{"title":"An objective comparison between spatial and DCT watermarking schemes for MPEG video","authors":"Y. Guan, Ling Jin","doi":"10.1109/ITCC.2001.918792","DOIUrl":"https://doi.org/10.1109/ITCC.2001.918792","url":null,"abstract":"Digital watermarking is an important emerging technique for intellectual property rights protection. We classify spread-spectrum watermarking techniques for MPEG video into two generic classes, namely spatial watermarking and DCT (discrete cosine transform) watermarking schemes, and evaluate their robustness and visual quality quantitatively and comparatively. Blind watermark detection and some watermark attacks are considered. For the two test video files considered in this study, it is observed that spatial watermarking may be preferred to DCT watermarking, as the latter tends to be less robust when both schemes are compared at the same visual quality level for the watermarked video.","PeriodicalId":318295,"journal":{"name":"Proceedings International Conference on Information Technology: Coding and Computing","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129914863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An overview of security issues in streaming video","authors":"E. Lin, G. W. Cook, E. Delp, P. Salama","doi":"10.1109/ITCC.2001.918819","DOIUrl":"https://doi.org/10.1109/ITCC.2001.918819","url":null,"abstract":"The article describes some of the security issues in streaming video over the Internet. If high quality video sequences are to be delivered to computers and digital television systems over the Internet in our \"digital future\", this material must be protected.","PeriodicalId":318295,"journal":{"name":"Proceedings International Conference on Information Technology: Coding and Computing","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130139438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LIPT: a lossless text transform to improve compression","authors":"F. Awan, A. Mukherjee","doi":"10.1109/ITCC.2001.918838","DOIUrl":"https://doi.org/10.1109/ITCC.2001.918838","url":null,"abstract":"We propose an approach to develop a dictionary based reversible lossless text transformation, called LIFT (length index preserving transform), which can be applied to a source text to improve the existing algorithm's ability to compress. In LIFT, the length of the input word and the offset of the words in the dictionary are denoted with alphabets. Our encoding scheme makes use of the recurrence of same length words in the English language to create context in the transformed text that the entropy coders can exploit. LIFT also achieves some compression at the preprocessing stage and retains enough context and redundancy for the compression algorithms to give better results. Bzip2 with LIFT gives 5.24% improvement in average BPC over Bzip2 without LIPT, and PPMD with LIPT gives 4.46% improvement in average BPC over PPMD without LIFT, for our test corpus.","PeriodicalId":318295,"journal":{"name":"Proceedings International Conference on Information Technology: Coding and Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123402968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic quality of service mapping framework for relative service differentiation-aware media streaming","authors":"Jitae Shin, JongWon Kim, D. Lee, C.-C. Jay Kuo","doi":"10.1109/ITCC.2001.918760","DOIUrl":"https://doi.org/10.1109/ITCC.2001.918760","url":null,"abstract":"We investigate the source domain's scheme of dynamically and intelligently pre-marking the streaming media packets before entering a DS-domain providing a relative differentiated service. The pre-marking scheme takes into account the packet content, the price limit for the transport of streaming media, and the traffic conditioning agreement. In this scheme, the sender cooperates with what we call media gateway (MG), which is a special node on the boundaries of the DS-domain. MG is responsible for meeting the traffic conditioning agreement while fully utilizing the received differentiated services for the quality of the streaming media. Our proposed QoS control scheme includes the following components: 1) the relative priority based indexing and categorization of streaming video content at the sender and 2) the dynamic feedforward QoS mapping of categorized index to DS grade at the proposed MG. With the proposed scheme, enhanced quality of streaming media applications is demonstrated.","PeriodicalId":318295,"journal":{"name":"Proceedings International Conference on Information Technology: Coding and Computing","volume":"16 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132988480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Geometric compression for fast transmission","authors":"L. Gewali, C. Sun","doi":"10.1109/ITCC.2001.918840","DOIUrl":"https://doi.org/10.1109/ITCC.2001.918840","url":null,"abstract":"A compact representation of a two dimensional mesh can significantly reduce transmission of mesh data over the Internet. Compact representation of the mesh is also desirable for saving storage space. The compressibility of a mesh can be elegantly captured in term of Hamiltonian graphs. In this paper we present an algorithm to partition a convex polygon into a triangular mesh that admits Hamiltonian paths.","PeriodicalId":318295,"journal":{"name":"Proceedings International Conference on Information Technology: Coding and Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132020526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emerging issues on multimedia distribution","authors":"N. Ansari","doi":"10.1109/ITCC.2001.918818","DOIUrl":"https://doi.org/10.1109/ITCC.2001.918818","url":null,"abstract":"This session has assembled expertise from both the industry and academia, addressing various interesting issues related to multimedia distribution. Two nicely written and well-covered overviews provide good pointers to readers on security and object-based encoding issues in streaming videos. A. Vetro and H. Sun provide a comprehensive overview of MPEG-4 object-based encoding algorithms which are readily being incorporated in emerging video products and systems. Security, the utmost concern for secured distribution and communications, has been nicely reviewed by E.J. Delp and his colleague. This session also includes two practical applications. S. Wilson and C.H. Chu develop a video system with GPS capability for environmental monitoring. F. Davoli and his colleagues at DIST-University of Genoa, Italy and CNIT, Italian National Telecommunications Consortium, present their LABNET Project, which will enable enhanced multimedia remote device control such as conducting on-line real-time experiments. Finally, H. Liu, N. Ansari and Y.Q. Shi present on-line dynamic bandwidth algorithms that are effective in reducing CLR and improving resource utilization.","PeriodicalId":318295,"journal":{"name":"Proceedings International Conference on Information Technology: Coding and Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124797508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High capacity audio data hiding for noisy channels","authors":"J. Chou, K. Ramchandran, Antonio Ortega","doi":"10.1109/ITCC.2001.918774","DOIUrl":"https://doi.org/10.1109/ITCC.2001.918774","url":null,"abstract":"We combine theoretical and algorithmic advances in the area of information-hiding with the current mature knowledge-base in the human audio perception system to propose a novel audio data hiding technique that significantly pushes the state-of-the-art in the field. Our work is based on a combination of advances in two disjoint fields: information hiding and human auditory masking. The field of information hiding has seen a resurgence due to advances in the understanding of fundamental bounds from information theory. By integrating this with the human perceptual system knowledge that has been successfully exploited for several years in the audio compression community, we derive a new and improved audio data hiding technique that finds application in a number of exciting scenarios like music enhancement and digital communications over analog data channels. Our preliminary results show that we can embed data at an order of magnitude higher rate than existing audio data hiding systems, while being robust to channel noise.","PeriodicalId":318295,"journal":{"name":"Proceedings International Conference on Information Technology: Coding and Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122517064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recent advances in wireless networking and communications","authors":"R. Chandramouli","doi":"10.1109/ITCC.2001.918782","DOIUrl":"https://doi.org/10.1109/ITCC.2001.918782","url":null,"abstract":"Wireless communications and networking have been receiving a lot of attention from the academic and industrial communities for the past few years. There has been a constant evolution of wireless systems over the years from the first generation to the current third generation wireless networks. Already, there is talk about the next generation networks and their goals and challenges ! Current and future generation wireless technologies will support bandwidth-hungry applications such as mobile multimedia communications for highly mobile users at high data rates. This brings-up various important issues to the forefront such as error-resilience, quality of service (QoS), resource management, security etc.","PeriodicalId":318295,"journal":{"name":"Proceedings International Conference on Information Technology: Coding and Computing","volume":"25 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120822516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Motion vector re-estimation for fractional-scale video transcoding","authors":"Lap-Pui Chau, Yongqing Liang, Yap-Peng Tan","doi":"10.1109/ITCC.2001.918793","DOIUrl":"https://doi.org/10.1109/ITCC.2001.918793","url":null,"abstract":"In video transcoding, the compressed video is often converted to a lower resolution in order to reduce the bit rate. One way to achieve this is to first decompress the compressed video, down-sample each frame, and then re-compress the down-scaled frame sequences. This method can obtain high-quality compressed video bit-streams; however, it involves motion vector estimation that is computationally complex. Recently, some transcoding techniques have been proposed to compute the motion vectors for a compressed video with lower resolution using the motion vectors directly from the original compressed video. These techniques, however, cannot be used in arbitrary-size video down-scaling, e.g for converting CIF (Common Intermediate Format) video to sub-QCIF (Quarter CIF) video or QCIF to sub-QCIF. In this paper, we propose a video transcoding method that can estimate the motion vectors for arbitrary-size down-scaled video. It can provide video quality that is comparable to full-search motion estimation but with very low computational complexity.","PeriodicalId":318295,"journal":{"name":"Proceedings International Conference on Information Technology: Coding and Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131113754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hologram watermarks for document authentications","authors":"J. Dittmann, Lucilla Croce Ferri, C. Vielhauer","doi":"10.1109/ITCC.2001.918766","DOIUrl":"https://doi.org/10.1109/ITCC.2001.918766","url":null,"abstract":"We present a new integrity watermark based on hologram techniques for document authentication. We focus on ID-Card watermarks. The main goal is to illustrate the use of computer-generated hologram coding techniques, to produce content-related data to be embedded into the personal data printed on an identification card with watermarking techniques. We call this special application of an integrity watermark technique a hologram watermark.","PeriodicalId":318295,"journal":{"name":"Proceedings International Conference on Information Technology: Coding and Computing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133385645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}