SPIE ITCom最新文献

筛选
英文 中文
Optimum discrete approximation of multidimensional band-limited signals 多维带限信号的最佳离散逼近
SPIE ITCom Pub Date : 2003-11-19 DOI: 10.1117/12.509845
Y. Kida, T. Kida
{"title":"Optimum discrete approximation of multidimensional band-limited signals","authors":"Y. Kida, T. Kida","doi":"10.1117/12.509845","DOIUrl":"https://doi.org/10.1117/12.509845","url":null,"abstract":"We present a necessary and sufficient condition that a given n-dimensional generalized interpolation approximation minimizes various worst-case measures of error of approximation at the same time among all the approximations, including nonlinear approximation, using the same set of sample values. As a typical example of the optimum approximation satisfying the above necessary and sufficient condition, we present n-dimensional generalitd interpolation approximation using the finite number of sample values. Then, we consider n-dimensional generalized discrete interpolation approximation based on n-dimensional FIR filter banks that uses the finite number of sample values in the approximation of each pixel of image but scan the image over the whole pixels. For this scanning-type discrete approximation, we prove that discrete interpolation functions exist that minimize various measures of error of approximation defined at discrete sample points xp=p, simultaneously, where p are the n-dimensional integer vectors. The presented discrete interpolation functions vanish outside the prescribed domain in the integer-vector space. Hence, these interpolation functions are realized by n-dimensional FIR filters. In this discussion, we prove that there exist continuous interpolation functions with extended band-width that interpolate the above discrete interpolation functions and satisfy the condition called discrete orthogonality. This condition is one of the two conditions that constitute the necessary and sufficient condition presented in this paper. Several discrete approximations are presented that satisfy both the conditions constituting the necessary and sufficient condition presented in this paper. The above discrete interpolation functions have much flexibility in their frequency characteristics if appropriate analysis filters are selected.","PeriodicalId":282161,"journal":{"name":"SPIE ITCom","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122754259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
XML schema harmonization: design methodology and examples XML模式协调:设计方法和示例
SPIE ITCom Pub Date : 2003-11-19 DOI: 10.1117/12.510924
Yih-Feng Chen, Xiaoming Sun, C.-C. Jay Kuo
{"title":"XML schema harmonization: design methodology and examples","authors":"Yih-Feng Chen, Xiaoming Sun, C.-C. Jay Kuo","doi":"10.1117/12.510924","DOIUrl":"https://doi.org/10.1117/12.510924","url":null,"abstract":"The flexible and semi-structured eXtensible Markup Language (XML) is used in various application domains as well as the database field. The proposed XML harmonization system attempts to re-utilize existing markup languages by extracting and integrating them. This idea is analogous to the join operation in the database domain. When new structures are created, new document types are defined. Structures of XML instances can be viewed from various viewpoints, e.g. the relational database or the object-oriented database. In this work, we propose a new way to achieve harmonization, i.e., by defining axioms on atomic elements of the selected data structure. The advantage of using axioms is that it can be extended to other data structures easily. Measurements of harmonization are discussed, and harmonization examples are given to illustrate the axiom-based design principle.","PeriodicalId":282161,"journal":{"name":"SPIE ITCom","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115015946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
MPML-based error-resilient wireless video transmission 基于mpml的容错无线视频传输
SPIE ITCom Pub Date : 2003-11-19 DOI: 10.1117/12.510921
Xiaoming Sun, C.-C. Jay Kuo
{"title":"MPML-based error-resilient wireless video transmission","authors":"Xiaoming Sun, C.-C. Jay Kuo","doi":"10.1117/12.510921","DOIUrl":"https://doi.org/10.1117/12.510921","url":null,"abstract":"MPML is an XML-based MPEG video coding method that was proposed in our previous work. A comprehensive study on the tradeoff between the coding bit rates and the PSNR performance with MPML under the noisy channel environment is conducted in this research. The original MPML compression algorithm has been modified for partial protection to reduce the XML overhead. A scheme to realize partial MPML protection is proposed. Simulation results demonstrate that the proposed MPML-based error resilient technique can achieve good performance for wireless video transmission.","PeriodicalId":282161,"journal":{"name":"SPIE ITCom","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130042062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluation based on invisible watermarking system 基于不可见水印系统的评价
SPIE ITCom Pub Date : 2003-11-19 DOI: 10.1117/12.502349
Daoshun Wang, Jinghong Liang, Lei Zhang, Yiqi Dai
{"title":"Evaluation based on invisible watermarking system","authors":"Daoshun Wang, Jinghong Liang, Lei Zhang, Yiqi Dai","doi":"10.1117/12.502349","DOIUrl":"https://doi.org/10.1117/12.502349","url":null,"abstract":"In this paper we introduce steganalysis and present three detection types. By the comparison of several watermark benchmark tools, which are Stirmark, Checkmark and Optimark, we discuss the validity of watermarking system, and propose a basic condition and outline to evaluate the validity of image watermarking system.","PeriodicalId":282161,"journal":{"name":"SPIE ITCom","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122618083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Watermarking scheme for authentication of compressed image 压缩图像认证的水印方案
SPIE ITCom Pub Date : 2003-11-19 DOI: 10.1117/12.510574
Tsung-Han Hsieh, Chang-Tsun Li, Shuo Wang
{"title":"Watermarking scheme for authentication of compressed image","authors":"Tsung-Han Hsieh, Chang-Tsun Li, Shuo Wang","doi":"10.1117/12.510574","DOIUrl":"https://doi.org/10.1117/12.510574","url":null,"abstract":"As images are commonly transmitted or stored in compressed form such as JPEG, to extend the applicability of our previous work, a new scheme for embedding watermark in compressed domain without resorting to cryptography is proposed. In this work, a target image is first DCT transformed and quantised. Then, all the coefficients are implicitly watermarked in order to minimize the risk of being attacked on the unwatermarked coefficients. The watermarking is done through registering/blending the zero-valued coefficients with a binary sequence to create the watermark and involving the unembedded coefficients during the process of embedding the selected coefficients. The second-order neighbors and the block itself are considered in the process of the watermark embedding in order to thwart different attacks such as cover-up, vector quantisation, and transplantation. The experiments demonstrate the capability of the proposed scheme in thwarting local tampering, geometric transformation such as cropping, and common signal operations such as lowpass filtering.","PeriodicalId":282161,"journal":{"name":"SPIE ITCom","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128191518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Real-time stereo image watermarking using discrete cosine transform and adaptive disparity maps 使用离散余弦变换和自适应视差图的实时立体图像水印
SPIE ITCom Pub Date : 2003-11-19 DOI: 10.1117/12.511615
Dong-Choon Hwang, Kyung-Hoon Bae, Maeng-Ho Lee, Eun-Soo Kim
{"title":"Real-time stereo image watermarking using discrete cosine transform and adaptive disparity maps","authors":"Dong-Choon Hwang, Kyung-Hoon Bae, Maeng-Ho Lee, Eun-Soo Kim","doi":"10.1117/12.511615","DOIUrl":"https://doi.org/10.1117/12.511615","url":null,"abstract":"In this paper, a real-time stereo image watermarking scheme using discrete cosine transform(DCT) and disparity map is proposed. That is, a watermark image is embedded into the right image of a stereo image pair in the frequency domain through the conventional DCT operation and disparity information between the watermarked right image and the left image is extracted. And then, the disparity data and the left image are simultaneously transmitted to the recipient through the communication channel. At the receiver, the watermarked right image is reconstructed from the received left image and disparity data through the adaptive matching algorithm and a watermark image is finally extracted from this reconstructed right image through the decoding algorithm. From some experiments by using the stereo image pair captured by the CCD camera and a watermark image of English alphabet 'NRL', it is found that the PSNR of the reconstructed right image through the DCT and adaptive matching algorithm improves to 9.3dB by comparing with those of the reconstructed right images through the conventional pixel-based and block-based matching algorithms. At the same time the PSNR of the watermark image extracted from the reconstructed right image also improve to 7.72dB by comparing with those of the others. These experimental results suggest a possibility of practical implementation of a disparity map-based stereo image watermarking scheme.","PeriodicalId":282161,"journal":{"name":"SPIE ITCom","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121929709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Memory bank conflict reduction for embedded multimedia applications 嵌入式多媒体应用的内存库冲突减少
SPIE ITCom Pub Date : 2003-11-19 DOI: 10.1117/12.512037
Qi Zhang, Qing Li, Yunyang Dai, C.-C. Jay Kuo
{"title":"Memory bank conflict reduction for embedded multimedia applications","authors":"Qi Zhang, Qing Li, Yunyang Dai, C.-C. Jay Kuo","doi":"10.1117/12.512037","DOIUrl":"https://doi.org/10.1117/12.512037","url":null,"abstract":"A detailed study of the impact of memory bank conflict on the performance of EMAs is presented. Based on the study, novel schemes utilizing SIMD and array padding are described to solve the memory bank conflict problem. Since the parameter in array padding has a great impact on the overall behavior of the memory system, how to achieve optimal padding is an important research topic. Here, we analyze the padding effect and develop a probabilistic model to determine the optimal padding distance. Preliminary experimental results are given to verify the correctness of this model.","PeriodicalId":282161,"journal":{"name":"SPIE ITCom","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123099277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Platform for distributed multimedia environments supporting arbitrarily nested team structures 支持任意嵌套团队结构的分布式多媒体环境平台
SPIE ITCom Pub Date : 2003-11-19 DOI: 10.1117/12.511190
A. A. Nazari Shirehjini, Hannes Guddat, S. Noll, N. Schiffner
{"title":"Platform for distributed multimedia environments supporting arbitrarily nested team structures","authors":"A. A. Nazari Shirehjini, Hannes Guddat, S. Noll, N. Schiffner","doi":"10.1117/12.511190","DOIUrl":"https://doi.org/10.1117/12.511190","url":null,"abstract":"In this paper a novel platform, HOUCOMTM, for the development of team based distributed collaborative applications is presented. Its implementation within a scenario for distributed cooperative virtual product development, ProViT, will be shown, describing the features and advantages of the presented platform. The specified platform consists of a decentrally organized, dynamic and user-configurable architecture. The main entities within the given platform are Conferences (working groups), Sessions (sub-groups), Users, Components, and Shared Resources. The system provides support of hierarchical Session Management, allowing for arbitrarily nested groups and multi-conferencing. Within the given platform Users can be individuals as well as technical devices, e.g. a streaming framework. The ProViT scenario builds a collaborative environment for interactive distributed VR Design reviews for the mechanical engineering industry. Here several distributed clusters form a working group, allowing individual partners to immersively collaborate on 3D models and supplementary documents and communicate via A/V-streaming. This paper divides into three chapters, first describing the ProViT scenario and deriving its requirements. The subsequent chapter examines the novel concept in general and the features that helped meeting the given project requirements in particular. In the conclusion the authors give an outlook on future extensions and applications of the developed platform.","PeriodicalId":282161,"journal":{"name":"SPIE ITCom","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132516755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Error-resilient video transmission with multi-hypothesis motion-compensated prediction 基于多假设运动补偿预测的容错视频传输
SPIE ITCom Pub Date : 2003-11-19 DOI: 10.1117/12.510847
Wei-Ying Kung, Chang-Su Kim, C.-C. Jay Kuo
{"title":"Error-resilient video transmission with multi-hypothesis motion-compensated prediction","authors":"Wei-Ying Kung, Chang-Su Kim, C.-C. Jay Kuo","doi":"10.1117/12.510847","DOIUrl":"https://doi.org/10.1117/12.510847","url":null,"abstract":"Multi-hypothesis motion compensated prediction (MHMCP) predicts a block from a weighted sum of multiple reference blocks in the frame buffer. By efficiently combining these reference blocks, MHMCP can provide less prediction errors so as to reduce the coding bit rates. Although MHMCP was originally proposed to achieve high coding efficiency, it has been observed recently that MHMCP can also enhance the error resilient property of compressed video. In this work, we investigate the error propagation effect in the MHMCP coder. More specifically, we study how the multi-hypothesis number as well as hypothesis coefficients influence the strength of propagating errors. Simulation results are given to confirm our analysis. Finally, several design principles for the MHMCP coder are derived based on our analysis and simulation results.","PeriodicalId":282161,"journal":{"name":"SPIE ITCom","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116053189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security analysis of selectively encrypted MPEG-2 streams 选择性加密MPEG-2流的安全性分析
SPIE ITCom Pub Date : 2003-11-19 DOI: 10.1117/12.512635
T. Lookabaugh, D. Sicker, David Keaton, Wangmei Guo, Indrani Vedula
{"title":"Security analysis of selectively encrypted MPEG-2 streams","authors":"T. Lookabaugh, D. Sicker, David Keaton, Wangmei Guo, Indrani Vedula","doi":"10.1117/12.512635","DOIUrl":"https://doi.org/10.1117/12.512635","url":null,"abstract":"Selective encryption exploits the relationship between encryption and compression to reduce encryption requirements, saving in complexity and facilitating new system functionality. Selective encryption of MPEG video streams has been proposed in a number of variations, yet has seen little application to date. Here we focus on high encryption savings, targeting 10% of the bit stream or less encrypted, moderate security in the sense that the content is degraded to the point that purchase would be preferred over consuming free content, no impact on compression efficiency, and a cryptanalytic approach to validating security. We find that adequate security is plausible if the compressor is cooperative or at least neutral with respect to the selective encryption system, but implausible if the compressor is operated antagonistically. The unusually low encryption targeted makes application of this solution appealing.","PeriodicalId":282161,"journal":{"name":"SPIE ITCom","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123732488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信