In this paper, we have proposed a modified version of image compression/decompression algorithm using block optimization and byte compression method (BOBC). After BOBC, it is followed by run-length encoding and its bl...
详细信息
In this paper, we have proposed a modified version of image compression/decompression algorithm using block optimization and byte compression method (BOBC). After BOBC, it is followed by run-length encoding and its block is optimised by varying block size. The proposed algorithm is very simple in implementation, fast in encoding time. Experimental results show that compression ratio of this algorithm is better than the previous BOBC algorithm and JPEG compression techniques. Image quality (PSNR) is almost the same or better as compared to that of the above mentioned compression techniques.
A new adaptive approach for lossless and near-lossless scalable compression of medical images is presented. It combines the adaptivity of DPCM schemes with hierarchical oriented prediction (HOP) in order to provide re...
详细信息
A new adaptive approach for lossless and near-lossless scalable compression of medical images is presented. It combines the adaptivity of DPCM schemes with hierarchical oriented prediction (HOP) in order to provide resolution scalability with better compression performances. We obtain lossless results which are about 4% better than resolution scalable JPEG2000 and close to non scalable CALIC on a large scale database. The HOP algorithm is also well suited for near-lossless compression, providing interesting rate-distortion trade-off compared to JPEG-LS and equivalent or better PSNR than JPEG2000 for high bit-rate on noisy (native) medical images.
The watermark embedding scheme is a improved algorithm of video watermarking. Basing on the Jordan motion vector watermarking algorithm and the human visual identification system and the secret key principle, we divid...
详细信息
The watermark embedding scheme is a improved algorithm of video watermarking. Basing on the Jordan motion vector watermarking algorithm and the human visual identification system and the secret key principle, we divide the motion vectors into two types. And according to the specific circumstances of motion vectors, we embed the watermark into the selected motion vectors, then the extraction process doesn't need the original video. The image of experiment proves that the algorithm has good invisibility and concealment.
This paper analyzes part of the results of the tests done on a DVB-S2 link received on board a high speed train. The tests aimed at verifying the behavior of the DVB-S2 in the railway environment, which introduce line...
详细信息
This paper analyzes part of the results of the tests done on a DVB-S2 link received on board a high speed train. The tests aimed at verifying the behavior of the DVB-S2 in the railway environment, which introduce line of sight (LOS) interruptions and variable fading, when different modcods and types of traffic are transmitted. Mainly, MPEG2 Transport Stream (TS) and IP/MPEG traffic has been transmitted in order to explore the limits of the technology. Additionally, qualitative and quantitative comparison of video transported via MEG2 TS and via IP has permitted to see the impact of the LOS interruptions on the reception of real time contents and the need for additional mitigation techniques.
The production of Broadcast content generates large files of video and audio content which must be transmitted among different production centers. The contribution of this material in certain circumstances is carried ...
详细信息
ISBN:
(纸本)9781424464258;9780769539942
The production of Broadcast content generates large files of video and audio content which must be transmitted among different production centers. The contribution of this material in certain circumstances is carried out on satellite links which usually have a relatively high error probability. In addition, the image suffers degradation in the processes of converting to base band video, transcoding to different compression systems, errors in transmission and drops in the link. To overcome this limitation, we present a transmissions system, based in a patent, which ensures the quality of JPEG2000 professional images.
Most universal steganalysis techniques use an image model to reconstruct an estimate of the original, unmanipulated cover from the input. Differences between reconstructed and input images are an indication of a stega...
详细信息
Most universal steganalysis techniques use an image model to reconstruct an estimate of the original, unmanipulated cover from the input. Differences between reconstructed and input images are an indication of a steganographic manipulation. In this paper, we analyze the relation between the modeling error of the image model and detection performance in the wavelet domain. Based on the modeling error we define a measure of separability which is highly correlated with detection performance. We find that in uncompressed images only fine scales play a role in steganalysis, whereas separability is spread out over all scales in JPEG images.
Efficient motion re-estimation schemes for H.264 Band P-frame transcoding are proposed in this paper. The proposed methods compose new motion vectors for out-going video bitstream from the pre-coded bitstream by utili...
详细信息
Efficient motion re-estimation schemes for H.264 Band P-frame transcoding are proposed in this paper. The proposed methods compose new motion vectors for out-going video bitstream from the pre-coded bitstream by utilizing Maximum Likelihood. The experimental results show that the proposed method can improve the performance and efficiency compared to previous approaches.
In this paper, it is shown that for substantial increase of video quality delivery in wireless networks, it is necessary to execute two important enhancements to existing communication schemes: (i) the video player on...
详细信息
In this paper, it is shown that for substantial increase of video quality delivery in wireless networks, it is necessary to execute two important enhancements to existing communication schemes: (i) the video player on the receiver side should selectively discard duplicated RTP packets, and (ii) server of streaming video should duplicate the packets containing the information of key frames. Coefficients of the mathematical model to assess video quality have been found for WiFi and 3G standards-compliant wireless networks that employ MPEG-2 and MPEG-4 (DivX) codecs. We also present a novel experimental technique that enabled us to collect and process the quantitative datasets used in our modeling study.
4K that became a digital cinema standard in 2005 is now recognized as the next high quality image technology of HD in the market. This paper describes what 4K is, the status of 4K, and 4K applications other than digit...
详细信息
4K that became a digital cinema standard in 2005 is now recognized as the next high quality image technology of HD in the market. This paper describes what 4K is, the status of 4K, and 4K applications other than digital cinema. We introduces three 4K applications, 4K alternative content with live transmission, 4K usage in dome theaters, and 4K video conference with our proof-of-concept experiments over the world.
Mobile ad hoc network is an infrastructureless wireless network with limited bandwidth and highly dynamic topology. It can support wide variety of applications by using specialized routing protocol either proactive or...
详细信息
Mobile ad hoc network is an infrastructureless wireless network with limited bandwidth and highly dynamic topology. It can support wide variety of applications by using specialized routing protocol either proactive or reactive protocols. However, to support multimedia applications to deliver voice and video data over ad hoc network is very challenging due to its characteristic mentioned above. MPEG-4 encoding scheme seems to be suitable for ad hoc networks since they offer high video quality with higher compression ratio than other MPEG standards. Because of this motivation, performance investigation on MPEG-4 traffic delivery over ad hoc network is required. Hence, we construct the simulation to demonstrate the performances of various ad hoc routing protocols including both proactive and reactive protocols when they deliver MPEG-4 bitstreams.
暂无评论