期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
An efficient compressed domain moving object segmentation algorithm based on motion vector field 被引量:4
1
作者 刘志 沈礼权 张兆杨 《Journal of Shanghai University(English Edition)》 CAS 2008年第3期221-227,共7页
In this paper an efficient compressed domain moving object segmentation algorithm is proposed, in which the motion vector (MV) field parsed from the compressed video is the only cue used for moving object segmentati... In this paper an efficient compressed domain moving object segmentation algorithm is proposed, in which the motion vector (MV) field parsed from the compressed video is the only cue used for moving object segmentation. First the MV field is temporally and spatially normalized, and then accumulated by an iterative backward projection to enhance salient motions and alleviate noisy MVs. The accumulated MV field is then segmented into motion-homogenous regions using a modified statistical region growing approach. Finally, moving object regions are extracted in turn based on minimization of the joint prediction error using the estimated motion models of two region sets containing the candidate object region and other remaining regions, respectively. Experimental results on several H.264 compressed video sequences demonstrate good segmentation performance. 展开更多
关键词 moving object segmentation compressed domain segmentation motion vector (MV) field
下载PDF
A Detection Strategy of Multi-Pose Face in Compressed Domain
2
作者 CHENLei ZHOUGuo-fu 《Wuhan University Journal of Natural Sciences》 CAS 2004年第5期845-850,共6页
In this paper, we present a strategy to implement multi-pose face detection in compressed domain. The strategy extracts firstly feature vectors from DCT domain, and then uses a boosting algorithm to build classificrs ... In this paper, we present a strategy to implement multi-pose face detection in compressed domain. The strategy extracts firstly feature vectors from DCT domain, and then uses a boosting algorithm to build classificrs to distinguish faces and non-faces. Moreover, to get more accurate results of the face detection, we present a kernel function and a linear combination to build incrementally the strong classifiers based on the weak classifiers. Through comparing and analyzing results of some experiments on the synthetic data and the natural data, we can get more satisfied results by the strong classifiers than by the weak classifies. Key words weak classifier - boosting algorithm - face detection - compressed domain CLC number TP 391. 41 Foundation item: Supported by the National 863 Program (2002 AA11101) and Open Fund of State Technology Center of Multimedia Software Engineering (621-273128)Biography: CHEN Lei(1978-), male, Master, research direction: image process, image recognition and AI. 展开更多
关键词 weak classifier boosting algorithm face detection compressed domain
下载PDF
Content Authentication Based on JPEG-to-JPEG Watermarking
3
作者 Hong-Xia Wang Jie Hou Ke Ding 《Journal of Electronic Science and Technology of China》 2009年第2期125-128,共4页
A content authentication technique based on JPEG-to-JPEG watermarking is proposed in this paper. In this technique, each 8x8 block in a JPEG compressed image is first processed by entropy decoding, and then the quanti... A content authentication technique based on JPEG-to-JPEG watermarking is proposed in this paper. In this technique, each 8x8 block in a JPEG compressed image is first processed by entropy decoding, and then the quantized discrete cosine transform (DCT) is applied to generate DCT coefficients: one DC coefficient and 63 AC coefficients in frequency coefficients. The DCT AC coefficients are used to form zero planes in which the watermark is embedded by a chaotic map. In this way, the watermark information is embedded into JPEG compressed domain, and the output watermarked image is still a JPEG format. The proposed method is especially applicable to content authentication of JPEG image since the quantized coefficients are modified for embedding the watermark and the chaotic system possesses an important property with the high sensitivity on initial values. Experimental results show that the tamper regions are localized accurately when the watermarked JPEG image is maliciously tampered. 展开更多
关键词 Index Terms-Chaotic map compressed domain content authentication digital watermarking.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部