In this paper, a blind statistical method for watermark detection is developed using a symmetrical normal inverse Gaussian (SNIG) prior for modelling the block-DCT coefficients of images. The proposed detector is moti...
详细信息
In this paper, a blind statistical method for watermark detection is developed using a symmetrical normal inverse Gaussian (SNIG) prior for modelling the block-DCT coefficients of images. The proposed detector is motivated by the superior ability of the SNIG prior in capturing the statistics of the DCT coefficients as compared to the conventionally used priors. Analytical expressions are derived for the Bayesian log-likelihood ratio and the corresponding mean and variance under null and alternative hypotheses. Extensive experiments are carried out using standard images to study the performance of the proposed detector and the results show that it performs better than several existing detectors in terms of the associated probabilities of false alarm and detection for watermarks of varying strength.
This paper proposes an invertible semi-fragile video watermarking algorithm using a hash function to authenticate the MPEG-4 video contents. The proposed algorithm embeds two watermarks into I frame while encoding YUV...
详细信息
This paper proposes an invertible semi-fragile video watermarking algorithm using a hash function to authenticate the MPEG-4 video contents. The proposed algorithm embeds two watermarks into I frame while encoding YUV video to MPEG-4 format. One watermark using hash function aims to authenticate the contents and embed the frame number for manipulation location between frames, and the other one based on DC coefficients is used for the detection of manipulation location within the frame. The experimental results show that the proposed algorithm is able to authenticate the video contents and detect the manipulation location, and it is robust for MPEG-4 compression. In addition, the proposed algorithm is exactly invertible, which means that the original video data is available as long as the watermarked video is credible.
In this digital era, lot of information are expressed through images. Various social networking websites, such as Facebook, Twitter, MySpace etc. provides a platform for the users to post up almost any type of picture...
详细信息
In this digital era, lot of information are expressed through images. Various social networking websites, such as Facebook, Twitter, MySpace etc. provides a platform for the users to post up almost any type of picture or photo. However, with the advancement in image editing technologies, many users have become victims of digital forgery as their uploaded images were forged for malicious activities. We have come up with a system which detects image forgery based on edge width analysis and center of gravity concepts. An algorithm based on edge detection is also used to identify the fuzzy edges in the forged digital image. The forged object in the image is highlighted by applying Flood fill algorithm. Different types of image forgeries like Image splicing, Copy-Move image forgery etc. can be detected. This method also reveals multiple forgeries in the same image. The proposed system is capable of detecting digital image forgeries in various image formats efficiently. The results we obtained after the analysis of different images shows that the proposed system is 95% efficient.
This paper parallelizes and characterizes an important computer vision application -Scale Invariant Feature transform (SIFT) both on a Symmetric Multiprocessor (SMP) platform and a large scale Chip Multiprocessor (CMP...
详细信息
This paper parallelizes and characterizes an important computer vision application -Scale Invariant Feature transform (SIFT) both on a Symmetric Multiprocessor (SMP) platform and a large scale Chip Multiprocessor (CMP) simulator. SIFT is an approach for extracting distinctive invariant features from images and has been widely applied. In many computer vision problems, a real-time or even super-real-time processing capability of SIFT is required. To meet the computation demand, we optimize and parallelize SIFT to accelerate its execution on multi-core systems. Our study shows that SIFT can achieve a 9.7x ~ llx speedup on a 16 -core SMP system. Furthermore, Single Instruction Multiple Data (SIMD) and cache-conscious optimization bring another 85% performance gain at most. But it is still three times slower than the real-time requirement for High-Definition Television (HDTV) image. Then we study the performance of SIFT on a 64 -core CMP simulator. The results show that for HDTV image, SIFT can achieve an excellent speedup of 52 x and run in real-time finally. Besides the parallelization and optimization work, we also conduct a detailed performance analysis for SIFT on those two platforms. We find that load imbalance significantly limits the scalability and SIFT suffers from intensive burst memory bandwidth requirement on the 16 -core SMP system. However, on the 64 -core CMP simulator the memory pressure is not high due to the shared last-level cache (LLC) which accommodates tremendous read-write sharing in SIFT. Thus it does not affect the scaling performance. In short, understanding the characterization of SIFT can help identify the program bottlenecks and give us further insights into designing better systems.
Aiming at the characteristics of the subway tunnel crack images, this paper presents a new method of subway tunnel crack image compression based on region of interest and motion estimation. It contains three key parts...
详细信息
Aiming at the characteristics of the subway tunnel crack images, this paper presents a new method of subway tunnel crack image compression based on region of interest and motion estimation. It contains three key parts: the method of key frame image compression based on Discrete Cosine transformation, the method of internal frame image compression based on forward predictive coding and motion estimation, the method of lossless image compression based on crack information database and suspected crack regions. The simulation experiment results show that this method can not only enhance the image compression ratio without losing any information of images in the region of interest, but also interface with the existing subway tunnel crack recognition system very well and make good use of the data from the crack recognition system database and the images in the disk array.
The privacy of unknown person may be included in the digital images unintentionally. The action of the file upload of it would constitute an invasion of his/her privacy. The JPEG files may include an exif information ...
详细信息
ISBN:
(纸本)9781467350839
The privacy of unknown person may be included in the digital images unintentionally. The action of the file upload of it would constitute an invasion of his/her privacy. The JPEG files may include an exif information which is regarded as personal privacy. For these two privacy problems, we propose a privacy protection technique for JPEG files using reversible information hiding. We adopt the reversible information hiding for the region included privacy in the image. We are also able to protect personal privacy if we embed an exif information into the region. We use Coltuc's method, which changes the pixel value to carry the additional information directly, as a reversible information hiding. Although Coltuc's method modifies the pixel value of cover image directly, we apply this to quantized DCT coefficients of it. In the experiments, we investigate our method and show an example of privacy protection image.
In past few years, multimedia traffic is growing and Internet have maximum portion of multimedia traffic. This traffic trend is expected to increase due to multimedia applications. Best effort Internet architecture po...
详细信息
In past few years, multimedia traffic is growing and Internet have maximum portion of multimedia traffic. This traffic trend is expected to increase due to multimedia applications. Best effort Internet architecture poses design limitations for multimedia traffic. IPTV like applications require higher bandwidth, low packet loss, low delays and jitter effects to transmit high quality video contents. Packet loss due to limited band width and congestion can negatively impact on Quality of Experience(QoE). Packet trimming based innovative scheme is proposed in this article to deal packet loss and improve QoE. Proposed scheme eliminate the chance of packet loss during congestion. Packet trimming scheme better handle congestion which improve video smoothness, interactivity and frame quality. Test-bed implementation and subsequent analyses shows promising improvement in video Quality of Experience over same Quality of Service.
In this paper we assess the relative merits of various types of wavelet functions for use in a wide range of image compression scenarios. We have delineated different algorithmic criteria that can be used for wavelet ...
详细信息
In this paper we assess the relative merits of various types of wavelet functions for use in a wide range of image compression scenarios. We have delineated different algorithmic criteria that can be used for wavelet evaluation. The assessment undertaken includes both algorithmic aspects (fidelity, perceptual quality) as well as suitability for real-time implementation in hardware. The results obtained indicate that of the wavelets studied the biorthogonal 9&7 taps wavelet is the most suitable from a compression perspective and that the Daubechies 8 taps gives best performance when assessed solely in terms of statistical measures.
This paper presents the new high-performance circuit architecture of the transform and quantization for unified video CODEC. The proposed architecture can be applied to all kinds of transforms for the video compressio...
详细信息
This paper presents the new high-performance circuit architecture of the transform and quantization for unified video CODEC. The proposed architecture can be applied to all kinds of transforms for the video compression standards such as JPEG, MPEG-1/2/4, H.264 and VC-1. It exploits the similarity of 4-point DCT and 8-point DCT using permutation matrices. Since our circuit accepts the transform coefficients from the users, it can be extended very easily to cover any kind of DCT-based transforms for future standards. The multipliers in the transform circuit are shared by the quantization circuit in order to minimize the circuit size. The quantization operations are performed using spare clock cycles during the transform operations in order to minimize the number of clock cycles required. We described the proposed transform circuit at RTL and verified its operation on FPGA board.
With the evolution of tools used for image editing in today's world, the images can be manipulated with ease. Resizing, cloning, cropping, etc., becomes easy and fast while on the other end, a great challenge in f...
详细信息
ISBN:
(数字)9781728170169
ISBN:
(纸本)9781728170176
With the evolution of tools used for image editing in today's world, the images can be manipulated with ease. Resizing, cloning, cropping, etc., becomes easy and fast while on the other end, a great challenge in front of the world is determining whether an image has been tempered or not. A very popular manipulation method for tempering images is Copy-move forgery in which a part of an image is duplicated and pasted in some other location of the same image. Major research has been going on in detection of copy-move forgery. A detailed review and analytical discussion has been presented in this paper along with pros and cons of each of the detection techniques used for copy-move forgery detection.
暂无评论