In this paper, an adaptive blind watermarking algorithm is proposed, which presents a new method of block classification based on the characteristic of visual masking of HVS (human visual system) model, including ener...
详细信息
In this paper, an adaptive blind watermarking algorithm is proposed, which presents a new method of block classification based on the characteristic of visual masking of HVS (human visual system) model, including energy and variance. According to the new classification method, classify image blocks and select quantization pedometers adaptively to embed the watermark into DC component. At the same time, because of the shortage of watermark intensity only embedded into DC components, the algorithm presents that the same watermark is embedded into mid-frequency subbands by changing the order of these coefficients under invisibility. This is a blind watermarking algorithm, the watermark can be extracted without the original picture needed. Experimental results and attacks analysis show that the proposed algorithm is effective and robust to common image processing and some geometric attacks, such as JPEG lossy compression, scaling, additive noise, rotation, histogram equilibrium, contrast adjusting, brightness adjusting, filtering and so on.
We present new algorithms to detect and track multiple moving objects in a static surveillance video that uses MPEG-2 compression. The algorithm detects moving objects based on the location of field-based motion estim...
详细信息
We present new algorithms to detect and track multiple moving objects in a static surveillance video that uses MPEG-2 compression. The algorithm detects moving objects based on the location of field-based motion estimated macroblocks in inter-prediction frames, and tracks their movements along video scene by using an extension of Kalman filter that uses the objects' velocity information. Experiments show that the algorithm outputs highly accurate results in various scenarios.
Proposes a novel approach to segmentation using a combination of Hebbian learning and competitive learning in a self-organizing manner. The network is modular, with each module corresponding to a different class of th...
详细信息
Proposes a novel approach to segmentation using a combination of Hebbian learning and competitive learning in a self-organizing manner. The network is modular, with each module corresponding to a different class of the input data. A module consists of a weight vector that is calculated during an initial training period. The appropriate class for a given input vector is determined by a maximum entropy classifier. The resulting network consistently extracts perceptually relevant features from image data. As well, the class representations are analogous to the arrangement of directionally sensitive columns in the visual cortex.< >
We point out the interest in using Zipf law in the wide field of image analysis. We show how it is possible to adapt it to image analysis. There are many applications; here we are concerned with image compression and ...
详细信息
We point out the interest in using Zipf law in the wide field of image analysis. We show how it is possible to adapt it to image analysis. There are many applications; here we are concerned with image compression and focus on a new definition of quality measurement of an image obtained after a decompression process. First we propose a coding mode of an image using some neighborhood of each pixel and the Zipf law. Then some significant comparisons can be achieved between different images. A statistical study of the patterns present in the image allows a characterization of the information contained in the image so that a measurement of information modification is made possible. We define two quantitative parameters; one indicates the structure of the image whereas the second indicates high content information. The examples of the images of a landscape and of a female face are used to illustrate the influence of the compression rate.
Disparity vectors are used for the reconstruction of the right image sequence from the left one (vice versa) in a 3DTV transmission system, it is replaced the full transmission of both stereo channels by a compensated...
详细信息
Disparity vectors are used for the reconstruction of the right image sequence from the left one (vice versa) in a 3DTV transmission system, it is replaced the full transmission of both stereo channels by a compensated scheme. An improved matching algorithm for disparity compensated video coding is presented in this paper. The algorithm requires transmitting the same amount of disparity data as the conventional block matching algorithm(BMA) while achieving much higher prediction accuracy by refinement scheme that captures the fine disparity variation between left and right image sequences.
This paper presents techniques for the design of generic block transform based vector quantizer encoders implemented by table lookups. In these table lookup encoders, input vectors to the encoders are used directly as...
详细信息
This paper presents techniques for the design of generic block transform based vector quantizer encoders implemented by table lookups. In these table lookup encoders, input vectors to the encoders are used directly as addresses in code tables to choose the codewords. There is no need to perform the forward or reverse transforms. They are implemented in the tables. In order to preserve manageable table sizes for large dimension VQ's, we use hierarchical structures to quantize the vector successively in stages. Since both the encoder and decoder are implemented by table lookups, there are no arithmetic computations required in the final system implementation. The algorithms are a novel combination of any generic block transform (DCT, Haar, WHT) and hierarchical vector quantization. They use perceptual weighting and subjective distortion measures in the design of VQ's. They are unique in that both the encoder and the decoder are implemented with only table lookups and are amenable to efficient software and hardware solutions.
We developed a Video Multi Processor (VMP) for image compression and decompression schemes of MPEG (especially MPEG-2) in this study. The VMP would apply to programmable architecture, various flexibilities to implemen...
详细信息
ISBN:
(纸本)078035012X
We developed a Video Multi Processor (VMP) for image compression and decompression schemes of MPEG (especially MPEG-2) in this study. The VMP would apply to programmable architecture, various flexibilities to implement real-time image compression algorithm, and other many applications such as DVD-CD ROM authoring tool and videophone/teleconferencing systems. IO architecture of the VMP is designed for the multi-processor functionality in which uses many VMPs according to required arithmetic quantities of the system. Further, the architecture of the VMP system is simplified by processing the necessary peripheral IO system operations within the processor.
The latest video coding standard HEVC has the potential to rapidly conquer many areas of video compression due to the significant boost in coding efficiency compared to its predecessor. Unfortunately there is the draw...
详细信息
ISBN:
(纸本)9781479919499
The latest video coding standard HEVC has the potential to rapidly conquer many areas of video compression due to the significant boost in coding efficiency compared to its predecessor. Unfortunately there is the drawback that this gain in efficiency comes at the expense of complexity. Encoders have to select the best possible coding mode from a huge set of available modes offered by the standard. In this paper the intra mode selection process is accelerated by early estimation of the distortion introduced by a certain mode, which may be applied in addition to other fast mode decision schemes. Due to the online adaptation of our proposed estimator, the approach is tolerant to different coding settings and input sequences. Using early distortion estimation results in a potential encoder speed-up of 24.83% on average, accompanied by an average bitrate increase of 2.92%.
This paper proposes a chaos-based encryption method that allows conditional access to privacy-sensitive regions in Joint Photographic Experts Group (JPEG) images. Our goal is to encipher the confidential content in a ...
详细信息
ISBN:
(数字)9798350349399
ISBN:
(纸本)9798350349405
This paper proposes a chaos-based encryption method that allows conditional access to privacy-sensitive regions in Joint Photographic Experts Group (JPEG) images. Our goal is to encipher the confidential content in a way that guarantees high resistance to common attacks without severely compromising the encoding speed and bitrate cost. The encryption mechanism comprises two modules: chaotic confusion and diffusion; the first module is governed by means of nonlinear shuffling applied on the quantized AC (Alternating Current) coefficients belonging the region of interest (ROI), while the second module is ruled by means of XOR operation that encrypts the shuffled components using a cumulative one-dimensional chaotic map. The whole cryptosystem is controlled by the chaotic sequences generated by chaotic maps. Experimental results demonstrate that the proposed cryptocompression scheme is proven to be effective in balancing the trade-off between robustness and hiding ability while guaranteeing reversible recovery of the protected data.
We use pictures as evidence. It is increasingly important to detect the manipulated areas of digital images. But we also face fabricated photographs to distort it. As the days go by, the fabricated image becomes more ...
详细信息
ISBN:
(数字)9781538692103
ISBN:
(纸本)9781538692110
We use pictures as evidence. It is increasingly important to detect the manipulated areas of digital images. But we also face fabricated photographs to distort it. As the days go by, the fabricated image becomes more sophisticated and invisible. Many people have tried to improve image forensics technology to distinguish this fabricated images. In this paper, We investigate how to detect manipulated areas of a digital image like JPEG image format that used lossy compression. We use the features of the lossy compression to detect the manipulated image by the error level analysis(ELA) that is the analysis digital data such as JPEG format. And we're going to show that the Error Level Analysis(ELA) can work as image forensics. Through this analysis, we will be able to better judge manipulated images.
暂无评论