Text Hiding in MPEG-l Video File Using Header Location

Author(s):  
Saad Albawi ◽  
Yasser Almadany ◽  
Walaa A. Mahmood
Keyword(s):  
2014 ◽  
Vol 11 ◽  
pp. S68-S76 ◽  
Author(s):  
Thomas Gloe ◽  
André Fischer ◽  
Matthias Kirchner

2014 ◽  
Vol 533 ◽  
pp. 218-225 ◽  
Author(s):  
Rapee Krerngkamjornkit ◽  
Milan Simic

This paper describes computer vision algorithms for detection, identification, and tracking of moving objects in a video file. The problem of multiple object tracking can be divided into two parts; detecting moving objects in each frame and associating the detections corresponding to the same object over time. The detection of moving objects uses a background subtraction algorithm based on Gaussian mixture models. The motion of each track is estimated by a Kalman filter. The video tracking algorithm was successfully tested using the BIWI walking pedestrians datasets [. The experimental results show that system can operate in real time and successfully detect, track and identify multiple targets in the presence of partial occlusion.


2010 ◽  
Vol 50 (1) ◽  
pp. 45
Author(s):  
Z. Geradts ◽  
FIDIS
Keyword(s):  

2020 ◽  
Vol 8 (5) ◽  
pp. 3978-3983

Identification of a person’s speech by his lip movement is a challenging task. Even though many software tools available for recognition of speech to text and vice versa, some of the words uttered may not be accurate as spoken and may vary from person to person because of their pronunciation. In addition, in the noisy environment speech uttered may not perceive effectively hence there lip movement for a given speech varies. Lip reading has added advantages when it augmented with speech recognition, thus increasing the perceived information. In this paper, the video file of a individual person are converted to frames and extraction of only the lip contour for vowels is done by calculating its area and other geometrical aspects. Once this is done as a part of testing it is compared with three to four people’s lip contour for vowels for first 20 frames. The parameters such as mean, centroid will remain approximately same for all people irrespective of their lip movement but there is change in major and minor axis and hence area changes considerably. In audio domain vowel detection is carried out by extracting unique features of English vowel utterance using Mel Frequency Cepstrum Coefficients (MFCC) and the feature vectors that are orthonormalized to compare the normalized vectors with standard database and results are obtained with approximation.


Author(s):  
Pinky Saikia Dutta ◽  
Sauvik Chakraborty

Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-secure method in which to protect data. Steganography techniques can be applied to images, a video file or an audio file. Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages, no matter how unbreakable they are, arouse interest and may in themselves be incriminating in countries in which encryption is illegal. Whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned both with concealing the fact that a secret message is being sent and its contents. Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol.


2019 ◽  
Vol 14 (6) ◽  
pp. 1999-2006
Author(s):  
Wessam Lahmod Nados ◽  
Nada A. Rasheed

2018 ◽  
Vol 7 (3.2) ◽  
pp. 713
Author(s):  
S Suherman ◽  
Naemah Mubarakah ◽  
Marwan Al-Akaidi

There are two transport layer protocols that have been used in the internet protocol (IP) networks: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both protocols have been utilized for video streaming applications. This paper examines energy consumed by a mobile device when TCP or UDP employed by the application within it for streaming a video file. A transport protocol load management is proposed to reduce the mobile device energy consumptions. The experiments were conducted in the 802.11 environment. The results show that the proposed method is able to minimize mobile device energy consumptions up to 10.7% and 3.34% for both TCP and UDP protocols.  


2014 ◽  
Vol 643 ◽  
pp. 253-257
Author(s):  
Kai Min Zhao ◽  
Yu Ting Chen ◽  
Jun Li ◽  
Hao Yang ◽  
Li Ying Chen

In this paper, frame differential method will be used to detect moving targets in a static background video file, and pre-contour can be obtained by binarizing the detected targets . However,, the result are not what was expected, so the expansion and corrosion of mathematical morphology are used to extract the final contour of moving targets. in the progress of dealing with massive data , mathematical morphology is not good enough to achieve the need of the real-time in video surveillance. Considering the dilation and erosion is a kind of parallel processing operations, in order to improve the speed of mathematical morphology operations, this paper offers detailed implementation process of the dilation algorithm for parallel computing on GPU. Experimental results showed that GPU parallel processing on mathematical morphology algorithm faster than the CPU serial processing.


1990 ◽  
Author(s):  
Mitsuya Okada ◽  
Osamu Okada ◽  
Syoji Shimizu ◽  
Kazuhiko Hayashi ◽  
Toru Sekiguchi ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document