Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
On the basis of general pivot method for paraphrase extraction which might introduce much noise in extracted paraphrases, this paper proposes a syntactic knowledge-enhanced method to extract higher-quality paraphrases to further improve the quality of statistical machine translation. Firstly, the syntactic knowledge is acquired and added to paraphrase extraction algorithm as constraints to obtain...
This paper proposes a new vacating room after encryption reversible data hiding scheme. Both joint and separate methods are presented. The most interesting features of the proposed scheme are the two staged embedding/decoding process and the group parity based data embedding for the separate method. Other new features are introduced as well. Compared with the state-of-the-art reserving room after...
Text instance as one category of self-described objects provides valuable information for understanding and describing cluttered scenes. In this paper, we explore the task of unambiguous text localization and retrieval, to accurately localize a specific targeted text instance in a cluttered image given a natural language description that refers to it. To address this issue, first a novel recurrent...
This paper revisits the recently proposed adaptive pairwise reversible watermarking scheme of IEEE Trans. on Image Processing 2016 and investigates a different pairing that favors the grouping in the horizontal direction. The horizontal grouping imposes a new prediction scheme, a different complexity measure, a new pixel selection procedure and several other adjustments. For some test images, the...
In the last few years, visual privacy has become a major problem. Because of this, encrypted image processing has received a lot of attention within the scientific and business communities. Data hiding in encrypted images (DHEI) is an effective technique to embed data in the encrypted domain. The owner of an image encrypts it with a secret key and it is still possible to embed additional data without...
Encouraged by recent waves of successful applications of deep learning, some researchers have demonstrated the effectiveness of applying convolutional neural networks (CNN) to time series classification problems. However, CNN and other traditional methods require the input data to be of the same dimension which prevents its direct application on data of various lengths and multi-channel time series...
We propose a novel decoding framework (Hybrid RSD-SE framework: Rhetorical Structure Decoding-Summary Extraction framework) for extracting summaries with rhetorical structure information from speech. Rhetorical structure hidden in speech data which helps us understand speech easier is always under-utilized. The hybrid RSDSE framework automatically decodes this underlying information in order to provide...
The growing popularity of powerful mobile devices such as smart phones and tablet devices has resulted in the exponential growth of demand for video applications. However, due to the intensive computation of the video decoding process, mobile video applications require frequent embedded memory access, which consumes a large amount of power and limits battery life. Various low-voltage memory techniques...
Visual context is fundamental to understand human actions in videos. However, to efficiently employ temporal context information presents an enormous challenge to this area. Two main problems are long-standing: (1) video frames are redundant while discriminative information is sparse; (2) large amount of interference information is mixed in frame sequences. These factors results in redundant computation...
High Efficiency Video Coding (HEVC) is gradually replacing its predecessor, the H.264/AVC standard, as the state-of-the-art technology for video compression. However, H.264/AVC has dominated the market for over a decade, so that there is an enormous amount of legacy content that must be migrated. This paper proposes a fast transcoder based on an extensive data mining process on H.264/AVC decoding...
In this paper, an improved lossless data hiding method with histogram shifting for medical images is proposed. In general, medical images consist of many pure black and white points. In the previous studies, it may need a lot of data as a location map to reconstruct the watermark and the cover image. To solve this problem, we present a new method to record the location map. We use two bits for each...
Intra prediction is an important component of video compression. The High Efficiency Video Coding (HEVC) standard supports advanced Intra prediction tools to achieve remarkable Intra coding performance. However, higher compression efficiency performance may be achieved using Combined Intra Prediction (CIP). CIP consists in combining conventional Intra reference samples, with samples extracted from...
To provide more powerful video enabled applications, e.g. in video surveillance environments, it is increasingly more critical not only to have access to the decoded video but also to, e.g. efficiently search for similar videos. In this context, this paper proposes a feature-based video coding solution adopting a hybrid approach where both pixels and local visual features are exploited for coding...
Although some security threats were taken into consideration in the IPv6 design, DDoS attacks still exist in the IPv6 networks. The main difficulty to counter the DDoS attacks is to trace the source of such attacks, as the attackers often use spoofed source IP addresses to hide their identity. This makes the IP traceback schemes very relevant to the security of the IPv6 networks. Given that most of...
Video decoding is a must-have feature in modern electronic devices in consumer market. A real-time processing demand is crucial in H.264 video application. In this paper, we present a fast H.264 video decoding technology based on a fast and quick bit pattern extraction method in video stream that is coded with variable-length code stored in little-endian systems. The Key of our approach is to make...
In steganographic technique of "sum and difference covering set" (SDCS), an appropriate SDCS is used to embed data into pixel sequences of cover image. This technique extends the conventional LSB matching and matrix embedding to derive more secure steganography. In this paper, towards stego-security enhancement, a new SDCS-based contentadaptive steganography is proposed. The most noisy pixels...
In this paper, a novel reversible data hiding by using Reed-Solomon (RS) code is proposed for efficient transmission in encryption image. To increase the recovery of data from encrypted image, RS codes are used to encode messages, and then the code words can be embedded into encrypted image according to encryption key. After receiving embedding the code words, the receiver firstly decrypts the encrypted...
The problem of efficient decoding of polar codes is considered. A multilevel bucket structure is proposed for implementation of the stack in the sequential decoding algorithm. This data structure reduces the complexity of stack operations with respect to the implementation based on a red-black tree.
The recovery of a damaged or altered video file plays a vital role in searching for evidences to resolve a criminal case in digital forensics. Here, a frame-based recovery method for a corrupted video file has been proposed using the specifications of a codec that is used to encode the video data. The existing approaches try to recover a video file with the help of the file structure rather than frame...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.