41 research outputs found

    Dual smoothing for marine oil spill segmentation

    Get PDF
    This is the author accepted manuscriptWe present a novel marine oil spill segmentation method that characterizes two smoothing modules at the label level and the pixel level separately. At the label level, we exploit the rolling guidance filter for smoothing the label cost volumes. It enables scale-aware labeling and thus alleviates the ambiguous segmentation that blurs the detailed structures of oil spills. At the pixel level, we adapt a cooperative model for smoothing higher order pixel variations, which has the potential of preserving elongated strips that often arise in oil spills. We integrate the two smoothing modules operating at different levels into an energy minimization formulation, which is referred to as dual smoothing. The coupling of the two smoothing modules enables an effective complement to each other such that the specific structures of oil spills are accurately characterized. We compute the optimal labeling of the dual-smoothing framework based on graph cuts. The proposed dual-smoothing framework is especially effective in segmenting elongated and detailed oil spills, and the experimental results demonstrate its advantages over thresholding- and graph-cut-based segmentations.Royal Societ

    Towards More Robust Commutative Watermarking-Encryption of Images

    Get PDF
    Histogram-based watermarking schemes are invariant against pixel permutations and can be combined with permutation-based ciphers. However, typical histogram-based watermarking schemes based on comparison of histogram bins are prone to de-synchronization attacks, where the whole histogram is shifted by a certain amount. In this paper we investigate the possibility of avoiding this kind of attacks by synchronizing the embedding and detection processes, using the mean of the histogram as a calibration point. The resulting watermarking scheme is resistant to three common types of shifts of the histogram, while the advantages of previous histogram-based schemes, especially commutativity of watermarking and permutation-based encryption, are preserved

    Non-commutative Geometry and Kinetic Theory of Open Systems

    Get PDF
    The basic mathematical assumptions for autonomous linear kinetic equations for a classical system are formulated, leading to the conclusion that if they are differential equations on its phase space MM, they are at most of the 2nd order. For open systems interacting with a bath at canonical equilibrium they have a particular form of an equation of a generalized Fokker-Planck type. We show that it is possible to obtain them as Liouville equations of Hamiltonian dynamics on MM with a particular non-commutative differential structure, provided certain geometric in character, conditions are fulfilled. To this end, symplectic geometry on MM is developped in this context, and an outline of the required tensor analysis and differential geometry is given. Certain questions for the possible mathematical interpretation of this structure are also discussed.Comment: 22 pages, LaTe

    Achieving better balance between compression and quality for JPEG-LS

    No full text

    Towards Robust Invariant Commutative Watermarking-Encryption based on Image Histograms

    No full text
    Invariant Commutative Watermarking-Encryption means to use a cipher that does not have any impact on a certain feature space, which can thus be used for embedding watermarks either before or after encryption. For example, histogram-based watermarking schemes are invariant to pixel permutations and can be combined with permutation-based ciphers to form a Commutative Watermarking-Encryption (CWE) scheme. However, typical histogram-based watermarking schemes based on comparison of histogram bins are prone to de-synchronization attacks, where the whole histogram is shifted by a certain amount. In this paper the authors investigate the possibility to avoid this kind of attacks by synchronizing the embedding and detection processes, using the mean of the histogram as a calibration point. The resulting watermarking scheme is resistant to three common types of shifts of the histogram, while the advantages of previous histogram-based schemes, especially commutativity of watermarking and permutation-based encryption, are preserved. The authors also report on the results of testing robustness of the scheme against JPEG and JPEG2000 compression

    Content-Fragile Commutative Watermarking-Encryption Based on Pixel Entropy

    No full text
    Content-fragile commutative watermarking-encryption requires that both the content-fragile image signature and the watermarking process are invariant under encryption. The pixel entropy, being dependent on first-order image statistics only, is invariant under permutations. In the present paper we embed semi-fragile signatures based on pixel entropy by using a histogram-based watermarking algorithm, which is also invariant to permutations. We also show how the problem of collisions, i.e. different images having the same signature, can be overcome in this approach, if embedder and encryptor share a common secret

    Preučevanje vpliva institucionalnih sprememb na gospodarsko rast in plačilno bilanco

    Get PDF
    The application of small civilian unmanned aerial vehicles (UAVs) has attracted great interest for disaster sensing. However, the limited computational capability and low energy resource of UAVs present a significant challenge to real-time data processing, networking and policy making, which are of vital importance to many disaster related applications such as oil-spill detection and flooding. In order to address the challenges imposed by the sheer volume of captured data, particularly video data, the intermittent and limited network resources, and the limited resources on UAVs, a new cloud-supported UAV application framework has been proposed and a prototype system of such framework has been implemented in this paper. The framework integrates video acquisition, data scheduling, data offloading and processing, and network state measurement to deliver an efficient and scalable system. The prototype of the framework comprises of a client-side set of components hosted on the UAV which selectively offloads the captured data to a cloud-based server. The server provides real-time data processing and information feedback services to the incident control centre and client device/operator. Results of the prototype system are presented to demonstrate the feasibility of such framework
    corecore