首页 > 最新文献

Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)最新文献

英文 中文
Image Steganographic Scheme Using Tri-way Pixel-Value Differencing and Adaptive Rules 基于三向像素值差分和自适应规则的图像隐写方案
Ko-Chin Chang, P. Huang, T. Tu, Chien-Ping Chang
A novel steganographic approach based on tri-way pixel-value differencing (TPVD) is presented in this paper. This approach uses three different directional edges to design the tri-way differencing scheme and to remove the capacity limitation of the original PVD method using only one direction. In addition, we propose an optimal selection approach for the reference point and adaptive rules to reduce distortion from setting larger embedding capacity. The theoretical estimation and experimental results demonstrate that our scheme can provide a superior embedding capacity and the embedded confidential information can be extracted from stego-images without the assistance of original images.
提出了一种基于三向像素值差分(TPVD)的隐写方法。该方法利用三个不同方向的边缘来设计三向差分方案,消除了原PVD方法仅使用一个方向的容量限制。此外,我们提出了参考点的最优选择方法和自适应规则,以减少由于设置较大的嵌入容量而造成的失真。理论估计和实验结果表明,该方法具有较好的嵌入能力,可以在不借助原始图像的情况下从隐写图像中提取嵌入的机密信息。
{"title":"Image Steganographic Scheme Using Tri-way Pixel-Value Differencing and Adaptive Rules","authors":"Ko-Chin Chang, P. Huang, T. Tu, Chien-Ping Chang","doi":"10.1109/IIH-MSP.2007.437","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.437","url":null,"abstract":"A novel steganographic approach based on tri-way pixel-value differencing (TPVD) is presented in this paper. This approach uses three different directional edges to design the tri-way differencing scheme and to remove the capacity limitation of the original PVD method using only one direction. In addition, we propose an optimal selection approach for the reference point and adaptive rules to reduce distortion from setting larger embedding capacity. The theoretical estimation and experimental results demonstrate that our scheme can provide a superior embedding capacity and the embedded confidential information can be extracted from stego-images without the assistance of original images.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127905813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
HVS-Based Robust Video Watermarking with Dual-plane Correlation 基于hvs的双平面相关鲁棒视频水印
I. Echizen, Yusuke Atomori, Shinta Nakayama, H. Yoshiura
This video watermarking method uses human vision models of color information to control watermark strength and has immunity to rotations, scale changes, translations, and random distortion. It determines the watermark strength in L*u*v* space, where human-perceived degradations of picture quality can be measured in terms of Euclidian distance, but embeds and detects watermarks in YUV space, where the detection is more reliable than the robust watermarking scheme we previously proposed. An experimental evaluation using actual video samples demonstrated that the method can embed more watermarks while keeping the same picture quality and can detect them reliably in watermarked pictures that had gone through all four types of transformations. The method can be used in various watermarking schemes.
该视频水印方法利用人眼视觉的颜色信息模型来控制水印强度,对旋转、尺度变化、平移和随机失真具有免疫力。它确定了L*u*v*空间中的水印强度,在L*u*v*空间中,人类感知到的图像质量的退化可以用欧几里德距离来衡量,但在YUV空间中嵌入和检测水印,在YUV空间中检测水印比我们之前提出的鲁棒水印方案更可靠。实验结果表明,该方法可以在保证图像质量的前提下嵌入更多的水印,并且可以在经过四种变换的水印图像中可靠地检测到水印。该方法可用于各种水印方案。
{"title":"HVS-Based Robust Video Watermarking with Dual-plane Correlation","authors":"I. Echizen, Yusuke Atomori, Shinta Nakayama, H. Yoshiura","doi":"10.1109/IIH-MSP.2007.434","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.434","url":null,"abstract":"This video watermarking method uses human vision models of color information to control watermark strength and has immunity to rotations, scale changes, translations, and random distortion. It determines the watermark strength in L*u*v* space, where human-perceived degradations of picture quality can be measured in terms of Euclidian distance, but embeds and detects watermarks in YUV space, where the detection is more reliable than the robust watermarking scheme we previously proposed. An experimental evaluation using actual video samples demonstrated that the method can embed more watermarks while keeping the same picture quality and can detect them reliably in watermarked pictures that had gone through all four types of transformations. The method can be used in various watermarking schemes.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129313787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study of using L1-norm with Image Watermarking on SVD Domain 基于SVD域的l1范数图像水印研究
A. Khawne, O. Chitsobhuk, T. Nakamiya
This paper presents a study of image watermarking using robust singular value decomposition in L1-norm sub-space. The watermarked image attacked by noise is greatly degraded. This results in the effects of transparency and robustness of the watermarked image. Although the watermarking in SVD domain is sensitive to noise and outliers, incorporating L1-norm regression to the watermarking algorithm can help handling the missing data caused by noise and help increasing the robustness of the proposed algorithm. Experimental results show that the proposed algorithm can not only excellently reduce the bit error rates of the recovered watermark but also retain the transparency property of the watermarked image.
提出了一种基于l1范数子空间鲁棒奇异值分解的图像水印方法。水印图像受到噪声的攻击后,图像质量大大降低。这就影响了水印图像的透明性和鲁棒性。尽管SVD域的水印对噪声和离群值敏感,但在水印算法中加入l1 -范数回归有助于处理噪声引起的数据缺失,提高算法的鲁棒性。实验结果表明,该算法不仅能很好地降低恢复水印的误码率,而且能保持水印图像的透明性。
{"title":"A Study of using L1-norm with Image Watermarking on SVD Domain","authors":"A. Khawne, O. Chitsobhuk, T. Nakamiya","doi":"10.1109/IIH-MSP.2007.64","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.64","url":null,"abstract":"This paper presents a study of image watermarking using robust singular value decomposition in L1-norm sub-space. The watermarked image attacked by noise is greatly degraded. This results in the effects of transparency and robustness of the watermarked image. Although the watermarking in SVD domain is sensitive to noise and outliers, incorporating L1-norm regression to the watermarking algorithm can help handling the missing data caused by noise and help increasing the robustness of the proposed algorithm. Experimental results show that the proposed algorithm can not only excellently reduce the bit error rates of the recovered watermark but also retain the transparency property of the watermarked image.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129032224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A New Multi-quality Image Fusion Method in Visual Sensor Network 视觉传感器网络中一种新的多质量图像融合方法
Minghua Yang, Yuanda Cao, Li Tan, Changyou Zhang, Jiong Yu
Bandwidth, energy consumption and delay are always bottlenecks of visual sensor network. In this paper a hierarchical multi-quality image fusion method based on region-mapping is proposed to improve above condition. Camera view is divided into regions according to mapping relation and the structured deployment of nodes. The methods of motion attention analysis and nearest neighbor sampling are also adopted to optimize the local attention region of the image. The proposed fusion method is analyzed and verified to be effective to improve the quality of the monitor image with no need for more energy and bandwidth.
带宽、能耗和时延一直是视觉传感器网络的瓶颈。针对上述问题,本文提出了一种基于区域映射的分层多质量图像融合方法。摄像机视图根据映射关系和节点的结构化部署划分区域。采用运动注意分析和最近邻采样的方法对图像的局部注意区域进行优化。分析并验证了所提出的融合方法在不增加能量和带宽的情况下提高监控图像质量的有效性。
{"title":"A New Multi-quality Image Fusion Method in Visual Sensor Network","authors":"Minghua Yang, Yuanda Cao, Li Tan, Changyou Zhang, Jiong Yu","doi":"10.1109/IIH-MSP.2007.42","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.42","url":null,"abstract":"Bandwidth, energy consumption and delay are always bottlenecks of visual sensor network. In this paper a hierarchical multi-quality image fusion method based on region-mapping is proposed to improve above condition. Camera view is divided into regions according to mapping relation and the structured deployment of nodes. The methods of motion attention analysis and nearest neighbor sampling are also adopted to optimize the local attention region of the image. The proposed fusion method is analyzed and verified to be effective to improve the quality of the monitor image with no need for more energy and bandwidth.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116677129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Improvement of Lee-Chiu's Remote User Authentication Scheme 李超远程用户认证方案的改进
Chao-Wen Chan, Chung-Chih Lin
The presented paper points out some security weaknesses of the authentication scheme proposed by Lee and Chiu in 2005. Based on our analysis of the scheme, we present a scheme which can improve the security of Lee-Chiu's scheme.
本文指出了Lee和Chiu在2005年提出的认证方案的一些安全缺陷。在对该方案进行分析的基础上,提出了一种可以提高Lee-Chiu方案安全性的方案。
{"title":"The Improvement of Lee-Chiu's Remote User Authentication Scheme","authors":"Chao-Wen Chan, Chung-Chih Lin","doi":"10.1109/IIH-MSP.2007.294","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.294","url":null,"abstract":"The presented paper points out some security weaknesses of the authentication scheme proposed by Lee and Chiu in 2005. Based on our analysis of the scheme, we present a scheme which can improve the security of Lee-Chiu's scheme.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117121822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pricing Credit-Linked Notes Issued by the Protection Buyer and an SPV 由担保买方和特殊目的机构发行的信用联系票据定价
Chou-Wen Wang, Chia-Chien Chang
We first derive the closed-form solutions of the CLNs issued by an SPV or the protection buyer both the with reference and counter party risk under the consideration of default events correlated with the short-term interest rate. We derive the fair fees that are paid by a protection buyer to an SPV for the purpose of issuing the CLNs. From numerical analyses, we find that the values of CLNs are negatively correlated with the interest rate volatility and the default intensity of reference obligation. Further, if the short-term interest rate changes dramatically or the credit qualities of the reference entity and the protection buyer get worse, it is a better timing for the CLNs issued through an SPV.
首先,在考虑与短期利率相关的违约事件的情况下,推导出由特殊目的机构或保护买方发行的cln的参考风险和交易对手风险的闭型解。我们得出保护买方为签发cln而向SPV支付的公平费用。通过数值分析,我们发现cln的值与利率波动率和参考债务违约强度呈负相关。此外,如果短期利率发生剧烈变化,或者参考实体和保护买方的信用质量变差,那么通过特殊目的平台发行cln是一个更好的时机。
{"title":"Pricing Credit-Linked Notes Issued by the Protection Buyer and an SPV","authors":"Chou-Wen Wang, Chia-Chien Chang","doi":"10.1109/IIH-MSP.2007.247","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.247","url":null,"abstract":"We first derive the closed-form solutions of the CLNs issued by an SPV or the protection buyer both the with reference and counter party risk under the consideration of default events correlated with the short-term interest rate. We derive the fair fees that are paid by a protection buyer to an SPV for the purpose of issuing the CLNs. From numerical analyses, we find that the values of CLNs are negatively correlated with the interest rate volatility and the default intensity of reference obligation. Further, if the short-term interest rate changes dramatically or the credit qualities of the reference entity and the protection buyer get worse, it is a better timing for the CLNs issued through an SPV.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117178209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Ensemble HMM Learning for Motion Retrieval with Non-linear PCA Dimensionality Reduction 非线性主成分降维运动检索的集成HMM学习
Jian Xiang, Hongli Zhu
As commercial motion capture systems are widely used , more and more 3D motion database become available. In this paper, we presented a motion retrieval system based on ensemble HMM learning. First, 3D features are extracted. Due to high dimensionality of motion's features, then non-linear PCA and radial basis function (RBF) neural network for dimensionality reduction are used. At last each action class is learned with one HMM for motion analysis. Since ensemble learning can effectively enhance supervised learners, ensembles of weak HMM learners are built. Some experimental examples are given to demonstrate the effectiveness and efficiency of our methods.
随着商业运动捕捉系统的广泛应用,越来越多的三维运动数据库应运而生。本文提出了一种基于集成HMM学习的运动检索系统。首先,提取三维特征。针对运动特征的高维性,采用非线性主成分分析和径向基函数(RBF)神经网络进行降维。最后用一个HMM学习每个动作类,进行动作分析。由于集成学习可以有效地增强监督学习器,因此构建了弱HMM学习器的集成。最后给出了一些实验实例,验证了该方法的有效性和高效性。
{"title":"Ensemble HMM Learning for Motion Retrieval with Non-linear PCA Dimensionality Reduction","authors":"Jian Xiang, Hongli Zhu","doi":"10.1109/IIH-MSP.2007.397","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.397","url":null,"abstract":"As commercial motion capture systems are widely used , more and more 3D motion database become available. In this paper, we presented a motion retrieval system based on ensemble HMM learning. First, 3D features are extracted. Due to high dimensionality of motion's features, then non-linear PCA and radial basis function (RBF) neural network for dimensionality reduction are used. At last each action class is learned with one HMM for motion analysis. Since ensemble learning can effectively enhance supervised learners, ensembles of weak HMM learners are built. Some experimental examples are given to demonstrate the effectiveness and efficiency of our methods.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115163311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Adaptive and Robust Audio watermarking in Wavelet Domain 小波域自适应鲁棒音频水印
M. Pooyan, A. Delforouzi
This paper presents a robust method of audio watermarking in the wavelet domain. In this method, the watermarked data is encrypted, then combined with a synchronization code and embedded in low- frequency coefficients of wavelet transform. In this paper two techniques of quantization are employed for data embedding process. The magnitude of quantization step and embedding strength is adaptively determined according to the characteristics of the human auditory system (HAS). Therefore data embedding distortion is imperceptible for human ears. The experimental results show that the proposed watermarking scheme is transparence and very robust against common attacks such as additive Gaussian noise, low-pass filtering, resampling, requantization, shifting, cropping and MPEG compression.
提出了一种基于小波域的鲁棒音频水印方法。该方法首先对水印数据进行加密,然后与同步码结合,嵌入到小波变换的低频系数中。本文在数据嵌入过程中采用了两种量化技术。根据人听觉系统的特点,自适应地确定量化步长大小和嵌入强度。因此,数据嵌入失真对人耳来说是难以察觉的。实验结果表明,该水印方案对加性高斯噪声、低通滤波、重采样、需求化、移位、裁剪和MPEG压缩等常见攻击具有良好的鲁棒性。
{"title":"Adaptive and Robust Audio watermarking in Wavelet Domain","authors":"M. Pooyan, A. Delforouzi","doi":"10.1109/IIH-MSP.2007.68","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.68","url":null,"abstract":"This paper presents a robust method of audio watermarking in the wavelet domain. In this method, the watermarked data is encrypted, then combined with a synchronization code and embedded in low- frequency coefficients of wavelet transform. In this paper two techniques of quantization are employed for data embedding process. The magnitude of quantization step and embedding strength is adaptively determined according to the characteristics of the human auditory system (HAS). Therefore data embedding distortion is imperceptible for human ears. The experimental results show that the proposed watermarking scheme is transparence and very robust against common attacks such as additive Gaussian noise, low-pass filtering, resampling, requantization, shifting, cropping and MPEG compression.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125802502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Reversible Fragile Watermarking Based on Pyramidal Structure and Gradient Predicting Image 基于金字塔结构和梯度预测图像的可逆脆弱水印
F. Yeh, Greg C. Lee, Cheng-Chieh Chiang
The purpose of this research lies in the development of a reversible fragile watermarking scheme that not only can restore the original image but can also both correctly identify and localize unauthorized manipulations to a protected image. The similarities among the detail components of a pyramid-structure image are exploited to select appropriate embedding areas, and then the cryptographic watermarks are embedded into selected wavelet coefficients using a difference-expansion method. No extra space is required to store the watermark information, watermarks and watermark location map. Experimental results show that the proposed scheme can successfully obtain original image if protected image is unaltered, and unauthorized manipulations can be correctly identified and localized even when protected images undergoes a cropping attack.
本研究的目的在于开发一种可逆脆弱水印方案,该方案不仅可以恢复原始图像,而且可以正确识别和定位对受保护图像的未经授权的操作。利用金字塔结构图像细节成分之间的相似性选择合适的嵌入区域,然后采用差分展开法将加密水印嵌入选定的小波系数中。不需要额外的空间来存储水印信息、水印和水印位置图。实验结果表明,该算法能够在不改变被保护图像的情况下成功获取原始图像,并且在被保护图像受到裁剪攻击的情况下也能正确识别和定位未经授权的操作。
{"title":"Reversible Fragile Watermarking Based on Pyramidal Structure and Gradient Predicting Image","authors":"F. Yeh, Greg C. Lee, Cheng-Chieh Chiang","doi":"10.1109/IIH-MSP.2007.269","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.269","url":null,"abstract":"The purpose of this research lies in the development of a reversible fragile watermarking scheme that not only can restore the original image but can also both correctly identify and localize unauthorized manipulations to a protected image. The similarities among the detail components of a pyramid-structure image are exploited to select appropriate embedding areas, and then the cryptographic watermarks are embedded into selected wavelet coefficients using a difference-expansion method. No extra space is required to store the watermark information, watermarks and watermark location map. Experimental results show that the proposed scheme can successfully obtain original image if protected image is unaltered, and unauthorized manipulations can be correctly identified and localized even when protected images undergoes a cropping attack.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127479874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fast Multiple Reference Frame Selection Algorithm Based on H.264/AVC 基于H.264/AVC的快速多参考帧选择算法
Hongjun Wang, Lili Wang, Hua Li
H.264/AVC uses multi-reference frames to enhance the coding efficiency; the quantity of increased computation is linearly proportional to the number of reference frames. On the study of the multi-macro-block motion estimation of H.264 standard, a low-complexity and fast multi-frame selection method is proposed. The experimental results show that the speed of the proposed method is over two times faster than that of the original scheme adopted in JVT reference software JM10.2 while keeping the similar video quality and bit-rate.
H.264/AVC采用多参考帧来提高编码效率;增加的计算量与参考帧的数量成线性比例。在研究H.264标准中多宏块运动估计的基础上,提出了一种低复杂度、快速的多帧选择方法。实验结果表明,该方法的速度比JVT参考软件JM10.2中采用的原方案快两倍以上,同时保持了相似的视频质量和比特率。
{"title":"A Fast Multiple Reference Frame Selection Algorithm Based on H.264/AVC","authors":"Hongjun Wang, Lili Wang, Hua Li","doi":"10.1109/IIH-MSP.2007.17","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.17","url":null,"abstract":"H.264/AVC uses multi-reference frames to enhance the coding efficiency; the quantity of increased computation is linearly proportional to the number of reference frames. On the study of the multi-macro-block motion estimation of H.264 standard, a low-complexity and fast multi-frame selection method is proposed. The experimental results show that the speed of the proposed method is over two times faster than that of the original scheme adopted in JVT reference software JM10.2 while keeping the similar video quality and bit-rate.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124120108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1