The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a new automatic histogram equalization algorithm which is based on Bi-Histogram Equalization (BHE) is proposed. The proposed method preserves the brightness and also improves the contrast. Mean value of the intensity is used for selecting the thresholds to avoid over enhancement also improving contrast of the image. The calculated mean limits the valley points to divide the histogram...
In this paper, it is proposed to design and implement a physical layer Unequal Error Protection (UEP) scheme based on convolutional codes and asymmetric 8PSK modulation. This scheme is combined with the UEP schemes at the application layer that is, multi-level unequal importance of compressed H.264/AVC video data. The proposed scheme takes the prioritized H.264 video data and encodes them with equal...
India is praised for its rich past and the culture. The rich heritage of the country has been carried over generations through the manuscripts and historic writings. A great deal of effort is being made to prevent their further degradation. A lot of research is also done in finding methods to digitize these documents so that they can be immortalized. But in order to achieve this, the noise in the...
The important issue of modern communication is establishing secret communication while using public channel and is achieved by steganography. In this paper, we propose Coherent Steganographic Technique using Segmentation and Discrete Cosine Transform (CSSDCT). The cover image is divided into 8*8 blocks and DCT is applied on each block. The number of payload MSB bits is embedded into DCT coefficients...
In this paper we compare data hiding techniques based on wavelet-like transform, viz., Slantlet transform, DD DT DWT and Complex Wavelet transforms, viz., DT CWT using wavelet based fusion method and thresholding method. The experimental results are compared with the existing method based on DWT. We observe that the proposed algorithms based on SLT and DT-CWT outperform the DWT in terms of visual...
Compressed video data is very sensitive to channel-induced errors and network losses. Most conventional unequal error protection techniques involve forward error correction codes of different rates or asymmetric signal constellations for data of different priorities. It is yet unknown if combining the above two techniques can further improve performance. In this paper, we investigate rate-compatible...
It is well known that the images, often used in variety of computer applications, are difficult to store and transmit. One possible solution to overcome this problem is to use a data compression technique where an image is viewed as a matrix and then the operations are performed on the matrix. In this paper, image compression is achieved by using singular value decomposition (SVD) technique on the...
In this paper we present a distortionless data hiding technique based on wavelet-like transform, known as Slantlet Transform (SLT). The proposed algorithm first encodes the original message using the encoder, T-codes. T-codes have shown to be more robust than the best known variable-length codes, Huffman codes. T-codes have a well-explained resyhchronization mechanism which leads to fast and reliable...
In this paper, we discuss a novel priority assignment and packetization scheme to transport H.264/AVC video packets over wireless networks. Specifically, we discuss a comprehensive packet priority assignment scheme for unequal error protection, followed by the use of adaptive network abstraction layer unit (NALU) sizes and NALU fragmentation schemes. These schemes use the standard-compliant decoder...
We present a cross-layer and multilevel unequal error protection (UEP) approach for robust video transmission over noisy wireless channels. We combine the UEP schemes at the application layer (i.e., multi-level unequal importance of compressed H.264/AVC video data) and physical layer (multi-resolution asymmetric 8-PSK modulation). The proposed scheme multiplexes the video data by mapping it to the...
In this paper we propose a steganography technique based on Stantlet transform and T-codes. The Stantlet transform are wavelet-like transforms that provides better time localization and signal compression than the conventional discrete cosine transforms (DCT) and discrete Haar-wavelet transforms. T-codes are used for better embedding capacity and decoding efficiency. The proposed method first encodes...
This paper presents a distributed source coding scheme for two correlated image data using Log-MAP and SOVA decoders. Both decoderspsila peak signal to noise ratio (PSNR) performance has been studied in symmetric as well as asymmetric turbo codes environment. Turbo codes are promising for distributed source coding (DSC) because of their simple encoding implementation and impressive decoding performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.