Using the perspective of Social Studies of Technology (SST), this paper inquires into how the public interest of users and proprietary interests of "essential" patent holders can be reconciled in so called &...
详细信息
Using the perspective of Social Studies of Technology (SST), this paper inquires into how the public interest of users and proprietary interests of "essential" patent holders can be reconciled in so called "Fair, Rational and non-Discrimination" (FRAND) and Royalty Free standard setting process. Using the case of Audio Video coding Standard (AVS) in China, we analyze the mechanisms for treating the stakeholders of AVS workgroup and Intellectual Property Rights (IPR) of their technical contributions. Based on the analysis, we formulate a Public Dominated Model of standardization (PDM), which can be used to guide standard development aimed to protect public interest and minimize the possibilities of excessive private rents associated with the standard.
Context-adaptive binary arithmetic coding (CABAC) is the most common strategy of current lossy, or lossy-to-lossless, image coding systems to diminish the statistical redundancy of symbols emitted by bitplane coding e...
详细信息
ISBN:
(纸本)9781424464258;9780769539942
Context-adaptive binary arithmetic coding (CABAC) is the most common strategy of current lossy, or lossy-to-lossless, image coding systems to diminish the statistical redundancy of symbols emitted by bitplane coding engines. Most coding schemes based on CABAC form contexts through the significance state of the neighbors of the currently coded coefficient, and adjust the probabilities of symbols as more data are coded. This work introduces a probabilities model for bitplane image coding that does not use context-adaptive coding. Modeling principles arise from the assumption that the magnitude of a transformed coefficient exhibits some correlation with the magnitude of its neighbors. Experimental results within the framework of JPEG2000 indicates 2% increment on coding efficiency.
In this paper we introduce a new method for source identification in digital image forensics. The proposed method uses local information of the inherent pattern of the camera, as a signature of the camera for source i...
详细信息
In this paper we introduce a new method for source identification in digital image forensics. The proposed method uses local information of the inherent pattern of the camera, as a signature of the camera for source identification. Here the sensor pattern noise is used as the unique identification property of the camera. However due to content dependency of the denoising algorithms that are used to extract the noise pattern, the different regions of the image do not have the same information about the camera signature. Hence in our algorithm, at first the best regions of the image according to their local information are selected to extract the noise pattern. This step is done by fuzzy-based classification on the overlapped blocks of the image. In the next step the noise pattern of these regions are extracted and then, we evaluate the correlation between the image pattern and camera pattern. Finally the source camera is determined according its correlation. The experimental results compared to similar works show an increase in the detection rate of source identification, while computational complexity is reduced; this affirms the efficiency and performance of the proposed theory.
Wireless multimedia service is considered a promising application in the near future. However, current layered protocol stack is not conductive to provide adaptive multimedia streams in instable wireless environment. ...
详细信息
Wireless multimedia service is considered a promising application in the near future. However, current layered protocol stack is not conductive to provide adaptive multimedia streams in instable wireless environment. In this paper, a new Cross-Layer mechanism is proposed to solve this problem. A scalable video encoder can dynamically adjust its coding behavior according to the estimated available bandwidth, and optimize the quality of video streams. Simulation using NS-2 demonstrates the effectiveness of the proposed mechanism.
Robustness analysis of a blind wavelet based ranked-ordered watermarking scheme against quality scalable image compression is presented in this paper. The analysis considers a general wavelet-based compression scheme ...
详细信息
Robustness analysis of a blind wavelet based ranked-ordered watermarking scheme against quality scalable image compression is presented in this paper. The analysis considers a general wavelet-based compression scheme by modeling the bit-plane discarding, used in achieving quality scalability in JPEG2000. In this work we aim to improve the robustness by proposing the optimum modification for the selected coefficients in order to retain the watermark information. A relationship is established between the watermark detection algorithm and the number of bit planes discarded and this knowledge is used during the embedding procedure. The proposed model assumes the same embedding and compression wavelet kernel. The experimental results verify the proposed model and demonstrate improved performance in robustness to quality scalable compression in JPEG2000.
Local feature descriptors based on gradient orientation histogram show good performance even when images contain distortions such as view point change, blur and rotation. However their performance declines significant...
详细信息
Local feature descriptors based on gradient orientation histogram show good performance even when images contain distortions such as view point change, blur and rotation. However their performance declines significantly when images are compressed using the block DCT based algorithm. Since images and videos are usually encoded to a compressed file format to reduce file size, many image processing applications inevitably treat compressed images. In this paper, we investigate the robustness of Zernike moment against compression noise. In our experiment using the INRIA dataset, we compared the matching results of the descriptors using the magnitudes of Zernike moments with SIFT descriptor in terms of recall vs. 1-precision metric. Magnitudes of Zernike moments provided better matching performance than SIFT when images contain compression noise.
This paper proposes a new method for digital video watermarking in compressed domain. Both the embedding and extracting phases are performed after entropy decoding. Consequently, fully decompressing the compressed vid...
详细信息
ISBN:
(纸本)9781424475421
This paper proposes a new method for digital video watermarking in compressed domain. Both the embedding and extracting phases are performed after entropy decoding. Consequently, fully decompressing the compressed video is not necessary making this scheme an appropriate choice for real-time application. Furthermore, taking the structural information into account leads to presenting a robust watermarking scheme along with less quality degradation. To select suitable coefficients for embedding the watermark, three different aspects, imperceptibility, security, and bit rate increase, have been considered. These performance factors are adjusted by defining three priority matrices. In addition, a content based key is proposed in order to overcome the collusion attack. The flexibility of our method to provide desired characteristic can be expressed as another advantage.
In this paper we present an implementation of a 3D graphics player showing for a first time worldwide a successful integration between COLLADA, a standard for representing 3D graphics assets, and MPEG-4, a standard fo...
详细信息
ISBN:
(纸本)9781424443147;9781424443161
In this paper we present an implementation of a 3D graphics player showing for a first time worldwide a successful integration between COLLADA, a standard for representing 3D graphics assets, and MPEG-4, a standard for compression and delivery of the assets.
The assessment of the practical performance of forensic methods for the detection of resampling operations on digital images is a difficult task requiring a careful experimental analysis. Unfortunately, the experiment...
详细信息
The assessment of the practical performance of forensic methods for the detection of resampling operations on digital images is a difficult task requiring a careful experimental analysis. Unfortunately, the experimental analysis reported in multimedia forensics papers is often statistically insufficient, or at least not usable to predict the performance of the proposed systems at scales needed for practical deployment. This paper attempts to move a first step to fill this gap in a twofold way. First of all a proper experimental framework is proposed to analyze the performance of resampling detectors. Then the suggested methodology is applied to evaluate the performance of two of the most significant resampling detectors proposed so far, providing a deeper-than-usual analysis of their behavior under different working conditions.
This paper represents a multi-standard PAL/NTSC video encoder for digital TV and multimedia applications. The encoder is a mixed signal integrated circuit consisting of a digital modulator and a triple 10-bit 27-MHz d...
详细信息
This paper represents a multi-standard PAL/NTSC video encoder for digital TV and multimedia applications. The encoder is a mixed signal integrated circuit consisting of a digital modulator and a triple 10-bit 27-MHz digital to analog converter. The measured differential nonlinearity (DNL) and integral nonlinearity (INL) are ±0.7 LSB and ±0.35 LSB, respectively. Total chip area is 1.47 mm 2 ; total power dissipation is 89 mW. The circuit has been fabricated using a standard 0.18 μm CMOS process.
暂无评论