Interleaving is used before the encoding of source symbols in JPEG to reduce visual artifacts due to lost packets because interleaving distributes the locations of errors. The recovery of lost DCT coefficients in inte...
详细信息
Interleaving is used before the encoding of source symbols in JPEG to reduce visual artifacts due to lost packets because interleaving distributes the locations of errors. The recovery of lost DCT coefficients in interleaved image compression is investigated in this paper. To restore the lost coefficients, an Maximum a Posteriori (MAP) estimate for the DCT coefficients is proposed. Under the assumption of a Gauss-Markov Random Field (GMRF) model in the pixel domain, the MAP estimate for the lost DCT coefficients is derived.
In this paper we integrate several spatial texture tools into a texture-based video coding scheme. We implemented texture techniques and segmentation strategies in order to detect texture regions in video sequences. T...
详细信息
In this paper we integrate several spatial texture tools into a texture-based video coding scheme. We implemented texture techniques and segmentation strategies in order to detect texture regions in video sequences. These textures are analyzed using temporal motion techniques and are labeled as skipped areas that are not encoded. After the decoding process, frame reconstruction is performed by inserting the skipped texture areas into the decoded frames. We are able to show an improvement over previous texture-based implementations in terms of compression efficiency.
Unsupervised person re-identification (re-ID) aims to learn identity information from a source domain (e.g. one surveillance system) and apply it to a target domain (e.g. a different surveillance system). This is chal...
Unsupervised person re-identification (re-ID) aims to learn identity information from a source domain (e.g. one surveillance system) and apply it to a target domain (e.g. a different surveillance system). This is challenging due to occlusion, viewpoint, and illumination variations between the different domains (i.e. systems). In this paper, we propose a neural network architecture, known as Synthetic Model Bank (SMB), to address illumination variation in unsupervised person re-ID. The basic idea of SMB is to use synthetic data for training different re-ID models for different illumination conditions. From our experiments, the proposed SMB outperforms other synthetic augmentation methods on several re-ID benchmarks.
Presents a new multiresolution scheme for the detection of stellate lesions in digital mammograms. First, a multiresolution representation of the original mammogram is obtained using a linear phase nonseparable 2-D wa...
详细信息
Presents a new multiresolution scheme for the detection of stellate lesions in digital mammograms. First, a multiresolution representation of the original mammogram is obtained using a linear phase nonseparable 2-D wavelet transform. A set of features are then extracted at each resolution for every pixel. This addresses the difficulty of predetermining the neighborhood size for feature extraction to characterize objects that may appear with different sizes. Detection is performed from the coarsest resolution to the finest resolution using binary tree classifiers. This top-down approach requires less computation by starting with the least amount of data and propagating detection results to finer resolutions. Experimental results on the MIAS image database have shown that this algorithm is capable of detecting stellate lesions of very different sizes.
In wireless networks, secure multicast protocols are difficult to implement efficiently due to the dynamic nature of the multicast group and scarcity of bandwidth at the receiving and transmitting ends. Mobility is on...
详细信息
In wireless networks, secure multicast protocols are difficult to implement efficiently due to the dynamic nature of the multicast group and scarcity of bandwidth at the receiving and transmitting ends. Mobility is one of the most distinct features to be considered in a wireless network. Moving users onto the key tree causes extra key management resources even though they are still in service. To take care of frequent handoff between wireless access networks, it is necessary to reduce the number of rekeying messages and the size of the messages. In this paper, we design a key management tree such that neighbors on the key tree are also physical neighbors on the cellular network. By tracking the user location, we localize the delivery of rekeying messages to the users who need them. This lessens the amount of traffic in wireless and wired intervals of the network. The group key management scheme uses a pre-positioned secret sharing scheme
Wyner-Ziv video coding aims to design encoders based on the Slepian-Wolf and Wyner-Ziv distributed source coding theorems. In this coding scenario, source statistics are exploited at the decoder so that it is feasible...
详细信息
Wyner-Ziv video coding aims to design encoders based on the Slepian-Wolf and Wyner-Ziv distributed source coding theorems. In this coding scenario, source statistics are exploited at the decoder so that it is feasible to design simplified encoders. The shift of the computational complexity from the encoder to the decoder is suitable for emerging mobile multimedia applications. Many channel coding techniques are used for the construction of distributed video coding systems. In this paper we present a Wyner-Ziv video coding design using low-density parity-check (LDPC) codes. We also present a refined side estimator to further improve the decoded video quality. Experimental results are presented to demonstrate the rate-distortion performance of the method
Behavioral information can be inferred from the trajectory of a rigid object. We propose a method to detect anomalies in the approach of a vehicle by observing the patterns in its velocity and describe methods for mor...
详细信息
Behavioral information can be inferred from the trajectory of a rigid object. We propose a method to detect anomalies in the approach of a vehicle by observing the patterns in its velocity and describe methods for more effective analysis of the velocity trajectory. First we define a hypothetical co-ordinate system in which the axes are specified with respect to the road and distances are true ground measurements. In this co-ordinate system the (axial) velocity is a one dimensional quantity. We estimate the “normal” trends in the velocities by activity path modeling after scaling the velocities by the vehicle's average speed. We detect an anomaly if a vehicle's velocity does not fall in the available path models. Finally, we use the shape of the trajectory to determine turns and other significant maneuvers. We also detect an anomaly if a vehicle's velocity falls in a path model which is inconsistent with the shape of its trajectory. We observe that our proposed co-ordinate system also improves trajectory shape analysis by suppressing false turns.
The need to create useful information from full motion video gathered by drones is a significant motivation for devising methods to approximate human cognitive behaviors. Additionally, the regulatory needs associated ...
详细信息
ISBN:
(纸本)9781479957521
The need to create useful information from full motion video gathered by drones is a significant motivation for devising methods to approximate human cognitive behaviors. Additionally, the regulatory needs associated with drone systems has spawned the requirement to be able to confirm, or audit, the activities of such devices. A conditional approach, as compared with a generalized video processing environment, is presented that associates practical and realistic constraints to simplify the problem of finding useful information from video acquired by a drone into something that is tractable and consistent with real-world requirements. A primary contribution of this paper is to introduce the concept of continuous cognition from a theoretical perspective, followed by a practical application derived from an operational system.
In ATM networks cell loss or channel errors can cause data to be dropped in the channel. When digital video is transmitted over these networks one must be able to reconstruct the missing data so that the impact of the...
详细信息
In ATM networks cell loss or channel errors can cause data to be dropped in the channel. When digital video is transmitted over these networks one must be able to reconstruct the missing data so that the impact of these errors is minimized. In this paper we describe a Bayesian approach to concealing these errors by post-processing the received data. In a previous paper (see IEEE Proc. Int. Conf. on imageprocessing p.49-52, 1996), each frame in the sequence was modeled as a Markov random field, and maximum a posteriori estimates of the missing macroblocks were obtained. However, the maximum a posteriori estimate is not unique, and the algorithm is also computationally intensive. In this paper we demonstrate, that by using median filtering we arrive at a suboptimal estimate. This will allow real-time nearly optimal reconstruction of the missing data.
In this paper we propose a system that annotates a user generated video based on the associated location metadata, by exploiting user-tagged image databases. An example of such a database is a photo sharing Web site s...
详细信息
In this paper we propose a system that annotates a user generated video based on the associated location metadata, by exploiting user-tagged image databases. An example of such a database is a photo sharing Web site such as Flickr where users upload their images and annotate them with various tags. The goal is to find the tags that have high probability of being relevant to the video without any complex object or action recognition being done to the video sequence. A video is first segmented into camera views and a set of keyframes are selected to represent the video. We will describe the concept of camera view as the basic element of user generated videos which has special properties suitable for the video annotation application. The keyframes are used to retrieve the most relevant images in the database. A ldquotag processingrdquo step is then used to tag the video.
暂无评论