首页 > 最新文献

2006 International Conference on Intelligent Information Hiding and Multimedia最新文献

英文 中文
Progressive Image Transmission Using Significant Features and Linear Regression Prediction 基于显著特征和线性回归预测的渐进图像传输
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.146
Chinchen Chang, J. Chuang
Progressive image transmission is often used in low bandwidth communications or in limited bandwidth environments. When a user browses an image on a website, the web server first sends a low quality image to the receiver and then gradually improves the image quality by subsequent transmissions .Because the image size becomes larger and larger, it is essential to develop a flexible and efficient technique to help users quickly browse or retrieve images on a website. For this reason, using significant features along with a prediction technique for progressive image transmission is proposed in this paper. In our method, significant features of an image need to be extracted first. Next, these features, according to their priority, are sent to the receiver. For reducing the encoding cost of the transmitted data, three approaches, sampling, quantization, and linear regression prediction, are also presented.
渐进图像传输常用于低带宽通信或有限带宽环境中。当用户在网站上浏览图像时,网络服务器首先向接收者发送低质量的图像,然后通过随后的传输逐渐提高图像质量。由于图像尺寸越来越大,因此必须开发一种灵活有效的技术来帮助用户快速浏览或检索网站上的图像。为此,本文提出了利用显著特征和预测技术进行渐进图像传输。在我们的方法中,首先需要提取图像的重要特征。接下来,这些特征根据它们的优先级被发送给接收者。为了降低传输数据的编码成本,提出了采样、量化和线性回归预测三种方法。
{"title":"Progressive Image Transmission Using Significant Features and Linear Regression Prediction","authors":"Chinchen Chang, J. Chuang","doi":"10.1109/IIH-MSP.2006.146","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.146","url":null,"abstract":"Progressive image transmission is often used in low bandwidth communications or in limited bandwidth environments. When a user browses an image on a website, the web server first sends a low quality image to the receiver and then gradually improves the image quality by subsequent transmissions .Because the image size becomes larger and larger, it is essential to develop a flexible and efficient technique to help users quickly browse or retrieve images on a website. For this reason, using significant features along with a prediction technique for progressive image transmission is proposed in this paper. In our method, significant features of an image need to be extracted first. Next, these features, according to their priority, are sent to the receiver. For reducing the encoding cost of the transmitted data, three approaches, sampling, quantization, and linear regression prediction, are also presented.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121791689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Image Inspection System for Defect Detection of Multilayer Ceramic Capacitors 多层陶瓷电容器缺陷检测的图像检测系统
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.111
Chun-Chieh Tseng, Mao-Fu Lai, Por-Song Lee
In today¿s competitive passive components market, the quality and delivery time of products are the key factors to survive. The traditional quality control process is performed by human experts, which is slow and error prone. In recent years, automatic inspection becomes a mainstream and many works have been published. However, the industry still demands a faster and more accurate inspection method. In this paper, a novel image inspection algorithm to detect defects of Multilayer Ceramic Capacitor (MLCC) is proposed. A testing system is developed and integrated into a production line. In our experiment, the proposed algorithm is proved to be very effective. The inspection system speeds up the testing process 2.5 times as well as increases the yield rate considerably.
在当今竞争激烈的无源元件市场,产品的质量和交货时间是生存的关键因素。传统的质量控制过程由人工专家执行,速度慢且容易出错。近年来,自动检测已成为一种主流,并出版了许多相关著作。然而,该行业仍然需要一种更快、更准确的检测方法。提出了一种新的多层陶瓷电容器缺陷图像检测算法。开发了测试系统并将其集成到生产线中。在我们的实验中,该算法被证明是非常有效的。该检测系统将测试过程加快了2.5倍,并大大提高了成品率。
{"title":"Image Inspection System for Defect Detection of Multilayer Ceramic Capacitors","authors":"Chun-Chieh Tseng, Mao-Fu Lai, Por-Song Lee","doi":"10.1109/IIH-MSP.2006.111","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.111","url":null,"abstract":"In today¿s competitive passive components market, the quality and delivery time of products are the key factors to survive. The traditional quality control process is performed by human experts, which is slow and error prone. In recent years, automatic inspection becomes a mainstream and many works have been published. However, the industry still demands a faster and more accurate inspection method. In this paper, a novel image inspection algorithm to detect defects of Multilayer Ceramic Capacitor (MLCC) is proposed. A testing system is developed and integrated into a production line. In our experiment, the proposed algorithm is proved to be very effective. The inspection system speeds up the testing process 2.5 times as well as increases the yield rate considerably.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127821164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automatic Real-Time Moving Target Detection from Infrared Video 红外视频自动实时运动目标检测
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.64
Shahryar Karimi-Ashtiani, C.-C. Jay Kuo
A novel progressive estimation scheme is proposed to detect moving targets in infrared video sequences in this work. The proposed algorithm does not place constraints on camera motions nor requires rigid backgrounds. The complexity of the algorithm is low so that it can be performed in real time. Computational results of the algorithm applied to a real-world infrared video sequence are given to demonstrate its superior detection performance.
本文提出了一种新的逐级估计方法来检测红外视频序列中的运动目标。该算法不受摄像机运动的限制,也不需要刚性背景。该算法的复杂度较低,可以实时执行。最后给出了实际红外视频序列的计算结果,证明了该算法具有良好的检测性能。
{"title":"Automatic Real-Time Moving Target Detection from Infrared Video","authors":"Shahryar Karimi-Ashtiani, C.-C. Jay Kuo","doi":"10.1109/IIH-MSP.2006.64","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.64","url":null,"abstract":"A novel progressive estimation scheme is proposed to detect moving targets in infrared video sequences in this work. The proposed algorithm does not place constraints on camera motions nor requires rigid backgrounds. The complexity of the algorithm is low so that it can be performed in real time. Computational results of the algorithm applied to a real-world infrared video sequence are given to demonstrate its superior detection performance.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133888053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Watermarking Scheme in Contourlet Domain Based on Independent Component Analysis 一种基于独立分量分析的Contourlet域水印新方案
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.34
Zhao Xu, Ke Wang, Xiao-hua Qiao
In this paper, a novel watermarking algorithm is proposed in Contourlet domain with ICA (independent component analysis). Contourlet transform is adopted in watermarking embedding scheme. In contrast to the wavelet transform, a kind of contour segment base are adopted to approach singular curve, and a flexible multiresolution, local, and directional expansion of an image is obtained. Watermarking image is embedded into the most distinct subband in order to obtain robustness. ICA processing is adopted in watermarking detected scheme. The watermarking can be correctly detected by no care about the attack type and attack parameter which the watermarked image would be suffered. To prove the validity of our approach, we give experimental results, our algorithm is robust to JPEG compression and noise attack, and especially robust to geometry attack, filter and image processing.
本文提出了一种基于ICA(独立分量分析)的Contourlet域水印算法。水印嵌入方案采用Contourlet变换。与小波变换相比,采用一种轮廓段基来逼近奇异曲线,实现了图像的灵活的多分辨率、局部和定向扩展。为了获得鲁棒性,将水印图像嵌入到最明显的子带中。水印检测方案采用ICA处理。在不考虑水印图像所遭受的攻击类型和攻击参数的情况下,可以正确检测水印。为了证明该方法的有效性,给出了实验结果,该算法对JPEG压缩和噪声攻击具有较强的鲁棒性,对几何攻击、滤波和图像处理具有较强的鲁棒性。
{"title":"A Novel Watermarking Scheme in Contourlet Domain Based on Independent Component Analysis","authors":"Zhao Xu, Ke Wang, Xiao-hua Qiao","doi":"10.1109/IIH-MSP.2006.34","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.34","url":null,"abstract":"In this paper, a novel watermarking algorithm is proposed in Contourlet domain with ICA (independent component analysis). Contourlet transform is adopted in watermarking embedding scheme. In contrast to the wavelet transform, a kind of contour segment base are adopted to approach singular curve, and a flexible multiresolution, local, and directional expansion of an image is obtained. Watermarking image is embedded into the most distinct subband in order to obtain robustness. ICA processing is adopted in watermarking detected scheme. The watermarking can be correctly detected by no care about the attack type and attack parameter which the watermarked image would be suffered. To prove the validity of our approach, we give experimental results, our algorithm is robust to JPEG compression and noise attack, and especially robust to geometry attack, filter and image processing.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116047284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Blind Watermarking in Contourlet Domain with Improved Detection 基于改进检测的Contourlet域盲水印
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.65
M. Jayalakshmi, S. Merchant, U. Desai
This paper presents a novel method of blind image watermarking in contourlet domain. We have used spread spectrum technique for additive watermark embedding. A correlation detector is used to detect the embedded pseudorandom sequence. The binary logo thus retrieved proves authenticity of the image. The similarity of the retrieved binary logo with the original embedded logo is veriJied using correlation technique. Post processing of the retrieved logo gives better visual effects, further aiding threshold selection for detection. We have verijied the robustness of the proposed method against dzrerent attacks including StirMark attack. The proposed method is compared with a wavelet based blind technique and the results prove that contourlet based technique gives better robustness, under similar embedding conditions.
提出了一种基于contourlet域的图像盲水印方法。我们采用扩频技术进行加性水印嵌入。利用相关检测器检测嵌入的伪随机序列。由此检索到的二进制标志证明了图像的真实性。利用相关技术验证检索到的二进制标识与原始嵌入标识的相似度。对检索到的徽标进行后处理可以获得更好的视觉效果,进一步帮助检测的阈值选择。我们已经验证了该方法对包括StirMark攻击在内的当前攻击的鲁棒性。将该方法与基于小波的盲法进行了比较,结果表明,在相似的嵌入条件下,基于轮廓波的盲法具有更好的鲁棒性。
{"title":"Blind Watermarking in Contourlet Domain with Improved Detection","authors":"M. Jayalakshmi, S. Merchant, U. Desai","doi":"10.1109/IIH-MSP.2006.65","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.65","url":null,"abstract":"This paper presents a novel method of blind image watermarking in contourlet domain. We have used spread spectrum technique for additive watermark embedding. A correlation detector is used to detect the embedded pseudorandom sequence. The binary logo thus retrieved proves authenticity of the image. The similarity of the retrieved binary logo with the original embedded logo is veriJied using correlation technique. Post processing of the retrieved logo gives better visual effects, further aiding threshold selection for detection. We have verijied the robustness of the proposed method against dzrerent attacks including StirMark attack. The proposed method is compared with a wavelet based blind technique and the results prove that contourlet based technique gives better robustness, under similar embedding conditions.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123460157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
An Image Encryption Approach Based on a New Two-Dimensional Map 一种基于二维新映射的图像加密方法
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.49
F. Huang, Yong Feng
In this paper a new two-dimensional map is proposed. It is a process of stretch-and-fold. Firstly a square image is divide two parts according diagonal. Secondly each part of image is stretch respectively and joins a line. Lastly the line is fold over to a new square image of same size. The map divides into the left map and the right map. The process shuffles the positions of image pixels. Comparing the prevalent twodimensional map, Cat map and Baker map, the new map has simple formulation, big keys space which is fit for image encryption. An image encryption scheme based on the map is developed. The numbers of the left map and the right map are used as the key. The deciphering process is opposite using the same keys. The results of simulation show that it can be used in real-time image encryption applications.
本文提出了一种新的二维地图。这是一个拉伸和折叠的过程。首先根据对角线将正方形图像分成两部分。其次,将图像的各个部分分别拉伸并连接成一条线。最后,这条线被折叠成一个相同大小的正方形图像。地图分为左地图和右地图。这个过程会打乱图像像素的位置。与目前流行的二维映射、Cat映射和Baker映射相比,新映射具有公式简单、密钥空间大、适合图像加密的特点。提出了一种基于映射的图像加密方案。使用左映射和右映射的数字作为键。使用相同的密钥,解密过程是相反的。仿真结果表明,该算法可用于实时图像加密应用。
{"title":"An Image Encryption Approach Based on a New Two-Dimensional Map","authors":"F. Huang, Yong Feng","doi":"10.1109/IIH-MSP.2006.49","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.49","url":null,"abstract":"In this paper a new two-dimensional map is proposed. It is a process of stretch-and-fold. Firstly a square image is divide two parts according diagonal. Secondly each part of image is stretch respectively and joins a line. Lastly the line is fold over to a new square image of same size. The map divides into the left map and the right map. The process shuffles the positions of image pixels. Comparing the prevalent twodimensional map, Cat map and Baker map, the new map has simple formulation, big keys space which is fit for image encryption. An image encryption scheme based on the map is developed. The numbers of the left map and the right map are used as the key. The deciphering process is opposite using the same keys. The results of simulation show that it can be used in real-time image encryption applications.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125151916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Novel Algorithm for Scrambling Digital Image Based on Cat Chaotic Mapping 一种基于Cat混沌映射的数字图像置乱算法
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.25
Liehuang Zhu, Wenzhuo Li, L. Liao, Hong Li
This paper proposes a new algorithm for scrambling digital image based on the cat chaotic mapping. We disorder the pixel coordinates of the digital image through using a cat chaotic mapping, and then perform exclusive OR operation between certain pixel value of the digital image and a chaotic value. The experiment results have shown that the new diffusion technique proposed in this paper is very effective to uniform the statistical characteristics of the encrypted graph, and the efficiency of this method is very high.
提出了一种基于cat混沌映射的数字图像置乱算法。我们使用cat混沌映射对数字图像的像素坐标进行无序化,然后在数字图像的某个像素值与某个混沌值之间进行异或运算。实验结果表明,本文提出的新扩散技术对于均匀加密图的统计特征是非常有效的,并且该方法的效率很高。
{"title":"A Novel Algorithm for Scrambling Digital Image Based on Cat Chaotic Mapping","authors":"Liehuang Zhu, Wenzhuo Li, L. Liao, Hong Li","doi":"10.1109/IIH-MSP.2006.25","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.25","url":null,"abstract":"This paper proposes a new algorithm for scrambling digital image based on the cat chaotic mapping. We disorder the pixel coordinates of the digital image through using a cat chaotic mapping, and then perform exclusive OR operation between certain pixel value of the digital image and a chaotic value. The experiment results have shown that the new diffusion technique proposed in this paper is very effective to uniform the statistical characteristics of the encrypted graph, and the efficiency of this method is very high.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130884389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
A Robust Watermarking Algorithm Adopting Double Embedding 采用双嵌入的鲁棒水印算法
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.38
Xiao-hua Qiao, Shuxun Wang, Quanxiu Wen, Zhao Xu
In this paper, an adaptive blind watermarking algorithm is proposed, which presents a new method of block classification based on the characteristic of visual masking of HVS (human visual system) model, including energy and variance. According to the new classification method, classify image blocks and select quantization pedometers adaptively to embed the watermark into DC component. At the same time, because of the shortage of watermark intensity only embedded into DC components, the algorithm presents that the same watermark is embedded into mid-frequency subbands by changing the order of these coefficients under invisibility. This is a blind watermarking algorithm, the watermark can be extracted without the original picture needed. Experimental results and attacks analysis show that the proposed algorithm is effective and robust to common image processing and some geometric attacks, such as JPEG lossy compression, scaling, additive noise, rotation, histogram equilibrium, contrast adjusting, brightness adjusting, filtering and so on.
本文提出了一种自适应盲水印算法,该算法基于人类视觉系统模型的视觉掩蔽特性,包括能量和方差,提出了一种新的块分类方法。根据新的分类方法,对图像块进行分类,自适应选择量化步长,将水印嵌入到直流分量中。同时,针对仅嵌入直流分量的水印强度不足的问题,该算法提出在不可见的情况下,通过改变系数的顺序,将相同的水印嵌入到中频子带中。这是一种盲水印算法,可以在不需要原始图片的情况下提取水印。实验结果和攻击分析表明,该算法对常见的图像处理和JPEG有损压缩、缩放、加性噪声、旋转、直方图平衡、对比度调整、亮度调整、滤波等几何攻击具有良好的鲁棒性。
{"title":"A Robust Watermarking Algorithm Adopting Double Embedding","authors":"Xiao-hua Qiao, Shuxun Wang, Quanxiu Wen, Zhao Xu","doi":"10.1109/IIH-MSP.2006.38","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.38","url":null,"abstract":"In this paper, an adaptive blind watermarking algorithm is proposed, which presents a new method of block classification based on the characteristic of visual masking of HVS (human visual system) model, including energy and variance. According to the new classification method, classify image blocks and select quantization pedometers adaptively to embed the watermark into DC component. At the same time, because of the shortage of watermark intensity only embedded into DC components, the algorithm presents that the same watermark is embedded into mid-frequency subbands by changing the order of these coefficients under invisibility. This is a blind watermarking algorithm, the watermark can be extracted without the original picture needed. Experimental results and attacks analysis show that the proposed algorithm is effective and robust to common image processing and some geometric attacks, such as JPEG lossy compression, scaling, additive noise, rotation, histogram equilibrium, contrast adjusting, brightness adjusting, filtering and so on.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126921054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Implementation of an MHP Video and Graphics Subsystem on Xilinx ML310 Platform 基于Xilinx ML310平台的MHP视频图形子系统的设计与实现
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.80
Min-Hong Chen, Feng-Cheng Chang, H. Hang
Multimedia Home Platform (MHP) is a standard to enable versatile applications of a DVB program. In this paper, we design and implement a simplified MHP video and graphics subsystem. The Xilinx ML310 is chosen as the hardware platform to implement our design. The execution environment consists of an embedded Linux, a frame-buffer based X server, and a Java ME Personal Basis Profile (J2ME PBP) run-time. To implement the MHP video functionality, we incorporate the FFmpeg libraries and the JavaTV JMF Lite to provide the demultiplexing and rendering operations of an MPEG-2 video. In addition, our major efforts are put on the video and graphics integration. The J2ME PBP reference software is heavily modified to optimally compose the video objects and the AWT graphics components in an MHP-compliant way. The application examples show that our proposed system is able to provide the AWT graphics and the JMF video presentation services, including normal presentation, arbitrary clipping, scaling and positioning of an MPEG-2 video.
多媒体家庭平台(MHP)是实现DVB程序多用途应用的标准。在本文中,我们设计并实现了一个简化的MHP视频和图形子系统。本设计选用Xilinx ML310作为硬件平台来实现。执行环境由嵌入式Linux、基于帧缓冲区的X服务器和Java ME Personal Basis Profile (J2ME PBP)运行时组成。为了实现MHP视频功能,我们结合了FFmpeg库和JavaTV JMF Lite来提供MPEG-2视频的解复用和呈现操作。此外,我们的主要努力放在视频和图形集成。对J2ME PBP参考软件进行了大量修改,以便以符合mhp的方式最佳地组合视频对象和AWT图形组件。应用实例表明,该系统能够提供AWT图形和JMF视频显示服务,包括MPEG-2视频的正常显示、任意剪辑、缩放和定位。
{"title":"Design and Implementation of an MHP Video and Graphics Subsystem on Xilinx ML310 Platform","authors":"Min-Hong Chen, Feng-Cheng Chang, H. Hang","doi":"10.1109/IIH-MSP.2006.80","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.80","url":null,"abstract":"Multimedia Home Platform (MHP) is a standard to enable versatile applications of a DVB program. In this paper, we design and implement a simplified MHP video and graphics subsystem. The Xilinx ML310 is chosen as the hardware platform to implement our design. The execution environment consists of an embedded Linux, a frame-buffer based X server, and a Java ME Personal Basis Profile (J2ME PBP) run-time. To implement the MHP video functionality, we incorporate the FFmpeg libraries and the JavaTV JMF Lite to provide the demultiplexing and rendering operations of an MPEG-2 video. In addition, our major efforts are put on the video and graphics integration. The J2ME PBP reference software is heavily modified to optimally compose the video objects and the AWT graphics components in an MHP-compliant way. The application examples show that our proposed system is able to provide the AWT graphics and the JMF video presentation services, including normal presentation, arbitrary clipping, scaling and positioning of an MPEG-2 video.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126469370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation and Performance Evaluation of LT and Raptor Codes for Multimedia Applications 多媒体应用中LT和Raptor代码的实现和性能评价
Pub Date : 2006-12-18 DOI: 10.1109/IIH-MSP.2006.117
Pasquale Cataldi, Miquel Pedros Shatarski, Marco Grangetto, E. Magli
Digital fountains have changed the standard transmission paradigm. A digital fountain can encode and transmit an unlimited number of data packets until every user gets enough information to guarantee correct decoding. Multimedia broadcasting, emerging peer-to-peer applications are only two examples of many other scenarios where digital fountains can be successfully applied. In this paper practical implementation issues of two class of digital fountain codes, namely LT and Raptor codes, are analyzed. Moreover, the performance in terms of coding and decoding complexity is measured experimentally.
数字喷泉改变了标准的传输模式。数字喷泉可以编码和传输无限数量的数据包,直到每个用户获得足够的信息来保证正确解码。多媒体广播、新兴的点对点应用只是数字喷泉可以成功应用的许多其他场景中的两个例子。本文分析了两类数字喷泉码(LT码和Raptor码)的实际实现问题。此外,在编码和解码复杂度方面进行了实验测试。
{"title":"Implementation and Performance Evaluation of LT and Raptor Codes for Multimedia Applications","authors":"Pasquale Cataldi, Miquel Pedros Shatarski, Marco Grangetto, E. Magli","doi":"10.1109/IIH-MSP.2006.117","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.117","url":null,"abstract":"Digital fountains have changed the standard transmission paradigm. A digital fountain can encode and transmit an unlimited number of data packets until every user gets enough information to guarantee correct decoding. Multimedia broadcasting, emerging peer-to-peer applications are only two examples of many other scenarios where digital fountains can be successfully applied. In this paper practical implementation issues of two class of digital fountain codes, namely LT and Raptor codes, are analyzed. Moreover, the performance in terms of coding and decoding complexity is measured experimentally.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127527809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
期刊
2006 International Conference on Intelligent Information Hiding and Multimedia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1