The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A novel image watermark algorithm based on digital holography and ridgelet transform was designed by taking the advantage that ridgelet transform domain is a most suitable representation of image's linear outline edge features. Firstly, the image was divided into blocks, and each block was transformed by finite ridgelet transformation. Secondly, the digital holography watermark is embedded into the...
Just Noticeable Difference (JND) of interaural level difference (ILD) are measured in 30 subjects with nomal hearing. Single-frequency sine tones with the frequency of 200, 500, 1000, 2000, 5000, 8000 or 12000Hz are used in the subjective listening test. The reference ILDs are 0, 3, 6, 9, 12 and 22dB, indicating 6 directions of sound sources from midline to the direction of the right ear. The results...
In this paper, we validate the feasibility of similitude compress convex hull, and design a new classification based on the method. And, we give a judgment about two convex hulls' intersection and other parameters' estimation. Then we deduce the geometrical bisection method based on similitude compress convex hull. Besides, we present another method for compressing convex hull, and the linear separable...
H.264 adopts variable length coding and interprediction techniques, so compressed image is very sensitive to channel error. Meanwhile errors will influence subsequent frames, easily leading to the distortion of rebuilding images. To enhance the quality of reconstructed images, this text proposes a weighted outer boundary matching algorithms based on multiple reference frames, which exploits the characteristic...
Packet losses or errors of high compressed video stream during transmission over error-prone channel may cause serious decline in video quality. Error concealment (EC) at decoder side is an effective technology to reduce this video degradation. This paper proposes a Dynamic Temporal Error Concealment (DTEC) algorithm for H.264, which chooses different error concealment approach according to the variance...
Vector data compression system carries important significance in studies such as geography environment simulation, map database establishment and GIS. But there are lots of redundant points in the digital topographic map. In order to reduce storage space and improve the speed, vector data must be compressed. The compression algorithms of the line element are researched in the paper. The line element...
The double compression of JPEG images is one of the important evidences of image tampering. The paper proposes a novel passive double compressed JPEG image detection algorithm using the moment features of the modes based DCT histogram's characteristic function. Support vector machine is used as the classifier. Experimental results demonstrate that the proposed algorithm significantly increases the...
A color image compression algorithm based on quaternion neural network approach is proposed. The original RGB based color image of Lena can be firstly modeled as pure imaginary quaternion matrix, i.e. any pixel of R,G,B corresponding to the I,J,K imaginary axis , to ensure the integrity of pixel in the computation. The obtained quaternion matrix can be split up into 8 × 8 sub-blocks and vector quantization...
A kind of Embedded System for Protecting Certificate Against Forgery is developed by combining with the Face Recognition and Two-Dimensional Barcode in order to help us identify the authenticity of certificate more easily. The system can accomplish the work of detecting and tracking the human face which is captured and collected by USB camera precisely with the help of motion tracking algorithm and...
For image and video compression standards, one image is divided into a serial of non-overlapped blocks. Detecting edge existence and analyzing the edge direction in a block level is useful in the applications, such as perceptually improved coding, MB encoding mode decision, blocking artifacts reduction, content-based retrieval, senses changing detection, etc. This paper proposes a novel Fast Block...
In connection with the trend at Compression Solution For Monitoring Video Based On H.264, this paper propose an Efficient Compression Solution For Monitoring Video based on removal of redundant content, and describe it with the idea of Content Detection and Layered Quantization. This paper focus on the methods and implementation process of Macroblock-level layered quantization, and also analysis the...
Recently, GPU has evolved into a highly parallel, multithreading, many core processor with tremendous computational capability and very high memory bandwidth. At the same time, multi-core CPU evolution continued and today's CPUs have 4-8 cores which offer dramatically increased performance and power savings characteristics. We are aware of very few works that consider both devices cooperating to solve...
This paper presents a novel hardware implementation of the adaptive JPEG-LS in field programmable gate array (FPGA), based on the low complexity lossless compression for images (LOCO-I) compression scheme. Differently from what previously reported in literature, this design achieves a much lower complexity and super high data throughput through an improved prediction model by breaking the feedback...
An high-performance implementation of 2-D lifting-based Discrete Wavelet Transform (DWT) in JPEG2000 applications is designed with low memory and high pipeline architecture. The architecture consists of a row processor module, a column processor module and two memory modules. we present two new row/column processor architecture and memory architecture, one of which includes 7 dual port rams. The For...
This paper focuses on how to flexibly access massive vector data on embedded devices. Combining hierarchical access spatial index and vector data simplification methods, a kind of vector pyramid model is put forward based on extensions of multi-scale R-tree. In the model, a sequence of coarse snapshots from a detailed map is created by vector compression methods according to the screen resolution,...
Real-time streaming media transmission of wireless networks technology has become the research focus, mobile network based on CDMA2000 can meet the requirements of video data bandwidth of real-time transmission. According to the characteristics of mobile wireless networks, and the features of video compression coding, designed a scheme for streaming media transmission, can improve the quality of real-time...
In modern measurement technology, wireless sensor network has been widely used in the industrial and other fields. Threrinto,remote virtual measurement technoligy which use wireless network technology to obtain remote measuring data is a hot topics.In this paper,we ues wireless sensor networks to achieve remote measuring data,its emphases is the remote data transfer after measurement ,storing and...
Aiming at the problems of the relatively lower compression ratio and the difficulty in hardware implementation regarding Rice lossless compression algorithm for the Space-borne Remote-sensing images, an improved Rice method is proposed in which the length of predictor FIFO is determined by the size of input images and the global unicode for differences is used. The improved Rice algorithm is mainly...
Recently, data de-duplication, the hot emerging technology, has received a broad attention from both academia and industry. Some researches focus on the approach by which to reduce more redundant data. And the others investigate how to do de-duplication at high speed. In this paper, we aim at reducing the time and space requirement for data de-duplication. We describe a clustering architecture with...
A recoding-resisted blind watermark algorithm for H.264/AVC is proposed in this paper in consideration of the new features of this video coding standard. The watermark embedding is realized by modifying the DCT coefficients of each macroblock in I frames. In each Intra_4 × 4 macroblock, the watermark is embedded by modifying the high-frequency DCT coefficient of one specific subblock which has the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.