The article describes some of the security issues in streaming video over the Internet. If high quality video sequences are to be delivered to computers and digital television systems over the Internet in our "di...
详细信息
ISBN:
(纸本)0769510620
The article describes some of the security issues in streaming video over the Internet. If high quality video sequences are to be delivered to computers and digital television systems over the Internet in our "digital future", this material must be protected.
New algorithms for computing the discrete Fourier transform (DFT) spectra along different directions are derived and implemented. For computing the DFT spectrum along any given direction (containing N DFT frequencies)...
详细信息
New algorithms for computing the discrete Fourier transform (DFT) spectra along different directions are derived and implemented. For computing the DFT spectrum along any given direction (containing N DFT frequencies), a new algorithm is presented that requires N(N-1) additions and a single 1-D FFT. As expected, for a single direction, the directional FFT algorithm is significantly faster than standard 2-D FFT algorithms that compute the entire spectrum (all results are compared against FFTW and FFTPACK). A scalable extension of the unidirectional algorithm for computing the entire DFT spectrum is also derived and implemented. The three most promising features of the new algorithm are that: (i) computation scales nearly linearly with the number of DFT frequencies computed, (ii) the algorithm uses a reduced number of multiplications (yet uses more additions), and (iii) it is more accurate.
With the recent growth of networked multimedia systems, techniques are needed to prevent (or at least deter) the illegal copying, forgery and distribution of digital media elements such as audio, images and video. The...
详细信息
With the recent growth of networked multimedia systems, techniques are needed to prevent (or at least deter) the illegal copying, forgery and distribution of digital media elements such as audio, images and video. The problem is that a copy of a media element is identical to the original. It is also desirable to determine where and by how much a multimedia element has been changed from the original. One classical approach to the problem of protecting "digital content" has been the use of cryptographic methods such as encryption and authentication. Recently other methods have been proposed to improve one's claim of ownership over a digital media element by inserting a small amount of distortion directly into the media element. This distortion, known as a digital watermark, can be used to uniquely identify the owner of the content. Digital watermarking research is mainly the domain of the signal processing community that is very naive when considering real world security problems. Also the attitude of the academic community that it has the "right" to copy and reproduce any multimedia element is curious at best and perhaps conveys the wrong message to our students. The use of the "Lena" image is a good example of this. In this talk I will survey the current state of multimedia security and describe important research issues. I will also express some concern that perhaps we in the signal processing community might want to understand the "security scenario" before making grandiose claims about how our latest watermarking technique will save the world!
We develop a framework for efficiently encoding predictive error frames (PEF) as part of a rate scalable, wavelet-based video compression algorithm. We investigate the use of rate-distortion analysis to determine the ...
详细信息
We develop a framework for efficiently encoding predictive error frames (PEF) as part of a rate scalable, wavelet-based video compression algorithm. We investigate the use of rate-distortion analysis to determine the significance of coefficients in the wavelet decomposition. Based on this analysis, we allocate the bit budget assigned to a PEF to the coefficients that yield the largest reduction in distortion, while maintaining the embedded and rate scalable properties of our video compression algorithm.
Rate scalable video compression is appealing for low bit rate applications, such as video telephony and wireless communication, where bandwidth available to an application cannot be guaranteed. In this paper, we inves...
详细信息
Rate scalable video compression is appealing for low bit rate applications, such as video telephony and wireless communication, where bandwidth available to an application cannot be guaranteed. In this paper, we investigate a set of strategies to increase the performance of SAMCoW, a rate scalable encoder. These techniques are based on based on wavelet decomposition, spatial orientation trees, and motion compensation.
Rate scalable video compression is appealing for low bit rate applications, such as video telephony and wireless communication, where bandwidth available to an application cannot be guaranteed. A technique known as sc...
详细信息
Rate scalable video compression is appealing for low bit rate applications, such as video telephony and wireless communication, where bandwidth available to an application cannot be guaranteed. A technique known as scalable adaptive motion compensated wavelet (SAMCoW) compression is described. SAMCoW is well suited for data rates less than 32 kbps. Several techniques to improve the subjective picture quality of SAMCoW are investigated. These include the use of B frames, half-pixel accuracy, and unrestricted motion vectors.
We present a new stochastic model for pixels in an edge-enhanced image. The model is robust because it allows for the possibilities of false and multiple edges, and may be efficiently estimated using a expectation-max...
详细信息
We present a new stochastic model for pixels in an edge-enhanced image. The model is robust because it allows for the possibilities of false and multiple edges, and may be efficiently estimated using a expectation-maximization technique with a minimum description length metric. The direct applicability of the model for the sequential edge linking algorithm is investigated.
Subjective testing of speaker recognizability is an intricate, time consuming and very expensive process, but using objectively measurable descriptors to augment the subjective speaker recognizability tests could resu...
详细信息
The growth of networked multimedia systems has complicated copyright enforcement relative to digital images. One way to protect the copyright of digital images is to add an invisible structure to the image (known as a...
详细信息
The growth of networked multimedia systems has complicated copyright enforcement relative to digital images. One way to protect the copyright of digital images is to add an invisible structure to the image (known as a digital watermark) to identify the owner. In particular, it is important for Internet and image database applications that as much of the watermark as possible remain in the image after compression. image adaptive watermarks are particularly resistant to removal by signal processing attack such as filtering or compression. Common image adaptive watermarks operate in the transform domain (DCT or wavelet); the same domains are also used for popular image compression techniques (JPEG, EZW). This paper investigates whether matching the watermarking domain to the compression transform domain will make the watermark more robust to compression.
Presents a novel approach to the problem of computer aided analysis of digital mammograms for breast cancer detection: namely, the development of algorithms to recognize unequivocally normal mammograms. First, the aut...
详细信息
Presents a novel approach to the problem of computer aided analysis of digital mammograms for breast cancer detection: namely, the development of algorithms to recognize unequivocally normal mammograms. First, the authors eliminate amorphous "clouds" or "blobs" in mammograms produced by normal glandular tissue of varying density using local average subtraction. Then the authors identify and remove normal connective tissue markings based on a set of specially designed line detectors. Any abnormality that may exist in the mammogram is therefore enhanced in the residual image, which makes the decision regarding the normality of the mammogram, much easier.
暂无评论