47 research outputs found

    Towards Baseline-Independent Analysis of Compressive Sensed Functional Magnetic Resonance Image Data

    Get PDF
    The main task of Functional Magnetic Resonance Imaging (fMRI) is the localisation of brain activities, which depends on the detection of hemodynamic responses in the Blood Oxygenation-Level Dependent (BOLD) signal. While compressive sensing has been widely applied to improve the quality and resolution of MRI in general, its reconstruction noise overwhelms the small magnitude of hemodynamic responses. We propose a new reconstruction algorithm for the compressive sensing fMRI that exploits the temporal redundancy of the data, called Referenced Compressive Sensing, which works well in preserving fMRI analytical features. We also propose the use of the baseline-independent signal for analysis of reconstructed data. It is shown that the baseline-independent reconstructed data from Referenced Compressive Sensing is highly correlated to the lossless data, thus preserving more of the analytical features

    Graph spectral domain shape representation

    Get PDF
    One of the major challenges in shape matching is recognising and interpreting the small variations in objects that are distinctly similar in their global structure, as in well known ETU10 silhouette dataset and the Tool dataset. The solution lies in modelling these variations with numerous precise details. This paper presents a novel approach based on fitting shape's local details into an adaptive spectral graph domain features. The proposed framework constructs an adaptive graph model on the boundaries of silhouette images based on threshold, in such a way that reveals small differences. This follows feature extraction on the spectral domain for shape representation. The proposed method shows that interpreting local details leading to improve the accuracy levels by 2% to 7% for the two datasets mentioned above, respectively

    Embedding distortion analysis in wavelet-domain watermarking

    Get PDF
    Imperceptibility and robustness are two complementary fundamental requirements of any watermarking algorithm. Low-strength watermarking yields high imperceptibility, but exhibits poor robustness. High-strength watermarking schemes achieve good robustness but often infuse distortions resulting in poor visual quality in host images. This article analyses the embedding distortion for wavelet-based watermarking schemes. We derive the relationship between distortion, measured in mean square error (MSE), and the watermark embedding modification and propose the linear proportionality between MSE and the sum of energy of the selected wavelet coefficients for watermark embedding modification. The initial proposition assumes the orthonormality of discrete wavelet transform. It is further extended for non-orthonormal wavelet kernels using a weighting parameter that follows the energy conservation theorems in wavelet frames. The proposed analysis is verified by experimental results for both non-blind and blind watermarking schemes. Such a model is useful to find the optimum input parameters, including the wavelet kernel, coefficient selection, and subband choices for wavelet domain image watermarking

    Graph Spectral Domain Watermarking for Unstructured Data from Sensor Networks

    Get PDF
    The modern applications like social networks and sensors networks are increasingly used in the recent years. These applications can be represented as a weighted graph using irregular structure. Unfortunately, we cannot apply the techniques of the traditional signal processing on those graphs. In this paper, graph spread spectrum watermarking is proposed for networked sensor data authentication. Firstly, the graph spectrum is computed based on the eigenvector decomposition of the graph Laplacian. Then, graph Fourier coefficients are obtained by projecting the graph signals onto the basis functions which are the eigenvectors of the graph Laplacian. Finally, the watermark bits are embedded in the graph spectral coefficients using a watermark strength parameter varied according to the eigenvector number. We have considered two scenarios: blind and non-blind watermarking. The experimental results show that the proposed methods are robust, high capacity and result in low distortion in data. The proposed algorithms are robust to many types of attacks: noise, data modification, data deletion, rounding and down-sampling

    Temporal salience based human action recognition

    Get PDF
    This paper proposes a new approach for human action recognition exploring the temporal salience. We exploit features over the temporal saliency maps for learning the action representation using a local dense descriptor. This approach automatically guides the descriptor towards the most interesting contents, i.e. the salience region, and obtains the action representation using solely the saliency information. Outperforming results on Weizmann, DHA and KTH datasets confirm the efficiency of the proposed approach as compared to the state-of-the-art methods, in terms of accuracy and robustness to the variations inside the action and similarities among actions. The proposed method outperforms by 2.7% with DHA, 1% with KTH and it is comparable in the case of Weizmann

    Graph spectral domain blind watermarking

    Get PDF
    This paper proposes the first ever graph spectral domain blind watermarking algorithm. We explore the recently developed graph signal processing for spread-spectrum watermarking to authenticate the data recorded on non-Cartesian grids, such as sensor data, 3D point clouds, Lidar scans and mesh data. The choice of coefficients for embedding the watermark is driven by the model for minimisation embedding distortion and the robustness model. The distortion minimisation model is proposed to reduce the watermarking distortion by establishing the relationship between the error distortion using mean square error and the selected Graph Fourier coefficients to embed the watermark. The robustness model is proposed to improve the watermarking robustness against the attacks by establishing the relationship between the watermark extraction and the effect of the attacks, namely, additive noise and nodes data deletion. The proposed models were verified by the experimental results
    corecore