In this paper, we propose a 4K digital cinema transmission over 1.2Gbps wireless LAN system. The proposed system employs the next generation wireless LAN system based on IEEE802.11ac specification. It reaches more tha...
详细信息
In this paper, we propose a 4K digital cinema transmission over 1.2Gbps wireless LAN system. The proposed system employs the next generation wireless LAN system based on IEEE802.11ac specification. It reaches more than 33 meter propagation distance by using 80MHz of bandwidth on the 5GHz band. In this system, video data is compressed by JPEG 2000 with error resilience tools. These tools improve error performance against wireless channel, and enable very high throughput communication. Computer simulations are used to evaluate the bit error performance's influences to the video quality. Finally, we present RTL design results of the proposed wireless LAN system.
Monitoring of target locations from a remote location is one of the important applications of a Wireless Sensor Network (WSN). In such image-based WSN applications, resource-constrained sensor nodes need to capture, c...
详细信息
ISBN:
(纸本)9781424464500;9781424464531
Monitoring of target locations from a remote location is one of the important applications of a Wireless Sensor Network (WSN). In such image-based WSN applications, resource-constrained sensor nodes need to capture, compress and transmit a large amount of data. However, the large size of the data and the high transmission rates associated with these applications cause rapid depletion of onboard power and increased congestion in the routing channels of the WSN. Together, these two effects cause the degradation of the performance and early death of wireless sensor nodes. In this paper, the performance improvement in WSNs through the implementation of hardware accelerated image compression is demonstrated.
The objective of this project is to build a character recognition system, which is able to recognize printed and handwritten character from A to Z. the typical optical character recognition systems, regardless the cha...
详细信息
The objective of this project is to build a character recognition system, which is able to recognize printed and handwritten character from A to Z. the typical optical character recognition systems, regardless the character's nature, are based mainly on three stages, preprocessing, features extraction, and discrimination. Each stage has its own problems and effects on the system efficiency which is the time consuming and the recognition errors. In order to avoid these difficulties this project presents new construction of character recognition tool using the technique similar to that is used in image compression such as wavelet compression or JPEG compression. Wavelet compression is chosen as the technique implemented for this project. Wavelet compression technique extracted the important coefficient from the images. The Euclidean distance between the coefficient of the test images and training images is computed. Character is considered recognized if the Euclidean distance calculated is smaller than the Global threshold value of 258. This character recognition system also has 18.81% of false rejection rate and 21.88% for false acceptance rate.
In this paper two H.263 video encryption algorithms have been implemented and compared. These algorithms encrypt selected sign bits of DCT coefficients using secret key cryptography algorithms such as DES, AES. The ai...
详细信息
In this paper two H.263 video encryption algorithms have been implemented and compared. These algorithms encrypt selected sign bits of DCT coefficients using secret key cryptography algorithms such as DES, AES. The aim of selective encryption is to reduce the amount of data to encrypt while maintaining a sufficient level of security. This computation saving is very desirable especially in constrained communications (real-time networking, high-definition delivery, and mobile communications with limited computational power devices). In addition, selective encryption allows preserving some codec functionalities such as scalability. The first algorithm encrypts the sign bits of the entire video in one iteration. The second algorithm is the modification of the first which meets the requirements of real-time applications by encrypting the sign bits framewise.
We address the problem of retrieving the silhouettes of objects from a database of shapes with a translation and rotation invariant feature extractor. We retrieve silhouettes by using a “soft” classification based o...
详细信息
We address the problem of retrieving the silhouettes of objects from a database of shapes with a translation and rotation invariant feature extractor. We retrieve silhouettes by using a “soft” classification based on the Euclidean distance. Experiments show significant gains in retrieval accuracy over the existing literature. This work extends the use of our previously employed feature extractor and shows that the same descriptor can be used for both texture and shape recognition.
Remote medical Support System (RMSS) means a remote support system among 4 remote telemedicine services of U-Health. A currently available service in Korea is the one checking and maintaining patient's status and ...
详细信息
Remote medical Support System (RMSS) means a remote support system among 4 remote telemedicine services of U-Health. A currently available service in Korea is the one checking and maintaining patient's status and supporting in emergency through video communication between an ambulance transferring patients and hospital under HSDPA and WiBro environment with coding of MPEG-2 and MPEG-4. With that, this paper improves the stability of the current RMSS service of ambulance confirms the improvement compared to the old system by generating a system communicating by RTP/RTCP under coding process through H.264/AVC after converting RGB video to YUV in order to improve network efficiency.
Re-encoding of once compressed files is one of the difficult challenges in measuring the efficiency of coding methods. Variable length coding with a variable source delimiting scheme is a promising method for improvin...
详细信息
Re-encoding of once compressed files is one of the difficult challenges in measuring the efficiency of coding methods. Variable length coding with a variable source delimiting scheme is a promising method for improving re-encoding efficiency. Analyses of coded files with fixed length delimiting and with variable length delimiting are reviewed. Motion vector codes of MPEG-2 encoded files are modified as a variable-to-variable coding point of view. Length, bit-rates, and varieties of videos are examined. The largest file is 16 seconds of D1 full size at 720 ×480 among five video files. By entropy evaluation, an improvement of almost 20% in coding efficiency over the conventional MPEG-2 is obtained.
In this paper, a new method to identify the violent videos by the bag of audio words is introduced. The MPEG-7 audio descriptors are firstly extracted, including the low level features such as AudioSpectrumCentroid an...
详细信息
In this paper, a new method to identify the violent videos by the bag of audio words is introduced. The MPEG-7 audio descriptors are firstly extracted, including the low level features such as AudioSpectrumCentroid and AudioSpectrum-Spread, etc. The audio words are then built according to the MPEG-7 high level descriptor, the AudioSighnature, which is considered as the “fingerprint” of the audio stream. The support vector machine is used to classify the feature vectors into two classes, i.e. the violent and non-violent videos. The experiment results demonstrate that our method can achieve good recall accuracy.
In digital rights management (DRM) systems, digital media is often distributed by multiple levels of distributors in a compressed and encrypted format. The distributors in the chain face the problem of embedding their...
详细信息
In digital rights management (DRM) systems, digital media is often distributed by multiple levels of distributors in a compressed and encrypted format. The distributors in the chain face the problem of embedding their watermark in compressed, encrypted domain for copyright violation detection purpose. In this paper, we propose a robust watermark embedding technique for JPEG2000 compressed and encrypted images. While the proposed technique embeds watermark in the compressed-encrypted domain, the extraction of watermark can be done either in decrypted domain or in encrypted domain.
Short description of the device's functions and capabilities is presented. Technical solutions for monitored signal quality data accessing are studied.
Short description of the device's functions and capabilities is presented. Technical solutions for monitored signal quality data accessing are studied.
暂无评论