CONSTRUCTION OF LOW-DISTORTED MESSAGE-RICH VIDEOS FOR PERVASIVE COMMUNICATION
|
|
- Esther Lee
- 5 years ago
- Views:
Transcription
1 2016 International Computer Symposium CONSTRUCTION OF LOW-DISTORTED MESSAGE-RICH VIDEOS FOR PERVASIVE COMMUNICATION 1 Zhen-Yu You ( ), 2 Yu-Shiuan Tsai ( ) and 3 Wen-Hsiang Tsai ( ) 1 Institute of Information Science and Engineering 2 Computer Vision Research Center 3 Department of Computer Science National Chiao Tung University, Hsinchu, Taiwan s: ystsai@g2.nctu.edu.tw, whtsai@cis.nctu.edu.tw ABSTRACT Many types of multimedia can be used to accommodate information for pervasive communication. Messages may be injected into them by information hiding techniques and extracted for various purposes. Such multimedia with messages embedded are called message-rich multimedia. A new method for creating message-rich s is proposed in this study for people to exchange messages by display-and-imaging operations. A message is firstly embedded in a given by a technique of injecting peak values into the DFT spectrum of each frame. The resulting message-rich, when displayed on a TV or monitor, is then recorded with a smart-phone camera as another. The message in the recorded is finally extracted for visual inspection. This way of message transmission can be used for covert communication, secret message exchanges, etc. Good experimental results show the feasibility of the proposed method. Keywords: low-distorted, message-rich, pervasive communication, multimedia, DFT spectrum. 1. INTRODUCTION With the advance of mobile devices, people now can easily exchange information via identities in the environment. For example, with a smart-phone camera, one can scan the QR code on a merchandise to get more information about that item. More generally, Davis [1] proposed the concept of signal-rich art which communicates its identity to context-aware devices for pervasive communication. For the example of the QR code, the art is the code and the device is the camera of the smart phone. Inspired by this concept, a method for people to exchange information via a shown on a display device (a TV or monitor) by the use of a smart-phone camera as a capturing tool has been proposed by Wu and Tsai [2]. As shown in Fig. 1, given a message and a, they created a reproduced, called message-rich, for secret message exchange. The message can be extracted in a display-and-imaging fashion i.e., a displayed message-rich is captured with a smart-phone camera to obtain a recorded from which the hidden message is extracted. However, their study of the message-rich is not mature yet; much of the image quality is lost after the message is embedded into the original, as can be seen from the results shown in Wu and Tsai [2]. For example, see Fig. 2, where obvious moiré patterns are seen in the reproduced message-rich. An undesired effect of the moiré pattern on the reproduced, when displayed, will arouse suspicion of third-party persons and reduce the secret-keeping effect of the method. Message: I love you, embedding Message: I love you, message extraction Fig. 1. Illustration of the secret message exchange process by the use of a message-rich proposed by Wu and Tsai [2]. Many kinds of multimedia identities can be utilized to accommodate information for pervasive communication. They can appear in many forms like hard copy, advertisement, poster, display on a monitor or TV, etc. Messages may be injected into such identities by data hiding techniques [3, 4] as mentioned by Davis [1], just like the way information is encoded into the QR code. Such messages hidden in the multimedia identities, which we may call message-rich multimedia, can be extracted by message reading devices such as smart-phone cameras, bar-code readers, etc. using appropriate message extraction techniques implemented by software. There are yet very few studies on the topic of message-rich multimedia. Except the one by Wu and Tsai [2] (Fig. 1) mentioned previously, another is Lee and Tsai [5] which deals with message hiding in images by pixel coding for automatic identification and data capture (AIDC) applications (like QR-code reading), and the reproduced image is called signal-rich-art code image. A block luminance modulation technique for data hiding in the Y component of the YUV color space of the given image and a spatial correction technique for identifying hidden messages are utilized by them to achieve message hiding and extraction. Their method is not applicable to message-rich s. Wen-Hsiang Tsai is also with the Dept. of Information Communication, Asia University, Taichung, Taiwan /16 $ IEEE DOI /ICS
2 (a) Fig. 2. Frames captured from the original and the reproduced message-rich one. (a) A frame from the original. (b) The corresponding frame of the reproduced message-rich generated by Wu and Tsai [2]. From the viewpoint of data recapturing, several data hiding techniques with reproduced images, called stego-images, robust against print-and-scan attacks have been proposed in the past. Here, the print-and-scan operation is equivalent to the display-and-imaging operation investigated in this study. A print-and-scan attack can create distortion of the embedded information after a stego-image is printed and rescanned to form a new one. Chiu and Tsai [6] proposed a method against print-and-scan attacks by embedding coded peak locations in the DFT domain of the input image. For the same purpose, Solanki et al. [7] embedded data into high-magnitude DFT coefficients in low frequencies; and Lefebvre et al. [8] used an additive watermarking method in the spatial domain and a synchronization template in the frequency domain. These methods were proposed for dealing with images, not s. In this study a new method that can produce message-rich s with better image-frame quality and extractable hidden messages is proposed. Problems encountered in the design of the method are analyzed and solved. When a third-party person watches the generated displayed on a monitor, they will have no idea of the existence of the message embedded behind the. This improvement will make the use of the generated message-rich more practical for applications like covert communication, secret message exchanges, etc. 2. SYSTEM DESIGN AND PROCESSES FOR PROPOSED METHOD The hardware system used by the proposed method is shown in Fig. 3, including a monitor or a TV, a smart phone, and a smart-phone holder. Because the to be captured for use by the proposed method might be long, we use the holder to fix the smart phone stably while doing the display-and-imaging work. And the software implementing the proposed method can be decomposed into two parts: a message-embedding process and a message-extraction process. A flowchart of the software processes is shown in Fig. 4. The proposed method can take s with different parameters (like resolution, frame rate, etc.) as the input. And the generated message-rich can survive the display-and-imaging operation. (b) monitor mobile device holder Fig. 3 Hardware configuration of the proposed system. In the message embedding process, at first we get the message to be embedded as well as the frame rate of the input. There is a signal synchronization problem between the message embedding and extraction processes, so we add specially-designed signals to the original message, called initial and ending signals. Then, we transform the new message into a stream of ASCII codes according to the frame rate. Inspired by the method that can resist the print-and-scan attack proposed in [6], the proposed message embedding process modifies the mid-frequency part of the spectrum of each captured image frame by increasing some pixels values in the frequency domain according to the ASCII stream to resist the display-and-imaging operation. Source Embedding Process Message-rich Message Predefined signal for synchonization Capturing the on the monitor Fig. 4 Software processes of the proposed system. Message Extracting process Recorded In the message extracting process, because different smart phones might be used for capturing, the camera parameter setting is taken into consideration at first. Videos with different resolutions might be processed, so the smart-phone camera used to capture the message-rich displayed on a TV or monitor should be set properly so as to capture s with the same aspect ratio. Also, the problem of signal synchronization should be handled. For this, the system is designed to get the frame rate at first. Next, the system analyzes the spectrum of each frame s Y component to extract the initial-signal part of the. Then, the system skips the initial-signal part and starts to analyze the subsequent frames until the ending-signal part is detected. In this process, a noise-removal technique is proposed to correct the extracted embedded ASCII codes to increase message extraction accuracy. 3. MESSAGE EMBEDDING In this section, the propose technique for embedding messages into single image frames is presented at first after describing the weakness of the method proposed by Tsai and Wu [2], followed by the technique proposed for embedding messages in s. (A) EMBEDDING MESSAGE SIGNAL BY PEAK VALUES IN THE FREQUENCY DOMAIN In Wu and Tsai [2], the embedding process injects message signals into each image frame of the input by a way of setting the pixel values to be zero in four pre-selected circular regions in the low-frequency part of the DFT (discrete Fourier transform) spectrum of the Y component of the YUV space of each frame. It is known that the low-frequency part of the DFT spectrum is the most significant portion of an image so that if the number of processed pixels in the low-frequency band is 360
3 too large or/and the changes of these processed pixels values are too great, severe distortion appearing as moiré patterns can be generated as shown in Fig. 5. Such distortion will arouse the suspicion of a third-party person, and reduce the secret communication effect of the proposed method. So we try to find another appropriate way of signal injection in the spectrum in this study for message embedding as described next. (a) (c) Fig. 5 An experimental result yielded by Wu and Tsai [2]. (a) The original image. (b) The Y component of (a). (c) DFT spectrum of (b) with four message signals embedded at a low-frequency part. (d) The image of the inverse DFT of (c) in which moiré patterns can be seen. In the previous method proposed by Chiu and Tsai [6], good results can be obtained by injecting the signals into the mid-frequency part of the Fourier spectrum without creating too much distortion, resulting in an image which is still visually comfortable to human beings. The basic idea of their method is to process only scattered single pixels in the spectrum for message embedding instead of processing pixel regions. Based on the idea of using single pixels in the frequency domain for message embedding, we try to embed signals by injecting peak values into the pixels at the four corners of a high-frequency window centered at the origin of the Y channel s spectrum of each input image frame. The peak values are set to be 5 million at the corners, and the size of the window is a quarter of the image size as indicated by the green rectangle in the figure. After applying a display-and-imaging operation, the embedded signals are reduced by some moiré patterns coming from the resampling effect of the camera s imaging operation, and appear to be very weak in magnitude. Such weak signals could not be extracted to recover the embedded message successfully as shown by our experiments conducted in this study. Modification of the message embedding process should be made. For this, a series of experiments were conducted, in which different window sizes and peak values were tried, and a better result was finally obtained. Specifically, we choose the window size to be a quarter of that of the original image so that the four corners of the window, where peak values for message embedding are injected, fall on a mid-frequency band of the spectrum. And the injected peak values are chosen to be 3 million. These choices of the parameters lead again to a good result of the IDFT which is an image with (b) (d) almost no moiré pattern. Also, after applying the display-and-imaging operation, the peak values in the Y channel s spectrum of the resulting image is still visible. Finally, after the IDFT is applied, not only the distortion in the resulting image is nearly invisible, but the embedded message can also be extracted successfully as will be shown by our experimental results described later. After applying the proposed method described above to a series of images, it was found that the proposed method yields better results than Wu and Tsai [2]. Specifically, the apparent moiré patterns at the edges in the images found in Wu and Tsai s results disappeared after the proposed method is applied, resulting in images which are much cleaner and visually comfortable, as can be seen from Fig. 6. (B) CODING OF MESSAGES FOR EMBEDDING We transform each message to be embedded into a sequence of ASCII codes which is a stream of binary bits, as mentioned previously. Accordingly, we use different arrangements of aforementioned peak values in the spectrum to represent four different binary codes 00, 01, 10, 11 for embedding in a single frame. The arrangement rule is described in Table 1. (a) (c) Fig. 6 A comparison between the result yielded by the method proposed by Wu and Tsai [2] and that by the proposed method. (a) The spectrum of an image into which signals are embedded by Wu and Tsai [2]. (b) The IDFT of (a). (c) The spectrum of the same image in which signals are embedded by the proposed method. (d) The IDFT of (c). Table 1. Design of patterns for message encoding and their meanings used in this study. The binary value represented by each pattern is shown to the right of it. (b) (d) When we embed messages in s instead of in single image frames, we encounter a problem of synchronization, i.e., when we try to record the message-rich, it is almost impossible to capture the displayed right from the starting point of the original. Consequently, it is also difficult to extract signal messages correctly from every frame of the recorded. To overcome this problem, we adopt a synchronization technique which was proposed in [2] by using special signals, called initial and ending signals, based on the property of frames. The initial signal 361
4 is designed to be Accordingly, the message extraction process is started in this study by identifying the real content of the message until it detects two consecutive 3-embedded frames. Similarly, the ending signal is designed to be The message extraction process will be terminated when it detects a triple of 3-embedded frames. Furthermore, smart-phone cameras used by people have different frame rates. If we embed a bit stream into a with a frame rate of 30 fps, for example, another error of synchronization will arise if we record the displayed with a camera with a frame rate other than 30 fps, say, 60 fps. To solve this problem, it observed first that though the frame rate may differ from one another due to uses of different cameras, the content of the message-rich is still the same. For example, if we record a displayed on a monitor with a frame rate different from that of the original, the recorded is still considered to have the same content as the source ; and the content per second is still the same as we watch the. Therefore, the problem can be solved by embedding duplicated signals in a period of time (called embedding period) to achieve the desired effect of synchronization. And the number of times for which each signal is repeated is called a duplicated number. In more detail, if we set the embedding period as X second(s) and the message which we want to embed is S 1S 2S 3, we can inject S 1 into all frames of the first period of X second(s), inject S 2 into all frames into the second period of X second(s), and so on. Then, the extraction process can analyze all frames of every X seconds to retrieve correctly the embedded signals in the recorded. Finally, the details of the proposed message embedding process is described as an algorithm in the following. Algorithm 1: proposed message embedding process. Input: a source V and its frame rate R; a message M; a pre-selected embedding period T; and a pre-selected peak value K for signal embedding. Output: a message-rich in which the message M is embedded. Steps: Step 1. Translate M into a bit stream B of ASCII codes. Step 2. Add initial and ending signals 0033 and 1333 respectively in front of B and at the end of B to form a new stream B new. Step 3. Use the frame rate R of source V and the pre-selected embedding period T to calculate a duplicated number D as D = R T. Step 4. Duplicate each bit of B new for D times sequentially to get a new stream B final. Step 5. Process each frame F of V by the following steps. i. Convert F into the YUV color space. ii. Get the first two bits b 1b 2 of B final as a message signal N and the corresponding peak-value embedding positions P according to Table 1. iii. Remove b 1b 2 from B final to avoid using them again. iv. Embed message signal N into the mid-frequency part of the Y-component spectrum of F by increasing the value of each pixel located at the positions specified by P up to be the pre-selected peak values K. v. If F is not the last frame of V, repeat Step 5; otherwise, continue. Step 6. Convert the final V in the YUV space by the IDFT into the image space as the desired message-rich. 4. MESSAGE EXTRACTION AND CORRECTION While extracting the message from an attacked resulting from a display-and-imaging operation, a problem will be encountered, that is, the change of the peak locations in the recorded frame. Next, different cameras have distinct parameters which can influence the frame rate of the recorded. So, to analyze correctly the frames captured by different cameras, the recorded signals should be segmented precisely according to their respective frame rates. Finally, the signal stream constructed with signals extracted from the frames of a signal-rich might have errors. All of these problems are solved in this study as described in this section. (A) EXTRACTION OF BIT-PAIR SIGNALS FROM SINGLE IMAGE FRAMES When using a camera to record a message-embedded, it is almost impossible to adjust the camera view precisely to match the monitor frame to produce a which has exactly the same size as that of the original one. Therefore, the peak value embedded in each frame s spectrum at a certain position might be moved. Fortunately, due to the DFT property, each peak will not be moved too far away from its original position so that we can set a search region in the spectrum to detect the highest value in the region instead of detecting directly the peak value exactly at its original position. In addition, because the positions where we embed the peak values are just the four corners of a pre-selected window, and due to the symmetry property of the DFT, we have to search only two regions, which are at the left-top and right-top corners of the window, to detect the highest values. We use two threshold values for this search: a magnitude threshold T to decide if each detected highest signal value is high enough to be accepted as a real message signal, and a difference threshold D to decide if the difference between the two signal values detected in the two regions is large enough for verifying whether or not the detected pair of bits is one of 01 or 10 instead of 00 or 11. That is, we have the following decision rule for message signal detection where V 1 and V 2 are the detected highest values in the two aforementioned regions: (1) when the absolute difference between V 1 and V 2 is larger than or equal to D: (1.1) decide signal pattern = 01 if V 1 is larger than or equal to V 2; (1.2) decide signal pattern = 10 if V 1 is smaller than V 2; (2) when the absolute difference between V 1 and V 2 is smaller than D: 362
5 (2.1) decide signal pattern = 11 if V 1 and V 2 are both larger than or equal to T; (2.2) decide signal pattern = 00 if V 1 and V 2 are both smaller than T. (B) EXTRACTION OF MESSAGE SIGNALS FROM VIDEOS In the message extraction process, the initial signal must be detected firstly. Because we use a pre-selected duplicated number to repeat signals in consecutive multiple frames, we cannot detect the initial signal just by a single frame. In addition, the number of frames found in each time period of one second might have small variations for different cases of displaying and capturing; i.e., the frame rate of the recorded is just an average value. If the extraction process uses the average frame rate for signal extraction, a synchronization problem between signal embedding and extraction will arise as well. To overcome these problems, a linear data structure [2] is used to keep the extracted signals so as to segment the signal sequence correctly. For example, let the signal stream be , the embedding period be 1 second, and the frame rate be 4 fps in average. Then, we can get a basic length of 1 4 = 4. When the extraction process detects the first signal pattern 0, it will be saved to a firstly created signal segment with length 1. When the second identical signal pattern 0 is detected, the length of the first segment is extended to 2, and so on; and finally the length of the first segment becomes 3. Next, when the extraction process detects the fourth signal pattern 1, which is different from those in the first segment, a second signal segment is created to keep the signal pattern 1 with length 1. In the end, the extraction process will save four signal segments with each having just two attributes: a signal pattern and a segment length. Comparing with the way of saving all detected signal patterns, this data structure, called signal line subsequently, uses less resources. Also, a signal segment might not be exactly of the basic length. To solve this unequal-length problem, the proposed extraction process analyzes the signal segments sequentially and determines the signal pattern of each segment by comparing the segment length with the basic length. For the above example, the basic length is 4, and the length of the first segment is 3. The extraction process will divide the segment length 3 by the basic length 4 and round off the result 0.75 to get an integer value of 1, ignoring the little difference between them. That is, the first signal segment will be regarded entirely to have a representative signal pattern 0, though the length of this segment is smaller than the basic length with a difference of 1. The aforementioned message extraction process might yield noisy results. For example, a message embedded in a may be detected to be with noise 10. Therefore, a noise removal scheme is proposed to deal with such noise. Conceptually, we treat short signal segments in the signal stream as noise and combine them with neighboring longer segments to construct a better result. In more detail, we consider two cases of a noise segment N in between two signal segments, A and B: (1) A and B have identical signal patterns; (2) A and B have different signal patterns. In Case (1), the signal line is apparently separated by the noise segment N, so that we may combine the two neighboring signal segments A and B with N to construct a larger signal segment with the same signal pattern as those of A and B, and the length of the new segment may be taken to be just the sum of the three shorter segments A, B, and N. In Case (2), if A and B are long enough, we speculate that the noise is on the boundary of the two signal segments A and B, so that the noise N can be combined into either of them. Reversely, if A and B are two short segments, we gather them together and discard the result. Finally, we conduct this noise removal process by an ascending order of their lengths, i.e., we process the shortest noise segment at first. The reason is that we do not want to combine a longer segment with a short one, because it is more possible that longer signal segments are separated by shorter noise ones according to our experimental experience. Accordingly, the above process of message extraction and noise removal is described as an algorithm in the following, where the length of a signal segment L is denoted as L, and the signal pattern of L is denoted as (L). Algorithm 2: proposed message extraction process. Input: a sequence S of signal patterns extracted by the scheme described in Section 4.1, and a basic length l b Output: a message M represented by S. Steps: Step 1. Save S in a linear structure, and transform S into a new one by the following steps. 1.1.If the first signal S i in S is the end of S, go to Step 2; else, create a signal segment L i with its signal pattern as S i and set its length to 1, i.e., set (L i) = S i and L i = Read the next signal S i+1, and if S i+1 is identical to S i, increase L i by 1; else, set S i+1 as the new first signal, increment i, and go to Step Increment i by 1 and repeat Step 1.2. Step 2. Correct each signal segment in S with its length smaller than a half of the basic length l b by the following steps. 2.1 Process the shortest signal segment L N firstly in S by analyzing its two neighboring signal segments L A and L B and combine them by either of the following rules. (A) If (L A) = (L B), then combine all the three signal segments L A, L N, and L B to form a new longer one L ANB and set L ANB = L A + L N + L B and (L ANB) = (L A) or (L B); (B) If (L A) (L B), combine L N with the shorter L S of L A and L B to form a new segment L NS and set L NS = L N + L S and (L NS) = (L S). 2.2 Repeat Step 2 until there is no more short signal segments whose lengths are smaller than a half of the basic length l b. 363
6 Step 3. Convert each signal segment L i in S entirely into a single representative signal by analyzing its signal patterns and length by the following steps. 3.1 Divide L i by the basic length l b, and round off the resulting value to get an integer G. 3.2 Convert L i into a new signal segment whose representative signal pattern is taken to any signal in L i and whose length is set to be G. 3.3 Repeat Step 3 until all line segments are processed. Step 4. Find the initial signal bits from the bit stream S and convert the remaining bit stream into a message by looking up the ASCII charts until the ending signal is detected. 5. EXPERIMENTAL RESULTS We used five advertisement s with different lengths to conduct experiments as shown in Table 2. In the 1st experiment, we computed the rates of detecting low-level binary signals (00~11) in single image frames of the five s using the proposed decision rule for two cases: (1) using only the magnitude threshold T; (2) using both the magnitude threshold T and the difference threshold D. The results are shown in Table 3 from which we can see that the detection rates are increased from Case (1) to Case (2) with an average of 7.30%; and the average detection rate using both thresholds is 98.59%. Though not 100%, improvement can be made by error correction as described in Sec Table 2. Original s used in the experiments. resolution duration 15 seconds 29 seconds 14 seconds 23 seconds 15 seconds fps Table 3. Low-level 2-bit signal detection rates (T: magnitude threshold; D: difference threshold). No. of bianry (1) No. of correctly (2) No. of correctly detected Input No. Message Improvement signals detected using D only using both T and D 1 goodluck % 98.37% 6.50% 2 abcdefghijkl % 99.01% 6.58% 3 iloveyou % 98.08% 9.21% 4 Message! % 99.02% 6.55% 5 NCTU % 98.47% 7.64% average % 98.59% 7.30% Next, we show the rates of extracting embedded high-level message signals, namely, ASCII codes, using the message extraction algorithm (Algorithm 2). We used two embedding periods in the experiments, one being 0.25 second so that an ASCII code can be embedded in every second; and the other being so that an ASCII code can be embedded in every half second. The resulting rates are shown in Table 4 from which we can see that when the embedding speed is higher, the extraction rate is decreased, as expected. For 100% performance, the embedding period of 0.25 second can be used. Table 4. High-level ASCII signal detection rates (T: magnitude threshold; D: difference threshold). Bold and blank characters are erroneously recognition results. Detection using 0.25s embedding period Detection using 0.125s embedding period Input Embdded Extracted No. Rate Embedded message Extracted message Rate message message 1 goodluck88 goodluck88 100% have a nice day hahaha have a jice day jajaha 86.36% 2 abcdefghijkl abcdefghijkl 100% abcdefghijklmnopqrstuvwxyz Abcdefgiijklmno_qrstuvwxyz 92.31% 3 iloveyou iloveyou 100% I love you You love me I_love you Zou love_me 86.36% 4 Message! Message! 100% ABCDEFGHIJKLMNOPQRSTUVWXYZ ABCDEFGHIJKL_N_PQRSTUVWXYZ 92.31% 5 NCTU2015 NCTU % I am tommyfake Y am tommyf_ke 85.71% 6. CONCLUSIONS A new method for creating message-rich s with good quality for pervasive communication like covert communication, secret message exchanges, etc. has been proposed. By transmission of messages via such s, suspicion coming from hackers can be reduced. To generate such s, a new technique has been proposed to embed peak-value codes representing binary ASCII messages into the mid-frequency bands of the Y-component s spectrums of the image frames of the input. The display-and-imaging operation is applied to record the resulting message-rich displayed on a TV or monitor using a smart-phone camera, and message extraction can be conducted successfully from the recorded by detecting high values in the Y-component s spectrums of the frames of the resulting. Several problems about synchronization encountered in the embedding and extraction processes are solved. High message extraction rates are achieved as demonstrated the experimental results, showing the feasibility of the proposed method. Future studies may be directed to improving the proposed method to increase the data amount embeddable in the message-rich, to extract embedded messages in real-time, to resist more types of attacks during display-and-imaging like lighting changes, etc. REFERENCES [1] B. Davis, Signal rich art: enabling the vision of ubiquitous computing, Proceedings of SPIE 7880: Media Watermarking, Security, and Forensics III, N. D. Memon, J. Dittmann, A. M. Alattar and E. J. Delp III, Eds., vol , San Francisco, USA, Feb [2] C. J. Wu and W. H. Tsai, Construction and applications of message-rich s for pervasive communication, Proceedings of 2014 Conference on Computer Vision, Graphics and Image Processing, Pintung, Taiwan, Aug [3] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, Information hiding a survey, Proceedings of IEEE, vol. 87, no. 7, pp , July [4] W. Bender, D. Gruhl, N. Morimoto and A. Lu, Techniques for data hiding, IBM System Journal, vol. 35, no. 3, 4, pp , [5] Y. L. Lee and W. H. Tsai, A new data transfer method via signal-rich-art code images captured by mobile devices, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 25, No. 4, pp , [6] Y. C. Chiu and W. H. Tsai, Copyright protection by watermarking for color images against print-and-scan operations using coding and synchronization of peak locations in discrete Fourier transform domain, Journal of Information Science and Engineering, Vol. 22, No. 3, pp [7] K. Solanki, et al, Print and scan resilient data hiding in images, IEEE Transactions on Information Forensics and Security, Vol. 1, No. 4, pp , [8] F. Lefebvre, A. Gueluy, D. Delannay and B. Macq, A print and scan optimized watermarking scheme, Proceedings of IEEE Fourth Workshop on Multimedia Signal Processing, 2001, Cannes, French, pp , 2001.MapFan.com. (2015, June). MapFan AR Global, [online], available: /arg/ 364
Automatic Commercial Monitoring for TV Broadcasting Using Audio Fingerprinting
Automatic Commercial Monitoring for TV Broadcasting Using Audio Fingerprinting Dalwon Jang 1, Seungjae Lee 2, Jun Seok Lee 2, Minho Jin 1, Jin S. Seo 2, Sunil Lee 1 and Chang D. Yoo 1 1 Korea Advanced
More informationLine-Adaptive Color Transforms for Lossless Frame Memory Compression
Line-Adaptive Color Transforms for Lossless Frame Memory Compression Joungeun Bae 1 and Hoon Yoo 2 * 1 Department of Computer Science, SangMyung University, Jongno-gu, Seoul, South Korea. 2 Full Professor,
More informationEMBEDDED ZEROTREE WAVELET CODING WITH JOINT HUFFMAN AND ARITHMETIC CODING
EMBEDDED ZEROTREE WAVELET CODING WITH JOINT HUFFMAN AND ARITHMETIC CODING Harmandeep Singh Nijjar 1, Charanjit Singh 2 1 MTech, Department of ECE, Punjabi University Patiala 2 Assistant Professor, Department
More informationError Resilience for Compressed Sensing with Multiple-Channel Transmission
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 5, September 2015 Error Resilience for Compressed Sensing with Multiple-Channel
More informationInvestigation of Digital Signal Processing of High-speed DACs Signals for Settling Time Testing
Universal Journal of Electrical and Electronic Engineering 4(2): 67-72, 2016 DOI: 10.13189/ujeee.2016.040204 http://www.hrpub.org Investigation of Digital Signal Processing of High-speed DACs Signals for
More informationWATERMARKING USING DECIMAL SEQUENCES. Navneet Mandhani and Subhash Kak
Cryptologia, volume 29, January 2005 WATERMARKING USING DECIMAL SEQUENCES Navneet Mandhani and Subhash Kak ADDRESS: Department of Electrical and Computer Engineering, Louisiana State University, Baton
More informationDICOM medical image watermarking of ECG signals using EZW algorithm. A. Kannammal* and S. Subha Rani
126 Int. J. Medical Engineering and Informatics, Vol. 5, No. 2, 2013 DICOM medical image watermarking of ECG signals using EZW algorithm A. Kannammal* and S. Subha Rani ECE Department, PSG College of Technology,
More informationRobert Alexandru Dobre, Cristian Negrescu
ECAI 2016 - International Conference 8th Edition Electronics, Computers and Artificial Intelligence 30 June -02 July, 2016, Ploiesti, ROMÂNIA Automatic Music Transcription Software Based on Constant Q
More information[Thu Ha* et al., 5(8): August, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A NEW SYSTEM FOR INSERTING A MARK PATTERN INTO H264 VIDEO Tran Thu Ha *, Tran Quang Duc and Tran Minh Son * Ho Chi Minh City University
More informationCOMPRESSION OF DICOM IMAGES BASED ON WAVELETS AND SPIHT FOR TELEMEDICINE APPLICATIONS
COMPRESSION OF IMAGES BASED ON WAVELETS AND FOR TELEMEDICINE APPLICATIONS 1 B. Ramakrishnan and 2 N. Sriraam 1 Dept. of Biomedical Engg., Manipal Institute of Technology, India E-mail: rama_bala@ieee.org
More informationAudio-Based Video Editing with Two-Channel Microphone
Audio-Based Video Editing with Two-Channel Microphone Tetsuya Takiguchi Organization of Advanced Science and Technology Kobe University, Japan takigu@kobe-u.ac.jp Yasuo Ariki Organization of Advanced Science
More informationFast MBAFF/PAFF Motion Estimation and Mode Decision Scheme for H.264
Fast MBAFF/PAFF Motion Estimation and Mode Decision Scheme for H.264 Ju-Heon Seo, Sang-Mi Kim, Jong-Ki Han, Nonmember Abstract-- In the H.264, MBAFF (Macroblock adaptive frame/field) and PAFF (Picture
More informationVisual Communication at Limited Colour Display Capability
Visual Communication at Limited Colour Display Capability Yan Lu, Wen Gao and Feng Wu Abstract: A novel scheme for visual communication by means of mobile devices with limited colour display capability
More informationRec. ITU-R BT RECOMMENDATION ITU-R BT PARAMETER VALUES FOR THE HDTV STANDARDS FOR PRODUCTION AND INTERNATIONAL PROGRAMME EXCHANGE
Rec. ITU-R BT.79-4 1 RECOMMENDATION ITU-R BT.79-4 PARAMETER VALUES FOR THE HDTV STANDARDS FOR PRODUCTION AND INTERNATIONAL PROGRAMME EXCHANGE (Question ITU-R 27/11) (199-1994-1995-1998-2) Rec. ITU-R BT.79-4
More informationDELTA MODULATION AND DPCM CODING OF COLOR SIGNALS
DELTA MODULATION AND DPCM CODING OF COLOR SIGNALS Item Type text; Proceedings Authors Habibi, A. Publisher International Foundation for Telemetering Journal International Telemetering Conference Proceedings
More information176 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 2, FEBRUARY 2003
176 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 2, FEBRUARY 2003 Transactions Letters Error-Resilient Image Coding (ERIC) With Smart-IDCT Error Concealment Technique for
More informationDATA hiding technologies have been widely studied in
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL 18, NO 6, JUNE 2008 769 A Novel Look-Up Table Design Method for Data Hiding With Reduced Distortion Xiao-Ping Zhang, Senior Member, IEEE,
More informationRECOMMENDATION ITU-R BT (Questions ITU-R 25/11, ITU-R 60/11 and ITU-R 61/11)
Rec. ITU-R BT.61-4 1 SECTION 11B: DIGITAL TELEVISION RECOMMENDATION ITU-R BT.61-4 Rec. ITU-R BT.61-4 ENCODING PARAMETERS OF DIGITAL TELEVISION FOR STUDIOS (Questions ITU-R 25/11, ITU-R 6/11 and ITU-R 61/11)
More informationExtraction Methods of Watermarks from Linearly-Distorted Images to Maximize Signal-to-Noise Ratio. Brandon Migdal. Advisors: Carl Salvaggio
Extraction Methods of Watermarks from Linearly-Distorted Images to Maximize Signal-to-Noise Ratio By Brandon Migdal Advisors: Carl Salvaggio Chris Honsinger A senior project submitted in partial fulfillment
More informationA Novel Approach towards Video Compression for Mobile Internet using Transform Domain Technique
A Novel Approach towards Video Compression for Mobile Internet using Transform Domain Technique Dhaval R. Bhojani Research Scholar, Shri JJT University, Jhunjunu, Rajasthan, India Ved Vyas Dwivedi, PhD.
More informationOBJECT-BASED IMAGE COMPRESSION WITH SIMULTANEOUS SPATIAL AND SNR SCALABILITY SUPPORT FOR MULTICASTING OVER HETEROGENEOUS NETWORKS
OBJECT-BASED IMAGE COMPRESSION WITH SIMULTANEOUS SPATIAL AND SNR SCALABILITY SUPPORT FOR MULTICASTING OVER HETEROGENEOUS NETWORKS Habibollah Danyali and Alfred Mertins School of Electrical, Computer and
More informationOverview of All Pixel Circuits for Active Matrix Organic Light Emitting Diode (AMOLED)
Chapter 2 Overview of All Pixel Circuits for Active Matrix Organic Light Emitting Diode (AMOLED) ---------------------------------------------------------------------------------------------------------------
More informationA Parametric Autoregressive Model for the Extraction of Electric Network Frequency Fluctuations in Audio Forensic Authentication
Journal of Energy and Power Engineering 10 (2016) 504-512 doi: 10.17265/1934-8975/2016.08.007 D DAVID PUBLISHING A Parametric Autoregressive Model for the Extraction of Electric Network Frequency Fluctuations
More informationScalable Foveated Visual Information Coding and Communications
Scalable Foveated Visual Information Coding and Communications Ligang Lu,1 Zhou Wang 2 and Alan C. Bovik 2 1 Multimedia Technologies, IBM T. J. Watson Research Center, Yorktown Heights, NY 10598, USA 2
More informationRegion Adaptive Unsharp Masking based DCT Interpolation for Efficient Video Intra Frame Up-sampling
International Conference on Electronic Design and Signal Processing (ICEDSP) 0 Region Adaptive Unsharp Masking based DCT Interpolation for Efficient Video Intra Frame Up-sampling Aditya Acharya Dept. of
More informationISSN (Print) Original Research Article. Coimbatore, Tamil Nadu, India
Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 016; 4(1):1-5 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources) www.saspublisher.com
More informationPerformance Improvement of AMBE 3600 bps Vocoder with Improved FEC
Performance Improvement of AMBE 3600 bps Vocoder with Improved FEC Ali Ekşim and Hasan Yetik Center of Research for Advanced Technologies of Informatics and Information Security (TUBITAK-BILGEM) Turkey
More informationBehavior Forensics for Scalable Multiuser Collusion: Fairness Versus Effectiveness H. Vicky Zhao, Member, IEEE, and K. J. Ray Liu, Fellow, IEEE
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 1, NO. 3, SEPTEMBER 2006 311 Behavior Forensics for Scalable Multiuser Collusion: Fairness Versus Effectiveness H. Vicky Zhao, Member, IEEE,
More informationColor Image Compression Using Colorization Based On Coding Technique
Color Image Compression Using Colorization Based On Coding Technique D.P.Kawade 1, Prof. S.N.Rawat 2 1,2 Department of Electronics and Telecommunication, Bhivarabai Sawant Institute of Technology and Research
More informationResearch Article. ISSN (Print) *Corresponding author Shireen Fathima
Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2014; 2(4C):613-620 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)
More informationRobust 3-D Video System Based on Modified Prediction Coding and Adaptive Selection Mode Error Concealment Algorithm
International Journal of Signal Processing Systems Vol. 2, No. 2, December 2014 Robust 3-D Video System Based on Modified Prediction Coding and Adaptive Selection Mode Error Concealment Algorithm Walid
More informationReal Time PQoS Enhancement of IP Multimedia Services Over Fading and Noisy DVB-T Channel
Real Time PQoS Enhancement of IP Multimedia Services Over Fading and Noisy DVB-T Channel H. Koumaras (1), E. Pallis (2), G. Gardikis (1), A. Kourtis (1) (1) Institute of Informatics and Telecommunications
More informationA Parametric Autoregressive Model for the Extraction of Electric Network Frequency Fluctuations in Audio Forensic Authentication
Proceedings of the 3 rd International Conference on Control, Dynamic Systems, and Robotics (CDSR 16) Ottawa, Canada May 9 10, 2016 Paper No. 110 DOI: 10.11159/cdsr16.110 A Parametric Autoregressive Model
More informationThe Development of a Synthetic Colour Test Image for Subjective and Objective Quality Assessment of Digital Codecs
2005 Asia-Pacific Conference on Communications, Perth, Western Australia, 3-5 October 2005. The Development of a Synthetic Colour Test Image for Subjective and Objective Quality Assessment of Digital Codecs
More informationAudio Compression Technology for Voice Transmission
Audio Compression Technology for Voice Transmission 1 SUBRATA SAHA, 2 VIKRAM REDDY 1 Department of Electrical and Computer Engineering 2 Department of Computer Science University of Manitoba Winnipeg,
More informationInstrument Recognition in Polyphonic Mixtures Using Spectral Envelopes
Instrument Recognition in Polyphonic Mixtures Using Spectral Envelopes hello Jay Biernat Third author University of Rochester University of Rochester Affiliation3 words jbiernat@ur.rochester.edu author3@ismir.edu
More informationUsing Raw Speech as a Watermark, Does it work?
Using Raw Speech as a Watermark, Does it work? P. Nintanavongsa and T. Amomraksa Multimedia Communications Laboratory, Department of Computer Engineering, King Mongkut's University of Technology Thonburi,
More informationTRAFFIC SURVEILLANCE VIDEO MANAGEMENT SYSTEM
TRAFFIC SURVEILLANCE VIDEO MANAGEMENT SYSTEM K.Ganesan*, Kavitha.C, Kriti Tandon, Lakshmipriya.R TIFAC-Centre of Relevance and Excellence in Automotive Infotronics*, School of Information Technology and
More informationAN IMPROVED ERROR CONCEALMENT STRATEGY DRIVEN BY SCENE MOTION PROPERTIES FOR H.264/AVC DECODERS
AN IMPROVED ERROR CONCEALMENT STRATEGY DRIVEN BY SCENE MOTION PROPERTIES FOR H.264/AVC DECODERS Susanna Spinsante, Ennio Gambi, Franco Chiaraluce Dipartimento di Elettronica, Intelligenza artificiale e
More informationEXPLORING THE USE OF ENF FOR MULTIMEDIA SYNCHRONIZATION
EXPLORING THE USE OF ENF FOR MULTIMEDIA SYNCHRONIZATION Hui Su, Adi Hajj-Ahmad, Min Wu, and Douglas W. Oard {hsu, adiha, minwu, oard}@umd.edu University of Maryland, College Park ABSTRACT The electric
More informationPaulo V. K. Borges. Flat 1, 50A, Cephas Av. London, UK, E1 4AR (+44) PRESENTATION
Paulo V. K. Borges Flat 1, 50A, Cephas Av. London, UK, E1 4AR (+44) 07942084331 vini@ieee.org PRESENTATION Electronic engineer working as researcher at University of London. Doctorate in digital image/video
More informationCHAPTER 8 CONCLUSION AND FUTURE SCOPE
124 CHAPTER 8 CONCLUSION AND FUTURE SCOPE Data hiding is becoming one of the most rapidly advancing techniques the field of research especially with increase in technological advancements in internet and
More informationROBUST ADAPTIVE INTRA REFRESH FOR MULTIVIEW VIDEO
ROBUST ADAPTIVE INTRA REFRESH FOR MULTIVIEW VIDEO Sagir Lawan1 and Abdul H. Sadka2 1and 2 Department of Electronic and Computer Engineering, Brunel University, London, UK ABSTRACT Transmission error propagation
More information1ms Column Parallel Vision System and It's Application of High Speed Target Tracking
Proceedings of the 2(X)0 IEEE International Conference on Robotics & Automation San Francisco, CA April 2000 1ms Column Parallel Vision System and It's Application of High Speed Target Tracking Y. Nakabo,
More informationModule 1: Digital Video Signal Processing Lecture 3: Characterisation of Video raster, Parameters of Analog TV systems, Signal bandwidth
The Lecture Contains: Analog Video Raster Interlaced Scan Characterization of a video Raster Analog Color TV systems Signal Bandwidth Digital Video Parameters of a digital video Pixel Aspect Ratio file:///d
More informationAN ARTISTIC TECHNIQUE FOR AUDIO-TO-VIDEO TRANSLATION ON A MUSIC PERCEPTION STUDY
AN ARTISTIC TECHNIQUE FOR AUDIO-TO-VIDEO TRANSLATION ON A MUSIC PERCEPTION STUDY Eugene Mikyung Kim Department of Music Technology, Korea National University of Arts eugene@u.northwestern.edu ABSTRACT
More informationWhite Paper. Uniform Luminance Technology. What s inside? What is non-uniformity and noise in LCDs? Why is it a problem? How is it solved?
White Paper Uniform Luminance Technology What s inside? What is non-uniformity and noise in LCDs? Why is it a problem? How is it solved? Tom Kimpe Manager Technology & Innovation Group Barco Medical Imaging
More informationCERIAS Tech Report Preprocessing and Postprocessing Techniques for Encoding Predictive Error Frames in Rate Scalable Video Codecs by E
CERIAS Tech Report 2001-118 Preprocessing and Postprocessing Techniques for Encoding Predictive Error Frames in Rate Scalable Video Codecs by E Asbun, P Salama, E Delp Center for Education and Research
More informationA NEW LOOK AT FREQUENCY RESOLUTION IN POWER SPECTRAL DENSITY ESTIMATION. Sudeshna Pal, Soosan Beheshti
A NEW LOOK AT FREQUENCY RESOLUTION IN POWER SPECTRAL DENSITY ESTIMATION Sudeshna Pal, Soosan Beheshti Electrical and Computer Engineering Department, Ryerson University, Toronto, Canada spal@ee.ryerson.ca
More informationMotion Video Compression
7 Motion Video Compression 7.1 Motion video Motion video contains massive amounts of redundant information. This is because each image has redundant information and also because there are very few changes
More informationLecture 2 Video Formation and Representation
2013 Spring Term 1 Lecture 2 Video Formation and Representation Wen-Hsiao Peng ( 彭文孝 ) Multimedia Architecture and Processing Lab (MAPL) Department of Computer Science National Chiao Tung University 1
More informationGuidance For Scrambling Data Signals For EMC Compliance
Guidance For Scrambling Data Signals For EMC Compliance David Norte, PhD. Abstract s can be used to help mitigate the radiated emissions from inherently periodic data signals. A previous paper [1] described
More informationReconfigurable Neural Net Chip with 32K Connections
Reconfigurable Neural Net Chip with 32K Connections H.P. Graf, R. Janow, D. Henderson, and R. Lee AT&T Bell Laboratories, Room 4G320, Holmdel, NJ 07733 Abstract We describe a CMOS neural net chip with
More informationKeywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 164 High Security Video Steganography Putti DeepthiChandan, Dr. M. Narayana Abstract- Video Steganography is a technique
More informationHidden melody in music playing motion: Music recording using optical motion tracking system
PROCEEDINGS of the 22 nd International Congress on Acoustics General Musical Acoustics: Paper ICA2016-692 Hidden melody in music playing motion: Music recording using optical motion tracking system Min-Ho
More informationMULTI-STATE VIDEO CODING WITH SIDE INFORMATION. Sila Ekmekci Flierl, Thomas Sikora
MULTI-STATE VIDEO CODING WITH SIDE INFORMATION Sila Ekmekci Flierl, Thomas Sikora Technical University Berlin Institute for Telecommunications D-10587 Berlin / Germany ABSTRACT Multi-State Video Coding
More informationData flow architecture for high-speed optical processors
Data flow architecture for high-speed optical processors Kipp A. Bauchert and Steven A. Serati Boulder Nonlinear Systems, Inc., Boulder CO 80301 1. Abstract For optical processor applications outside of
More informationSelective Intra Prediction Mode Decision for H.264/AVC Encoders
Selective Intra Prediction Mode Decision for H.264/AVC Encoders Jun Sung Park, and Hyo Jung Song Abstract H.264/AVC offers a considerably higher improvement in coding efficiency compared to other compression
More informationBit Rate Control for Video Transmission Over Wireless Networks
Indian Journal of Science and Technology, Vol 9(S), DOI: 0.75/ijst/06/v9iS/05, December 06 ISSN (Print) : 097-686 ISSN (Online) : 097-5 Bit Rate Control for Video Transmission Over Wireless Networks K.
More informationThe Extron MGP 464 is a powerful, highly effective tool for advanced A/V communications and presentations. It has the
MGP 464: How to Get the Most from the MGP 464 for Successful Presentations The Extron MGP 464 is a powerful, highly effective tool for advanced A/V communications and presentations. It has the ability
More informationAn Efficient Low Bit-Rate Video-Coding Algorithm Focusing on Moving Regions
1128 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 11, NO. 10, OCTOBER 2001 An Efficient Low Bit-Rate Video-Coding Algorithm Focusing on Moving Regions Kwok-Wai Wong, Kin-Man Lam,
More information1022 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 19, NO. 4, APRIL 2010
1022 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 19, NO. 4, APRIL 2010 Delay Constrained Multiplexing of Video Streams Using Dual-Frame Video Coding Mayank Tiwari, Student Member, IEEE, Theodore Groves,
More informationA Framework for Segmentation of Interview Videos
A Framework for Segmentation of Interview Videos Omar Javed, Sohaib Khan, Zeeshan Rasheed, Mubarak Shah Computer Vision Lab School of Electrical Engineering and Computer Science University of Central Florida
More informationMPEG has been established as an international standard
1100 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 9, NO. 7, OCTOBER 1999 Fast Extraction of Spatially Reduced Image Sequences from MPEG-2 Compressed Video Junehwa Song, Member,
More informationFree Viewpoint Switching in Multi-view Video Streaming Using. Wyner-Ziv Video Coding
Free Viewpoint Switching in Multi-view Video Streaming Using Wyner-Ziv Video Coding Xun Guo 1,, Yan Lu 2, Feng Wu 2, Wen Gao 1, 3, Shipeng Li 2 1 School of Computer Sciences, Harbin Institute of Technology,
More informationPerformance Evaluation of Error Resilience Techniques in H.264/AVC Standard
Performance Evaluation of Error Resilience Techniques in H.264/AVC Standard Ram Narayan Dubey Masters in Communication Systems Dept of ECE, IIT-R, India Varun Gunnala Masters in Communication Systems Dept
More informationDepartment of Electrical & Electronic Engineering Imperial College of Science, Technology and Medicine. Project: Real-Time Speech Enhancement
Department of Electrical & Electronic Engineering Imperial College of Science, Technology and Medicine Project: Real-Time Speech Enhancement Introduction Telephones are increasingly being used in noisy
More informationEasy Search Method of Suspected Illegally Video Signal Using Correlation Coefficient for each Silent and Motion regions
, pp.239-245 http://dx.doi.org/10.14257/astl.2015.111.46 Easy Search Method of Suspected Illegally Video Signal Using Correlation Coefficient for each Silent and Motion regions Hideo Kuroda 1, Kousuke
More informationATSC Standard: Video Watermark Emission (A/335)
ATSC Standard: Video Watermark Emission (A/335) Doc. A/335:2016 20 September 2016 Advanced Television Systems Committee 1776 K Street, N.W. Washington, D.C. 20006 202-872-9160 i The Advanced Television
More informationSource/Receiver (SR) Setup
PS User Guide Series 2015 Source/Receiver (SR) Setup For 1-D and 2-D Vs Profiling Prepared By Choon B. Park, Ph.D. January 2015 Table of Contents Page 1. Overview 2 2. Source/Receiver (SR) Setup Main Menu
More informationReal-time body tracking of a teacher for automatic dimming of overlapping screen areas for a large display device being used for teaching
CSIT 6910 Independent Project Real-time body tracking of a teacher for automatic dimming of overlapping screen areas for a large display device being used for teaching Student: Supervisor: Prof. David
More information52 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 7, NO. 1, FEBRUARY 2005
52 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 7, NO. 1, FEBRUARY 2005 Spatially Localized Image-Dependent Watermarking for Statistical Invisibility and Collusion Resistance Karen Su, Student Member, IEEE, Deepa
More informationColour Reproduction Performance of JPEG and JPEG2000 Codecs
Colour Reproduction Performance of JPEG and JPEG000 Codecs A. Punchihewa, D. G. Bailey, and R. M. Hodgson Institute of Information Sciences & Technology, Massey University, Palmerston North, New Zealand
More informationWipe Scene Change Detection in Video Sequences
Wipe Scene Change Detection in Video Sequences W.A.C. Fernando, C.N. Canagarajah, D. R. Bull Image Communications Group, Centre for Communications Research, University of Bristol, Merchant Ventures Building,
More informationInterlace and De-interlace Application on Video
Interlace and De-interlace Application on Video Liliana, Justinus Andjarwirawan, Gilberto Erwanto Informatics Department, Faculty of Industrial Technology, Petra Christian University Surabaya, Indonesia
More informationReduced complexity MPEG2 video post-processing for HD display
Downloaded from orbit.dtu.dk on: Dec 17, 2017 Reduced complexity MPEG2 video post-processing for HD display Virk, Kamran; Li, Huiying; Forchhammer, Søren Published in: IEEE International Conference on
More informationVLSI Technology used in Auto-Scan Delay Testing Design For Bench Mark Circuits
VLSI Technology used in Auto-Scan Delay Testing Design For Bench Mark Circuits N.Brindha, A.Kaleel Rahuman ABSTRACT: Auto scan, a design for testability (DFT) technique for synchronous sequential circuits.
More informationInSync White Paper : Achieving optimal conversions in UHDTV workflows April 2015
InSync White Paper : Achieving optimal conversions in UHDTV workflows April 2015 Abstract - UHDTV 120Hz workflows require careful management of content at existing formats and frame rates, into and out
More informationSteganographic Technique for Hiding Secret Audio in an Image
Steganographic Technique for Hiding Secret Audio in an Image 1 Aiswarya T, 2 Mansi Shah, 3 Aishwarya Talekar, 4 Pallavi Raut 1,2,3 UG Student, 4 Assistant Professor, 1,2,3,4 St John of Engineering & Management,
More informationChapter 3 Fundamental Concepts in Video. 3.1 Types of Video Signals 3.2 Analog Video 3.3 Digital Video
Chapter 3 Fundamental Concepts in Video 3.1 Types of Video Signals 3.2 Analog Video 3.3 Digital Video 1 3.1 TYPES OF VIDEO SIGNALS 2 Types of Video Signals Video standards for managing analog output: A.
More informationRECOMMENDATION ITU-R BT Studio encoding parameters of digital television for standard 4:3 and wide-screen 16:9 aspect ratios
ec. ITU- T.61-6 1 COMMNATION ITU- T.61-6 Studio encoding parameters of digital television for standard 4:3 and wide-screen 16:9 aspect ratios (Question ITU- 1/6) (1982-1986-199-1992-1994-1995-27) Scope
More informationVISUAL CONTENT BASED SEGMENTATION OF TALK & GAME SHOWS. O. Javed, S. Khan, Z. Rasheed, M.Shah. {ojaved, khan, zrasheed,
VISUAL CONTENT BASED SEGMENTATION OF TALK & GAME SHOWS O. Javed, S. Khan, Z. Rasheed, M.Shah {ojaved, khan, zrasheed, shah}@cs.ucf.edu Computer Vision Lab School of Electrical Engineering and Computer
More informationConstant Bit Rate for Video Streaming Over Packet Switching Networks
International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Constant Bit Rate for Video Streaming Over Packet Switching Networks Mr. S. P.V Subba rao 1, Y. Renuka Devi 2 Associate professor
More informationECE 4220 Real Time Embedded Systems Final Project Spectrum Analyzer
ECE 4220 Real Time Embedded Systems Final Project Spectrum Analyzer by: Matt Mazzola 12222670 Abstract The design of a spectrum analyzer on an embedded device is presented. The device achieves minimum
More informationUnequal Error Protection Codes for Wavelet Image Transmission over W-CDMA, AWGN and Rayleigh Fading Channels
Unequal Error Protection Codes for Wavelet Image Transmission over W-CDMA, AWGN and Rayleigh Fading Channels MINH H. LE and RANJITH LIYANA-PATHIRANA School of Engineering and Industrial Design College
More informationVideo coding standards
Video coding standards Video signals represent sequences of images or frames which can be transmitted with a rate from 5 to 60 frames per second (fps), that provides the illusion of motion in the displayed
More informationh t t p : / / w w w. v i d e o e s s e n t i a l s. c o m E - M a i l : j o e k a n a t t. n e t DVE D-Theater Q & A
J O E K A N E P R O D U C T I O N S W e b : h t t p : / / w w w. v i d e o e s s e n t i a l s. c o m E - M a i l : j o e k a n e @ a t t. n e t DVE D-Theater Q & A 15 June 2003 Will the D-Theater tapes
More information(12) (10) Patent No.: US 7,197,164 B2. Levy (45) Date of Patent: Mar. 27, 2007
United States Patent US007 1971 64B2 (12) () Patent No.: Levy (45) Date of Patent: Mar. 27, 2007 (54) TIME-VARYING VIDEO WATERMARK 5,9,044 A 6/1999 Gardos et al.... 382,236 5,9,377 A 7/1999 Powell et al.......
More informationAdaptive Key Frame Selection for Efficient Video Coding
Adaptive Key Frame Selection for Efficient Video Coding Jaebum Jun, Sunyoung Lee, Zanming He, Myungjung Lee, and Euee S. Jang Digital Media Lab., Hanyang University 17 Haengdang-dong, Seongdong-gu, Seoul,
More informationModulation transfer function of a liquid crystal spatial light modulator
1 November 1999 Ž. Optics Communications 170 1999 221 227 www.elsevier.comrlocateroptcom Modulation transfer function of a liquid crystal spatial light modulator Mei-Li Hsieh a, Ken Y. Hsu a,), Eung-Gi
More informationTHE importance of music content analysis for musical
IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 15, NO. 1, JANUARY 2007 333 Drum Sound Recognition for Polyphonic Audio Signals by Adaptation and Matching of Spectrogram Templates With
More informationUC San Diego UC San Diego Previously Published Works
UC San Diego UC San Diego Previously Published Works Title Classification of MPEG-2 Transport Stream Packet Loss Visibility Permalink https://escholarship.org/uc/item/9wk791h Authors Shin, J Cosman, P
More informationSkip Length and Inter-Starvation Distance as a Combined Metric to Assess the Quality of Transmitted Video
Skip Length and Inter-Starvation Distance as a Combined Metric to Assess the Quality of Transmitted Video Mohamed Hassan, Taha Landolsi, Husameldin Mukhtar, and Tamer Shanableh College of Engineering American
More informationReconstruction of Ca 2+ dynamics from low frame rate Ca 2+ imaging data CS229 final project. Submitted by: Limor Bursztyn
Reconstruction of Ca 2+ dynamics from low frame rate Ca 2+ imaging data CS229 final project. Submitted by: Limor Bursztyn Introduction Active neurons communicate by action potential firing (spikes), accompanied
More informationINTRA-FRAME WAVELET VIDEO CODING
INTRA-FRAME WAVELET VIDEO CODING Dr. T. Morris, Mr. D. Britch Department of Computation, UMIST, P. O. Box 88, Manchester, M60 1QD, United Kingdom E-mail: t.morris@co.umist.ac.uk dbritch@co.umist.ac.uk
More informationSERIES J: CABLE NETWORKS AND TRANSMISSION OF TELEVISION, SOUND PROGRAMME AND OTHER MULTIMEDIA SIGNALS Measurement of the quality of service
International Telecommunication Union ITU-T J.342 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (04/2011) SERIES J: CABLE NETWORKS AND TRANSMISSION OF TELEVISION, SOUND PROGRAMME AND OTHER MULTIMEDIA
More informationChannel models for high-capacity information hiding in images
Channel models for high-capacity information hiding in images Johann A. Briffa a, Manohar Das b School of Engineering and Computer Science Oakland University, Rochester MI 48309 ABSTRACT We consider the
More informationRainBar: Robust Application-driven Visual Communication using Color Barcodes
2015 IEEE 35th International Conference on Distributed Computing Systems RainBar: Robust Application-driven Visual Communication using Color Barcodes Qian Wang, Man Zhou, Kui Ren, Tao Lei, Jikun Li and
More informationPAPER Wireless Multi-view Video Streaming with Subcarrier Allocation
IEICE TRANS. COMMUN., VOL.Exx??, NO.xx XXXX 200x 1 AER Wireless Multi-view Video Streaming with Subcarrier Allocation Takuya FUJIHASHI a), Shiho KODERA b), Nonmembers, Shunsuke SARUWATARI c), and Takashi
More informationALONG with the progressive device scaling, semiconductor
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 57, NO. 4, APRIL 2010 285 LUT Optimization for Memory-Based Computation Pramod Kumar Meher, Senior Member, IEEE Abstract Recently, we
More information