Pub Date : 2001-04-02DOI: 10.1109/ITCC.2001.918806
Jianyu Dong, Chao He, Yuan F. Zheng
A new transport protocol called Audio-Video Protocol (AVP) for highly efficient multimedia communications on the Internet is presented in this paper. While providing similar real-time delivery functions of RTP/RTCP AVP adopts a novel audio-based synchronization scheme. This synchronization scheme has two advantages. One is that there is no need to include a timestamp in each transmitted packet so that the AVP header is small for highly efficient transmission. The other is that AVP can achieve lower end-to-end message delay by putting multiple audio frames or mixed audio-video frames in the same AVP packet to reduce the packet rate. Furthermore, AVP provides different QoS by assigning different priority numbers to the packers. Simulation results are presented to show the good performance of AVP in real-time video-audio delivery.
{"title":"AVP: a highly efficient real-time protocol for multimedia communications on Internet","authors":"Jianyu Dong, Chao He, Yuan F. Zheng","doi":"10.1109/ITCC.2001.918806","DOIUrl":"https://doi.org/10.1109/ITCC.2001.918806","url":null,"abstract":"A new transport protocol called Audio-Video Protocol (AVP) for highly efficient multimedia communications on the Internet is presented in this paper. While providing similar real-time delivery functions of RTP/RTCP AVP adopts a novel audio-based synchronization scheme. This synchronization scheme has two advantages. One is that there is no need to include a timestamp in each transmitted packet so that the AVP header is small for highly efficient transmission. The other is that AVP can achieve lower end-to-end message delay by putting multiple audio frames or mixed audio-video frames in the same AVP packet to reduce the packet rate. Furthermore, AVP provides different QoS by assigning different priority numbers to the packers. Simulation results are presented to show the good performance of AVP in real-time video-audio delivery.","PeriodicalId":318295,"journal":{"name":"Proceedings International Conference on Information Technology: Coding and Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125193778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-04-02DOI: 10.1109/ITCC.2001.918792
Y. Guan, Ling Jin
Digital watermarking is an important emerging technique for intellectual property rights protection. We classify spread-spectrum watermarking techniques for MPEG video into two generic classes, namely spatial watermarking and DCT (discrete cosine transform) watermarking schemes, and evaluate their robustness and visual quality quantitatively and comparatively. Blind watermark detection and some watermark attacks are considered. For the two test video files considered in this study, it is observed that spatial watermarking may be preferred to DCT watermarking, as the latter tends to be less robust when both schemes are compared at the same visual quality level for the watermarked video.
{"title":"An objective comparison between spatial and DCT watermarking schemes for MPEG video","authors":"Y. Guan, Ling Jin","doi":"10.1109/ITCC.2001.918792","DOIUrl":"https://doi.org/10.1109/ITCC.2001.918792","url":null,"abstract":"Digital watermarking is an important emerging technique for intellectual property rights protection. We classify spread-spectrum watermarking techniques for MPEG video into two generic classes, namely spatial watermarking and DCT (discrete cosine transform) watermarking schemes, and evaluate their robustness and visual quality quantitatively and comparatively. Blind watermark detection and some watermark attacks are considered. For the two test video files considered in this study, it is observed that spatial watermarking may be preferred to DCT watermarking, as the latter tends to be less robust when both schemes are compared at the same visual quality level for the watermarked video.","PeriodicalId":318295,"journal":{"name":"Proceedings International Conference on Information Technology: Coding and Computing","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129914863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-04-02DOI: 10.1109/ITCC.2001.918760
Jitae Shin, JongWon Kim, D. Lee, C.-C. Jay Kuo
We investigate the source domain's scheme of dynamically and intelligently pre-marking the streaming media packets before entering a DS-domain providing a relative differentiated service. The pre-marking scheme takes into account the packet content, the price limit for the transport of streaming media, and the traffic conditioning agreement. In this scheme, the sender cooperates with what we call media gateway (MG), which is a special node on the boundaries of the DS-domain. MG is responsible for meeting the traffic conditioning agreement while fully utilizing the received differentiated services for the quality of the streaming media. Our proposed QoS control scheme includes the following components: 1) the relative priority based indexing and categorization of streaming video content at the sender and 2) the dynamic feedforward QoS mapping of categorized index to DS grade at the proposed MG. With the proposed scheme, enhanced quality of streaming media applications is demonstrated.
{"title":"Dynamic quality of service mapping framework for relative service differentiation-aware media streaming","authors":"Jitae Shin, JongWon Kim, D. Lee, C.-C. Jay Kuo","doi":"10.1109/ITCC.2001.918760","DOIUrl":"https://doi.org/10.1109/ITCC.2001.918760","url":null,"abstract":"We investigate the source domain's scheme of dynamically and intelligently pre-marking the streaming media packets before entering a DS-domain providing a relative differentiated service. The pre-marking scheme takes into account the packet content, the price limit for the transport of streaming media, and the traffic conditioning agreement. In this scheme, the sender cooperates with what we call media gateway (MG), which is a special node on the boundaries of the DS-domain. MG is responsible for meeting the traffic conditioning agreement while fully utilizing the received differentiated services for the quality of the streaming media. Our proposed QoS control scheme includes the following components: 1) the relative priority based indexing and categorization of streaming video content at the sender and 2) the dynamic feedforward QoS mapping of categorized index to DS grade at the proposed MG. With the proposed scheme, enhanced quality of streaming media applications is demonstrated.","PeriodicalId":318295,"journal":{"name":"Proceedings International Conference on Information Technology: Coding and Computing","volume":"16 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132988480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-04-02DOI: 10.1109/ITCC.2001.918840
L. Gewali, C. Sun
A compact representation of a two dimensional mesh can significantly reduce transmission of mesh data over the Internet. Compact representation of the mesh is also desirable for saving storage space. The compressibility of a mesh can be elegantly captured in term of Hamiltonian graphs. In this paper we present an algorithm to partition a convex polygon into a triangular mesh that admits Hamiltonian paths.
{"title":"Geometric compression for fast transmission","authors":"L. Gewali, C. Sun","doi":"10.1109/ITCC.2001.918840","DOIUrl":"https://doi.org/10.1109/ITCC.2001.918840","url":null,"abstract":"A compact representation of a two dimensional mesh can significantly reduce transmission of mesh data over the Internet. Compact representation of the mesh is also desirable for saving storage space. The compressibility of a mesh can be elegantly captured in term of Hamiltonian graphs. In this paper we present an algorithm to partition a convex polygon into a triangular mesh that admits Hamiltonian paths.","PeriodicalId":318295,"journal":{"name":"Proceedings International Conference on Information Technology: Coding and Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132020526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-04-02DOI: 10.1109/ITCC.2001.918819
E. Lin, G. W. Cook, E. Delp, P. Salama
The article describes some of the security issues in streaming video over the Internet. If high quality video sequences are to be delivered to computers and digital television systems over the Internet in our "digital future", this material must be protected.
{"title":"An overview of security issues in streaming video","authors":"E. Lin, G. W. Cook, E. Delp, P. Salama","doi":"10.1109/ITCC.2001.918819","DOIUrl":"https://doi.org/10.1109/ITCC.2001.918819","url":null,"abstract":"The article describes some of the security issues in streaming video over the Internet. If high quality video sequences are to be delivered to computers and digital television systems over the Internet in our \"digital future\", this material must be protected.","PeriodicalId":318295,"journal":{"name":"Proceedings International Conference on Information Technology: Coding and Computing","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130139438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-04-02DOI: 10.1109/ITCC.2001.918818
N. Ansari
This session has assembled expertise from both the industry and academia, addressing various interesting issues related to multimedia distribution. Two nicely written and well-covered overviews provide good pointers to readers on security and object-based encoding issues in streaming videos. A. Vetro and H. Sun provide a comprehensive overview of MPEG-4 object-based encoding algorithms which are readily being incorporated in emerging video products and systems. Security, the utmost concern for secured distribution and communications, has been nicely reviewed by E.J. Delp and his colleague. This session also includes two practical applications. S. Wilson and C.H. Chu develop a video system with GPS capability for environmental monitoring. F. Davoli and his colleagues at DIST-University of Genoa, Italy and CNIT, Italian National Telecommunications Consortium, present their LABNET Project, which will enable enhanced multimedia remote device control such as conducting on-line real-time experiments. Finally, H. Liu, N. Ansari and Y.Q. Shi present on-line dynamic bandwidth algorithms that are effective in reducing CLR and improving resource utilization.
{"title":"Emerging issues on multimedia distribution","authors":"N. Ansari","doi":"10.1109/ITCC.2001.918818","DOIUrl":"https://doi.org/10.1109/ITCC.2001.918818","url":null,"abstract":"This session has assembled expertise from both the industry and academia, addressing various interesting issues related to multimedia distribution. Two nicely written and well-covered overviews provide good pointers to readers on security and object-based encoding issues in streaming videos. A. Vetro and H. Sun provide a comprehensive overview of MPEG-4 object-based encoding algorithms which are readily being incorporated in emerging video products and systems. Security, the utmost concern for secured distribution and communications, has been nicely reviewed by E.J. Delp and his colleague. This session also includes two practical applications. S. Wilson and C.H. Chu develop a video system with GPS capability for environmental monitoring. F. Davoli and his colleagues at DIST-University of Genoa, Italy and CNIT, Italian National Telecommunications Consortium, present their LABNET Project, which will enable enhanced multimedia remote device control such as conducting on-line real-time experiments. Finally, H. Liu, N. Ansari and Y.Q. Shi present on-line dynamic bandwidth algorithms that are effective in reducing CLR and improving resource utilization.","PeriodicalId":318295,"journal":{"name":"Proceedings International Conference on Information Technology: Coding and Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124797508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-04-02DOI: 10.1109/ITCC.2001.918774
J. Chou, K. Ramchandran, Antonio Ortega
We combine theoretical and algorithmic advances in the area of information-hiding with the current mature knowledge-base in the human audio perception system to propose a novel audio data hiding technique that significantly pushes the state-of-the-art in the field. Our work is based on a combination of advances in two disjoint fields: information hiding and human auditory masking. The field of information hiding has seen a resurgence due to advances in the understanding of fundamental bounds from information theory. By integrating this with the human perceptual system knowledge that has been successfully exploited for several years in the audio compression community, we derive a new and improved audio data hiding technique that finds application in a number of exciting scenarios like music enhancement and digital communications over analog data channels. Our preliminary results show that we can embed data at an order of magnitude higher rate than existing audio data hiding systems, while being robust to channel noise.
{"title":"High capacity audio data hiding for noisy channels","authors":"J. Chou, K. Ramchandran, Antonio Ortega","doi":"10.1109/ITCC.2001.918774","DOIUrl":"https://doi.org/10.1109/ITCC.2001.918774","url":null,"abstract":"We combine theoretical and algorithmic advances in the area of information-hiding with the current mature knowledge-base in the human audio perception system to propose a novel audio data hiding technique that significantly pushes the state-of-the-art in the field. Our work is based on a combination of advances in two disjoint fields: information hiding and human auditory masking. The field of information hiding has seen a resurgence due to advances in the understanding of fundamental bounds from information theory. By integrating this with the human perceptual system knowledge that has been successfully exploited for several years in the audio compression community, we derive a new and improved audio data hiding technique that finds application in a number of exciting scenarios like music enhancement and digital communications over analog data channels. Our preliminary results show that we can embed data at an order of magnitude higher rate than existing audio data hiding systems, while being robust to channel noise.","PeriodicalId":318295,"journal":{"name":"Proceedings International Conference on Information Technology: Coding and Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122517064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-04-02DOI: 10.1109/ITCC.2001.918782
R. Chandramouli
Wireless communications and networking have been receiving a lot of attention from the academic and industrial communities for the past few years. There has been a constant evolution of wireless systems over the years from the first generation to the current third generation wireless networks. Already, there is talk about the next generation networks and their goals and challenges ! Current and future generation wireless technologies will support bandwidth-hungry applications such as mobile multimedia communications for highly mobile users at high data rates. This brings-up various important issues to the forefront such as error-resilience, quality of service (QoS), resource management, security etc.
{"title":"Recent advances in wireless networking and communications","authors":"R. Chandramouli","doi":"10.1109/ITCC.2001.918782","DOIUrl":"https://doi.org/10.1109/ITCC.2001.918782","url":null,"abstract":"Wireless communications and networking have been receiving a lot of attention from the academic and industrial communities for the past few years. There has been a constant evolution of wireless systems over the years from the first generation to the current third generation wireless networks. Already, there is talk about the next generation networks and their goals and challenges ! Current and future generation wireless technologies will support bandwidth-hungry applications such as mobile multimedia communications for highly mobile users at high data rates. This brings-up various important issues to the forefront such as error-resilience, quality of service (QoS), resource management, security etc.","PeriodicalId":318295,"journal":{"name":"Proceedings International Conference on Information Technology: Coding and Computing","volume":"25 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120822516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-04-02DOI: 10.1109/ITCC.2001.918793
Lap-Pui Chau, Yongqing Liang, Yap-Peng Tan
In video transcoding, the compressed video is often converted to a lower resolution in order to reduce the bit rate. One way to achieve this is to first decompress the compressed video, down-sample each frame, and then re-compress the down-scaled frame sequences. This method can obtain high-quality compressed video bit-streams; however, it involves motion vector estimation that is computationally complex. Recently, some transcoding techniques have been proposed to compute the motion vectors for a compressed video with lower resolution using the motion vectors directly from the original compressed video. These techniques, however, cannot be used in arbitrary-size video down-scaling, e.g for converting CIF (Common Intermediate Format) video to sub-QCIF (Quarter CIF) video or QCIF to sub-QCIF. In this paper, we propose a video transcoding method that can estimate the motion vectors for arbitrary-size down-scaled video. It can provide video quality that is comparable to full-search motion estimation but with very low computational complexity.
{"title":"Motion vector re-estimation for fractional-scale video transcoding","authors":"Lap-Pui Chau, Yongqing Liang, Yap-Peng Tan","doi":"10.1109/ITCC.2001.918793","DOIUrl":"https://doi.org/10.1109/ITCC.2001.918793","url":null,"abstract":"In video transcoding, the compressed video is often converted to a lower resolution in order to reduce the bit rate. One way to achieve this is to first decompress the compressed video, down-sample each frame, and then re-compress the down-scaled frame sequences. This method can obtain high-quality compressed video bit-streams; however, it involves motion vector estimation that is computationally complex. Recently, some transcoding techniques have been proposed to compute the motion vectors for a compressed video with lower resolution using the motion vectors directly from the original compressed video. These techniques, however, cannot be used in arbitrary-size video down-scaling, e.g for converting CIF (Common Intermediate Format) video to sub-QCIF (Quarter CIF) video or QCIF to sub-QCIF. In this paper, we propose a video transcoding method that can estimate the motion vectors for arbitrary-size down-scaled video. It can provide video quality that is comparable to full-search motion estimation but with very low computational complexity.","PeriodicalId":318295,"journal":{"name":"Proceedings International Conference on Information Technology: Coding and Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131113754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-04-02DOI: 10.1109/ITCC.2001.918766
J. Dittmann, Lucilla Croce Ferri, C. Vielhauer
We present a new integrity watermark based on hologram techniques for document authentication. We focus on ID-Card watermarks. The main goal is to illustrate the use of computer-generated hologram coding techniques, to produce content-related data to be embedded into the personal data printed on an identification card with watermarking techniques. We call this special application of an integrity watermark technique a hologram watermark.
{"title":"Hologram watermarks for document authentications","authors":"J. Dittmann, Lucilla Croce Ferri, C. Vielhauer","doi":"10.1109/ITCC.2001.918766","DOIUrl":"https://doi.org/10.1109/ITCC.2001.918766","url":null,"abstract":"We present a new integrity watermark based on hologram techniques for document authentication. We focus on ID-Card watermarks. The main goal is to illustrate the use of computer-generated hologram coding techniques, to produce content-related data to be embedded into the personal data printed on an identification card with watermarking techniques. We call this special application of an integrity watermark technique a hologram watermark.","PeriodicalId":318295,"journal":{"name":"Proceedings International Conference on Information Technology: Coding and Computing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133385645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}