This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.
Image-Based Rendering examines the theory, practice, and applications associated with image-based rendering and modeling. The authors bring together their backgrounds and research experiences in computer graphics, computer vision and signal processing to address the multi-disciplinary nature of IBR research. The topics to be covered vary from IBR basic concepts and representations on the theory side, to signal processing and data compression on the practical side. These theoretical and practical issues are further disseminated in several IBR systems built to-date. However, this book will not focus on the geometrical modeling aspect of IBR, since 3D modeling has been extensively treated elsewhere in the vision literature.
One of the only titles devoted exclusively to the area of IBR, this book is intended for researchers, professionals, and general readers interested in the topics of computer graphics, computer vision, image processing, and video processing. Advanced-level students in EECS studying related disciplines will be able to seriously expand their knowledge about image-based rendering.
latest development in user-centered methods and the state-of-the-art in
visual media retrieval. It includes discussion on perceptually inspired
non-linear paradigm in user-controlled interactive retrieval (UCIR)
systems. It also features a coherent approach which focuses on specific topics
within content/concept-based retrievals via audio-visual information modeling
* Exploring an adaptive machine that can learn from its
* Optimizing the learning system by incorporating self-organizing
adaptation into the retrieval process
* Demonstrating state-of-the-art applications within small,
medium, and large databases
The authors also include applications related to Digital Asset
Management (DAM), Computer Aided Referral (CAR) System, Geographical
Database Retrieval, retrieval of Art Documents, and Films and Video
Multimedia Database Retrieval: A Human-Centered Approach presents the
fundamental and advanced aspects of these topics, as well as the
philosophical directions in the field. The methods detailed in this
book possess broad applications which will advance the technology in
this fast developing topical area.
The material includes a technical review and literature survey of components and complete systems, solutions for technical issues, and implementation of prototypes. The book is organized into four sections: System Overview, Content Generation, Data Compression and Transmission, and 3D Visualization and Quality Assessment. This book will benefit researchers, developers, engineers, and innovators, as well as advanced undergraduate and graduate students working in relevant areas.
This edited book presents recent findings in the field of intelligent multimedia surveillance emerging from disciplines such as multimedia computing, computer vision, and artificial intelligence. It consists of nine chapters addressing intelligent video surveillance, video analysis of crowds, privacy issues in intelligent multimedia surveillance, RFID technology for localization of objects, object tracking using visual saliency information, estimating multiresolution depth using active stereo vision, and performance evaluation for video surveillance systems.
The book will be of value to researchers and practitioners working on related problems in security, multimedia, and artificial intelligence.
Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AVS2; describes the key technologies used in the AVS2 standard, including prediction coding, transform coding, entropy coding, and loop-filters; examines efficient tools for scene video coding and surveillance video, and the details of a promising intelligent video coding system; discusses optimization technologies in video coding systems for reducing complexity, improving performance, and organizing compressed streams; provides a review of image, video, and 3D content quality assessment algorithms; surveys the hot research topics in video compression, including perceptual video compression, and Internet media-oriented compression.This invaluable work provides practical guidance for engineers on implementing the AVS2 standard, and will also prove helpful to students wishing to better understand the relevant techniques. Additionally, the book offers suggestions for researchers interested in developing smart video coding and processing frameworks for target problems.
The multi-frame technique and the Lagrangian coder control have been adopted by the ITU-T as an integral part of the well known H.263 standard and are were adopted in the ongoing H.26L project of the ITU-T Video Coding Experts Group.
This work will interest researchers and students in the field of video coding and transmission. Moreover, engineers in the field will also be interested since an integral part of the well known H.263 standard is based on the presented material.
Eric Setton, Hewlett-Packard Laboratories, Palo Alto, CA
Bernd Girod, Stanford University, Stanford, CA
Peer-to-Peer Video Streaming describes novel solutions to enhance video quality, increase robustness to errors, and reduce end-to-end latency in video streaming systems. This book will be of use to both academics and professionals as it presents thorough coverage and solutions for current issues with Video Streaming and Peer-to-Peer architectures.
Provides overview of today’s state-of-the art video streaming technology
Presents adaptive video coding and streaming techniques for performance enhancement of conventional client-server systems and P2P multicast
Focus on throughput-limited environments where congestion often hampers interactivity and fast response times
Results derived from experiments carried out over large-scale simulated peer networks
Detailed appendix incorporates various additional experiments