A new paradigm for designing compressed image quality metric is proposed in this paper, of which the most significant characteristic is the use of mutual information, a key concept in information theory which measures...
详细信息
A new paradigm for designing compressed image quality metric is proposed in this paper, of which the most significant characteristic is the use of mutual information, a key concept in information theory which measures statistical dependence between two random variables, to exploring the degree of similarity of spatial visual information distribution across different frequency bands in image. Visual information used in the calculation of mutual information is extracted by contrast sensitivity function (CSF) and local band-limited contrast definition proposed by E. Peli. Our paradigm is more consistent with human perceptual mechanism comparing with the traditional error-summation based ones. The effectiveness of our image quality assessment paradigm is validated by JPEG & JPEG2000 compressed images at different bit rates and images with various types of noises.
The massive information-sharing capabilities and global reach of Facebook are of great interest to organizations of all types, including those with malicious and/or illegal intents. Our main findings in this research ...
详细信息
The massive information-sharing capabilities and global reach of Facebook are of great interest to organizations of all types, including those with malicious and/or illegal intents. Our main findings in this research include the following. Steganography can be employed to send covert information via Facebook photos and potentially videos as well. Facebook Cover Photos can effectively utilize steganography, of at least 15.75% capacity using DCT coefficient embedding algorithms. Network traffic analysis determined no distinguishable differences between network traffic patterns of normal images and cover photos as they were uploaded to the Facebook servers. Firewall rules can be written to block all image uploads to Facebook.
The paper describes the implementation of a real time VAS (Video Aggregation System) on a parallel architecture based on a multiprocessor system with five C40 DSP's. Video aggregation of MPEG for a group of video ...
详细信息
The paper describes the implementation of a real time VAS (Video Aggregation System) on a parallel architecture based on a multiprocessor system with five C40 DSP's. Video aggregation of MPEG for a group of video sessions as a bundle is to perform compression and multiplexing of video streams before packetization (i.e. before the ATM layer). This system may be used to telesupervise factory processes when we need some video sources simultaneously.
In a JPEG decoder, the quantized discrete cosine transform (DCT) coefficient blocks are usually processed using the inverse DCT to reconstruct an approximation of the original image. In the presence of quantization of...
详细信息
In a JPEG decoder, the quantized discrete cosine transform (DCT) coefficient blocks are usually processed using the inverse DCT to reconstruct an approximation of the original image. In the presence of quantization of the transform coefficients, the use of the inverse DCT in the decoder is not the best choice: We propose a procedure to design a family of separable 2D synthesis filters that minimize the reconstruction error power and these filters are used in the decoder instead of the inverse DCT. The appropriate reconstruction filters are selected on the basis of the standard quantization information provided in the JPEG bit stream. We show that the proposed decoding method gives some gain with respect to the standard decoder, making use of only the information provided by the JPEG bit stream.
Presents a strategy for generating optimal JPEG quantization tables to approximate a target compression ratio. This uses a model to express the quantization coefficients as functions of compression ratio and their pos...
详细信息
Presents a strategy for generating optimal JPEG quantization tables to approximate a target compression ratio. This uses a model to express the quantization coefficients as functions of compression ratio and their position in the quantization table. Simulated annealing of model parameters was used to find optimum models for an image which is a composite of several standard test images. Models of varying complexity with 1 to 6 parameters were optimized at three compression ratios, and a three parameter model was chosen to represent quantization tables. After further optimizations over a range of compressions, a general model was obtained by expressing each model parameter as a function of the compression. Application to three CCITT test pictures demonstrates the quality of recovered images.< >
This paper describes an embedded sinusoidal transform codec that is scalable not only in bit-rate, but also in sampling rate. In a representative implementation, the system produces an embedded bit-stream at 3.2 and 6...
详细信息
This paper describes an embedded sinusoidal transform codec that is scalable not only in bit-rate, but also in sampling rate. In a representative implementation, the system produces an embedded bit-stream at 3.2 and 6.4 kbit/s for telephone-bandwidth speech, and scales up to 9.6 kbit/s for 16 kHz sampled wideband speech. The 3.2 kbit/s codec is a sinusoidal transform codec with synthetic phases. The 6.4 kbit/s codec adds resolution to the spectral envelope and transmits measured phases of the eight lowest harmonics. The 9.6 kbit/s codec adds information in the 4 to 8 kHz band to provide higher quality wideband speech.
If visual information retrieval should make further progress, it will be necessary to identify new ways to derive visual properties from higher levels of understanding than the pixel level (e.g. from low-level feature...
详细信息
If visual information retrieval should make further progress, it will be necessary to identify new ways to derive visual properties from higher levels of understanding than the pixel level (e.g. from low-level features). The paper outlines the implementation of modelling of feature hierarchies in the visual information retrieval framework VizIR (free under GPL). The approach allows for the derivation of high-level features from low-level features by aggregation and localisation as well as semantic enrichment with additional knowledge. The technical implementation is based on the MPEG-7 structures for aggregation and specialisation.
Using FPGAs in the cloud has rapidly and significantly increased over the last few years. FPGA devices can be either integrated to support the cloud infrastructure or used as a computing resources. FPGA are available ...
详细信息
Using FPGAs in the cloud has rapidly and significantly increased over the last few years. FPGA devices can be either integrated to support the cloud infrastructure or used as a computing resources. FPGA are available as a computing resources for enabling the designers to accelerate their applications. Putting FPGA environment in the cloud called FPGA as a service, have proposed different services. These existing services cannot solve all challenges. In this paper, we propose a new service called Intellectual Property (IP) as a Service trying to resolve the unsolved challenges. This service will allow easily and Quickly exploit and share IP in the cloud.
For image content authentication, a secure watermarking method using quantization-based embedding on the largest singular value (SV) is proposed. The block-wise quantization-based embedding can be vulnerable to vector...
详细信息
ISBN:
(纸本)0780388747
For image content authentication, a secure watermarking method using quantization-based embedding on the largest singular value (SV) is proposed. The block-wise quantization-based embedding can be vulnerable to vector quantization (VQ) attack and attacks associated with histogram analysis. To overcome these security problems, the proposed method places interdependency among image blocks and dithers the quantized value. By adjusting the threshold of the detector, a trade-off between the robustness to JPEG compression and the probability of misdetection can be made. The proposed method can detect a tampered area with high sensitivity. This is confirmed by experimental results and security analysis.
Paper presents one implementation of software solution for processing WebVTT subtitles during playback of HLS streams. Software solution is created by using the functionality of the FFmpeg library. Result of using cre...
详细信息
Paper presents one implementation of software solution for processing WebVTT subtitles during playback of HLS streams. Software solution is created by using the functionality of the FFmpeg library. Result of using created software solution on HLS streams is creation of overall transport stream, which contains video, audio and subtitle components. In this way successful playback of audio, video and subtitle is enabled.
暂无评论