The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Despite recent advances, the extraction of optical flow with large displacements is still challenging for state-of the-art methods. The approaches that are the most successful at handling large displacements blend sparse correspondences from a matching algorithm with an optimization that refines the optical flow. We follow the scheme of Deep-Flow [33]. We first extract sparse pixel correspondences...
Some video watermarking methods have been proposed that embed information into compressed video streams. When the compression scheme is an MPEG2-Video, its codes are almost pre-defined by using the coding tables, and therefore, information embedding in the compressed stream is possible by substituting some of the codes. On the other hand, HEVC/H.265 uses a kind of arithmetic coding (CABAC [5]) and...
In multimedia streaming network, voice and video packets are transmitted through IP, UDP and RTP. Then the redundant header data in contiguously transmitted packets can result in the inefficiency of data transmission. To prevent this, ROHC (RObust Header Compression) mechanism is applied. The ROHC uses a WLSB (Window Least Significant Bit) which is an encoding method using the value of sliding window...
Nowadays video is being produced and consumed in more component representation formats, more device types and over a variety of networks than ever. Transmission of video through network takes more time. So Video Transcoding is a very important factor when the video is moved between various heterogeneous clients in the cloud environment. Transcoding is a process of translating one coded form of video...
Recognition of emotional content in music is an issue that arises recently. Music received by live applications are often exposed to noise, thus prone to reducing the recognition rate of the application. The solution proposed in this study is a robust music emotion recognition system for live applications. The proposed system consists of two major parts, i.e. subspace-based noise suppression and a...
In this paper, a pristine method of tough digital video watermarking algorithm in H.264 compressed domain is articulated. Most of the video watermarking techniques interleave the watermark in I-frames but in this paper a fabulous method of blind low complexity video watermarking in P-frames for H.264 video is proposed. Our algorithm decides which 4×4 block within the macro-block of P-frame will be...
Effective recognition of objects calls for the appropriate selection of feature descriptor. In this paper, we generalize the "extended local ternary patterns" (ELTP) to form a novel and compact set of features named center-symmetric extended local ternary patterns (CS-ELTP). The newly defined CS-ELTP follows a simplified encoding procedure and has a lower dimension for a fixed neighborhood...
Communication of data in public requires data to be transmitted in robust and secure manner. Also, excessive use of digital data in various fields of life demands a secure system. Various techniques such as cryptography, steganography and watermarking have been established. Among these steganography provides better confidentiality as it is the practice of hiding data within data. In digital media...
In this paper we study the problem of designing a distributed data storage system using rateless codes for resource constrained systems such as Wireless Sensor Networks (WSNs). Rateless codes, e.g. LT-codes, can achieve reduced complexity of both encoding and decoding, which caters well to the nature of limited resources in such systems. However, data in WSNs is inherently decentralized and that poses...
A fast CU size decision algorithm is proposed for High Efficiency Video Coding (HEVC) intra prediction in this paper. Prediction unit (PU) is decided by analyzing the threshold of judgment, the complexity of the algorithm is increased if the threshold is too big, and the quality of the image is seriously damaged if the threshold is too small. The robustness of the algorithm would be destroyed if the...
In this paper an overview of the PRIME specification v1.4 is given. In this new version, many additional features have been defined at both PHY and MAC layers to improve the existing PRIME technology and prepare it for LV grid enhanced operation. The communication robustness has been increased thanks to the innovative robust transmission modes especially designed to maintain a low system complexity...
Smartphones and tablet computers are being actively studied for the performance of biometric recognition in visible spectrum. Owing to robust performance of iris recognition, many works have investigated the performance in visible spectrum. Increasing popularity of iris recognition in the visible spectrum has further resulted in using smartphones for the same. The extraction of robust features for...
Fountain code is a class of graph-based linear erasure codes, which can effectively solve the problems such as network congestion and feedback cracking for its characteristics of rateless and can resume when interrupted, and has a lower complexity of encoding and decoding. However, there are still some problems in the process of encoding and decoding, including the degree distribution structure may...
A novel technique in chipless RFID systems is presented providing high data capacity on a fully printable tag. Tag structure includes small polarizers that orthogonally backscatter signal respect to the interrogation wave. The reader utilizes a simple continuous wave (CW) form on its separate TX and RX antennas. The fully printable tag is capable of carrying up to 35 bits in a credit card size while...
An Hermite-symmetric subcarrier coding for OFDM systems (HC-OFDM) enables dual channel transmission over individual IQ wireless channels with higher power efficiency than a simple repetition coding (RC-OFDM). We theoretically proved the advantage of the HC-OFDM systems assuming an ideal coherent detection. But, in practice, the dual channel transmission needs precise phase compensation to separate...
We provide the first capacity approaching coding schemes that robustly simulate any interactive protocol over an adversarial channel that corrupts any eps fraction of the transmitted symbols. Our coding schemes achieve a communication rate of 1 -- O(√ε log log 1/ε) over any adversarial channel. This can be improved to 1 -- O(√ε)...
Non-malleable codes were introduced by Dziembowski, Pietrzak and Wichs[1] as an elegant generalization of the classical notions of error detection, where the corruption of a codeword is viewed as a tampering function acting on it. Informally, a non-malleable code with respect to a family of tampering functions F consists of a randomized encoding function Enc and a deterministic decoding function Dec...
Digital Image Watermarking is used to hide the copyrighted information as a watermark inside a Digital image, to identify the ownership. In this paper to ensure the security watermark is first encrypted by standard A5/1 algorithm. The encrypted watermark is encoded by repetition code to provide robustness against salt and pepper noise and embedded inside the cover image by modifying the least significant...
This paper presents a method to hide information in audio. The proposed method modifies at most one bit in a segment containing 256 samples to hide eight bits of the secret message. To increase the security of the proposed scheme, we use permutation to scramble the secret message before hiding. Experimental results show that the inserted message is inaudible and the proposed method is suitable for...
Remote health monitoring BASNs promise substantive improvements in the quality of healthcare by providing access to diagnostically rich patient data in real-time. However, adoption is hindered by the threat of compromise of the diagnostic quality of the data by faults. Simultaneously, unresolved issues exist with the secure sharing of the sensitive medical data measured by automated BASNs, stemming...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.