The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Scalable Video Coding (SVC) extension of the H.264/AVC video coding standard supports fidelity or quality (SNR) scalability. The quality enhancement packets would be discarded in case of limited network capacity, which calls for an optimized bit extraction strategy. In this paper, we first analyze the linear feature in H.264/AVC video coding. A linear error model is also constructed using this...
Motion Estimation is the most computationally expensive operation in the entire video compression process. The challenge is to reduce the computational complexity and time of Full Search Algorithm without losing too much quality at the output. In this paper, we proposed to implement a new algorithm for Motion Vector Estimation which performs better than other Block Matching Algorithms like Three Step...
The Wyner-Ziv video coding (WZVC) efficiency is highly dependent on the quality of the side information (SI) created at the decoder, typically through motion compensated frame interpolation (MCFI) techniques. Since the decoder only has available some reference decoded frames, SI creation turns out to be a difficult problem in WZVC. In most the MCFI techniques available, the matching criterion used...
To meet the special requirements of resource-limited video sensors in wireless video sensor network (WVSN), low-complexity video encoding technique is highly desired. In distributed multi-view video coding (DMVC) system, multi-view video sources are encoded separately and decoded dependently, so the burden of huge computation is shifted from the encoder side to the decoder side. The generation of...
Compression of encrypted data draws much attention in recent years due to the security concerns in a service oriented environment such as cloud computing. We propose a scalable lossy compression scheme for images having their pixel value encrypted with a standard stream cipher. The encrypted data are simply compressed by transmitting a uniformly sub sampled portion of the encrypted data and some bit-planes...
In H.264 standard, because of differential coding of motion vectors, sudden motion changes in object boundaries increase the amount of bits used for coding especially at low bitrate regimes. In this paper, we propose a novel algorithm that uses decoder support for efficient coding of motion vectors in B-frames. In this method, decoder uses true motion estimation to determine a vector set that contains...
Distributed video coding is a new video paradigm that transfers the computational bulk from video encoders to decoders. Thus, the scenario of video transmission involving inexpensive encoders and a powerful central decoder would be possible. In a previous work, the authors have proposed a novel distributed video coding scheme with progressive decoding. The proposed architecture considers a chessboard...
Conventional secret message passing methods embed a message in the cover-text, so the receiver must use stego-text to extract the message content. In contrast, this paper proposes a new paradigm in which the receiver does not necessarily require stego-text to retrieve the message content. Under the proposed approach, the sender can produce keys without modifying the cover-image, and the intended recipient...
Generally, DRM(Digital Rights Management) system is achieved with individual function modules of cryptography, watermarking and so on. In this typical system flow, all digital contents are temporarily disclosed with perfect condition via decryption process. This paper describes the fundamental idea of a novel DRM method which is composed of an incomplete cryptography and user identification mechanism...
The major advantages of Block Matching Algorithm is it can reduce the temporal redundancy by placing a direction and magnitude of a Motion Vector (MV) instead of an image block. There are various type of BMA for motion estimation technique have been proposed to enhance the accuracy of the MV of the image block and also to reduce the computational complexity of the BMA for time consuming. This paper...
A scalable multiple description scalar quantizer (SMDSQ) is a quantization based framework used for scalable multiple description coding (SMDC). In this paper, we introduce a novel generalization of the Lloyd-Max algorithm to realize locally optimal SMDSQs. Both level-constrained and entropy-constrained cases are considered. For both cases, locally optimal solutions are realized by iterative execution...
Steganography is a science dealing with the hiding of the secured information in a harmless signal. The information may be embedded in an image, audio or video file. For image steganography, binary, gray scale or color images may be used as cover-images for hiding the secret data. In this paper a novel information hiding method has been proposed in spatial domain, to improve Imperceptibility, Security...
Distributed Video Coding (DVC) is a relatively new video coding paradigm evolved for catering to emerging applications such as wireless video surveillance and streaming. DVC is not yet commercially deployed due to various challenges including necessity of feedback channel, unavailability of standardized complete coding method including chroma components handling, lower Rate Distortion (RD) performance...
Video broadcasting to heterogeneous receivers with varying channel conditions poses many challenges. The nature of the real-time data usually precludes any retransmission option. Forward error correction (FEC) can be used to protect the video data at the cost of adding some redundancy. The gains are increased further by partitioning the video data according to its importance for video reconstruction...
Listless SPECK (LSPECK) is a low complexity image coding algorithm compared to SPECK. The problem of LSPECK is that, it encode each insignificant subband by a zero. Therefore, these block based coders codes as many zeros as the number of insignificant subbands. This gives rise to many zeros at the encoder output on early bit plane passes. By looking at the statistics of transformed images, the number...
In this paper, we propose a computationally- efficient data hiding method for images which achieves Cachin's security criterion: zero Kullback- Liebler(KL) divergence. In order to preserve the statistical properties of the cover medium, we change the order of pixels rather than modify their values to embed the hidden message. We then subject the proposed stego method to a higher-order statistics based...
Stereoscopic video transmission systems have now evolved from 2D video systems and have been commercialized for a number of application areas, driven by developments in stereo capturing and display technology. With the new developments in autostereoscopic display technology, these stereo systems need to further advance towards 3D video systems. In contrast to all previous video coding technologies,...
Scalable video coding (SVC) is desirable for video communication in heterogeneous environments where end-users retain different types of terminals. Because motion estimation and compensation are used in SVC to reduce redundancy between frames, the visual quality degrades due to the errors of transmission channels and the error propagation across multiple frames. In order to decrease error propagation...
Error tolerance is evolving into a new computing paradigm with further technology scaling, cost constraint, system scalability and emerging applications. Distinguished from defect tolerance and fault tolerance, error tolerance is based on application characteristics and relaxes the constraint of 100 percent functional correctness. From the viewpoint of error tolerance, this paper proposes a framework...
This paper deals with the problem of image transmission over error-prone channels. A comparison between ISO/IEC image coding standards JPEG, JPEG 2000 and JPEG XR is presented. The main objective is to evaluate the performances of the recently standardized JPEG XR in transmissions over channel affected by errors.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.