共查询到20条相似文献,搜索用时 0 毫秒
1.
Effective wipe detection in MPEG compressed video using macro block type information 总被引:2,自引:0,他引:2
Soo-Chang Pei Yu-Zuong Chou 《Multimedia, IEEE Transactions on》2002,4(3):309-319
For video scene analysis, the wipe transition is considered most complex and difficult to detect. In this paper, an effective wipe detection method is proposed using the macroblock (MB) information of the MPEG compressed video. By analyzing the prediction directions of B frames, which are revealed in the MB types, the scene change region of each frame can be found. Once the accumulation of the scene change regions covers most of the area of the frame, the sequence will be considered a motionless wipe transition sequence. Besides, uncommon intracoded MB of the B frame can also be applied as an indicator of the motion wipe transition. A very simple analysis based on small amount of MB type information is sufficient to achieve wipe detection directly on MPEG compressed video. Easy extraction of MB type information, low-complexity analysis algorithm and robustness to arbitrary shape and direction of wipe transitions are the great advantages of the proposed method. 相似文献
2.
Chao Chen Wen Ji Seungmin Rho Bo-Wei Chen Yiqiang Chen 《Multimedia Tools and Applications》2016,75(22):14507-14524
Mobile video quality assessment plays an essential role in multimedia systems and services. In the case of scalable video coding, which enables dynamic adaptation based on terminal capabilities and heterogeneous network, variable resolution is one of the most prominent types of video distortions. In this paper, we propose a new hybrid spatial and temporal distortion metric for evaluating video streaming quality with variable spatio-temporal resolution. The key idea is to project video sequence into feature domain and calculate the distortion of content information from the projected principal component matrix and its eigenvectors. This metric can measures the degree of content information degradation especially in spatio-temporal resolution scalable video. The performance of the proposed metric is evaluated and compared to some state-of-the-art quality evaluation metrics in the literature. Our results show that the proposed metric achieves good correlations with the subjective evaluations of the EPFL scale video database. 相似文献
3.
Benrhouma Oussama Hermassi Houcemeddine Belghith Safya 《Multimedia Tools and Applications》2017,76(20):21133-21156
Multimedia Tools and Applications - This paper analyses the security of an effective SVD-based image tampering detection and self-recovery scheme that has been recently proposed by S. Dadkhah et... 相似文献
4.
Wang Y Bowman D Krum D Coalho E Smith-Jackson T Bailey D Peck S Anand S Kennedy T Abdrazakov Y 《IEEE transactions on visualization and computer graphics》2008,14(6):1755-1762
Many interesting and promising prototypes for visualizing video data have been proposed, including those that combine videos with their spatial context (contextualized videos). However, relatively little work has investigated the fundamental design factors behind these prototypes in order to provide general design guidance. Focusing on real-time video data visualization, we evaluated two important design factors--video placement method and spatial context presentation method--through a user study. In addition, we evaluated the effect of spatial knowledge of the environment. Participants' performance was measured through path reconstruction tasks, where the participants followed a target through simulated surveillance videos and marked the target paths on the environment model. We found that embedding videos inside the model enabled realtime strategies and led to faster performance. With the help of contextualized videos, participants not familiar with the real environment achieved similar task performance to participants that worked in that environment. We discuss design implications and provide general design recommendations for traffic and security surveillance system interfaces. 相似文献
5.
Airborne vehicle detection and tracking systems equipped on unmanned aerial vehicles (UAVs) are receiving more and more attention due to their advantages of high mobility, fast deployment and large surveillance scope. However, such systems are difficult to develop because of factors like UAV motion, scene complexity, and especially the partial occlusion of targets. To address these problems, a new framework of multi-motion layer analysis is proposed to detect and track moving vehicles in airborne platform. After motion layers are constructed, they are maintained over time for tracking vehicles. Most importantly, since the vehicle motion layers can be maintained even when the vehicles are only partially observed, the proposed method is robust to partial occlusion. Our experimental results showed that (1) compared with other previous algorithms, our method can achieve better performance in terms of higher detection rate and lower false positive rate; (2) it is more efficient and more robust to partial occlusion; (3) it is able to meet the demand of real time application due to its computational simplicity. 相似文献
6.
Agarwal Rohit Jalal Anand Singh Arya K. V. 《Multimedia Tools and Applications》2020,79(19-20):13621-13645
Multimedia Tools and Applications - Biometric authentication can establish a person’s identity from their exclusive features. In general, biometric authentication can vulnerable to spoofing... 相似文献
7.
In this work, a new model that combines the concepts of wavelet transformation and subspace analysis tools, like independent component analysis (ICA), topographic independent component analysis (TICA), and Independent Subspace Analysis (ISA), is developed for the purpose of defect detection in textile images. In previous works, it has been shown that reduction of the textural components of the textile image by preprocessing has increased the performance of the system. Based on this observation, in the present work, the aforementioned subspace analysis tools are applied to subband images. The feature vector of a subwindow of a test image is compared with that of a defect-free image in order to make a decision. This decision is based on a Euclidean distance classifier. The increase performance that results from using wavelet transformation prior to subspace analysis has been discussed in detail. While it has been found that all subspace analysis methods lead to the same detection performances, as a further step, independent subspace analysis is used to classify the detected defects according to their directionalities. 相似文献
8.
针对HSBH的特点对其进行分析,提出一种区间差分检测的方法(DMID),可以准确检测其隐藏量,进而提出了改进的HSBH算法,使其可以抗击DMID的检测.实验结果表明,DMID方法可以测量出HSBH算法隐藏量,检测准确率达到95%以上,改进的HSBH算法使DMID分析得出的估计值低于判决门限2%,从而做出错误判决,可以很好地抗击区间差分检测. 相似文献
9.
In the past few years, many gray-level image watermarking schemes have been proposed, although the extension to the color case is rare and regularly accomplished by marking the image luminance, or by processing each color channel separately. This paper presents a new color image watermarking scheme that combines color edge detection and color quantization using principal axes analysis in three-dimensional color space. The watermark is hidden within the data by modifying a subset of carefully selected edge points to resist both geometric distortion and signal processing attacks. Experimental results show the robustness of the proposed scheme to resist common attacks. 相似文献
10.
In this paper a classification method is described for painted surfaces using laser image clarity meter (LIC)†. In this method extracted features from reflected images of size (512 × 512 × 8 bits) from painted surfaces are used for classification purpose. The distance measured between the features of the test samples and the reference sample, which is smooth black glass, determines the deviation of the test sample from the reference. In comparing the result of 500 of the painted panels classified by the proposed method with the result of visual inspection, we have shown that this method is quite effective. 相似文献
11.
Machine Learning - Online video games drive a multi-billion dollar industry dedicated to maintaining a competitive and enjoyable experience for players. Traditional cheat detection systems struggle... 相似文献
12.
Mahmoodi Javad Nezamabadi-pour Hossein Abbasi-Moghadam Dariush 《Multimedia Tools and Applications》2022,81(15):20945-20961
Multimedia Tools and Applications - With the rapid development of detecting violent behaviors in surveillance cameras, requests on systems that automatically recognize violent events are expanded.... 相似文献
13.
《IEEE transactions on pattern analysis and machine intelligence》1995,21(12):945-958
The paper examines two existing approaches to software reliability analysis, time domain reliability growth modeling and input domain reliability analysis, and presents a new approach that combines some of their individual strengths. An analysis method called tree-based modeling is used to build models based on the combined measurement data. This new approach can be used to assess the reliability of software systems, to track reliability change over time, and to identify problematic subparts characterized by certain input states or time periods. The results can also be used to guide various remedial actions aimed at reliability improvement. This approach has been demonstrated to be applicable and effective in the testing of several large commercial software systems developed in the IBM Software Solutions Toronto Laboratory 相似文献
14.
G. Deepa P. Santhi Thilagam Furqan Ahmed Khan Amit Praseed Alwyn R. Pais Nushafreen Palsetia 《International Journal of Information Security》2018,17(1):105-120
As web applications become the most popular way to deliver essential services to customers, they also become attractive targets for attackers. The attackers craft injection attacks in database-driven applications through the user-input fields intended for interacting with the applications. Even though precautionary measures such as user-input sanitization is employed at the client side of the application, the attackers can disable the JavaScript at client side and still inject attacks through HTTP parameters. The injected parameters result in attacks due to improper server-side validation of user input. The injected parameters may either contain malicious SQL/XML commands leading to SQL/XPath/XQuery injection or be invalid input that intend to violate the expected behavior of the web application. The former is known as an injection attack, while the latter is called a parameter tampering attack. While SQL injection has been intensively examined by the research community, limited work has been done so far for identifying XML injection and parameter tampering vulnerabilities. Database-driven web applications today rely on XML databases, as XML has gained rapid acceptance due to the fact that it favors integration of data with other applications and handles diverse information. Hence, this work proposes a black-box fuzzing approach to detect XQuery injection and parameter tampering vulnerabilities in web applications driven by native XML databases. A prototype XiParam is developed and tested on vulnerable applications developed with a native XML database, BaseX, as the backend. The experimental evaluation clearly demonstrates that the prototype is effective against detection of both XQuery injection and parameter tampering vulnerabilities. 相似文献
15.
Defect detection and restoration of degraded videos is an important topic in media content management systems. Frame pixel-shift
is a common form of severe defect in videos caused by loss of consecutive pixels by the video transmission system. Pixel-shift
refers to the large amount of pixel shifts one by one due to a small quantity of image data loss. The damaged region in the
affected frame is usually quite large, causing serious degradation of visual quality. This paper addresses the issue of how
to automatically detect and restore frame pixel-shift in videos. Pixel-shift frame detection relies on spatio-temporal information
and motion estimation. Accurate measurement of pixels shift is achieved based on the analysis of temporal frequency information
and restoration is accomplished by reversing the pixels shift and spatio-temporal interpolation. Performance evaluation using
real video sequences demonstrate the good performance of our algorithm. 相似文献
16.
Irena Orović Milica Orlandić Srdjan Stanković 《Multimedia Tools and Applications》2014,70(3):1503-1519
An image watermarking technique based on the concept of JPEG2000 algorithm is proposed. Biorthogonal wavelet 9/7 transform is used to provide a set of coefficients suitable for watermark embedding. The statistical properties of different subbands are analyzed in order to choose the number of decomposition levels and position of subbands, which will assure the best compromise between the watermark transparency and robustness. The JPEG2000 quantization is applied to avoid insignificant wavelet coefficients, while the remaining ones are used for watermarking. The optimal and blind watermark detection is based on the nonlinear score function and appropriate model of coefficients distribution. The performance of the proposed procedure is tested on examples with various images, showing robustness under different attacks, while maintaining high image quality. 相似文献
17.
18.
Shao-Han Liu Author VitaeJzau-Sheng LinAuthor Vitae 《Pattern recognition》2002,35(10):2201-2211
In this paper, fuzzy possibilistic c-means (FPCM) approach based on penalized and compensated constraints are proposed to vector quantization (VQ) in discrete cosine transform (DCT) for image compression. These approaches are named penalized fuzzy possibilistic c-means (PFPCM) and compensated fuzzy possibilistic c-means (CFPCM). The main purpose is to modify the FPCM strategy with penalized or compensated constraints so that the cluster centroids can be updated with penalized or compensated terms iteratively in order to find near-global solution in optimal problem. The information transformed by DCT was separated into DC and AC coefficients. Then, the AC coefficients are trained by using the proposed methods to generate better codebook based on VQ. The compression performances using the proposed approaches are compared with FPCM and conventional VQ method. From the experimental results, the promising performances can be obtained using the proposed approaches. 相似文献
19.
Pattern Analysis and Applications - Action recognition is an active research area in computer vision as it has enormous applications in today’s world, out of which, recognizing violent action... 相似文献
20.
Weizhi Nie Yan Yan Tong Hao Chenchen Liu Yuting Su 《Machine Vision and Applications》2018,29(8):1249-1256
Mitosis detection and recognition in phase-contrast microscopy image sequences is a fundamental problem in many biomedical applications. Traditionally, researchers detect all mitotic cells from these image sequences with human eyes, which is tedious and time consuming. In recent years, many computer vision technologies were proposed to help humans to achieve the mitosis detection automatically. In this paper, we present an approach which utilized the evolution of feature in the time domain to represent the feature of mitosis. Firstly, the feature of each cell image is extracted by the different method (GIST, SIFT, CNN). Secondly, we construct the levels of motorists according to the steps of mitosis. The pooling method is utilized to handle the feature fusion in each dimension and in different time segments. Third, the pooling features were combined to one vector to represent the characters of this video. Finally, tradition machine learning method SVM is used to handle the mortises recognition problem. In order to demonstrate the performance of our approach, motorists event detection is made in some microscopy image sequences. In the experiment, some classic methods as comparison method are made in this paper. The corresponding experiments also demonstrate the superiority of our approach. 相似文献