首页 > 最新文献

2008 IEEE 10th Workshop on Multimedia Signal Processing最新文献

英文 中文
Color image database for evaluation of image quality metrics 用于评价图像质量指标的彩色图像数据库
Pub Date : 2008-11-05 DOI: 10.1109/MMSP.2008.4665112
N. Ponomarenko, V. Lukin, K. Egiazarian, J. Astola, M. Carli, F. Battisti
In this contribution, a new image database for testing full-reference image quality assessment metrics is presented. It is based on 1700 test images (25 reference images, 17 types of distortions for each reference image, 4 levels for each type of distortion). Using this image database, 654 observers from three different countries (Finland, Italy, and Ukraine) have carried out about 400000 individual human quality judgments (more than 200 judgments for each distorted image). The obtained mean opinion scores for the considered images can be used for evaluating the performances of visual quality metrics as well as for comparison and for the design of new metrics. The database, with testing results, is freely available.
在这篇贡献中,提出了一个用于测试全参考图像质量评估指标的新图像数据库。它基于1700张测试图像(25张参考图像,每张参考图像有17种畸变,每种畸变有4个级别)。利用这个图像数据库,来自三个不同国家(芬兰、意大利和乌克兰)的654名观察员进行了大约40万次个人质量判断(每张扭曲图像超过200次判断)。所考虑的图像获得的平均意见分数可用于评估视觉质量指标的性能,以及用于比较和设计新指标。包含测试结果的数据库是免费提供的。
{"title":"Color image database for evaluation of image quality metrics","authors":"N. Ponomarenko, V. Lukin, K. Egiazarian, J. Astola, M. Carli, F. Battisti","doi":"10.1109/MMSP.2008.4665112","DOIUrl":"https://doi.org/10.1109/MMSP.2008.4665112","url":null,"abstract":"In this contribution, a new image database for testing full-reference image quality assessment metrics is presented. It is based on 1700 test images (25 reference images, 17 types of distortions for each reference image, 4 levels for each type of distortion). Using this image database, 654 observers from three different countries (Finland, Italy, and Ukraine) have carried out about 400000 individual human quality judgments (more than 200 judgments for each distorted image). The obtained mean opinion scores for the considered images can be used for evaluating the performances of visual quality metrics as well as for comparison and for the design of new metrics. The database, with testing results, is freely available.","PeriodicalId":402287,"journal":{"name":"2008 IEEE 10th Workshop on Multimedia Signal Processing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115398389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 206
Informed stego-systems in active warden context: Statistical undetectability and capacity 主动监狱长背景下的知情stego系统:统计不可探测性和能力
Pub Date : 2008-11-05 DOI: 10.1109/MMSP.2008.4665167
S. Braci, C. Delpha, R. Boyer, Gaëtan Le Guelvouit
Several authors have studied stego-systems based on Costa scheme, but just a few ones gave both theoretical and experimental justifications of these schemes performance in an active warden context. We provide in this paper a steganographic and comparative study of three informed stego-systems in active warden context: scalar Costa scheme, trellis-coded quantization and spread transform scalar sosta Scheme. By leading on analytical formulations and on experimental evaluations, we show the advantages and limits of each scheme in term of statistical undetectability and capacity in the case of active warden. Such as the undetectability is given by the distance between the stego-signal and the cover distance. It is measured by the Kullback-Leibler distance.
几位作者研究了基于Costa方案的隐写系统,但只有少数人给出了这些方案在主动监狱长环境下表现的理论和实验证明。本文对主动监视环境下的三种知情隐写系统:标量Costa格式、栅格编码量化和扩展变换标量sosta格式进行了隐写和比较研究。通过分析公式和实验评估,我们展示了在主动监狱长的情况下,每种方案在统计不可检测性和能力方面的优点和局限性。如隐写信号与掩蔽距离之间的距离给出了隐写信号的不可探测性。它是用Kullback-Leibler距离来测量的。
{"title":"Informed stego-systems in active warden context: Statistical undetectability and capacity","authors":"S. Braci, C. Delpha, R. Boyer, Gaëtan Le Guelvouit","doi":"10.1109/MMSP.2008.4665167","DOIUrl":"https://doi.org/10.1109/MMSP.2008.4665167","url":null,"abstract":"Several authors have studied stego-systems based on Costa scheme, but just a few ones gave both theoretical and experimental justifications of these schemes performance in an active warden context. We provide in this paper a steganographic and comparative study of three informed stego-systems in active warden context: scalar Costa scheme, trellis-coded quantization and spread transform scalar sosta Scheme. By leading on analytical formulations and on experimental evaluations, we show the advantages and limits of each scheme in term of statistical undetectability and capacity in the case of active warden. Such as the undetectability is given by the distance between the stego-signal and the cover distance. It is measured by the Kullback-Leibler distance.","PeriodicalId":402287,"journal":{"name":"2008 IEEE 10th Workshop on Multimedia Signal Processing","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123100153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Image tampering detection by blocking periodicity analysis in JPEG compressed images 基于块周期性分析的JPEG压缩图像篡改检测
Pub Date : 2008-11-05 DOI: 10.1109/MMSP.2008.4665184
Yi-Lei Chen, Chiou-Ting Hsu
Since JPEG image format has been a popularly used image compression standard, tampering detection in JPEG images now plays an important role. The artifacts introduced by lossy JPEG compression can be seen as an inherent signature for compressed images. In this paper, we propose a new approach to analyse the blocking periodicity by, 1) developing a linearly dependency model of pixel differences, 2) constructing a probability map of each pixelpsilas belonging to this model, and 3) finally extracting a peak window from the Fourier spectrum of the probability map. We will show that, for single and double compressed images, their peakspsila energy distribution behave very differently. We exploit this property and derive statistic features from peak windows to classify whether an image has been tampered by cropping and recompression. Experimental results demonstrate the validity of the proposed approach.
由于JPEG图像格式已成为一种广泛使用的图像压缩标准,因此对JPEG图像的篡改检测现在起着重要的作用。有损JPEG压缩带来的伪影可以看作是压缩图像的固有特征。在本文中,我们提出了一种新的方法来分析阻塞周期性,1)建立像素差的线性依赖模型,2)构建属于该模型的每个像素的概率图,3)最后从概率图的傅里叶谱中提取峰窗。我们将证明,对于单压缩和双压缩图像,它们的峰值能量分布表现非常不同。我们利用这一特性,并从峰值窗口导出统计特征来分类图像是否被裁剪和再压缩篡改。实验结果证明了该方法的有效性。
{"title":"Image tampering detection by blocking periodicity analysis in JPEG compressed images","authors":"Yi-Lei Chen, Chiou-Ting Hsu","doi":"10.1109/MMSP.2008.4665184","DOIUrl":"https://doi.org/10.1109/MMSP.2008.4665184","url":null,"abstract":"Since JPEG image format has been a popularly used image compression standard, tampering detection in JPEG images now plays an important role. The artifacts introduced by lossy JPEG compression can be seen as an inherent signature for compressed images. In this paper, we propose a new approach to analyse the blocking periodicity by, 1) developing a linearly dependency model of pixel differences, 2) constructing a probability map of each pixelpsilas belonging to this model, and 3) finally extracting a peak window from the Fourier spectrum of the probability map. We will show that, for single and double compressed images, their peakspsila energy distribution behave very differently. We exploit this property and derive statistic features from peak windows to classify whether an image has been tampered by cropping and recompression. Experimental results demonstrate the validity of the proposed approach.","PeriodicalId":402287,"journal":{"name":"2008 IEEE 10th Workshop on Multimedia Signal Processing","volume":"76 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120821178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Modelling an individual’s Web search interests by utilizing navigational data 利用导航数据对个人的网络搜索兴趣进行建模
Pub Date : 2008-11-05 DOI: 10.1109/MMSP.2008.4665164
Hao Wen, L. Fang, L. Guan
An approach to model and quantify a userpsilas Web search interests using the userpsilas navigational data is presented. The approach is based on the premise that frequently visiting certain types of content indicates that the user is interested in that content. The proposed approach can be divided into three steps: monitoring the userpsilas navigational data; using the cumulative weight to determine a Web pagepsilas content; and employing the Naive Bayes Model for updating the userpsilas interest model. In order to demonstrate the effectiveness of the proposed model, experimental software is developed to analyze a userpsilas interests in sports. The experimental results demonstrate that the approach can effectively model the userpsilas interest. The proposed model could be integrated with personalized Web services.
提出了一种利用用户导航数据对用户Web搜索兴趣进行建模和量化的方法。该方法基于这样一个前提:频繁访问某些类型的内容表明用户对该内容感兴趣。该方法可分为三个步骤:监测用户的导航数据;使用累积权值确定网页内容;采用朴素贝叶斯模型更新用户兴趣模型。为了验证所提模型的有效性,我们开发了实验软件来分析某用户的体育兴趣。实验结果表明,该方法可以有效地对用户兴趣进行建模。所提出的模型可以与个性化Web服务集成。
{"title":"Modelling an individual’s Web search interests by utilizing navigational data","authors":"Hao Wen, L. Fang, L. Guan","doi":"10.1109/MMSP.2008.4665164","DOIUrl":"https://doi.org/10.1109/MMSP.2008.4665164","url":null,"abstract":"An approach to model and quantify a userpsilas Web search interests using the userpsilas navigational data is presented. The approach is based on the premise that frequently visiting certain types of content indicates that the user is interested in that content. The proposed approach can be divided into three steps: monitoring the userpsilas navigational data; using the cumulative weight to determine a Web pagepsilas content; and employing the Naive Bayes Model for updating the userpsilas interest model. In order to demonstrate the effectiveness of the proposed model, experimental software is developed to analyze a userpsilas interests in sports. The experimental results demonstrate that the approach can effectively model the userpsilas interest. The proposed model could be integrated with personalized Web services.","PeriodicalId":402287,"journal":{"name":"2008 IEEE 10th Workshop on Multimedia Signal Processing","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121086298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Automated identification of lung nodules 肺结节的自动识别
Pub Date : 2008-11-05 DOI: 10.1109/MMSP.2008.4665129
Shu Ling Alycia Lee, A. Kouzani, E. Hu
A system that can automatically detect nodules within lung images may assist expert radiologists in interpreting the abnormal patterns as nodules in 2D CT lung images. A system is presented that can automatically identify nodules of various sizes within lung images. The pattern classification method is employed to develop the proposed system. A random forest ensemble classifier is formed consisting of many weak learners that can grow decision trees. The forest selects the decision that has the most votes. The developed system consists of two random forest classifiers connected in a series fashion. A subset of CT lung images from the LIDC database is employed. It consists of 5721 images to train and test the system. There are 411 images that contained expert- radiologists identified nodules. Training sets consisting of nodule, non-nodule, and false-detection patterns are constructed. A collection of test images are also built. The first classifier is developed to detect all nodules. The second classifier is developed to eliminate the false detections produced by the first classifier. According to the experimental results, a true positive rate of 100%, and false positive rate of 1.4 per lung image are achieved.
一种可以自动检测肺图像中的结节的系统可以帮助放射科专家将2D CT肺图像中的异常模式解释为结节。提出了一种能够自动识别肺图像中不同大小结节的系统。采用模式分类方法开发了该系统。由多个弱学习器组成的随机森林集成分类器可以生长决策树。森林会选择得票最多的决定。所开发的系统由两个随机森林分类器串联而成。采用LIDC数据库中的CT肺图像子集。它由5721张图像组成,用于训练和测试系统。有411张图像包含放射专家鉴定的结节。构造了由结节、非结节和假检测模式组成的训练集。还构建了一组测试映像。第一种分类器是用来检测所有结节的。第二分类器是为了消除第一分类器产生的错误检测而开发的。实验结果表明,该方法的真阳性率为100%,每张肺图像的假阳性率为1.4。
{"title":"Automated identification of lung nodules","authors":"Shu Ling Alycia Lee, A. Kouzani, E. Hu","doi":"10.1109/MMSP.2008.4665129","DOIUrl":"https://doi.org/10.1109/MMSP.2008.4665129","url":null,"abstract":"A system that can automatically detect nodules within lung images may assist expert radiologists in interpreting the abnormal patterns as nodules in 2D CT lung images. A system is presented that can automatically identify nodules of various sizes within lung images. The pattern classification method is employed to develop the proposed system. A random forest ensemble classifier is formed consisting of many weak learners that can grow decision trees. The forest selects the decision that has the most votes. The developed system consists of two random forest classifiers connected in a series fashion. A subset of CT lung images from the LIDC database is employed. It consists of 5721 images to train and test the system. There are 411 images that contained expert- radiologists identified nodules. Training sets consisting of nodule, non-nodule, and false-detection patterns are constructed. A collection of test images are also built. The first classifier is developed to detect all nodules. The second classifier is developed to eliminate the false detections produced by the first classifier. According to the experimental results, a true positive rate of 100%, and false positive rate of 1.4 per lung image are achieved.","PeriodicalId":402287,"journal":{"name":"2008 IEEE 10th Workshop on Multimedia Signal Processing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127337497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A comparative study of ± steganalyzers ±隐写分析器的比较研究
Pub Date : 2008-11-05 DOI: 10.1109/MMSP.2008.4665182
Giacomo Cancelli, G. Doërr, M. Barni, I. Cox
We compare the performance of three steganalysis system for detection of plusmn1 steganography. We examine the relative performance of each system on three commonly used image databases. Experimental results clearly demonstrate that both absolute and relative performance of all three algorithms vary considerably across databases. This sensitivity suggests that considerably more work is needed to develop databases that are more representative of diverse imagery. In addition, we investigate how performance varies based on a variety of training and testing assumptions, specifically (i) that training and testing are performed for a fixed and known embedding rate, (ii) training is performed at one embedding rate, but testing is over a range of embedding rates, (iii) training and testing are performed over a range of embedding rates. As expected, experimental results show that performance under (ii) and (iii) is inferior to (i). The experimental results also suggest that test results for different embedding rates should not be consolidated into a single score, but rather reported separately. Otherwise, good performance at high embedding rates may mask poor performance at low embedding rates.
我们比较了三种隐写分析系统检测plusmn1隐写的性能。我们在三种常用的图像数据库上检查了每个系统的相对性能。实验结果清楚地表明,这三种算法的绝对性能和相对性能在不同的数据库中差异很大。这种敏感性表明,需要做更多的工作来开发更能代表各种图像的数据库。此外,我们研究了基于各种训练和测试假设的性能变化情况,特别是(i)训练和测试是针对固定和已知的嵌入率进行的,(ii)训练是在一个嵌入率下进行的,但测试是在一个嵌入率范围内进行的,(iii)在一个嵌入率范围内进行训练和测试。正如预期的那样,实验结果表明(ii)和(iii)下的性能不如(i)。实验结果还表明,不同嵌入率的测试结果不应合并为一个分数,而应单独报告。否则,高嵌入率下的良好性能可能会掩盖低嵌入率下的不良性能。
{"title":"A comparative study of ± steganalyzers","authors":"Giacomo Cancelli, G. Doërr, M. Barni, I. Cox","doi":"10.1109/MMSP.2008.4665182","DOIUrl":"https://doi.org/10.1109/MMSP.2008.4665182","url":null,"abstract":"We compare the performance of three steganalysis system for detection of plusmn1 steganography. We examine the relative performance of each system on three commonly used image databases. Experimental results clearly demonstrate that both absolute and relative performance of all three algorithms vary considerably across databases. This sensitivity suggests that considerably more work is needed to develop databases that are more representative of diverse imagery. In addition, we investigate how performance varies based on a variety of training and testing assumptions, specifically (i) that training and testing are performed for a fixed and known embedding rate, (ii) training is performed at one embedding rate, but testing is over a range of embedding rates, (iii) training and testing are performed over a range of embedding rates. As expected, experimental results show that performance under (ii) and (iii) is inferior to (i). The experimental results also suggest that test results for different embedding rates should not be consolidated into a single score, but rather reported separately. Otherwise, good performance at high embedding rates may mask poor performance at low embedding rates.","PeriodicalId":402287,"journal":{"name":"2008 IEEE 10th Workshop on Multimedia Signal Processing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125029774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Improved side information generation for Distributed Video Coding 改进的分布式视频编码侧信息生成
Pub Date : 2008-11-05 DOI: 10.1109/MMSP.2008.4665079
Xin Huang, Søren Forchhammer
As a new coding paradigm, distributed video coding (DVC) deals with lossy source coding using side information to exploit the statistics at the decoder to reduce computational demands at the encoder. The performance of DVC highly depends on the quality of side information. With a better side information generation method, fewer bits will be requested from the encoder and more reliable decoded frames will be obtained. In this paper, a side information generation method is introduced to further improve the rate-distortion (RD) performance of transform domain distributed video coding. This algorithm consists of a variable block size based Y, U and V component motion estimation and an adaptive weighted overlapped block motion compensation (OBMC). The proposal is tested and compared with the results of an executable DVC codec released by DISCOVER group (DIStributed COding for Video sERvices). RD improvements on the set of test sequences are observed.
分布式视频编码(DVC)作为一种新的编码范式,利用侧信息处理有损源编码,利用解码器的统计信息来减少编码器的计算需求。DVC的性能在很大程度上取决于侧信息的质量。采用更好的侧信息生成方法,可以减少编码器所需的比特数,获得更可靠的解码帧。为了进一步提高变换域分布式视频编码的码率失真性能,提出了一种边信息生成方法。该算法由基于可变块大小的Y、U和V分量运动估计和自适应加权重叠块运动补偿(OBMC)组成。对该方案进行了测试,并与DISCOVER组发布的可执行DVC编解码器的结果进行了比较。在测试序列集上观察到RD的改进。
{"title":"Improved side information generation for Distributed Video Coding","authors":"Xin Huang, Søren Forchhammer","doi":"10.1109/MMSP.2008.4665079","DOIUrl":"https://doi.org/10.1109/MMSP.2008.4665079","url":null,"abstract":"As a new coding paradigm, distributed video coding (DVC) deals with lossy source coding using side information to exploit the statistics at the decoder to reduce computational demands at the encoder. The performance of DVC highly depends on the quality of side information. With a better side information generation method, fewer bits will be requested from the encoder and more reliable decoded frames will be obtained. In this paper, a side information generation method is introduced to further improve the rate-distortion (RD) performance of transform domain distributed video coding. This algorithm consists of a variable block size based Y, U and V component motion estimation and an adaptive weighted overlapped block motion compensation (OBMC). The proposal is tested and compared with the results of an executable DVC codec released by DISCOVER group (DIStributed COding for Video sERvices). RD improvements on the set of test sequences are observed.","PeriodicalId":402287,"journal":{"name":"2008 IEEE 10th Workshop on Multimedia Signal Processing","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125854354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Small and dim moving target detection in deep space background 深空背景下弱小运动目标检测
Pub Date : 2008-11-05 DOI: 10.1109/MMSP.2008.4665202
Jinqiu Sun, Yanning Zhang, Jiangbin Zheng, Lei Jiang, Si-wei You
In this article, the selective visual attention mechanism and curve detection by Connect The Dots model is introduced to small and dim target detection in deep space background. The greyscale and movement continual significance are fully taken into account to get focus of attention integration map. A curve detection method which based on Connect The Dots model is designed to detect the target trajectory. Qualitative and quantitative results prove that the proposed algorithm has strong anti-noise performance and improve calculate efficiency of detection system effectively.
本文将选择性视觉注意机制和连接点模型的曲线检测引入到深空背景下弱小目标的检测中。该方法充分考虑了灰度和运动连续显著性,得到了注意力集中的整合图。设计了一种基于连点模型的目标轨迹曲线检测方法。定性和定量结果表明,该算法具有较强的抗噪声性能,有效地提高了检测系统的计算效率。
{"title":"Small and dim moving target detection in deep space background","authors":"Jinqiu Sun, Yanning Zhang, Jiangbin Zheng, Lei Jiang, Si-wei You","doi":"10.1109/MMSP.2008.4665202","DOIUrl":"https://doi.org/10.1109/MMSP.2008.4665202","url":null,"abstract":"In this article, the selective visual attention mechanism and curve detection by Connect The Dots model is introduced to small and dim target detection in deep space background. The greyscale and movement continual significance are fully taken into account to get focus of attention integration map. A curve detection method which based on Connect The Dots model is designed to detect the target trajectory. Qualitative and quantitative results prove that the proposed algorithm has strong anti-noise performance and improve calculate efficiency of detection system effectively.","PeriodicalId":402287,"journal":{"name":"2008 IEEE 10th Workshop on Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116089368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An ARMA(1,1) prediction model of first person shooter game traffic 第一人称射击游戏流量的ARMA(1,1)预测模型
Pub Date : 2008-11-05 DOI: 10.1109/MMSP.2008.4665172
P. Branch, A. Cricenti, G. Armitage
Modeling traffic generated by Internet-based multiplayer computer games has attracted a great deal of attention in the past few years. In part this has been driven by a need to simulate correctly the network impact of highly interactive online game genres such as the first person shooter (FPS). Packet size distributions and autocovariance models are important elements in the creation of realistic traffic generators for network simulators. In this paper we present simple techniques for creating representative models for N-player FPS games based on empirically measured traffic of 2- and 3-player games. The models capture the packet size distribution as well as the time series behaviour of game traffic. We illustrate the likely generality of our approach using data from seven FPS games that have been popular over the past nine years: Half-Life, Half-Life Counterstrike, Half-Life 2, Half-Life 2 Counterstrike, Quake III Arena, Quake 4 and Wolfenstein Enemy Territory.
在过去的几年里,基于互联网的多人电脑游戏产生的流量建模引起了人们的极大关注。在某种程度上,这是由于需要正确模拟高度互动的在线游戏类型(如第一人称射击游戏)的网络影响。数据包大小分布和自协方差模型是为网络模拟器创建真实流量生成器的重要元素。在本文中,我们基于经验测量的2人和3人游戏的流量,提出了为n人FPS游戏创建代表性模型的简单技术。该模型捕获数据包大小分布以及游戏流量的时间序列行为。我们用过去9年流行的7款FPS游戏的数据来说明我们方法的普遍性:《半条命》、《半条命反恐精英》、《半条命2》、《半条命2反恐精英》、《雷神之锤III竞技场》、《雷神之锤4》和《德军总部》。
{"title":"An ARMA(1,1) prediction model of first person shooter game traffic","authors":"P. Branch, A. Cricenti, G. Armitage","doi":"10.1109/MMSP.2008.4665172","DOIUrl":"https://doi.org/10.1109/MMSP.2008.4665172","url":null,"abstract":"Modeling traffic generated by Internet-based multiplayer computer games has attracted a great deal of attention in the past few years. In part this has been driven by a need to simulate correctly the network impact of highly interactive online game genres such as the first person shooter (FPS). Packet size distributions and autocovariance models are important elements in the creation of realistic traffic generators for network simulators. In this paper we present simple techniques for creating representative models for N-player FPS games based on empirically measured traffic of 2- and 3-player games. The models capture the packet size distribution as well as the time series behaviour of game traffic. We illustrate the likely generality of our approach using data from seven FPS games that have been popular over the past nine years: Half-Life, Half-Life Counterstrike, Half-Life 2, Half-Life 2 Counterstrike, Quake III Arena, Quake 4 and Wolfenstein Enemy Territory.","PeriodicalId":402287,"journal":{"name":"2008 IEEE 10th Workshop on Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122394673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
An evaluation of possession information in playfield zones from soccer video using mid-level descriptors 利用中级描述符对足球视频中球场区域的占有信息进行评估
Pub Date : 2008-11-05 DOI: 10.1109/MMSP.2008.4665162
S. Aydın, M. Karsligil
In this paper, we propose a method to acquire the possession information in different zones of the playfield from soccer video by using view type and playfield zone mid-level descriptors. First, each video frame is classified into three kinds of view type according to a domain-specific feature, grass area ratio and series of classification rules. Then, the classified frames are used to determine the currently active playfield zone in the match. The history of active playfield zones is post processed to acquire the possession information in playfield zones during the game. The efficiency and effectiveness of the proposed method are demonstrated over a large collection of soccer video data with different stadiums and conditions.
本文提出了一种利用视角类型和场地区域中层描述符从足球视频中获取场地不同区域的占有信息的方法。首先,根据特定领域特征、草面积比和一系列分类规则,将每个视频帧划分为三种视图类型。然后,使用分类帧来确定比赛中当前活动的场地区域。在比赛过程中,对活动场地区域的历史进行后处理以获取场地区域的控球信息。通过大量不同场地和条件的足球视频数据,验证了该方法的有效性和有效性。
{"title":"An evaluation of possession information in playfield zones from soccer video using mid-level descriptors","authors":"S. Aydın, M. Karsligil","doi":"10.1109/MMSP.2008.4665162","DOIUrl":"https://doi.org/10.1109/MMSP.2008.4665162","url":null,"abstract":"In this paper, we propose a method to acquire the possession information in different zones of the playfield from soccer video by using view type and playfield zone mid-level descriptors. First, each video frame is classified into three kinds of view type according to a domain-specific feature, grass area ratio and series of classification rules. Then, the classified frames are used to determine the currently active playfield zone in the match. The history of active playfield zones is post processed to acquire the possession information in playfield zones during the game. The efficiency and effectiveness of the proposed method are demonstrated over a large collection of soccer video data with different stadiums and conditions.","PeriodicalId":402287,"journal":{"name":"2008 IEEE 10th Workshop on Multimedia Signal Processing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122431632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2008 IEEE 10th Workshop on Multimedia Signal Processing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1