Pub Date : 2006-12-18DOI: 10.1109/IIH-MSP.2006.146
Chinchen Chang, J. Chuang
Progressive image transmission is often used in low bandwidth communications or in limited bandwidth environments. When a user browses an image on a website, the web server first sends a low quality image to the receiver and then gradually improves the image quality by subsequent transmissions .Because the image size becomes larger and larger, it is essential to develop a flexible and efficient technique to help users quickly browse or retrieve images on a website. For this reason, using significant features along with a prediction technique for progressive image transmission is proposed in this paper. In our method, significant features of an image need to be extracted first. Next, these features, according to their priority, are sent to the receiver. For reducing the encoding cost of the transmitted data, three approaches, sampling, quantization, and linear regression prediction, are also presented.
{"title":"Progressive Image Transmission Using Significant Features and Linear Regression Prediction","authors":"Chinchen Chang, J. Chuang","doi":"10.1109/IIH-MSP.2006.146","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.146","url":null,"abstract":"Progressive image transmission is often used in low bandwidth communications or in limited bandwidth environments. When a user browses an image on a website, the web server first sends a low quality image to the receiver and then gradually improves the image quality by subsequent transmissions .Because the image size becomes larger and larger, it is essential to develop a flexible and efficient technique to help users quickly browse or retrieve images on a website. For this reason, using significant features along with a prediction technique for progressive image transmission is proposed in this paper. In our method, significant features of an image need to be extracted first. Next, these features, according to their priority, are sent to the receiver. For reducing the encoding cost of the transmitted data, three approaches, sampling, quantization, and linear regression prediction, are also presented.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121791689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-12-18DOI: 10.1109/IIH-MSP.2006.111
Chun-Chieh Tseng, Mao-Fu Lai, Por-Song Lee
In today¿s competitive passive components market, the quality and delivery time of products are the key factors to survive. The traditional quality control process is performed by human experts, which is slow and error prone. In recent years, automatic inspection becomes a mainstream and many works have been published. However, the industry still demands a faster and more accurate inspection method. In this paper, a novel image inspection algorithm to detect defects of Multilayer Ceramic Capacitor (MLCC) is proposed. A testing system is developed and integrated into a production line. In our experiment, the proposed algorithm is proved to be very effective. The inspection system speeds up the testing process 2.5 times as well as increases the yield rate considerably.
{"title":"Image Inspection System for Defect Detection of Multilayer Ceramic Capacitors","authors":"Chun-Chieh Tseng, Mao-Fu Lai, Por-Song Lee","doi":"10.1109/IIH-MSP.2006.111","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.111","url":null,"abstract":"In today¿s competitive passive components market, the quality and delivery time of products are the key factors to survive. The traditional quality control process is performed by human experts, which is slow and error prone. In recent years, automatic inspection becomes a mainstream and many works have been published. However, the industry still demands a faster and more accurate inspection method. In this paper, a novel image inspection algorithm to detect defects of Multilayer Ceramic Capacitor (MLCC) is proposed. A testing system is developed and integrated into a production line. In our experiment, the proposed algorithm is proved to be very effective. The inspection system speeds up the testing process 2.5 times as well as increases the yield rate considerably.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127821164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A novel progressive estimation scheme is proposed to detect moving targets in infrared video sequences in this work. The proposed algorithm does not place constraints on camera motions nor requires rigid backgrounds. The complexity of the algorithm is low so that it can be performed in real time. Computational results of the algorithm applied to a real-world infrared video sequence are given to demonstrate its superior detection performance.
{"title":"Automatic Real-Time Moving Target Detection from Infrared Video","authors":"Shahryar Karimi-Ashtiani, C.-C. Jay Kuo","doi":"10.1109/IIH-MSP.2006.64","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.64","url":null,"abstract":"A novel progressive estimation scheme is proposed to detect moving targets in infrared video sequences in this work. The proposed algorithm does not place constraints on camera motions nor requires rigid backgrounds. The complexity of the algorithm is low so that it can be performed in real time. Computational results of the algorithm applied to a real-world infrared video sequence are given to demonstrate its superior detection performance.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133888053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-12-18DOI: 10.1109/IIH-MSP.2006.141
Zhenyu Wu, Hongyang Yu, B. Tang, H. Hu
The latest Chinese video coding standard AVS-P2 has been recently approved and is going to be adopted for numerous applications including HD-DVD and satellite broadcast. To allow interconnectivity between different video coding standards, transcoding will be a key factor. This paper assesses the performance of existing requantization techniques developed when applied to transcoding from MPEG-2 to AVS-P2 together with a new technique. The proposed transcoding algorithm is based on an improved mixed re-quantization technique, which gives a good compromise between complexity and quality.
{"title":"Performance Evaluation of Transcoding Algorithms for MPEG-2 to AVS-P2","authors":"Zhenyu Wu, Hongyang Yu, B. Tang, H. Hu","doi":"10.1109/IIH-MSP.2006.141","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.141","url":null,"abstract":"The latest Chinese video coding standard AVS-P2 has been recently approved and is going to be adopted for numerous applications including HD-DVD and satellite broadcast. To allow interconnectivity between different video coding standards, transcoding will be a key factor. This paper assesses the performance of existing requantization techniques developed when applied to transcoding from MPEG-2 to AVS-P2 together with a new technique. The proposed transcoding algorithm is based on an improved mixed re-quantization technique, which gives a good compromise between complexity and quality.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134347782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Most learning-based super-resolution algorithms neglect the illumination problem such as shadows and illumination direction changes. In this paper we propose a logarithmic-wavelet transform (Log-WT) based method to combine super-resolution and shadow removing into a single operation. First intrinsic, illumination invariant features of the image are extracted by exploiting logarithmic-wavelet transform. Then an initial estimation of high resolution image is obtained based on the assumption that small patches in low resolution space and patches in high resolution space share the similar local manifold structure. Finally the target high resolution image is reconstructed by applying the reconstruction constraints in pixel domain. Experimental results demonstrate that the proposed method simultaneously achieves singleimage super-resolution and image enhancement especially shadow removing.
{"title":"A Novel Log-WT Based Super-Resolution Algorithm","authors":"Jianping Qiao, Ju Liu","doi":"10.1109/IIH-MSP.2006.30","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.30","url":null,"abstract":"Most learning-based super-resolution algorithms neglect the illumination problem such as shadows and illumination direction changes. In this paper we propose a logarithmic-wavelet transform (Log-WT) based method to combine super-resolution and shadow removing into a single operation. First intrinsic, illumination invariant features of the image are extracted by exploiting logarithmic-wavelet transform. Then an initial estimation of high resolution image is obtained based on the assumption that small patches in low resolution space and patches in high resolution space share the similar local manifold structure. Finally the target high resolution image is reconstructed by applying the reconstruction constraints in pixel domain. Experimental results demonstrate that the proposed method simultaneously achieves singleimage super-resolution and image enhancement especially shadow removing.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132674433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose a novel image-based facial expression recognition method called "expression transition" to identify six kinds of facial expressions (anger, fear, happiness, neutral, sadness, and surprise) at low-resolution images. Two approaches: direct mapping and singular value decomposition (SVD) are applied to calculate the expression transition matrices. The transformed images with a set of expression transition matrices are compared to identify the facial expressions. The experimental results show that the proposed facial expression recognition system can recognize 120 test images in the Chon-Kanade facial expression database with high accuracy and efficiency.
{"title":"A Fast Facial Expression Recognition Method at Low-Resolution Images","authors":"C. Lien, Yang-Kai Chang, Chih-Chiang Tien","doi":"10.1109/IIH-MSP.2006.10","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.10","url":null,"abstract":"In this paper, we propose a novel image-based facial expression recognition method called \"expression transition\" to identify six kinds of facial expressions (anger, fear, happiness, neutral, sadness, and surprise) at low-resolution images. Two approaches: direct mapping and singular value decomposition (SVD) are applied to calculate the expression transition matrices. The transformed images with a set of expression transition matrices are compared to identify the facial expressions. The experimental results show that the proposed facial expression recognition system can recognize 120 test images in the Chon-Kanade facial expression database with high accuracy and efficiency.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132832019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a novel watermarking algorithm is proposed in Contourlet domain with ICA (independent component analysis). Contourlet transform is adopted in watermarking embedding scheme. In contrast to the wavelet transform, a kind of contour segment base are adopted to approach singular curve, and a flexible multiresolution, local, and directional expansion of an image is obtained. Watermarking image is embedded into the most distinct subband in order to obtain robustness. ICA processing is adopted in watermarking detected scheme. The watermarking can be correctly detected by no care about the attack type and attack parameter which the watermarked image would be suffered. To prove the validity of our approach, we give experimental results, our algorithm is robust to JPEG compression and noise attack, and especially robust to geometry attack, filter and image processing.
{"title":"A Novel Watermarking Scheme in Contourlet Domain Based on Independent Component Analysis","authors":"Zhao Xu, Ke Wang, Xiao-hua Qiao","doi":"10.1109/IIH-MSP.2006.34","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.34","url":null,"abstract":"In this paper, a novel watermarking algorithm is proposed in Contourlet domain with ICA (independent component analysis). Contourlet transform is adopted in watermarking embedding scheme. In contrast to the wavelet transform, a kind of contour segment base are adopted to approach singular curve, and a flexible multiresolution, local, and directional expansion of an image is obtained. Watermarking image is embedded into the most distinct subband in order to obtain robustness. ICA processing is adopted in watermarking detected scheme. The watermarking can be correctly detected by no care about the attack type and attack parameter which the watermarked image would be suffered. To prove the validity of our approach, we give experimental results, our algorithm is robust to JPEG compression and noise attack, and especially robust to geometry attack, filter and image processing.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116047284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a novel method of blind image watermarking in contourlet domain. We have used spread spectrum technique for additive watermark embedding. A correlation detector is used to detect the embedded pseudorandom sequence. The binary logo thus retrieved proves authenticity of the image. The similarity of the retrieved binary logo with the original embedded logo is veriJied using correlation technique. Post processing of the retrieved logo gives better visual effects, further aiding threshold selection for detection. We have verijied the robustness of the proposed method against dzrerent attacks including StirMark attack. The proposed method is compared with a wavelet based blind technique and the results prove that contourlet based technique gives better robustness, under similar embedding conditions.
{"title":"Blind Watermarking in Contourlet Domain with Improved Detection","authors":"M. Jayalakshmi, S. Merchant, U. Desai","doi":"10.1109/IIH-MSP.2006.65","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.65","url":null,"abstract":"This paper presents a novel method of blind image watermarking in contourlet domain. We have used spread spectrum technique for additive watermark embedding. A correlation detector is used to detect the embedded pseudorandom sequence. The binary logo thus retrieved proves authenticity of the image. The similarity of the retrieved binary logo with the original embedded logo is veriJied using correlation technique. Post processing of the retrieved logo gives better visual effects, further aiding threshold selection for detection. We have verijied the robustness of the proposed method against dzrerent attacks including StirMark attack. The proposed method is compared with a wavelet based blind technique and the results prove that contourlet based technique gives better robustness, under similar embedding conditions.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123460157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper a new two-dimensional map is proposed. It is a process of stretch-and-fold. Firstly a square image is divide two parts according diagonal. Secondly each part of image is stretch respectively and joins a line. Lastly the line is fold over to a new square image of same size. The map divides into the left map and the right map. The process shuffles the positions of image pixels. Comparing the prevalent twodimensional map, Cat map and Baker map, the new map has simple formulation, big keys space which is fit for image encryption. An image encryption scheme based on the map is developed. The numbers of the left map and the right map are used as the key. The deciphering process is opposite using the same keys. The results of simulation show that it can be used in real-time image encryption applications.
{"title":"An Image Encryption Approach Based on a New Two-Dimensional Map","authors":"F. Huang, Yong Feng","doi":"10.1109/IIH-MSP.2006.49","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.49","url":null,"abstract":"In this paper a new two-dimensional map is proposed. It is a process of stretch-and-fold. Firstly a square image is divide two parts according diagonal. Secondly each part of image is stretch respectively and joins a line. Lastly the line is fold over to a new square image of same size. The map divides into the left map and the right map. The process shuffles the positions of image pixels. Comparing the prevalent twodimensional map, Cat map and Baker map, the new map has simple formulation, big keys space which is fit for image encryption. An image encryption scheme based on the map is developed. The numbers of the left map and the right map are used as the key. The deciphering process is opposite using the same keys. The results of simulation show that it can be used in real-time image encryption applications.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125151916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In a digital TV system, the Conditional Access (CA) system is essential to protect programs from unauthorized access. However, the encryption technique alone is not sufficient to protect or control the use of contents after decryption. To provide flexible and complete Digital Rights Management (DRM) protection on the Digital Video Broadcasting (DVB) programs, we propose a method that adapts the MPEG- 21 REL technology and integrates it into a DVB-T system. By extending the Service Information (SI) section of a DVB stream to include an REL license, the transmitted content can be conveniently consumed and legally protected. Our design is verified by an experimental hardware system. The results show that the proposed method can provide both the conditional access functionality and the usage control of broadcasted contents.
{"title":"A Digital Content Protection Scheme Using MPEG-21 REL with Applications to DVB Systems","authors":"Ying-Tzu Shih, Feng-Cheng Chang, H. Hang","doi":"10.1109/IIH-MSP.2006.6","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2006.6","url":null,"abstract":"In a digital TV system, the Conditional Access (CA) system is essential to protect programs from unauthorized access. However, the encryption technique alone is not sufficient to protect or control the use of contents after decryption. To provide flexible and complete Digital Rights Management (DRM) protection on the Digital Video Broadcasting (DVB) programs, we propose a method that adapts the MPEG- 21 REL technology and integrates it into a DVB-T system. By extending the Service Information (SI) section of a DVB stream to include an REL license, the transmitted content can be conveniently consumed and legally protected. Our design is verified by an experimental hardware system. The results show that the proposed method can provide both the conditional access functionality and the usage control of broadcasted contents.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128221539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}