We evaluate the performance of MPEG-7 image signatures, Compressed Histogram of Gradients descriptor (CHoG) and Scale Invariant Feature transform (SIFT) descriptors for mobile visual search applications. We observe th...
详细信息
We evaluate the performance of MPEG-7 image signatures, Compressed Histogram of Gradients descriptor (CHoG) and Scale Invariant Feature transform (SIFT) descriptors for mobile visual search applications. We observe that SIFT and CHoG outperform MPEG-7 image signatures greatly in terms of feature-level Receiver Operating Characteristic (ROC) performance and image-level matching. Moreover, CHoG descriptors demonstrate such gains while being comparable with MPEG-7 image signatures in bit-rate.
A fragile watermarking algorithm for image contents integrity verification based on logistic system and JPEG (Joint Photographic Experts Group) is proposed in this paper. The watermarking process is carried out during...
详细信息
A fragile watermarking algorithm for image contents integrity verification based on logistic system and JPEG (Joint Photographic Experts Group) is proposed in this paper. The watermarking process is carried out during JPEG quantization process. Firstly, each 8×8 DCT coefficients block is subdivided into 4 groups based on logistic system; then, in order to obtain the watermarked JPEG image, all of the groups are check coded by the check bits. The watermarked JPEG image remains high quality. The tamper probability is determined by checking the DCT coefficients groups.
Three-dimensional (3D) TV is considered as the next-generation broadcasting service. In this paper, we propose a new scheme to generate 3D video contents using a time-of-flight (TOF) range sensor for the 3DTV service....
详细信息
Three-dimensional (3D) TV is considered as the next-generation broadcasting service. In this paper, we propose a new scheme to generate 3D video contents using a time-of-flight (TOF) range sensor for the 3DTV service. TOF sensors are a relatively novel technology allowing for the real-time capture of both photometric and geometric scene information. In this work, in order to generate natural 3D video, we develop a practical pipeline including TOF data processing and MPEG- 4-based data transmission and reception. First, we acquire color and depth videos from a TOF range sensor. Then, alpha matting and depth map enhancement are performed to handle fuzzy and hairy objects that are traditionally difficult in image processing. Thereafter, the generated video-plus-depth data are combined with interactive computer graphic models in the MPEG-4 multimedia framework. Since we represent the depth video with a newly designed MPEG-4 Binary Format for Scene (BIFS) node and describe a dynamic 3D scene in the multimedia framework, the 3D video contents can be streamed to the client side through a network.
In this paper, an efficient and secure encryption scheme for JPEG2000 codestream is proposed. The scheme encrypts each codeblock contribution to a packet (CCP) and does not introduce superfluous JPEG2000 markers in th...
详细信息
In this paper, an efficient and secure encryption scheme for JPEG2000 codestream is proposed. The scheme encrypts each codeblock contribution to a packet (CCP) and does not introduce superfluous JPEG2000 markers in the protected codestream. It achieves full information protection for data confidentiality, and maintains all the advanced features of the original JPEG2000 codestream such as error resilience and scalability. Theoretical analysis and experimental results demonstrate the merits of the proposed scheme.
The Reconfigurable Video coding (RVC) framework is a recent ISO standard aiming at providing a unified specification of MPEG video technology in the form of a library of components. The word “reconfigurable” evokes ...
详细信息
The Reconfigurable Video coding (RVC) framework is a recent ISO standard aiming at providing a unified specification of MPEG video technology in the form of a library of components. The word “reconfigurable” evokes run-time instantiation of different decoders starting from an on-the-fly analysis of the input bitstream. In this paper we move a first step towards the definition of systematic procedures that, based on the MPEG RVC specification formalism, are able to produce multi-decoder platforms, capable of fast switching between different configurations. Looking at the similarities between the decoding algorithms to implement, the papers describes an automatic tool for their composition into a single configurable multi-decoder built of all the required modules, and able to reuse the shared components so as to reduce the overall footprint (either from a hardware or software perspective). The proposed approach, implemented in C++ leveraging on Flex and Bison code generation tools, typically exploited in the compilers front-end, demonstrates to be successful in the composition of two different decoders MPEG-4 Part 2 (SP): serial and parallel.
Cloud computing is emerging as a virtual model in support of “everything-as-a-service” (XaaS). Service providers in a cloud provide XasS of resources. There are numerous providers involved in a cloud such as feeders...
详细信息
Cloud computing is emerging as a virtual model in support of “everything-as-a-service” (XaaS). Service providers in a cloud provide XasS of resources. There are numerous providers involved in a cloud such as feeders, owners, delegators and creators who are less likely the same agent. Consequently, without identifying the credential of their providers, cloud resources cannot be securely managed by traditional security models and services may be trustless. In this paper, we propose a new security technique to measure the trustiness of the cloud resources. Using the metadata of resources, the technique binds authorization policies to compute the trace ability between the resources and the provider's credential. The contribution of this paper includes a mechanism of the privilege chains that can be used to verify the legitimacy of cloud resources and to measure the trustiness of cloud services.
This paper deals with image compression over Wireless Camera Sensor Networks (WCSNs) in order to decrease the energy consumption of sensors and thus to maintain a long network lifetime. As the radio tranceiver is the ...
详细信息
This paper deals with image compression over Wireless Camera Sensor Networks (WCSNs) in order to decrease the energy consumption of sensors and thus to maintain a long network lifetime. As the radio tranceiver is the most power greedy components of sensor nodes, it seems natural to consider lossy compression before transmission as the appropriate answer to the problem of energy consumption. However, the limitation of sensor nodes in terms of memory as well as processor speed makes most of the compression algorithms inapplicable. Indeed, the most popular methods such as JPEG or JPEG2000 can yield a higher energy consumption than when transmitting uncompressed images. Here we propose to solve this problem by the design of a fast zonal DCT-based image compression algorithm which allows an efficient tuning of the trade-off between energy consumption and image distortion, as shown by experimental results provided in the paper.
This paper presents a block-wise semi-fragile watermarking algorithm for image content authentication, with tamper region localization and recovery capability. A halftone image is generated by the error diffusion half...
详细信息
This paper presents a block-wise semi-fragile watermarking algorithm for image content authentication, with tamper region localization and recovery capability. A halftone image is generated by the error diffusion halftoning method and embedded using the Quantization Index Modulation (QIM) method in the Discrete Cosine transform (DCT) domain of the original image. The proposed method is robust to JPEG compression, because the halftone image is embedded as a watermark sequence in the middle frequencies of the DCT coefficients using QIM. Also to improve the recovered image quality, Multilayer Perceptron neural network (MLP) is used in inverse halftoning process. Data in the tampered region is estimated with gray-scale data obtained from the MLP, using the embedded halftone as input. The experimental results show desirable performance of the proposed algorithm, such as watermark imperceptibility, robustness to JPEG compression, detection accuracy of tampered region and high quality of recovered image.
This paper proposes an image watermarking scheme for copyright protection based on Independent Component Analysis (ICA). In the suggested scheme, we divide the original image into blocks and use the ICA to project the...
详细信息
This paper proposes an image watermarking scheme for copyright protection based on Independent Component Analysis (ICA). In the suggested scheme, we divide the original image into blocks and use the ICA to project the image into a basis with its components as statistically independent as possible. The data embedding is carried out in cumulative form in the ICA basis and also the ICA is used for watermark extraction. The extraction process could be either non-blind, through a straightforward procedure, or blind, via a tricky method we propose. Experimental results show that the new method outperforms some well-known image watermarking methods in spatial or frequency domain and is robust against various attacks, including noise addition, resizing, low pass filtering, multiple marks embedding, JPEG compression, gray-scale reduction, and cropping parts of image.
In this work we propose a new algorithm for selection of high-quality photos for album building applications. We describe how to select features for detection well-exposed, sharp and artifact-free photos. We considere...
详细信息
In this work we propose a new algorithm for selection of high-quality photos for album building applications. We describe how to select features for detection well-exposed, sharp and artifact-free photos. We considered two approaches: the first, typical way when all features are used in single AdaBoost classifiers committee and the second way, when decision tree, including 3 committees. Careful analysis of features and decision tree construction allowed better outcomes to be reached.
暂无评论