Quantization index modulation (QIM) principle has shown superior performance in digital watermarking over spread-spectrum and low-bit(s) modulation based methods. In QIM based data hiding scheme, it is a challenging t...
详细信息
Quantization index modulation (QIM) principle has shown superior performance in digital watermarking over spread-spectrum and low-bit(s) modulation based methods. In QIM based data hiding scheme, it is a challenging task to embed multiple bits of information into the same set of host signal samples. This work attempts to employ M-ary modulation for multibit QIM watermarking. The watermark embedding process may be divided into two phases. In the first phase, a binary watermark image is spatially dispersed using sequence of number generated by a secret key. In the second phase, host image is decomposed by integer wavelets and the encoded watermark bits are embedded into high-low (HL) and low-high (LH) subbands of DWT-coefficients using M-ary modulation. M-ary modulation is accomplished using near-orthogonal dither generated from the combination of random key, Hadamard matrix and step size. Simulation results show that robustness is increased, at the cost of increase in decoding complexity for high M-value.
Tools for designing signal processing systems with their semantic foundation in dataflow modeling often use high-level graphical user interface (GUI) or text based languages that allow specifying applications as direc...
详细信息
Tools for designing signal processing systems with their semantic foundation in dataflow modeling often use high-level graphical user interface (GUI) or text based languages that allow specifying applications as directed graphs. Such graphical representations serve as an initial reference point for further analysis and optimizations that lead to platform-specific implementations. For large-scale applications, the underlying graphs often consist of smaller substructures that repeat multiple times. To enable more concise representation and direct analysis of such substructures in the context of high level DSP specification languages and design tools, we develop the modeling concept of topological patterns, and propose ways for supporting this concept in a high-level language. We augment the DIF language - a language for specifying DSP-oriented dataflow graphs - with constructs for supporting topological patterns, and we show how topological patterns can be effective in various aspects of embedded signal processing design flows using specific application examples.
The design of new embedded systems is getting more and more complex as more functionality is integrated into these systems. To deal with the design complexity, a predictable design flow is needed. The result should be...
详细信息
The design of new embedded systems is getting more and more complex as more functionality is integrated into these systems. To deal with the design complexity, a predictable design flow is needed. The result should be a system that guarantees that an application can perform its own tasks within strict timing deadlines, independent of other applications running on the system. Synchronous Dataflow Graphs (SDFGs) provide predictability and are often used to model time-constrained streaming applications that are mapped onto a multiprocessor platform. However, the model abstracts from the dynamic application behaviour which may lead to a large overestimation of its resource requirements. We present a design flow that takes the dynamic behaviour of applications into account when mapping them onto a multiprocessor platform. The design flow provides throughput guarantees for each application independent of the other applications while taking into account the available processing capacity, memory and communication bandwidth. The design flow generates a set of mappings that provide a trade-off in their resource usage. This trade-off can be used by a run-time mechanism to adapt the mapping in different use-cases to the available resource. The experimental results show that our design flow reduces the resource requirements of an MPEG-4 decoder by 66% compared to a state-of-the-art design flow based on SDFGs.
The design and implementation of web-based DICOM-format image archive, medical image compression and DICOM viewer system for teleradiology application which DICOM server was developed using software such as Borland De...
详细信息
ISBN:
(纸本)9781424476428
The design and implementation of web-based DICOM-format image archive, medical image compression and DICOM viewer system for teleradiology application which DICOM server was developed using software such as Borland Delphi 6.0, PHP and MySQL for image archive, image compression, image processing and image transmission. The system provides the following facilities: (1) DICOM-format image archive. (2) Medical Image Compression based on JPEG and JPEG2000. and (3) DICOM viewer. The results shown that (1) our system can also convert the image data both single frame and multiframes in normal or automatic DICOM process into the standard DICOM 3.0 format without altering the image data. (2) The resulting images are then compressed with two different techniques - JPEG and JPEG2000. The significant advantage of JPEG2000 over normal JPEG is that the error from JPEG2000 compression is smaller than the error from JPEG. Nevertheless, both methods share a similar mishap; when the compression ratio increases, they both generate more error than the processes on lower compression ratio. And (3) our system can open single frame and multiframes, each of which can exhibit information in .dcm file format with no distortion and digital image processing based on local contrast enhancement, adaptive interpolators techniques, colour transformation and cine loop. The system has been developed and provided medical image services over long distance which showed the usefulness of our approach.
This paper presents a methodology for fast and efficient Design Space Exploration during High Level Synthesis. An augmented instance of the design space is studied taking under consideration the effects of both compil...
详细信息
ISBN:
(纸本)9781424473212
This paper presents a methodology for fast and efficient Design Space Exploration during High Level Synthesis. An augmented instance of the design space is studied taking under consideration the effects of both compiler- and architectural-level transformations onto the final datapath. A new gradient-based pruning technique has been developed, which evaluates large portions of the augmented solution space in a quick manner. At a second level, the proposed pruning technique is combined with exhaustive exploration in order to guarantee the quality of design solutions. We show that the proposed methodology delivers (i) higher quality designs than exploration methods which do not account the introduced extended design space, (ii) with considerable reductions of the exploration's runtime and (iii) efficient convergence to global optima.
This paper presents the latest developments and possible new directions for future work in standardisation of Visual Signature Tools within the Moving Picture Experts Group (MPEG). The tools, which include the Image S...
详细信息
This paper presents the latest developments and possible new directions for future work in standardisation of Visual Signature Tools within the Moving Picture Experts Group (MPEG). The tools, which include the Image Signature descriptor and the recently completed Video Signature descriptor, form a part of the MPEG-7 specification. They enable fast and robust detection of duplicate or derived visual media content, images and videos. Descriptors of this type are sometimes also referred to as fingerprints or robust hashes. Here we mainly focus on introducing the technology behind the recently completed Video Signature Tools and describe some recent developments and demonstration applications for the Image Signature Tools. Finally, we briefly present MPEG exploratory investigations on requirements of searching for different images containing the same visual objects within the mobile visual search framework.
In this paper, we present a reduced reference method for image quality assessment (RRIQA). This method is based on statistical properties of the bidimensional empirical mode decomposition (BEMD) components, called int...
详细信息
In this paper, we present a reduced reference method for image quality assessment (RRIQA). This method is based on statistical properties of the bidimensional empirical mode decomposition (BEMD) components, called intrinsic mode function (IMF). First we decompose both reference and distorted images to IMFs, then we compute the distance between marginal probability distributions of each IMF coefficients of the reference image, and its corresponding IMF of the distorted image using the Kullback Leibler divergence (KLD) as a measure of image distortion. To summarize the histogram of each IMF coefficients of the reference image, we use the Generalized Gaussian density model (GGD), in order that only a vector of few features will be needed for the image quality assessment(IQA) purpose. This method is simple to implement and it outperforms some existing results especially for the blur and the white noise distortion.
In this demo, we present three lean methods for real-time adaptation of live MPEG-2 video to limited and varying network bandwidth. Our methods use real-time resource management techniques to determine available resou...
详细信息
In this demo, we present three lean methods for real-time adaptation of live MPEG-2 video to limited and varying network bandwidth. Our methods use real-time resource management techniques to determine available resources and steer adaptation decisions. Then, the modified stream consists only of frames with a high likelyhood of being processed completely, the resulting stream will only use resources when they are effectively used. We present three related approaches, based on skipping entire frames, or frames and DCT coefficients for finer granularity and thus smaller underutilization.
A novel semi-fragile watermarking scheme of JPEG image in compressed domain is proposed. A chaotic map model based an authentication generating model is introduced. The DCT-transformed matrix of luminance plane in YCb...
详细信息
A novel semi-fragile watermarking scheme of JPEG image in compressed domain is proposed. A chaotic map model based an authentication generating model is introduced. The DCT-transformed matrix of luminance plane in YCbCr color space is quantized by a modified quantized table. Then the low-frequency coefficients and location of each image block are used as the input of authentication generating model to generate binary authentication sequence. The sequence is embedded in the middle-frequency coefficients of each block after quantization. Finally, the authentication results are improved by a cross window. Experimental results illustrate that the watermarked image has good imperceptibility and could tolerate multiple cycles of JPEG compression. It is also sensitive to malicious manipulations and could localize those tampered regions correctly.
Due to its object based nature, flexible features and provision for user interaction, MPEG-4 encoder is highly suitable for parallelization. The most critical and time-consuming operation of encoder is motion estimati...
详细信息
ISBN:
(纸本)9781424447909
Due to its object based nature, flexible features and provision for user interaction, MPEG-4 encoder is highly suitable for parallelization. The most critical and time-consuming operation of encoder is motion estimation. Nvidia's general-purpose graphical processing unit (GPGPU) architecture allows for a massively parallel stream processor model at a very cheap price (in a few thousands Rupees). However synchronization of parallel calculations and repeated device to host data transfer is a major challenge in parallelizing motion estimation on CUDA. Our solution employs optimized and balanced parallelization of motion estimation on CUDA. This paper discusses about frame-based parallelization wherein parallelization is done at two levels - at macroblock level and at search range level. We propose a further division of macroblock to optimize parallelization. Our algorithm supports real-time processing and streaming for key applications such as e-learning, telemedicine and video-surveillance systems, as demonstrated by experimental results.
暂无评论