We propose the ontology-based inference rule for an experience media authoring system. The experience media lets people feel realistic while satisfying the five senses. The experience media means the media recreating ...
详细信息
We propose the ontology-based inference rule for an experience media authoring system. The experience media lets people feel realistic while satisfying the five senses. The experience media means the media recreating more realistic situation by utilizing various peripheral devices in addition to audio-visual contents. The proposed ontology has advantages in producing the experience media by defining the relationships between sensory effects and sensory devices and utilizing ontology semantic knowledge representation as the expansion of the previous research. We also implemented an application, the Ontology-based Multi-Sensory Inference Engine (OMSIE), applying the proposed ontology model. The OMSIE infers sensory effect information from the given multimedia content information.
Objective image and video quality evaluations generally provide an overall measure of distortions. Parameter optimization and benchmarking of codecs require evaluating individual distortions. There are not many object...
详细信息
Objective image and video quality evaluations generally provide an overall measure of distortions. Parameter optimization and benchmarking of codecs require evaluating individual distortions. There are not many objective metrics that distinguish individual compression artefacts which are rapid to evaluate and correlate with human perception. The author of the paper presents the correlation that had been established between the metrics of compression artefact distortions that objectively and separately measure blockiness and blur artefacts introduced by image compression codecs. The methodology and the approach use synthetic test patterns specially designed for each of the two artefacts. Evaluation of quality in multimedia applications requires that the distortion metrics be correlated to human perception. One limitation of the previously proposed two metrics was that no correlation was established to human perception. This paper investigates this correlation, using SSIM as a proxy for human perception, demonstrating a strong correlation.
By exploiting Stream Control transmission Protocol (SCTP), we proposed a selective retransmission scheme to improve the performance of MPEG-4 streaming traffic. The scheme selects retransmissions of lost packets that ...
详细信息
By exploiting Stream Control transmission Protocol (SCTP), we proposed a selective retransmission scheme to improve the performance of MPEG-4 streaming traffic. The scheme selects retransmissions of lost packets that can reach at the receiver side with the scheduled time. The selection of lost packets to be retransmitted is based on the one-way delay that can be obtained by assuming the time synchronization between two endpoints. However, the time synchronization cannot be expected in general. The purpose of this paper is to investigate the performance of the selective retransmission scheme without assuming the time synchronization. By computer simulations, we examine the effects of the offset of synchronization (the time difference between two endpoints) on the performance. Using several MPEG-4 stream data, we investigate the relationship between the selective retransmission and the time difference, and discuss the applicability of the scheme.
The paper presents a lossless compression method, based on the variation of the byte length of data elements in the sequence. The method has been developed and analyzed in the field of image compression. The purpose o...
详细信息
The paper presents a lossless compression method, based on the variation of the byte length of data elements in the sequence. The method has been developed and analyzed in the field of image compression. The purpose of creating such an algorithm was to simplify the hardware realization of the image compression and save hardware area and memory resources. It is used after DCT transformation along with different quantization method comparing to JPEG encoding. Results of the algorithm are compared to JPEG compression results.
A novel steganographic scheme within AAC bitstream is proposed in this paper. Based on the structure of AAC bitstream, the scheme hides secret information using the characteristics of the sign bits of Huffman codeword...
详细信息
ISBN:
(纸本)9781424478712
A novel steganographic scheme within AAC bitstream is proposed in this paper. Based on the structure of AAC bitstream, the scheme hides secret information using the characteristics of the sign bits of Huffman codeword. The structure of original bitstream and the length of AAC file will not be changed after steganography. Experimental results are given to show that the proposed scheme has high capacity, good imperceptibility, and certain undetectability.
Watermarking resisting to geometric distortion is a very difficult and challenging subject. In this paper, to solve this problem, two method are proposed one method, which estimates rotation and scaling based on templ...
详细信息
Watermarking resisting to geometric distortion is a very difficult and challenging subject. In this paper, to solve this problem, two method are proposed one method, which estimates rotation and scaling based on template embedding, has low computing complexity for template matching, one method which estimates translation based on invariant centroid has solve the translation synchronization of the original watermarking images and test images. Experiments demonstrate that the scheme is can efficiently correct geometric distortions of high intensity.
This paper proposes a scalable JPEG 2000 images and video transmission scheme for multiple receivers based on an adaptive bandwidth estimation tool. Channel resources are optimized in order to select suitable image la...
详细信息
This paper proposes a scalable JPEG 2000 images and video transmission scheme for multiple receivers based on an adaptive bandwidth estimation tool. Channel resources are optimized in order to select suitable image layers and resolution for each wireless client. The effectiveness of the proposed system is demonstrated using different wireless transmission scenarios and its ability to transmit smooth and robust video sequences even when wireless networks experience harsh conditions is also highlighted.
A new fast algorithm for the remote sensing image progressive compression was proposed. This algorithm has three embedded characters (resolution, region of interest, and fidelity), low computing complexity and favorab...
详细信息
A new fast algorithm for the remote sensing image progressive compression was proposed. This algorithm has three embedded characters (resolution, region of interest, and fidelity), low computing complexity and favorable loss compression performance. Every resolution of wavelet transform coefficients were partitioned into many precincts according to the area. In each sub-band of each precinct, the spatio-temporal neighborhood relationship was used to remove redundancies between different bit-planes and neighbors in the same bit-plane, and the bits of every bit-plane were modeled and reordered to form three sub-processes and run-length encoded only in one pass. The adaptive Golomb_Rice coding for the dyadic sequence was used to entropy code effectively. In addition, the uniform scalar quantization with dead-zone and adjustable parameter was used. The experiments showed that the new algorithm can decrease the coding and decoding time evidently compared with the JPEG2000 algorithm, while maintains favorable loss compression performance.
We investigate the impact of cache parameters and cache locking on the predictability, power consumption, and performance of real-time embedded systems. We simulate a universally used Pentium-like CPU architecture tha...
详细信息
We investigate the impact of cache parameters and cache locking on the predictability, power consumption, and performance of real-time embedded systems. We simulate a universally used Pentium-like CPU architecture that has two levels of cache memory hierarchy under two real-time workloads, MPEG-4 and H.264/AVC. Experimental results show that cache locking mechanism (15% CL1 locking was found to be best) added to an optimized cache memory structure is very promising for improving the predictability of embedded systems without any negative impact on the performance and total power consumption. It is also observed that H.264/AVC has a performance advantage over MPEG-4 in smaller caches.
In heterogeneous service environment, E-learning, especially for learning content service, poses many opportunities and challengers of which the focus is that the service is even not able to be provided if the content...
详细信息
In heterogeneous service environment, E-learning, especially for learning content service, poses many opportunities and challengers of which the focus is that the service is even not able to be provided if the content can not be consumed in the service environment, termed service context also, which consists of the current state of networks, terminals, users, natural circumstance etc. To face the music, ISO/IEC proposes new standard, MPEG-21, in which content adaptation technology is employed to solve the problem of mismatch between content and service context. In content adaptation technology, service context model is a key point because it is the premise of other operations. Though service context modeling has been studied extensively recently and some models are created even standardized, there are some problems left still. One is that most of models are lack of ability of inference or the ability is weak because they are based on extensive makeup language (XML) or resource description framework (RDF). The other is that they are not capable of describing rules. However, it is necessary for service context model to reason and rule coding because those abilities will be helpful for datasize deceasing, context mining and subsequent processing, e.g. adaptation decision-taking, In this paper, we propose a novel model in the basis of ontology, whose property is to reason and describe rules. By ontology modeling software, protégé, the model is performed. Based on the result of implementation, it is proven that the model is feasible.
暂无评论