolving digital imaging on embedded devices imposes need for fast, energy efficient and flexible encoder implementation. In this paper we present fully software implementation of JPEG XR encoder on heterogeneous...
详细信息
Fast evolving digital imaging on embedded devices imposes need for fast, energy efficient and flexible encoder implementation. In this paper we present fully software implementation of JPEG XR encoder on heterogeneous multiprocessor platform consisting of one VLIW+SIMD processor used for compute-intensive parts of the algorithm. Achieved performance is between fully software implementation on general purpose processor and fully hardware implementation, with flexibility of fully software implementation.
A blind, low complex, fast, and highly resistant to attacks watermarking algorithm is proposed for JPEG compressed images. Our method is a discrete cosine transform (DCT) and block based algorithm that adds some Huffm...
详细信息
ISBN:
(纸本)9781424467600
A blind, low complex, fast, and highly resistant to attacks watermarking algorithm is proposed for JPEG compressed images. Our method is a discrete cosine transform (DCT) and block based algorithm that adds some Huffman code words to the end of the code sequence of some blocks during JPEG compression procedure. Via a blind approach in decoder, each block is determined to be a watermarked or unwatermarked one. While the robustness to attacks is still preserved, the size of watermarked image may differ from the JPEG compressed one insignificantly. Presented scheme is used for pictures that have perceptually high quality and due to this, are very apt to watermarking task for the sake of contents owner authenticity. Peak signal to noise ratio (PSNR) will be our benchmark to asses the quality of images.
In this paper we propose a novel technique for efficient video distribution over WiMAX networks. The technique incorporates resource distribution, scheduling and content-aware streaming of video taking advantage of a ...
详细信息
In this paper we propose a novel technique for efficient video distribution over WiMAX networks. The technique incorporates resource distribution, scheduling and content-aware streaming of video taking advantage of a flexible QoS functionality offered by WiMAX. The proposed technique was thoroughly investigated using NS-2 software package under various real-life scenarios which included streaming video over MAC service connections. It is shown that the technique allows dramatic increase in overall network throughput, which is dependent upon the initial selection of WiMAX user parameters.
This paper presents a real-time adaptive video streaming system based on the latest standardized video codec H.264/MPEG-4 AVC scalable extension (SVC). The system provides a full MPEG-21 media access framework over he...
详细信息
This paper presents a real-time adaptive video streaming system based on the latest standardized video codec H.264/MPEG-4 AVC scalable extension (SVC). The system provides a full MPEG-21 media access framework over heterogeneous networks and terminals with end-to-end QoS control and multimedia adaptation based on SVC. This adaptive streaming system is composed of a server with a real-time SVC encoder, an adaptive network node, and a terminal with appropriate feedback of perceptual quality, network conditions and user preferences for adaptation support. The system facilitates a general content adaptation solution to achieve the end-to-end QoS control.
Image retrieval method in discrete cosine transform (DCT) compressed domain, which based on the color feature of diagonal sub-image by extracting the dominant color information from DCT domain directly, is studied in ...
详细信息
Image retrieval method in discrete cosine transform (DCT) compressed domain, which based on the color feature of diagonal sub-image by extracting the dominant color information from DCT domain directly, is studied in this paper, the simulation shows the effectiveness of the proposed method.
In this paper, we propose a method for detecting resized JPEG images. We defined 8 × 8 periodic blocks as JPEG blocks. JPEG block boundaries are detected by applying 8 × 8 block discrete cosine transform (DC...
详细信息
In this paper, we propose a method for detecting resized JPEG images. We defined 8 × 8 periodic blocks as JPEG blocks. JPEG block boundaries are detected by applying 8 × 8 block discrete cosine transform (DCT) to all the pixels of the input image and analyzing the high frequency coefficients in them. In order to quantitatively analyze the degree of forgery, we have developed two approaches such as truth-score and correlation-score methods. Experimental results using 375 original (untouched) JPEG images and 2,250 resized images recompressed with a variety of quality factors demonstrated that our proposed method can classify them with over 90% of accuracy. Our proposed method can detect not only conventional resizing but also state-of-the-art non-linear resizing such as seam carving.
The objective of image fusion is to combine information from multiple images of the same scene in order to deliver only the useful information. The discrete cosine transform (DCT) based methods of image fusion are mor...
详细信息
The objective of image fusion is to combine information from multiple images of the same scene in order to deliver only the useful information. The discrete cosine transform (DCT) based methods of image fusion are more suitable and time-saving in real-time systems using DCT based standards of still image or video. In this paper an efficient approach for fusion of multi-focus images based on variance calculated in DCT domain is presented. The experimental results on several images show the efficiency improvement of our method both in quality and complexity reduction in comparison with several recent proposed techniques.
暂无评论