23 research outputs found

    Fast algorithm for the modulated complex lapped transform

    No full text

    Motion Estimation and DCT Coding Combined Scheme for H.264/AVC Codec

    No full text

    Efficient Run-length Encoding Of Binary Sources With Unknown Statistics

    No full text
    An efficient run-length encoding of binary sources with unknown statistics was discussed. Binary entropy coders, which were used in multimedia codec standards and used adaptive Golomb-Rice coders, were also discussed. The uses of two subsets of Golomb parameters were also proposed. Polynomials whose roots were used to determine the optimal values of the Golomb parameters were derived. A nearly-optimal adaption strategy was derived, using a maximum-liklihood approach.534Tanaka, H., Leon-Garcia, A., Efficient run-length encoding (1982) IEEE Trans. Information Theory, IT-28, pp. 880-890. , NovCosta, M.H.M., Malvar, H.S., Efficient run-length encoding of binary sources with unknown statistics (2003) Microsoft Research Tech. Report, TR-2003-95. , De

    A practical approach for the design of nonuniform lapped transforms

    No full text

    Low-complexity transform and quantization in H.264/AVC

    No full text

    Rapid Algorithms for MPEG-2 to H.264 Transcoding

    No full text

    Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding

    No full text
    International audienceThis paper is the continuation of works about analysis of secure watermarking schemes in the case of WOA (Watermarked Only Attack) framework. In previous works, two new BPSK spread-spectrum watermarking modulations, Natural Watermarking (NW) and Circular Watermarking (CW), have been proposed and have been shown to be more secure than classical modulations. Because security is guaranted using specific distributions of watermarked contents, we propose to use optimal model-based embedding to ensure security while minimizing the overall distortion. Additionally, we propose a new secure watermarking scheme based on distribution of vector norms in the Gaussian case. We illustrate model-based embedding performance in the case of Gaussian signals and show that this approach not only allows to achieve excellent level of security in the WOA framework, but also allows to minimize distortion. Finally, a comparison of the robustness of the proposed em- bedding schemes is performed
    corecore