{"title":"Video personalization and summarization system","authors":"Belle L. Tseng, Ching-Yung Lin, John R. Smith","doi":"10.1109/MMSP.2002.1203336","DOIUrl":"https://doi.org/10.1109/MMSP.2002.1203336","url":null,"abstract":"A video personalization and summarization system is designed and implemented to dynamically generate a personalized video summary. The personalization system adopts the three-tier server-middleware-client architecture in order to select, adapt, and deliver rich media content to the user. The server stores the content sources along with their corresponding MPEG-7 metadata descriptions. These semantic metadata are provided through the use of our VideoAnnEx MPEG-7 video annotation tool. When the user initiates a request for content, the client communicates the user request and usage environment descriptions to the middleware. The middleware is powered by the personalization engine and the content adaptation engine. Our personalization engine includes the VideoSue summarization on usage environment engine that selects the optimal set of desired contents according to user preferences. Afterwards, the adaptation engine performs the required transformations and compositions of the selected contents for the specific usage environment using our VideoEd editing and composition tool. Finally, a personalization and summarization system is demonstrated on the IBM Websphere Portal Server for PCs and pervasive devices.","PeriodicalId":398813,"journal":{"name":"2002 IEEE Workshop on Multimedia Signal Processing.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123884793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Programmable Web environment for multimedia applications","authors":"Jagannadha R. Jakilinki, B. Prabhakaran","doi":"10.1109/MMSP.2002.1203338","DOIUrl":"https://doi.org/10.1109/MMSP.2002.1203338","url":null,"abstract":"We propose an extensible markup language (XML) based framework, which facilitates easy application management, better application performance and load balancing among the participating servers.","PeriodicalId":398813,"journal":{"name":"2002 IEEE Workshop on Multimedia Signal Processing.","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114297171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Channel-adaptive video streaming using packet path diversity and rate-distortion optimized reference picture selection","authors":"Yi J. Liang, Eric Setton, B. Girod","doi":"10.1109/MMSP.2002.1203335","DOIUrl":"https://doi.org/10.1109/MMSP.2002.1203335","url":null,"abstract":"In this paper, we present error-resilient Internet video transmission using path diversity and rate-distortion optimized reference picture selection. Under this scheme, the optimal packet dependency is determined adapting to channel characteristics and video content, to achieve a better trade-off between coding efficiency and forming independent streams to increase error resilience. Packets are sent over the selected path that minimizes the distortion, while taking advantage of path diversity. Experiments demonstrate that the proposed scheme provides significant gains over video redundancy coding and the NACK mode of conventional reference picture selection.","PeriodicalId":398813,"journal":{"name":"2002 IEEE Workshop on Multimedia Signal Processing.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115179773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"3D rigid structure from video: what are \"easy\" shapes and \"good\" motions?","authors":"Mário Q. Aguiar, José M. F. Moura","doi":"10.1109/MMSP.2002.1203257","DOIUrl":"https://doi.org/10.1109/MMSP.2002.1203257","url":null,"abstract":"Factorization algorithms are increasingly popular to recover 3D rigid structure from video. In this paper, we analyze the rank 1 factorization algorithm to determine what are the most suitable 3D shapes or the best 3D motions to recover the 3D structure from the 2D trajectories of the features. We show that the shape is best retrieved from orthogonal views aligned with the longest and smallest axes of inertia of the object.","PeriodicalId":398813,"journal":{"name":"2002 IEEE Workshop on Multimedia Signal Processing.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122725914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Delay-optimal rate allocation in multiaccess communications: a cross-layer view","authors":"E. Yeh","doi":"10.1109/MMSP.2002.1203331","DOIUrl":"https://doi.org/10.1109/MMSP.2002.1203331","url":null,"abstract":"The literature on multiaccess communications has traditionally treated \"network-layer\" issues such as source burstiness, network delay, and buffer overflow, apart from \"physical-layer\" issues such as channel modeling, coding, and detection. The recent work of Telatar and Gallager [I. E. Telatar and R. Gallager, Combining Queueing Theory with Information Theory for Multiaccess, August 1995] [I.E. Telatar, Multiple Access Information Theory and Job Scheduling, 1995] have sought to bridge this unfortunate division. We extend this line of inquiry by examining a multiaccess communication scenario where users' packets arrive randomly into separate queues and transmission rates are allocated from the information-theoretic multiaccess capacity region based on the respective users' queue states. In the symmetric case, a longer-queue-higher rate (LQHR) allocation strategy is shown to minimize the average system delay of packets. Such a policy can be interpreted in the coding context as adaptive successive decoding. The delay performance of the LQHR policy provides a fundamental lower bound to the performance for multiaccess coding schemes which seek to meet any given level of decoding error probability.","PeriodicalId":398813,"journal":{"name":"2002 IEEE Workshop on Multimedia Signal Processing.","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131920603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algorithm for summarization and key extraction in athletic video","authors":"G. Caccia, R. Lancini, S. Russo","doi":"10.1109/MMSP.2002.1203288","DOIUrl":"https://doi.org/10.1109/MMSP.2002.1203288","url":null,"abstract":"In this paper, we present an effective framework for features extraction from an athletic sport sequence. The extracted features are the start and finish of the race and the type of competition. Our approach is based on camera movement detection and it process MPEG-2 video sequences.","PeriodicalId":398813,"journal":{"name":"2002 IEEE Workshop on Multimedia Signal Processing.","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115729285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-stream video transport over MPLS networks","authors":"H. Man, Y. Li","doi":"10.1109/MMSP.2002.1203326","DOIUrl":"https://doi.org/10.1109/MMSP.2002.1203326","url":null,"abstract":"This paper presents a study on traffic management for transporting progressive video streams over multiprotocol label switching (MPLS) networks. Based on the variety of MPLS service models, a unique multi-stream video transport scheme is proposed. A 3-D subband video coder is used in generating the source data traffic. A special feature of this video coder is that the coded bit stream can be easily segmented into sub-streams with different quality of service (QoS) requirements. After source coding and segmentation, multiple streams are formed. Upon their entering into the network, they are labeled with different forwarding equivalence classes (FECs). Specific label switch paths (LSPs) are selected by the MPLS protocols to achieve the desired quality levels. The proposed scheme is studied under the metrics such as the end-to-end video delivery quality, the bandwidth consumption and the pricing of the service. Extensive simulations have been conducted in this study, and some of the results are presented in this paper.","PeriodicalId":398813,"journal":{"name":"2002 IEEE Workshop on Multimedia Signal Processing.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114510824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Embedded signature-based authentication by channel statistics using watermarking techniques","authors":"Zhi-Fang Yang, Wen-Hsiang Tsai","doi":"10.1109/MMSP.2002.1203312","DOIUrl":"https://doi.org/10.1109/MMSP.2002.1203312","url":null,"abstract":"This study examines the feasibility of using statistics to perform embedded signature-based authentication. Doing so is an attempt to view a reference watermark embedded with signature as side information. The reference watermark is extracted to determine channel statistics, based on the Bayes theorem, and used to extract the embedded signature. The reliability of the extracted signature and the uncertainty of the channel status are also measured. Experimental results demonstrate that the reliability and uncertainty measures based on channel statistics are meaningful, and that the embedded signature can survive high-quality JPEG compression and manipulation such as negation.","PeriodicalId":398813,"journal":{"name":"2002 IEEE Workshop on Multimedia Signal Processing.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117102971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and development of 3D cooperation tool","authors":"Xiufen Fu, Ning Luo, Yansheng Lu, Yong Tang","doi":"10.1109/MMSP.2002.1203340","DOIUrl":"https://doi.org/10.1109/MMSP.2002.1203340","url":null,"abstract":"Distance cooperation on a network is always an important application field since long ago. Based on the research of network communication, WWW application, CAD, and 3D scene graph, this article focuses on the feathers and directions of distance cooperation in new circumstances of Internet and WWW, and constructed a 3D interactive tool which works on WWW. It combined traditional distance cooperation, CAD and virtual reality together on WWW, thus bring about a new method of distance cooperation.","PeriodicalId":398813,"journal":{"name":"2002 IEEE Workshop on Multimedia Signal Processing.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116220795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new hybrid error concealment scheme for MPEG-2 video transmission","authors":"Li-Wei Kang, Jin-Jang Leou","doi":"10.1109/MMSP.2002.1203240","DOIUrl":"https://doi.org/10.1109/MMSP.2002.1203240","url":null,"abstract":"For entropy-coded MPEG-2 video frames, a transmission error will not only affect the underlying codeword but also may affect subsequent codewords, resulting in a great degradation of the received video frames. In this study, transmission errors in MPEG-2 video frames are first detected and located by the error detection scheme proposed by Shyu and Leou [1999], and then the corrupted blocks are concealed by the proposed hybrid error concealment scheme. Based on the condition of a corrupted block, a corrupted block in an intracoded I frame is concealed by either the spatial error concealment algorithm in H.26L test model long-term number 9 (TML-9) or the best neighborhood matching (BNM) algorithm followed by the proposed modified spatial anisotropic diffusion (SD) algorithm. A corrupted block in an inter-coded P or B frame is concealed by the proposed motion-compensated BNM algorithm. Based on the simulation results obtained in this study, the proposed scheme can recover high-quality MPEG-2 video frames from the corresponding corrupted video frames up to a bit error rate of 0.5%.","PeriodicalId":398813,"journal":{"name":"2002 IEEE Workshop on Multimedia Signal Processing.","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124657321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}