Blind Steganalysis attempts to detect steganographic data without prior knowledge of either the embedding algorithm or the `cover' image. This paper proposes new features for JPEG blind steganalysis using a combin...
详细信息
Blind Steganalysis attempts to detect steganographic data without prior knowledge of either the embedding algorithm or the `cover' image. This paper proposes new features for JPEG blind steganalysis using a combination of Huffman Bit Code Length (HBCL) Statistics and File size to Resolution ratio (FR Index); the Huffman Bit File Index Resolution (HUBFIRE) algorithm proposed uses these functionals to build the classifier using a multi-class Support Vector Machine (SVM). JPEG images spanning a wide range of resolutions are used to create a `stego-image' database employing three embedding schemes - the advanced Least Significant Bit encoding technique, that embeds in the spatial domain, a transform-domain embedding scheme: JPEG Hide-and-Seek and Model Based Steganography which employs an adaptive embedding technique. This work employs a multi-class SVM over the proposed `HUBFIRE' algorithm for statistical steganalysis, which is not yet explored by steganalysts. Experiments conducted prove the model's accuracy over a wide range of payloads and embedding schemes.
Based on ADI's Blackfin561 powerful audio processing capabilities and a dedicated peripheral interface to uClinux as the operating system, uses advanced algorithms to achieve the interpretation of the MP3 files on...
详细信息
Based on ADI's Blackfin561 powerful audio processing capabilities and a dedicated peripheral interface to uClinux as the operating system, uses advanced algorithms to achieve the interpretation of the MP3 files on the 561 platform.
The segmentation of video sequences into shots is the first step towards video content analysis. Two kinds of shot boundaries can be distinguished: abrupt scene changes ("cuts") and gradual transitions. In t...
详细信息
The segmentation of video sequences into shots is the first step towards video content analysis. Two kinds of shot boundaries can be distinguished: abrupt scene changes ("cuts") and gradual transitions. In this paper, we present a technique to reduce the error rates of cut detection algorithms based on pixel-wise or histogram-based frame difference metrics when operating directly on compressed MPEG video data. The proposed approach, called "frame difference normalization" (FDN), intends to eliminate the effects of a specific frame pattern in MPEG streams responsible for causing such errors. Experimental results will be presented to demonstrate the benefits of our proposal and its superiority over a more general noise filter. Furthermore, the proposed method is not limited to a particular algorithm but it is applicable to an entire class of cut detection algorithms.
One of the hottest areas of development in the computer industry today is motion video on the desktop. Both motion video and still image video pose some new problems: huge storage and high bandwidths are required to s...
详细信息
One of the hottest areas of development in the computer industry today is motion video on the desktop. Both motion video and still image video pose some new problems: huge storage and high bandwidths are required to send, view or store video data in a timely fashion. Compression techniques may help to reduce the amount of data by trading processing power for reduced data size. For both video compression and decompression, very large amounts of processing power are required to handle the video data quickly enough. Parallel processing is being used in some cases to solve this need for processing power. This paper explores some of the parallel processing techniques currently being used, and some additional possibilities for parallelization. It focuses primarily on JPEG (Joint Photographic Experts Group) techniques, but many of the concepts are applicable to other compression schemes. Results from a simple PC-based JPEG compression/decompression program are used to explore some of the techniques.< >
This paper proposes a method of identified reciprocating motion in pornographic video from other human action using Hidden Markov Model (HMM). The motion vectors are obtained by decoding the compressed MPEG video. The...
详细信息
This paper proposes a method of identified reciprocating motion in pornographic video from other human action using Hidden Markov Model (HMM). The motion vectors are obtained by decoding the compressed MPEG video. Then the feature vectors are extracted by calculating the direction and the magnitude of the motion vectors. The feature vectors are fed to Hidden Markov Model for training and classification of actions. Six actions were trained with distinct HMM for classification. The correct recognition result is up to 90%.
Digital acquisition, storage, and review of echocardiographic data are feasible in a multivendor networked DICOM environment. The authors' echocardiographic laboratory currently stores 120 studies per day rising t...
详细信息
Digital acquisition, storage, and review of echocardiographic data are feasible in a multivendor networked DICOM environment. The authors' echocardiographic laboratory currently stores 120 studies per day rising the ProSolv Echo Management System. Storage and retrieval is realized on standard computer hardware without the necessity for proprietary hardware solutions. DICOM storage has become more efficient as vendor solutions improve. Transmission rates over a 10/100 BT switched network are approximately 0.40 MB/s allowing a complete echo study (/spl sim/40 MB) to be transferred to the server in approximately 1.5 minutes, however the ability to send data during a study has also been realized by one vendor.
Objective quality evaluation of stereoscopic images is useful in three-dimensional television application, and it is difficult to establish a reasonable relationship between objective evaluation and quality score. In ...
详细信息
Objective quality evaluation of stereoscopic images is useful in three-dimensional television application, and it is difficult to establish a reasonable relationship between objective evaluation and quality score. In this paper, a new stereoscopic image quality assessment method is proposed. In the method, stereoscopic features are first extracted to describe perceptual attributes of image quality and depth perception by singular value decomposition. Then, the relationship between stereoscopic features and quality score is established by using support vector regression. Finally, the objective evaluation values are tested on the symmetric database. Experimental results show that the proposed is more effective in quantifying image quality, compared with other two relevant quality evaluation metrics.
In general, JPEG2000 code streams have marker codes in the header, which define particular meanings such as start of packet and end of code stream. Marker codes do not exist in the data part of code streams. The selec...
详细信息
In general, JPEG2000 code streams have marker codes in the header, which define particular meanings such as start of packet and end of code stream. Marker codes do not exist in the data part of code streams. The selective encryption of the data part has been considered to avoid generating marker codes. Such encryption is effective in business content exchange. To handle this issue, some schemes have been proposed. However, the security of these schemes has not been evaluated yet. This paper shows that an existing scheme can be broken by cryptanalysis. We describe a secure encryption scheme and mode against cipher-text attacks, known plain-text attacks and chosen plain-text attacks.
In this demo we would like to present the current development status of our WebGL based MPEG-4 virtual human. The main result is the extension of our previous talking head with full-body animations and new customazibl...
详细信息
In this demo we would like to present the current development status of our WebGL based MPEG-4 virtual human. The main result is the extension of our previous talking head with full-body animations and new customazible tools.
Zero-watermarking is an effective method to better pro tect the copyright of images. This paper proposes a new ze ro-watermarking algorithm based on Non-uniform Block Tr uncation coding (NUBTC). In the proposed scheme...
详细信息
ISBN:
(纸本)9781665466127
Zero-watermarking is an effective method to better pro tect the copyright of images. This paper proposes a new ze ro-watermarking algorithm based on Non-uniform Block Tr uncation coding (NUBTC). In the proposed scheme, the ori ginal image is divided into different rectangular grids accor ding to the non-uniform block-truncation-coding partition, a nd the feature matrix is formed by calculating number of rectangles in each 8*8 sub-area. The obtained feature matri x is further mapped to a binary watermark after Arnold s crambling, and both of them are stored as the zero water mark. Experimental results indicate that the extracted zero-watermark could keep more than 90% similarity to the un attacked zero-watermark under JPEG com pression attack a nd other various noise attacks, thus proving that the propo sed zero-watermark scheme is very robust when sufferring attacks.
暂无评论