期刊文献+

基于物联网的远程视频监控优化方法研究 被引量:13

Remote Video Monitoring Optimization Method Research Based on Internet of Things
下载PDF
导出
摘要 设计远程视频监控系统的关键是在于对视频图像的实时传输和数据通信设计,远程视频监控系统中接收端所显示的视频图像通常受到吞吐量和传输时延等因素的影响,导致远程视频监控实时性和保真性不好。提出一种基于物联网的远程视频监控优化方法。设计基于物联网的远程视频数据采集系统模型,构建远程视频监控识别的量化编码算法,使用RLE行程编码和Huffman编码来完成压缩任务,采用三级放大器进行逐级放大,进行远程视频监控。仿真结果表明,采用该方法进行远程视频监控,能准确实现对远程监控视频序列量化编码,提高远程视频监控的视频保真度和峰值信噪比,同时能提高视频传输效率,实现了视频远程监控的实时无损传输。 Design of remote video monitoring system is the key lies in the design of real-time video image transmission and data communication, shown in the video remote monitoring system of the receiving end video images are usually influenced by factors such as throughput and transmission delay, leading to the remote video monitoring real-time and fidelity is bad. In this paper, a remote video monitoring optimization method based on Internet of things. Design model of remote video data acquisition system based on Internet of things, the construction of a remote video monitoring to identify quantitative coding algorithm, using the RLE coding and Huffman coding to complete the compact task schedule and with three-stage amplifier amplification, step by step for remote video monitoring. The simulation results show that using the method of remote video monitoring, remote monitoring video sequence can accurately realize the quantization coding, improve the fidelity of remote video monitoring video and peak signal-to-noise ratio, at the same time can improve the efficiency of video transmission, real-time remote monitoring for the video transmission condition.
出处 《科技通报》 北大核心 2015年第10期226-228,共3页 Bulletin of Science and Technology
基金 陕西省社会发展科技攻关项目(2013B0320181) 归国留学人员科研启动项目(2013C0320118) 陕西省自然科学基金项目(2014G1321039) 中央高校基本科研项目(2013jm8017)
关键词 物联网 视频监控 图像 Internet of things video monitoring image
  • 相关文献

参考文献5

二级参考文献42

  • 1侯利明,孙宝升,陆晓明.群时延特性对卫星高速数传中继系统的影响[J].飞行器测控学报,2006,25(2):54-58. 被引量:15
  • 2张乃通,李晖,张钦宇.深空探测通信技术发展趋势及思考[J].宇航学报,2007,28(4):786-793. 被引量:75
  • 3秦运龙 孙广玲 张新鹏.利用运动矢量进行视频篡改检测.计算机研究与发展,2009,46:227-233.
  • 4Lin Y R, Huang H Y, Hsu W H. An embedded watermark tech- nique in video for copyright protection [ C ]//Proceedings of the 18th Int. Conf. on Pattern Recognition. Piscataway, NJ: Institu- te of Electrical and Electronics Engineers Inc. 2006: 795-798. [DOI: 10. 1109/ICPR. 2006. 244].
  • 5Ahun O, Sharma G, Celik M, et al. A set theoretic framework for watermarking and its application to semifragile tamper detec- tion [ J ]. IEEE Transactions on Information, Forensics and Secu- rity, 2006, 1 ( 4 ) : 479492. [DOI: 10. 1109/TIFS. 2006. 885018 ].
  • 6De Roover C, De Vleeschouwer C, Lefebvre F, et al. Robust video hashing based on radial projections of key frames [ J ]. IEEE Transactions on Signal Processing, 2005, 53 (10) : 4020- 4037. [ DOI: 10. ll09/TSP. 2005. 855414].
  • 7Wang W H, Farid H. Exposing digital forgeries in color filter ar- ray interpolated images [ C ]//Proc. of MM&Sec' 07. New York : Association for Computing Machinery, 2007:715-728.
  • 8Wang W H, Farid H. Exposing digital forgeries in video by de- tecting double MPEG compression [ C ]//Proceedings of the Mul- timedia and Security Workshop Geneva. Switzerland: ACM, 2006 : 37-47.
  • 9Wang W H, Farid H. Exposing digital forgeries in video by de- tecting double quantization [ C ]//Proceedings of the 11 th ACM Multimedia and Security Workshop. Princeton : ACM, 2009 : 39- 48.
  • 10Zhang J, Su Y T. Detecting logo-removal forgery by inconsisten- cies of blur [ C ]//Proceedings of 2009 International Conference on Industrial Mechatronics and Automation. Singapore: IEEE Industrial Electronics Society, 2009: 32-36. [ DOI: 10. 1109/ ICIMA. 2009.5156553 ].

共引文献56

同被引文献74

引证文献13

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部