In this paper SoC (system on chip) solution for DVB receiver is presented with case study DVR application. Main purpose of this software package is recording parallel streams coming from the transport stream interface...
详细信息
In this paper SoC (system on chip) solution for DVB receiver is presented with case study DVR application. Main purpose of this software package is recording parallel streams coming from the transport stream interface (TSI) unit to the hard disk drive (HDD), and retrieving stored data from the HDD, featuring random access functionality.
This paper considers lossless compression of black and white images using recently developed distributed turbo compression techniques. An empirical study of image pixel statistics is initially conducted in order to ap...
详细信息
This paper considers lossless compression of black and white images using recently developed distributed turbo compression techniques. An empirical study of image pixel statistics is initially conducted in order to apply turbo compression algorithms to distributed compression of image rows. In particular, it is noted that while the entropy of the pixels throughout the image does not vary much, the distribution and conditional distributions of pixel values are nonstationary. Corresponding compression bounds are noted, appropriate coding schemes based on turbo-codes are developed and simulation results are reported.
In this paper we proposed a robust video decoding scheme using early resynchronization, error detection (ED) and error concealment (EC). Many video coding standards such as H.263+ and MPEG-2 make the compressed video ...
详细信息
ISBN:
(纸本)7563506861
In this paper we proposed a robust video decoding scheme using early resynchronization, error detection (ED) and error concealment (EC). Many video coding standards such as H.263+ and MPEG-2 make the compressed video signals more vulnerable to channel errors because of error propagation due to using variables length coding (VLC). Channel errors cannot only result in false decoding of current bits but also make the decoder lose synchronization. The data between the errors and next resynchronization marker (RM) will be discarded even if they are not corrupted by channel errors. Early resynchronization can retrieve unaffected data between the errors and next RM, which can greatly reduce error propagation due to using VLC. We combined early resynchronization with deliberately designed ED and EC technologies and tested three early resynchronization schemes in our simulation. It has been found that the third scheme can give the best tradeoff between the final reconstructed image quality and searching times.
In this paper, a video surveillance system is designed to provide means for ensuring privacy information security and offer the capability of proving authenticity. First, a real-time scrambling approach to conceal vid...
详细信息
In this paper, a video surveillance system is designed to provide means for ensuring privacy information security and offer the capability of proving authenticity. First, a real-time scrambling approach to conceal video information is presented. The sign of transform coefficients for intra macro- block is pseudo-randomly flipped, and so only the authorized persons are allowed to correctly decode the code-stream. At the same time, a method for embedding digital watermark into videos is proposed. The relationship among the DC components in several successive frames is used for hiding data. Simulation results based on MPEG-4 show that a good level of security is provided by the end-to-end security scheme. Furthermore, this is achieved with a small impact on coding performance and computation complexity.
Increase on the availability of the image editing tools makes it easy to create digital forgeries. More popular forgery in image manipulation is the copy move forgery where part of an image is copied into another loca...
详细信息
Increase on the availability of the image editing tools makes it easy to create digital forgeries. More popular forgery in image manipulation is the copy move forgery where part of an image is copied into another location to hide an object. The methods that are used to detect the copy move forgery in images have a drawback. Length of the feature vector that represents an image block affects the time complexity of the detection algorithm. In this work, we use the local binary patterns (LBP) to represent an image block. LBP is used to reduce the dimension of the features. Experimental results also show that the method can detect the duplicated regions even when an image was distorted by JPEG compression or Gaussian blurring.
JPEG2000 and H.264 are the latest image and video coding standards respectively. Digital cinema is a new kind of application for super high definition video. The DCI (digital cinema initiative) specification published...
详细信息
JPEG2000 and H.264 are the latest image and video coding standards respectively. Digital cinema is a new kind of application for super high definition video. The DCI (digital cinema initiative) specification published in 2005 has selected JPEG2000 instead of H.264 as the video coding standard for digital cinema. It shows that JPEG2000 has a better performance in the field of super high definition video coding. Until now, only a few basic tests have been done to compare between JPEG2000 and H.264. Moreover, the test resolutions and characteristics of input sequences are very limited. In this paper, based on JPEG2000, H.264 intra and inter-frame coding, we compare the coding efficiency and subjective image quality on multiple series of test sequences from low to super high resolutions. The experiment results demonstrate some regularity for JPEG2000 and H.264 video coding, and reveal JPEG2000 is more suitable for digital cinema.
For theoretical disadvantages of detecting images signal based on independent and identically distributed (i.i.d.) models used for hiding data, a novel detection method is provided based on Markov chain in the paper. ...
详细信息
For theoretical disadvantages of detecting images signal based on independent and identically distributed (i.i.d.) models used for hiding data, a novel detection method is provided based on Markov chain in the paper. The Markov chain model provides an analytically tractable framework whose predictions are consistent with the performance of practical hiding data algorithms that account for spatial dependencies. Numerical results are provided for image information hiding techniques of using SS, QIM, and LSB, respectively.
Compound images contain a mixture of natural images, text, and graphics. They need special care in the use of compression because text and graphics cannot withstand the significant distortion that is acceptable for na...
详细信息
Compound images contain a mixture of natural images, text, and graphics. They need special care in the use of compression because text and graphics cannot withstand the significant distortion that is acceptable for natural images. One solution is to identify the areas that need to have higher settings in a dynamic quality control scheme, as supported by JPEG-SPIFF and JPEG 2000. We propose a scheme to identify those regions using a discrimination function that works with a non-linear transform to reliably identify edges, and at the same time avoid false positive detection on regions with complex patterns. It does so by exploiting the properties of histograms of coefficients of this block transform, and their entropy function, which we show can be computed efficiently via table look-up. Experimental results demonstrate the performance of the new scheme, compared to other methods in the literature.
This paper discusses the problems of the MPEG video encryption algorithm by using a random permutation list instead of a zigzag order within the MPEG compression process. We show that (1) the encryption method causes ...
详细信息
This paper discusses the problems of the MPEG video encryption algorithm by using a random permutation list instead of a zigzag order within the MPEG compression process. We show that (1) the encryption method causes a significant size increase of the MPEG video stream, hence defeats the purpose of compression, and (2) the encryption method can not withstand the known-plaintext attack, therefore, should not be considered as secure. We also discuss other solutions to achieve secure, time-efficient, and size-preserving MPEG-video encryption.
Sketch based image coding decomposes an input image into a piece-wise smooth approximation image and a residual image. Image compression by gradient field integration follows this model, but differs by generating the ...
详细信息
Sketch based image coding decomposes an input image into a piece-wise smooth approximation image and a residual image. Image compression by gradient field integration follows this model, but differs by generating the approximation image from gradient data along edge contours and regularly sampled low resolution image data. This allows direct and efficient calculation of an approximation image which is smooth between edges. In this paper, we describe the image compression by gradient field integration approach, together with a low complexity implementation intended for near visually lossless compression of mixed content images. The implementation uses gradient field integration by scanline convolution, simple edge data extraction, DCT residual image coding and is block-based; it is suited to compression of images containing sharp edges occurring along pixel borders. Compression results are provided indicating potential gains from this method.
暂无评论