The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a VLSI architecture of rhombus interpolation based reversible watermarking by difference expansion. The proposed architecture have been implemented and tested on Xilinx Virtex-7 FPGA, Zynq SoC (System On Chip) and ultra-scale FPGA platforms. The system is based on the modified rhombus interpolation scheme to embed and extract the copyright protection for medical and military imaging...
In order to improve the quality of H.264 video transmission in wireless networks, a data hiding based adaptive error recovery approach is proposed in this paper. With this approach, the important data for each macroblock (MB) of the H.264 intra-coded I frame are extracted adaptively at the encoder and embedded into the RTP header of the next frame. At the decoder, if the important data for a corrupted...
Loss less data hiding, also known as reversible data hiding, is a newly developed research field and relating applications in digital rights management (DRM). Secret information can be hidden into original image at the encoder, and then image containing secret data is delivered to the decoder. For decoding, original image and secret information need to be perfectly recovered from the received image...
Reversible data hiding can be classified into two major research branches, one is by use of the histogram of original image, named the H scheme, and the other is by manipulating pixel relations between adjacent pixels, called the difference expansion (DE) scheme. Both schemes have their own advantages and drawbacks, but the inherent characteristics of original image are seldom considered in existing...
This paper presents a novel error-resilient strategy which employs a reversible watermarking technique to protect the H.264/AVC video content. The proposed scheme adopts reversible watermarking to embed an error detection codeword within every Macro block (MB). The watermark is then extracted at the decoder and used to detect the corrupted MBs to be concealed. The proposed scheme further manages to...
In this paper, the authors propose a novel method to measure the perceived picture quality of H.264 coded video based on hybrid no reference framework. The latter term means that the proposed model uses only receiver-side information for objective video quality assessment, but analyzes both the compressed bitstream and baseband signals of the decoded picture to improve the estimation accuracy of the...
This paper proposes a scheme that integrates error concealment and quality access control of digital image(s) in a single platform. The objective is achieved by embedding some important information extracted from the original image itself, to introduce sufficient redundancy in the transmitted image. The data embedding is done by modulating integer wavelet coefficients using quantization index modulation...
An MPEG-2 to H.264 intra transcoding method is proposed. This method uses the encoding information from an MPEG-2 stream and keeps as many DCT coefficients of the original MPEG-2 bitstream as possible. Experimental results show that the proposed method improves PSNR by about 0.76-1.27 dB compared with a typical conventional method.
Transmission of videos in error prone environments may lead to video corruption or loss. Therefore error concealment at the decoder side has to be applied. Commonly error concealment techniques make use of the surrounding correctly received image data or motion information for concealment. In this paper, a novel spatio-temporal boundary matching algorithm (STBMA) by exploiting both spatial and temporal...
In this paper, we discuss a novel priority assignment and packetization scheme to transport H.264/AVC video packets over wireless networks. Specifically, we discuss a comprehensive packet priority assignment scheme for unequal error protection, followed by the use of adaptive network abstraction layer unit (NALU) sizes and NALU fragmentation schemes. These schemes use the standard-compliant decoder...
Due to the growing interest in video delivery over unreliable channels, the problem of error concealment in video communication is increasingly important. Our goal is to enable the correct decoding of bitstream, on the top of that, have a maximum playable frame rate and video quality. To be able to better combat packet loss, this article proposes a UEP solution in data partitioned H.264 video. Using...
This paper proposes a fragile watermarking algorithm named compression watermarking algorithm (CWA) which provides compression and authentication functions to apply in MJPEG of video surveillance system. The watermark information is embedded into every 8 times 8 block in the coefficient domain in encoding process and extracted watermark from each 8 times 8 block in the coefficient domain in decoding...
Compressed video bitstream is intended for real-time transmission over communication networks. However, it is very sensitive to transmission errors. Even a single bit error can lead to disastrous video quality degradation in both time and spatial domain. This quality deterioration is exacerbated when no error control mechanism is employed to protect coded video data against the error prone environments...
Mobile devices are often characterized by their relatively low processing power. Applications running on these devices should therefore avoid heavy computations in order to save valuable battery lifetime. We present a selective packet discard scheme for streaming video which does not need receiver-side calculations, therefore perfectly satisfying this constraint in many common scenarios (e.g. mobile...
In earlier work, Demaret and Iske proposed the scattered data coding (SDC) method for (single-rate) coding of arbitrarily-sampled image data. In this paper, several modifications to the SDC method are proposed in order to remove some limitations of the original scheme, improve coding efficiency, and add a progressive lossy-to-lossless coding capability. Through experimental results, the proposed method...
High-quality and low-latency video streaming is essential to providing a natural user experience in video conferencing. This is challenging over lossy networks since compressed video is highly fragile while the low-latency requirement limits the effectiveness of traditional error control approaches such as retransmission and forward error correction. In this paper, we advocate a practical solution...
In this paper we propose a steganography technique based on Stantlet transform and T-codes. The Stantlet transform are wavelet-like transforms that provides better time localization and signal compression than the conventional discrete cosine transforms (DCT) and discrete Haar-wavelet transforms. T-codes are used for better embedding capacity and decoding efficiency. The proposed method first encodes...
Distributed video coding (DVC) has been proposed for different new application domains. This rise is apparently motivated by the very attractive features of its flexibility for building very low cost video encoders and the very high built-in error resilience when applied over noisy communication channels. These features could be very effectively exploited in several application domains including wireless...
The development of an efficient and reliable multiple descriptions coding (MDC) scheme over lossy communication networks has been described. The advantage of MDC is that, if all the channels work, a high quality, possibly lossless, reconstruction can be achieved from all the received descriptions. On the other hand, a lower but still acceptable quality can be achieved if some of the channels are not...
Information hiding (also known as data hiding), is a process of embedding secret message into a cover media for the purpose of covert communication, identification, security and copyright. Information hiding is used to conceal the content of messages. This is achieved by hiding secret message into other digital media like audio, images, video etc. For hiding secret message information in images, there...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.