In this paper, we present a new low-complexity no-reference metric that assesses the visibility of blocking artifacts in DCT-coded images. The metric works in the spatial domain as well as in the gradient image domain...
详细信息
In this paper, we present a new low-complexity no-reference metric that assesses the visibility of blocking artifacts in DCT-coded images. The metric works in the spatial domain as well as in the gradient image domain without remarkable changes. Our conducted simulations showed that the metric is highly robust among many image distortion databases and extremely consistent with subjective mean opinion scores (MOS). The metric also provides a blocking visibility map that can be used for adaptive filtering of blocking artifacts.
Although optimal truncation of JPEG2000 compressed imagery provides an image of the highest quality per bitrate in terms of PSNR, the algorithm is highly computationally inefficient because of the removal of compresse...
详细信息
Although optimal truncation of JPEG2000 compressed imagery provides an image of the highest quality per bitrate in terms of PSNR, the algorithm is highly computationally inefficient because of the removal of compressed image sections that have been previously calculated. The proposed idea utilizes a simple quantization technique prior to Tier I coding to remove many of the coding passes from the imagery that would not become a part of the final compressed bitstream. A new method based on the this idea is discussed. The method restricts the quantization value to be a power of 2, effectively eliminating the least significant bits of each codeblock through the quantization step, providing substantial reduction in computational complexity, a 39% reduction in overall complexity at 0.25 bits per pixel. The new method gives an equivalent rate distortion curve as traditional optimal truncation.
In this paper we present a hardware architecture suitable for implementing discrete trigonometric transforms (DTT) including popular fast Discrete Cosine (DCT) and Sine (DST) transforms. The design method is modular a...
详细信息
In this paper we present a hardware architecture suitable for implementing discrete trigonometric transforms (DTT) including popular fast Discrete Cosine (DCT) and Sine (DST) transforms. The design method is modular and uses predesigned components to construct a transform system. A data shuffle network structure is presented in this work and we will show how it is used in conjunction with a partial column structure to build and compute the transforms. The scalability is based only on the transform size and the number of processing elements (PE). The transform throughput is determined by the number of PE and its associated shuffle network size. In this work we use a scalable DCT-II algorithm with a constant geometry structure to present the design methodology. The design approach can be applied to implement other discrete trigonometric transforms with similar property.
In this paper, we propose a novel SVD-based RGB color image watermarking, in which the watermark is assumed to be an RGB color image whose detection and extraction are performed in a blind manner. The performance of t...
详细信息
In this paper, we propose a novel SVD-based RGB color image watermarking, in which the watermark is assumed to be an RGB color image whose detection and extraction are performed in a blind manner. The performance of the proposed watermarking method is investigated by measuring its imperceptible and robust capabilities. For the imperceptible capability, a quantitative index, Peek Signal-to-Noise Ratio (PSNR), is employed to evaluate the difference between an original image and its corresponding watermarked image. For the robust capability, the Correlation Coefficient (CC) is also used to evaluate the similarity between the original watermark and the extracted one. Experimental results indicate that our technique is robust and produces high-quality watermarked images.
Compositing is one of the most common forms of digital image tampering. In this paper, we present a passive approach to detect composite JPEG images by measuring inconsistencies of blocking artifacts. Firstly, double-...
详细信息
Compositing is one of the most common forms of digital image tampering. In this paper, we present a passive approach to detect composite JPEG images by measuring inconsistencies of blocking artifacts. Firstly, double-compression detection is performed to estimate the primary quality factor. Secondly, the blocking artifacts ratio mapping is extracted in the DCT domain via computing the blocking artifacts with different block-dividing manners at primary quality factor. Finally, automatic tampering detection and location of tampered region are fulfilled by image segmentation. Experimental results indicate the proposed algorithm is effective to images of various qualities and small tampered regions. With the false positive rate of 1%, the detection accuracy for composite images is above 93% for differences of quality factors before/after tampering larger than 15 and for tampered regions with size 64×64. Furthermore, owing to the elimination of decompression/ compression conversion, the proposed method has advantage of low computational complexity.
We propose a novel shot detection algorithm based on RS in Compressed-Domain. Firstly, the Algorithm extracts I frames from Compressed-Domain data sequence. We constructs information system with the difference between...
详细信息
We propose a novel shot detection algorithm based on RS in Compressed-Domain. Firstly, the Algorithm extracts I frames from Compressed-Domain data sequence. We constructs information system with the difference between two adjacent I frames in column and attributes sets witch extracted from decompressed I frames in row. Then the established information system is normalized and discredited. Secondly, we reduce information system by using attribute reduce theory of RS to obtain no redundant attributes, and detect shot by using the theory of classification of RS. Finally, the performance of the algorithm is K-mean cross validation. Experimental results show that the algorithm can reduce the computational complexity and improve the accuracy of the shot detection effectively.
In this paper, we present a novel approach for improving retrieval accuracy based on DCT (discrete cosine transform) Filter-bank. First, we perform DCT on a given image, and generate a Filter-bank using the DCT coeffi...
详细信息
ISBN:
(纸本)9781424459421;9781424459438
In this paper, we present a novel approach for improving retrieval accuracy based on DCT (discrete cosine transform) Filter-bank. First, we perform DCT on a given image, and generate a Filter-bank using the DCT coefficients for each color channel. In this step, DC and the limited number of AC coefficients are used. Next, a feature vector is obtained from the histogram of the quantized DC coefficients. Then, AC coefficients in the Filter-bank are separated into three main groups indicating horizontal, vertical, and diagonal edge directions, respectively, according to their spatial-frequency properties. Each directional group creates its histogram after employing Otsu binarization technique. Finally, we project each histogram on the horizontal and vertical axes, and generate a feature vector for each group. The computed DC and AC feature vectors are concatenated, and it is used in the similarity checking procedure. In order to evaluate the proposed scheme, state-of-art approaches including DC-based and DC and AC energy-based retrieval systems are implemented and compared in terms of retrieval accuracy. Experimental results show that the proposed algorithm outperforms the other approaches.
Video Content-Based Copy Detection (CBCD) is an emergent research field which is targeted to the identification of modified copies of an original clip in a given dataset, e.g., on the Internet. As opposed to digital w...
详细信息
Video Content-Based Copy Detection (CBCD) is an emergent research field which is targeted to the identification of modified copies of an original clip in a given dataset, e.g., on the Internet. As opposed to digital watermarking, the content itself is used to uniquely identify the video through the extraction of features that need to be robust against a certain set of predetermined video attacks. This paper advocates the use of multiple features together with detection performance estimation to construct a flexible video signature instead of a fixed, single feature based one. To combine diverse features, a normalized linear combination is also proposed. The system performance boost is evaluated through the MPEG Video Signature Core Experiment dataset and experimental results show how the proposed signature scheme can achieve impressive improvements with respect to the single feature approach.
Over the years it has been observed that a hacker, finds it less difficult to break any encryption key, even though it may require large number of attempts, specially with advent of high-speed machines. Therefore, an ...
详细信息
Over the years it has been observed that a hacker, finds it less difficult to break any encryption key, even though it may require large number of attempts, specially with advent of high-speed machines. Therefore, an encryption method alone is not sufficient for copyright protection and ownership authentication of stored and streamed videos. Digital watermarking techniques have been proposed for this purpose. A fast method of watermarking of streamed H.264 video data is proposed in the present work to meet the real time criteria of a streaming CDN server. The approach involves a blind watermarking scheme that inserts watermark in transformed coefficients of Independent Decoder Refresh (IDR) frames of the streamed H.264. As these IDR frames are then required to reconstruct the P frames, the proposed scheme can ensure security for both type of frames namely I and P. The method also may include a hashing technique to hash the entire group of pictures (GOP) into a 128-bit number. This number, in turn, is used as watermark for the next GOP to ensure the integrity feature of the watermarking scheme.
The MMP is an algorithm for image compression which uses the multiscale method of recurrent patterns, based on dictionary. The MMP has compression ratio at the same level of others compression algorithms which are bas...
详细信息
The MMP is an algorithm for image compression which uses the multiscale method of recurrent patterns, based on dictionary. The MMP has compression ratio at the same level of others compression algorithms which are based on transforms, having been detached to images with high frequency, however its execution time has been shown high, by repeated searches of these patterns in dictionaries. In this paper we propose a parallel and dedication hardware to accelerate the execution of MMP, and it is implemented in FPGA, which performs the critical function in 340ns, achieving a speedup of 300 over software version.
暂无评论