8 research outputs found

    Entropy in Image Analysis II

    Get PDF
    Image analysis is a fundamental task for any application where extracting information from images is required. The analysis requires highly sophisticated numerical and analytical methods, particularly for those applications in medicine, security, and other fields where the results of the processing consist of data of vital importance. This fact is evident from all the articles composing the Special Issue "Entropy in Image Analysis II", in which the authors used widely tested methods to verify their results. In the process of reading the present volume, the reader will appreciate the richness of their methods and applications, in particular for medical imaging and image security, and a remarkable cross-fertilization among the proposed research areas

    Multimedia

    Get PDF
    The nowadays ubiquitous and effortless digital data capture and processing capabilities offered by the majority of devices, lead to an unprecedented penetration of multimedia content in our everyday life. To make the most of this phenomenon, the rapidly increasing volume and usage of digitised content requires constant re-evaluation and adaptation of multimedia methodologies, in order to meet the relentless change of requirements from both the user and system perspectives. Advances in Multimedia provides readers with an overview of the ever-growing field of multimedia by bringing together various research studies and surveys from different subfields that point out such important aspects. Some of the main topics that this book deals with include: multimedia management in peer-to-peer structures & wireless networks, security characteristics in multimedia, semantic gap bridging for multimedia content and novel multimedia applications

    Recent Advances in Signal Processing

    Get PDF
    The signal processing task is a very critical issue in the majority of new technological inventions and challenges in a variety of applications in both science and engineering fields. Classical signal processing techniques have largely worked with mathematical models that are linear, local, stationary, and Gaussian. They have always favored closed-form tractability over real-world accuracy. These constraints were imposed by the lack of powerful computing tools. During the last few decades, signal processing theories, developments, and applications have matured rapidly and now include tools from many areas of mathematics, computer science, physics, and engineering. This book is targeted primarily toward both students and researchers who want to be exposed to a wide variety of signal processing techniques and algorithms. It includes 27 chapters that can be categorized into five different areas depending on the application at hand. These five categories are ordered to address image processing, speech processing, communication systems, time-series analysis, and educational packages respectively. The book has the advantage of providing a collection of applications that are completely independent and self-contained; thus, the interested reader can choose any chapter and skip to another without losing continuity

    Information Analysis for Steganography and Steganalysis in 3D Polygonal Meshes

    Get PDF
    Information hiding, which embeds a watermark/message over a cover signal, has recently found extensive applications in, for example, copyright protection, content authentication and covert communication. It has been widely considered as an appealing technology to complement conventional cryptographic processes in the field of multimedia security by embedding information into the signal being protected. Generally, information hiding can be classified into two categories: steganography and watermarking. While steganography attempts to embed as much information as possible into a cover signal, watermarking tries to emphasize the robustness of the embedded information at the expense of embedding capacity. In contrast to information hiding, steganalysis aims at detecting whether a given medium has hidden message in it, and, if possible, recover that hidden message. It can be used to measure the security performance of information hiding techniques, meaning a steganalysis resistant steganographic/watermarking method should be imperceptible not only to Human Vision Systems (HVS), but also to intelligent analysis. As yet, 3D information hiding and steganalysis has received relatively less attention compared to image information hiding, despite the proliferation of 3D computer graphics models which are fairly promising information carriers. This thesis focuses on this relatively neglected research area and has the following primary objectives: 1) to investigate the trade-off between embedding capacity and distortion by considering the correlation between spatial and normal/curvature noise in triangle meshes; 2) to design satisfactory 3D steganographic algorithms, taking into account this trade-off; 3) to design robust 3D watermarking algorithms; 4) to propose a steganalysis framework for detecting the existence of the hidden information in 3D models and introduce a universal 3D steganalytic method under this framework. %and demonstrate the performance of the proposed steganalysis by testing it against six well-known 3D steganographic/watermarking methods. The thesis is organized as follows. Chapter 1 describes in detail the background relating to information hiding and steganalysis, as well as the research problems this thesis will be studying. Chapter 2 conducts a survey on the previous information hiding techniques for digital images, 3D models and other medium and also on image steganalysis algorithms. Motivated by the observation that the knowledge of the spatial accuracy of the mesh vertices does not easily translate into information related to the accuracy of other visually important mesh attributes such as normals, Chapters 3 and 4 investigate the impact of modifying vertex coordinates of 3D triangle models on the mesh normals. Chapter 3 presents the results of an empirical investigation, whereas Chapter 4 presents the results of a theoretical study. Based on these results, a high-capacity 3D steganographic algorithm capable of controlling embedding distortion is also presented in Chapter 4. In addition to normal information, several mesh interrogation, processing and rendering algorithms make direct or indirect use of curvature information. Motivated by this, Chapter 5 studies the relation between Discrete Gaussian Curvature (DGC) degradation and vertex coordinate modifications. Chapter 6 proposes a robust watermarking algorithm for 3D polygonal models, based on modifying the histogram of the distances from the model vertices to a point in 3D space. That point is determined by applying Principal Component Analysis (PCA) to the cover model. The use of PCA makes the watermarking method robust against common 3D operations, such as rotation, translation and vertex reordering. In addition, Chapter 6 develops a 3D specific steganalytic algorithm to detect the existence of the hidden messages embedded by one well-known watermarking method. By contrast, the focus of Chapter 7 will be on developing a 3D watermarking algorithm that is resistant to mesh editing or deformation attacks that change the global shape of the mesh. By adopting a framework which has been successfully developed for image steganalysis, Chapter 8 designs a 3D steganalysis method to detect the existence of messages hidden in 3D models with existing steganographic and watermarking algorithms. The efficiency of this steganalytic algorithm has been evaluated on five state-of-the-art 3D watermarking/steganographic methods. Moreover, being a universal steganalytic algorithm can be used as a benchmark for measuring the anti-steganalysis performance of other existing and most importantly future watermarking/steganographic algorithms. Chapter 9 concludes this thesis and also suggests some potential directions for future work

    Data Hiding and Its Applications

    Get PDF
    Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others

    Intelligent Circuits and Systems

    Get PDF
    ICICS-2020 is the third conference initiated by the School of Electronics and Electrical Engineering at Lovely Professional University that explored recent innovations of researchers working for the development of smart and green technologies in the fields of Energy, Electronics, Communications, Computers, and Control. ICICS provides innovators to identify new opportunities for the social and economic benefits of society.  This conference bridges the gap between academics and R&D institutions, social visionaries, and experts from all strata of society to present their ongoing research activities and foster research relations between them. It provides opportunities for the exchange of new ideas, applications, and experiences in the field of smart technologies and finding global partners for future collaboration. The ICICS-2020 was conducted in two broad categories, Intelligent Circuits & Intelligent Systems and Emerging Technologies in Electrical Engineering

    Association of Christians in the Mathematical Sciences Proceedings 2017

    Get PDF
    The conference proceedings of the Association of Christians in the Mathematical Sciences biannual conference, May 31-June 2, 2017 at Charleson Southern University

    CIRCUS 2001 Conference Proceedings: New Synergies in Digital Creativity. Conference for Content Integrated Research in Creative User Systems

    Get PDF
    CIRCUS (Content Integrated Research For Creative User Systems) was an ESPRIT Working Group, originally set up in 1988 as one of the very last additional actions in Framework 4, under DG III. Its purpose was to develop models for collaborative work between artists (the term here used in its widest sense) and technologists (ditto) and to promote these models by whatever means available. While some have criticised this aim as implicitly promoting a 1950s agenda of building bridges across C.P. Snow’s ‘two cultures’, there is no such intention here, rather that technology, particularly computer and communications technology (ICT) , is irresistibly intruding into what is normally thought of as creative work (and so practised by artists) and that, like any new technique, this has to be understood by its potential practitioners in terms of its true strengths and limitations. The specific problem that computer technology poses is that it is in principle malleable to such an extent that the limitations on its form and functionality are still barely understood, yet the people charged with the task of making the technology available have little or no understanding of the needs of creative users. What the artist usually sees is a tool which is in principle capable of being harnessed to creative ends but in practice resists being so applied. Quite often the tool is shaped more by blind economic forces than by a clear response to a specific, here creative, need. CIRCUS came into existence as a forum in which both artists and technologists could work out how best to play to the strengths of ICT and how to apply both creative and technological solutions (possibly both together) to its limitations. In particular the then new Framework V programme invited projects in such areas as new media but required them to be addressed in essentially the same old way, by technologists working towards commercialisation. The only obvious exception to this was in the area of cultural heritage which, incidentally, CIRCUS was also capable of reviewing. The scope for effective participation by artists was thus limited by an essentially technological agenda although everybody at the time, the participants of CIRCUS and programme managers in DG III, believed that we could do far better than this, and to develop new models of working which could inform the nature of Framework VI or even the later stages of F V. It is fair to say that everyone involved was excited by the idea of doing something quite new (and iconoclastic), not least the expanding of the expertise base on which future Frameworks could draw. It is also fair to say that, while not ultimately wholly original, the CIRCUS agenda was an ambitious one and the WG has had a chequered history peppered with misunderstandings perpetrated by the very people who might have thought would give the WG their strongest support. The CIRCUS idea has been aired before, specifically at the University of Illinois at Urbana- Champaign, the MIT Media Lab (and its imitators), and a recent IEEE forum. However a near total change in participation, fuelled by natural migration and a switch to DG XIII, has resulted in the CIRCUS agenda being restarted on at least one occasion and a fairly regular questioning of the principles on whose elucidation we are engaged. While this is no bad thing in principle, in practice we haven’t learned anything new from these periodic bouts of self-examination other than a reinforcement of the values our goals. On the other hand it is evident that we have made progress and have moved on a long way from where we started. A recent experience of a workshop whose agenda appeared to be to form another version of CIRCUS, this time with an overwhelmingly technological (DG III) membership, demonstrates they have a CIRCUS-worth of work to do before they will have reached where we are now. (Foreword of CIRCUS for Beginners
    corecore