首页 > 最新文献

2006 International Conference on Intelligent Information Hiding and Multimedia最新文献

英文 中文
Audio Watermark Enhanced by LDPC Coding for Air Transmission 基于LDPC编码的无线传输音频水印增强算法
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.61
Yôiti Suzuki, R. Nishimura, Hao Tao
A decrease in the watermark detection rate is a fatal problem in employing audio watermarks for applications in which a watermarked signal is transmitted through the air. The enforcement of watermarks using an error-correcting code is a solution to this problem. Low-density Parity Check (LDPC) coding is a recent error-correcting code; it shows good performance close to Shannon¿s limit. Therefore, in the present study, watermark detection rates when the watermarks were coded combined with and without LDPC coding were evaluated through computer simulations and experiments in a real room. The results showed that employing LDPC coding raised the watermark detection rate by around 15 percentage points for an additive white Gaussian noise and by around 20 points from around 60% to around 80% in an actual reverberation environment.
水印检测率的降低是音频水印在空气中传输的一个致命问题。使用纠错码强制执行水印是解决这个问题的一种方法。低密度奇偶校验(LDPC)编码是一种新兴的纠错编码;在接近香农极限时表现出良好的性能。因此,在本研究中,通过计算机模拟和真实室内实验,对水印合并LDPC编码和不合并LDPC编码时的水印检测率进行了评估。结果表明,对于加性高斯白噪声,采用LDPC编码将水印检测率提高了约15个百分点,在实际混响环境中,水印检测率从60%左右提高到80%左右,提高了约20个百分点。
{"title":"Audio Watermark Enhanced by LDPC Coding for Air Transmission","authors":"Yôiti Suzuki, R. Nishimura, Hao Tao","doi":"10.1109/IIH-MSP.2006.61","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.61","url":null,"abstract":"A decrease in the watermark detection rate is a fatal problem in employing audio watermarks for applications in which a watermarked signal is transmitted through the air. The enforcement of watermarks using an error-correcting code is a solution to this problem. Low-density Parity Check (LDPC) coding is a recent error-correcting code; it shows good performance close to Shannon¿s limit. Therefore, in the present study, watermark detection rates when the watermarks were coded combined with and without LDPC coding were evaluated through computer simulations and experiments in a real room. The results showed that employing LDPC coding raised the watermark detection rate by around 15 percentage points for an additive white Gaussian noise and by around 20 points from around 60% to around 80% in an actual reverberation environment.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115942305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
H.264/AVC Video Encoder Implementation Based on TI TMS320DM642 基于TI TMS320DM642的H.264/AVC视频编码器实现
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.108
Hongjun Wang, Yong-Jian Huang, Hua Li
Compared with the previous standards, the coding efficiency and coding performance of H.264/AVC are improved at the cost of higher computational complexity. It is a big challenge for us to develop the embedded real-time H.264/AVC video encoder with the limited on-chip memory space. This paper introduces the method to develop and optimize the H.264/AVC "baseline' encoder on the TMS320DM642 DSP hardware platform. The emphasis is put on the optimization methods of memory space allocation, the strategy of data transfer and pixel interpolation in motion compensation. Hereinto, ping-pong buffering technique was used to optimize the input interface of H.264/AVC encoder and the bi-linear interpolation method was used to replace the 6-tap filter which has been adopted in the "x264" source program. Experiments show that the coding performance of the optimized encoder is improved effectively with a little loss in PSNR and video sequences with QCIF resolution can be encoded in real time.
与以前的编码标准相比,H.264/AVC的编码效率和编码性能得到了提高,但代价是计算量的增加。在有限的片上存储空间下,如何开发嵌入式实时H.264/AVC视频编码器是一个很大的挑战。介绍了在TMS320DM642 DSP硬件平台上开发和优化H.264/AVC“基线”编码器的方法。重点讨论了运动补偿中存储空间分配的优化方法、数据传输策略和像素插值。其中,采用乒乓缓冲技术优化H.264/AVC编码器的输入接口,采用双线性插值法替代“x264”源程序中采用的6分接滤波器。实验表明,优化后的编码器编码性能得到了有效提高,PSNR损失很小,能够实现QCIF分辨率视频序列的实时编码。
{"title":"H.264/AVC Video Encoder Implementation Based on TI TMS320DM642","authors":"Hongjun Wang, Yong-Jian Huang, Hua Li","doi":"10.1109/IIH-MSP.2006.108","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.108","url":null,"abstract":"Compared with the previous standards, the coding efficiency and coding performance of H.264/AVC are improved at the cost of higher computational complexity. It is a big challenge for us to develop the embedded real-time H.264/AVC video encoder with the limited on-chip memory space. This paper introduces the method to develop and optimize the H.264/AVC \"baseline' encoder on the TMS320DM642 DSP hardware platform. The emphasis is put on the optimization methods of memory space allocation, the strategy of data transfer and pixel interpolation in motion compensation. Hereinto, ping-pong buffering technique was used to optimize the input interface of H.264/AVC encoder and the bi-linear interpolation method was used to replace the 6-tap filter which has been adopted in the \"x264\" source program. Experiments show that the coding performance of the optimized encoder is improved effectively with a little loss in PSNR and video sequences with QCIF resolution can be encoded in real time.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116180128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Abnormal Event Detection in Video Using N-cut Clustering 基于N-cut聚类的视频异常事件检测
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.44
Chun-Ku Lee, Meng-Fen Ho, Wu-Sheng Wen, Chung-Lin Huang
This paper introduces an unusual event detection scheme in various video scenes. The proposed method finds out the video clips that are most different from the others based on the similarity measure. Each video clip is represented by the motion magnitude and direction histograms and color histogram. Without searching key-frames, we calculate the similarity matrix by using chi^2 difference or chamfer difference as the similarity measure of features in different clips. Finally, we apply n-cut clustering. Clusters with low self-similarity value are reported as unusual events.
本文介绍了一种针对各种视频场景的异常事件检测方案。该方法基于相似性度量找出与其他视频片段差异最大的视频片段。每个视频片段由运动幅度和方向直方图以及颜色直方图表示。在不搜索关键帧的情况下,我们使用chi^2差或倒角差作为不同片段中特征的相似性度量来计算相似矩阵。最后,我们应用n-cut聚类。自相似值低的聚类被报告为异常事件。
{"title":"Abnormal Event Detection in Video Using N-cut Clustering","authors":"Chun-Ku Lee, Meng-Fen Ho, Wu-Sheng Wen, Chung-Lin Huang","doi":"10.1109/IIH-MSP.2006.44","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.44","url":null,"abstract":"This paper introduces an unusual event detection scheme in various video scenes. The proposed method finds out the video clips that are most different from the others based on the similarity measure. Each video clip is represented by the motion magnitude and direction histograms and color histogram. Without searching key-frames, we calculate the similarity matrix by using chi^2 difference or chamfer difference as the similarity measure of features in different clips. Finally, we apply n-cut clustering. Clusters with low self-similarity value are reported as unusual events.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123589567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Delay Constrained Fuzzy Rate Control for Video Streaming over DVB-H DVB-H视频流的延迟约束模糊速率控制
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.79
M. Rezaei, M. Gabbouj, Imed Bouazizi
A novel fuzzy video rate control algorithm (RCA) with delay and quality constraints is proposed for video streaming over DVB-H (Digital Video Broadcasting for Handheld terminals) application. In this application a variable bit rate (VBR) bit stream is used to improve the quality and compression performance of encoded video at the expense of buffering delay while there is a holdup as channel changing delay. DVB-H uses a time-sliced transmission scheme to reduce the power consumption for the receiver. The time-slice scheme amplifies the channel changing delay. Two main factors in channel changing delay are the time until a media decoder is refreshed by a random access point such as an IDR (Instantaneous Decoder Refresh) picture in H.264/AVC and the delay to compensate the variation in bit rate. The average decoder refresh delay can decrease by frequent IDR pictures in the bit stream while it drops the quality and compression efficiency remarkably. On the other hand, a VBR video provides higher quality at the expense of higher buffering delay. Hence force, there is a multilateral contradiction between the quality and delay in this application. The proposed RCA has been optimized to provide high quality VBR video with minimum channel changing delay. Simulation results on H.264/AVC video coding standard show that encoded bit streams by proposed RCA strictly obey the delay and quality constraints.
针对DVB-H(手持终端数字视频广播)视频流,提出了一种具有延迟和质量约束的模糊视频速率控制算法(RCA)。在此应用中,可变比特率(VBR)比特流用于提高编码视频的质量和压缩性能,但代价是缓冲延迟,同时存在信道转换延迟。DVB-H采用分时传输方案来降低接收机的功耗。时间片方案放大了信道变化延迟。信道改变延迟的两个主要因素是媒体解码器被H.264/AVC中的随机接入点(如IDR(瞬时解码器刷新)图像)刷新之前的时间,以及补偿比特率变化的延迟。码流中频繁出现IDR图像可以降低解码器的平均刷新延迟,但会显著降低码流的质量和压缩效率。另一方面,VBR视频以更高的缓冲延迟为代价提供更高的质量。因此,在此应用程序中存在质量与延迟之间的多边矛盾。所提出的RCA已被优化,以提供高质量的VBR视频与最小的信道转换延迟。在H.264/AVC视频编码标准上的仿真结果表明,所提出的RCA编码码流严格遵守时延和质量约束。
{"title":"Delay Constrained Fuzzy Rate Control for Video Streaming over DVB-H","authors":"M. Rezaei, M. Gabbouj, Imed Bouazizi","doi":"10.1109/IIH-MSP.2006.79","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.79","url":null,"abstract":"A novel fuzzy video rate control algorithm (RCA) with delay and quality constraints is proposed for video streaming over DVB-H (Digital Video Broadcasting for Handheld terminals) application. In this application a variable bit rate (VBR) bit stream is used to improve the quality and compression performance of encoded video at the expense of buffering delay while there is a holdup as channel changing delay. DVB-H uses a time-sliced transmission scheme to reduce the power consumption for the receiver. The time-slice scheme amplifies the channel changing delay. Two main factors in channel changing delay are the time until a media decoder is refreshed by a random access point such as an IDR (Instantaneous Decoder Refresh) picture in H.264/AVC and the delay to compensate the variation in bit rate. The average decoder refresh delay can decrease by frequent IDR pictures in the bit stream while it drops the quality and compression efficiency remarkably. On the other hand, a VBR video provides higher quality at the expense of higher buffering delay. Hence force, there is a multilateral contradiction between the quality and delay in this application. The proposed RCA has been optimized to provide high quality VBR video with minimum channel changing delay. Simulation results on H.264/AVC video coding standard show that encoded bit streams by proposed RCA strictly obey the delay and quality constraints.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125206784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A New Image Steganography for Internet Communications Based on Chaotic Sequences 一种新的基于混沌序列的互联网通信图像隐写技术
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.20
Niansheng Liu, Donghui Guo, G. Parr
In this paper we propose a new image steganography to meet an increasing demand for effective and cheap digital security scheme for the Internet. This technique is based on chaotic sequences in the discrete wavelet transform domain of covert images. Multiple sensitive images are added to a covert image as a white noise-like form. The results of theoretical analysis and computer simulation show the new hiding technique has improved properties with high security, imperceptibility and capacity for hidden information in comparison with LSB. Such properties can be exploited in the quest for secure communications and document exchange over the Internet.
本文提出了一种新的图像隐写技术,以满足日益增长的对高效、廉价的互联网数字安全方案的需求。该技术基于隐蔽图像的离散小波变换域中的混沌序列。将多个敏感图像以类似白噪声的形式添加到隐蔽图像中。理论分析和计算机仿真结果表明,与LSB相比,该隐藏技术具有较高的安全性、隐蔽性和隐藏信息的能力。这些属性可以用于在Internet上寻求安全通信和文档交换。
{"title":"A New Image Steganography for Internet Communications Based on Chaotic Sequences","authors":"Niansheng Liu, Donghui Guo, G. Parr","doi":"10.1109/IIH-MSP.2006.20","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.20","url":null,"abstract":"In this paper we propose a new image steganography to meet an increasing demand for effective and cheap digital security scheme for the Internet. This technique is based on chaotic sequences in the discrete wavelet transform domain of covert images. Multiple sensitive images are added to a covert image as a white noise-like form. The results of theoretical analysis and computer simulation show the new hiding technique has improved properties with high security, imperceptibility and capacity for hidden information in comparison with LSB. Such properties can be exploited in the quest for secure communications and document exchange over the Internet.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128790220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multiscale Gradient Vector Field with Application to Image Denoising and Enhancement 多尺度梯度向量场及其在图像去噪和增强中的应用
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.136
Jinye Peng, Wanhai Yang, Yichun Wang
Image denoising and enhancement is one of the most important tasks in image processing. Self-snake model is a most basic and important image denoising method based on PDE (Partial Differential Equation), in which the stop function is very important and is usually related to the gradient of the image. But it¿s difficult to choose the smoothness scale as we usually do in acquiring the gradients of the approximating image by smoothening it with a single scale. So we proposed a multiscale gradient vector which integrate the different scale gradient vector from coarse image to fine according to our some defined rulers instead of single-scaled gradient vector of images to improve the performance of self-snake model. The efficiency of our proposal was proved by experimental results.
图像去噪与增强是图像处理中的重要任务之一。自蛇模型是基于偏微分方程(PDE)的一种最基本、最重要的图像去噪方法,其中停止函数非常重要,通常与图像的梯度有关。但是我们通常用单一的尺度来获取近似图像的梯度时,很难选择平滑尺度。因此,为了提高自蛇模型的性能,我们提出了一种多尺度梯度向量,该梯度向量是根据我们定义的一些标尺将图像从粗到细的不同尺度梯度向量集成在一起的。实验结果证明了该方法的有效性。
{"title":"Multiscale Gradient Vector Field with Application to Image Denoising and Enhancement","authors":"Jinye Peng, Wanhai Yang, Yichun Wang","doi":"10.1109/IIH-MSP.2006.136","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.136","url":null,"abstract":"Image denoising and enhancement is one of the most important tasks in image processing. Self-snake model is a most basic and important image denoising method based on PDE (Partial Differential Equation), in which the stop function is very important and is usually related to the gradient of the image. But it¿s difficult to choose the smoothness scale as we usually do in acquiring the gradients of the approximating image by smoothening it with a single scale. So we proposed a multiscale gradient vector which integrate the different scale gradient vector from coarse image to fine according to our some defined rulers instead of single-scaled gradient vector of images to improve the performance of self-snake model. The efficiency of our proposal was proved by experimental results.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116804787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Human Motion Recognition Using Clay Representation of Trajectories 利用轨迹的粘土表示进行人体运动识别
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.110
Yu-Chun Lai, H. Liao
In this paper, we propose a novel human motion recognition approach that incorporates two fundamental concepts. First, the Shape Context and a clustering method are used to extract moving articulated parts from a video sequence. Then, we represent the moving articulated parts by trajectories. Our trajectory extraction approach provides good tolerance under various background and lighting conditions. Significantly, landmark point selection is not necessary in our approach, since trajectory generation is based on the extraction of moving articulated parts. The second concept is that the extracted trajectories are seen as forces pushing the articulated parts. Those forces are applied to a clay-like deformed material, which is used to represent the trajectories¿ behavior. The experiment results show that the proposed approach is robust against noise and incorrectly extracted trajectories, such as redundant and missing trajectories.
在本文中,我们提出了一种新的人体运动识别方法,该方法结合了两个基本概念。首先,使用形状上下文和聚类方法从视频序列中提取运动铰接部件。然后,我们用轨迹来表示运动的铰接部件。我们的轨迹提取方法在各种背景和光照条件下都具有良好的容忍度。值得注意的是,在我们的方法中不需要选择地标点,因为轨迹生成是基于提取运动的铰接部件。第二个概念是,提取的轨迹被视为推动铰接部件的力。这些力被施加到一种粘土状的变形材料上,这种材料被用来表示轨迹的行为。实验结果表明,该方法对噪声和错误提取的轨迹(如冗余轨迹和缺失轨迹)具有较强的鲁棒性。
{"title":"Human Motion Recognition Using Clay Representation of Trajectories","authors":"Yu-Chun Lai, H. Liao","doi":"10.1109/IIH-MSP.2006.110","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.110","url":null,"abstract":"In this paper, we propose a novel human motion recognition approach that incorporates two fundamental concepts. First, the Shape Context and a clustering method are used to extract moving articulated parts from a video sequence. Then, we represent the moving articulated parts by trajectories. Our trajectory extraction approach provides good tolerance under various background and lighting conditions. Significantly, landmark point selection is not necessary in our approach, since trajectory generation is based on the extraction of moving articulated parts. The second concept is that the extracted trajectories are seen as forces pushing the articulated parts. Those forces are applied to a clay-like deformed material, which is used to represent the trajectories¿ behavior. The experiment results show that the proposed approach is robust against noise and incorrectly extracted trajectories, such as redundant and missing trajectories.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117103341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Reversible Data Hiding for 3D Point Cloud Model 三维点云模型的可逆数据隐藏
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.155
Hao Luo, Jeng-Shyang Pan, Zhe-ming Lu, Hsiang-Cheh Huang
This paper proposes a reversible data hiding scheme for 3D point cloud model. It exploits the high correlation among neighbor vertices to embed data. It starts with creating a set of 8-neighbor vertices clusters with randomly selected seed vertices. Then an 8-point integer DCT is performed on these clusters and an efficient highest frequency coefficient modification technique is employed to modulate the watermark bit. In data extraction, the modified clusters are retrieved first, and other operations are the inverse process of the data hiding. The original model can be perfectly recovered if it is intact. Our scheme is suitable for some specific applications where content accuracy of the original model must be guaranteed. Moreover, the method can be used for 3D point cloud model authentication, e.g., hiding a hash sequence.
提出了一种三维点云模型的可逆数据隐藏方案。它利用相邻顶点之间的高度相关性来嵌入数据。它首先创建一组随机选择种子顶点的8个相邻顶点簇。然后对这些簇进行8点整数DCT,并采用高效的最高频率系数修改技术对水印位进行调制。在数据提取中,首先检索修改后的聚类,其他操作是与数据隐藏相反的过程。如果原始模型完好无损,可以完全复原。我们的方案适用于一些需要保证原始模型内容准确性的特定应用。此外,该方法可用于三维点云模型认证,例如隐藏哈希序列。
{"title":"Reversible Data Hiding for 3D Point Cloud Model","authors":"Hao Luo, Jeng-Shyang Pan, Zhe-ming Lu, Hsiang-Cheh Huang","doi":"10.1109/IIH-MSP.2006.155","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.155","url":null,"abstract":"This paper proposes a reversible data hiding scheme for 3D point cloud model. It exploits the high correlation among neighbor vertices to embed data. It starts with creating a set of 8-neighbor vertices clusters with randomly selected seed vertices. Then an 8-point integer DCT is performed on these clusters and an efficient highest frequency coefficient modification technique is employed to modulate the watermark bit. In data extraction, the modified clusters are retrieved first, and other operations are the inverse process of the data hiding. The original model can be perfectly recovered if it is intact. Our scheme is suitable for some specific applications where content accuracy of the original model must be guaranteed. Moreover, the method can be used for 3D point cloud model authentication, e.g., hiding a hash sequence.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116902147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Multiple Description Coding of an Audio Stream by Optimum Recovery Transform 基于最优恢复变换的音频流多描述编码
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.134
A. Ito, S. Makino
In this paper, we discuss the mathematical fundamentals of splitting one audio stream into two equal-quality streams. From a trivial consideration, it is found that the sum of errors of two recovered signals is equal to the power of the original signal if the orthogonal recovery is carried out. Next, we describe the optimum recovery transform. This method utilizes the covariance matrix of the signal. We carried out some experiments to recover a signal from one of the split signals. From the results of four kinds of split methods used, the correlating transform of the spectrum gave the best performance.
在本文中,我们讨论了将一个音频流分割成两个同等质量的流的数学基础。从一个微不足道的考虑出发,发现如果进行正交恢复,两个恢复信号的误差和等于原始信号的功率。其次,我们描述了最优恢复变换。该方法利用信号的协方差矩阵。我们进行了一些实验,从其中一个分裂信号中恢复一个信号。从四种分割方法的结果来看,光谱的相关变换效果最好。
{"title":"Multiple Description Coding of an Audio Stream by Optimum Recovery Transform","authors":"A. Ito, S. Makino","doi":"10.1109/IIH-MSP.2006.134","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.134","url":null,"abstract":"In this paper, we discuss the mathematical fundamentals of splitting one audio stream into two equal-quality streams. From a trivial consideration, it is found that the sum of errors of two recovered signals is equal to the power of the original signal if the orthogonal recovery is carried out. Next, we describe the optimum recovery transform. This method utilizes the covariance matrix of the signal. We carried out some experiments to recover a signal from one of the split signals. From the results of four kinds of split methods used, the correlating transform of the spectrum gave the best performance.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124484119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Channel Capacity Analysis of Spread Spectrum Audio Watermarking for Noisy Environments 噪声环境下扩频音频水印的信道容量分析
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.70
Saeed Sedghi, M. Khademi, N. Cvejic
In this paper channel capacity analysis of spread spectrum audio watermarking (SSW) system for transmission of hidden information through a noisy environment is performed. Channel capacity analysis of algorithm enables us to determine the most reliable transmission rate of hidden information by the watermarking system, i.e. the analysis makes a relation between capacity and robustness as two conflicting features of watermarking algorithms. Examining transmission and detection of hidden information shows that SSW behaves like a binary symmetric channel. It is proved that well known Shannon channel capacity formula for calculating channel capacity is not applicable for SSW system. Instead, analysis of channel capacity for additive color noise channels should be used. Obtaining channel capacity for SSW system using pseudo-noise random sequences with different period, different power of additive white Gaussian noise channel and different power of host signal is performed in simulation results.
本文对扩频音频水印系统在噪声环境下传输隐藏信息的信道容量进行了分析。算法的信道容量分析使我们能够确定水印系统对隐藏信息最可靠的传输速率,即分析了容量和鲁棒性作为水印算法两个相互冲突的特征之间的关系。对传输和隐藏信息的检测表明,SSW的行为类似于二进制对称信道。证明了计算信道容量的香农信道容量公式不适用于SSW系统。相反,应该对加性色噪声信道的信道容量进行分析。仿真结果表明,采用不同周期、不同加性高斯白噪声信道功率和不同主信号功率的伪噪声随机序列,获得了SSW系统的信道容量。
{"title":"Channel Capacity Analysis of Spread Spectrum Audio Watermarking for Noisy Environments","authors":"Saeed Sedghi, M. Khademi, N. Cvejic","doi":"10.1109/IIH-MSP.2006.70","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.70","url":null,"abstract":"In this paper channel capacity analysis of spread spectrum audio watermarking (SSW) system for transmission of hidden information through a noisy environment is performed. Channel capacity analysis of algorithm enables us to determine the most reliable transmission rate of hidden information by the watermarking system, i.e. the analysis makes a relation between capacity and robustness as two conflicting features of watermarking algorithms. Examining transmission and detection of hidden information shows that SSW behaves like a binary symmetric channel. It is proved that well known Shannon channel capacity formula for calculating channel capacity is not applicable for SSW system. Instead, analysis of channel capacity for additive color noise channels should be used. Obtaining channel capacity for SSW system using pseudo-noise random sequences with different period, different power of additive white Gaussian noise channel and different power of host signal is performed in simulation results.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129475927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2006 International Conference on Intelligent Information Hiding and Multimedia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1