A simple algorithm for image retargeting in the compressed domain is proposed. Most existing retargeting algorithms work directly in the spatial domain of the raw image. Here, we work on the DCT coefficients of a JPEG...
详细信息
ISBN:
(纸本)9781424475421
A simple algorithm for image retargeting in the compressed domain is proposed. Most existing retargeting algorithms work directly in the spatial domain of the raw image. Here, we work on the DCT coefficients of a JPEG-compressed image to generate a gradient map that serves as an importance map to help identify those parts in the image that need to be retained during the retargeting process. Each 8 × 8 block of DCT coefficients is scaled based on the least importance value. Retargeting can be done both in the horizontal and vertical directions with the same framework. We also illustrate image enlargement using the same method. Experimental results show that the proposed algorithm produces less distortion in the retargeted image compared to some other algorithms reported recently.
A rate control algorithm is introduced to the JPEG XR still image compression algorithm, thereby allowing the user to compress an image to a target bit-rate. Using ρ-domain analysis, we showed a strong linearity rela...
详细信息
A rate control algorithm is introduced to the JPEG XR still image compression algorithm, thereby allowing the user to compress an image to a target bit-rate. Using ρ-domain analysis, we showed a strong linearity relationship of the rate function R(ρ). This allows us to accurately estimate the rate-distortion function, and thus control bit-rate of the JPEG XR encoder.
The word steganography is a Greek word means “covered or hidden writing”. Steganograpahy is a special method of writing hidden messages in such a way that no-one apart from the sender and the receiver can realizes t...
详细信息
ISBN:
(纸本)9781424486533
The word steganography is a Greek word means “covered or hidden writing”. Steganograpahy is a special method of writing hidden messages in such a way that no-one apart from the sender and the receiver can realizes that there is a hidden message. The Steganography includes the embedding of digital information within computer files. In our present work we try to embed sound file in an image file, text file within a word file or within a excel file or within a pdf file. In fact we try to embed any file into another cover file. The only restriction is that the size of cover file must be at least 10-20 times bigger than the embedded file. In the present work we apply (i) changing LSB, (ii) changing LSB+1 bit, (iii) changing LSB+3 bit for inserting secret message inside a cover file. We have also introduced the password for getting into the secret file. If the password is incorrect then we will not be able to extract message from the cover file.
Perceptual Encryption is required in many of the multimedia content preview application. There is always a need of an efficient technique that reduces the overhead of encryption in real-time. In this paper we take adv...
详细信息
Perceptual Encryption is required in many of the multimedia content preview application. There is always a need of an efficient technique that reduces the overhead of encryption in real-time. In this paper we take advantage of the energy present in DCT block and have studied the effects of encrypting the selected DCT coefficient. Also the DC coefficient is further divided into bitplanes and an investigation is carried out to study the resulting depth of perceptual encryption. To measure the level of perceptual degradation, objective image quality assessment metrics such as SSIM, MS-SSIM, VIF, VIFP, VSNR, IFC and UQI are used. The presented results can help one chose the desired level of perceptual encryption according to the application with very little overhead.
Most video compression standards, such as MPEG-2 and H.264/AVC, use variable length coding (VLC) to remove statistical redundancy. Since the code words have variable length, how to represent the codeword table to redu...
详细信息
Most video compression standards, such as MPEG-2 and H.264/AVC, use variable length coding (VLC) to remove statistical redundancy. Since the code words have variable length, how to represent the codeword table to reduce storage size is an important issue. A 2-D to 1-D tree translation scheme is proposed to minimize the number of stored bits. However, the throughput is limited by the tree search decoding flow. The VLC tree is then decomposed using sub-tree (ST) classification. The ST classification method not only reduces the amount of storage required for code words but also improves the throughput. The gate count of the proposed H.264/AVC context-based variable length decoder (CAVLD) design is 6.23 K when synthesized at 200 MHz.
This paper presents the system-level modeling of a Reconfigurable System on Chip (RSoC) that is being currently developed in our institution. Although there is a wide range of possible applications, our system is init...
详细信息
This paper presents the system-level modeling of a Reconfigurable System on Chip (RSoC) that is being currently developed in our institution. Although there is a wide range of possible applications, our system is initially aiming fruit monitoring system. The proposed RSoC contains a 32-bit RISC microprocessor, reconfigurable structures, analog and digital interfaces, an RF transceiver and an Active Pixel Sensor (APS) matrix whose function will consist basically on image acquisition. The modeling at a high level of abstraction has been used lately in the design and verification of SoCs due to the rising complexity of such systems. Virtual platforms using SystemC description language at Transaction-Level Modeling (TLM) allow efficient simulations including software and hardware. In this work, a preliminary evaluation of a system-level description of the RSoC is carried out. A JPEG compression algorithm was mapped and implemented as a case study to test the accuracy of the model. Future implementations will include the description of an RF transceiver and the communication between two RSoCs.
This work contributes to investigate theoretical properties of the trend vanishing moment (TVM) which the authors have defined in a previous work and applied to the directional design of 2-D nonsep-arable GenLOTs. The...
详细信息
This work contributes to investigate theoretical properties of the trend vanishing moment (TVM) which the authors have defined in a previous work and applied to the directional design of 2-D nonsep-arable GenLOTs. The TVM condition can be regarded as a natural extention of 1-D VM to 2-D one and alternative of the conventional directional vanishing moment (DVM). Firstly, the definition of TVM is given to clarify what it is, and then the mathematical meaning is discussed. While the conventional DVM condition requires for the moments to vanish along lines in the frequency domain and restricts the direction to a rational factor, the TVM condition imposes the moments only point-wisely and the direction can be steered flexibly. Some significant properties of TVMs are also shown and a simulation result of zonal coding for an artifical picture is given to verify the trend surface annihilation property.
In this paper, an integer-based post-compression rate-distortion optimization (PCRD-Opt) algorithm for JPEG2000 rate control is presented. The distortion estimation described in the JPEG2000 standard requires non-inte...
详细信息
In this paper, an integer-based post-compression rate-distortion optimization (PCRD-Opt) algorithm for JPEG2000 rate control is presented. The distortion estimation described in the JPEG2000 standard requires non-integer processing, and the overwhelming computational burden on JPEG2000 is the distortion calculation, which is calculated for every bit of the uncompressed image. In this paper, an integer-based approach for distortion calculation is proposed. The proposed method reduces the computational requirements for PCRD-Opt within the Tier I encoder, as well as provides a more straightforward algorithm for embedded processing, requiring no distortion look-up tables (LUTs) for proper distortion computation. The proposed integer-based method improves upon the PCRD-Opt method described in the standard. Specifically, the proposed method reduces the Tier-I processing time from an offline implementation of PDRD-Opt utilizing LUTs by approximately 18% on average, and reduces the overall JPEG2000 processing by 15%. The proposed integer-based distortion estimation provides an equivalent rate-distortion (RD) curve as both the offline PCRD method described in the standard.
Steganography is the art of secret communication between two parties that not only conceals the contents of a message but also its existence. Steganalysis attempts to detect the existence of embedded data in a stegano...
详细信息
Steganography is the art of secret communication between two parties that not only conceals the contents of a message but also its existence. Steganalysis attempts to detect the existence of embedded data in a steganographically altered cover file. Many algorithms have been proposed, but so far each has some weakness that has allowed its effects to be detected, usually through statistical analysis of the image. In this paper, we propose a different approach to JPEG steganography that provides high embedding capacity with zero-deviant histogram restoration. Our algorithm, named J3, uses stop points in its header structure that allows it to restore the histogram completely, making its detection impossible by any first order steganalysis. It gives better results with higher order steganalysis when compared to F5, Outguess and Steghide. As far as we know, there is no existing algorithm that can provide as high an embedding payload with complete histogram restoration.
Depth-image-based rendering (DIBR) is used to generate additional views of a real-world scene from images or videos and associated per-pixel depth information. An inherent problem of the view synthesis concept is the ...
详细信息
Depth-image-based rendering (DIBR) is used to generate additional views of a real-world scene from images or videos and associated per-pixel depth information. An inherent problem of the view synthesis concept is the fact that image information which is occluded in the original view may become visible in the “virtual” image. The resulting question is: how can these disocclusions be covered in a visually plausible manner? In this paper, a new temporally and spatially consistent hole filling method for DIBR is presented. In a first step, disocclusions in the depth map are filled. Then, a background sprite is generated and updated with every frame using the original and synthesized information from previous frames to achieve temporally consistent results. Next, small holes resulting from depth estimation inaccuracies are closed in the textured image, using methods that are based on solving Laplace equations. The residual disoccluded areas are coarsely initialized and subsequently refined by patch-based texture synthesis. Experimental results are presented, highlighting that gains in objective and visual quality can be achieved in comparison to the latest MPEG view synthesis reference software (VSRS).
暂无评论