scholarly journals Exposing Video Compression History by Detecting Transcoded HEVC Videos from AVC Coding

Symmetry ◽  
2019 ◽  
Vol 11 (1) ◽  
pp. 67 ◽  
Author(s):  
Shan Bian ◽  
Haoliang Li ◽  
Tianji Gu ◽  
Alex Chichung Kot

The analysis of video compression history is one of the important issues in video forensics. It can assist forensics analysts in many ways, e.g., to determine whether a video is original or potentially tampered with, or to evaluate the real quality of a re-encoded video, etc. In the existing literature, however, there are very few works targeting videos in HEVC format (the most recent standard), especially for the issue of the detection of transcoded videos. In this paper, we propose a novel method based on the statistics of Prediction Units (PUs) to detect transcoded HEVC videos from AVC format. According to the analysis of the footprints of HEVC videos, the frequencies of PUs (whether in symmetric patterns or not) are distinguishable between original HEVC videos and transcoded ones. The reason is that previous AVC encoding disturbs the PU partition scheme of HEVC. Based on this observation, a 5D and a 25D feature set are extracted from I frames and P frames, respectively, and are combined to form the proposed 30D feature set, which is finally fed to an SVM classifier. To validate the proposed method, extensive experiments are conducted on a dataset consisting of CIF ( 352 × 288 ) and HD 720p videos with a diversity of bitrates and different encoding parameters. Experimental results show that the proposed method is very effective at detecting transcoded HEVC videos and outperforms the most recent work.

2020 ◽  
Vol 2020 ◽  
pp. 1-8
Author(s):  
Xueping Su ◽  
Meng Gao ◽  
Jie Ren ◽  
Yunhong Li ◽  
Matthias Rätsch

With the continuous development of economy, consumers pay more attention to the demand for personalization clothing. However, the recommendation quality of the existing clothing recommendation system is not enough to meet the user’s needs. When browsing online clothing, facial expression is the salient information to understand the user’s preference. In this paper, we propose a novel method to automatically personalize clothing recommendation based on user emotional analysis. Firstly, the facial expression is classified by multiclass SVM. Next, the user’s multi-interest value is calculated using expression intensity that is obtained by hybrid RCNN. Finally, the multi-interest value is fused to carry out personalized recommendation. The experimental results show that the proposed method achieves a significant improvement over other algorithms.


2021 ◽  
Vol 11 (5) ◽  
pp. 2038
Author(s):  
Huiping Gao ◽  
Guili Xu

In this paper, a novel method for the effective extraction of the light stripes in rail images is proposed. First, a preprocessing procedure that includes self-adaptive threshold segmentation and brightness enhancement is adopted to improve the quality of the rail image. Secondly, center of mass is utilized to detect the center point of each row of the image. Then, to speed up the procedure of centerline optimization, the detected center-points are segmented into several parts based on the geometry of the rail profile. Finally, piecewise fitting is adopted to obtain a smooth and robust centerline. The performance of this method is analyzed in detail, and experimental results show that the proposed method works well for rail images.


Symmetry ◽  
2022 ◽  
Vol 14 (1) ◽  
pp. 151
Author(s):  
Xintao Duan ◽  
Lei Li ◽  
Yao Su ◽  
Wenxin Wang ◽  
En Zhang ◽  
...  

Data hiding is the technique of embedding data into video or audio media. With the development of deep neural networks (DNN), the quality of images generated by novel data hiding methods based on DNN is getting better. However, there is still room for the similarity between the original images and the images generated by the DNN models which were trained based on the existing hiding frameworks to improve, and it is hard for the receiver to distinguish whether the container image is from the real sender. We propose a framework by introducing a key_img for using the over-fitting characteristic of DNN and combined with difference image grafting symmetrically, named difference image grafting deep hiding (DIGDH). The key_img can be used to identify whether the container image is from the real sender easily. The experimental results show that without changing the structures of networks, the models trained based on the proposed framework can generate images with higher similarity to original cover and secret images. According to the analysis results of the steganalysis tool named StegExpose, the container images generated by the hiding model trained based on the proposed framework is closer to the random distribution.


Author(s):  
Steven A. Schmied ◽  
Jonathan R. Binns ◽  
Martin R. Renilson ◽  
Giles A. Thomas ◽  
Gregor J. Macfarlane ◽  
...  

In this paper, a novel idea to produce continuous breaking waves is discussed, whereby a pressure source is rotated within an annular wave pool. The concept is that the inner ring of the annulus has a sloping bathymetry to induce wave breaking from the wake of the pressure source. In order to refine the technique, work is being conducted to better understand the mechanics of surfable waves generated by moving pressure sources in restricted water. This paper reports on the first stage of an experimental investigation of a novel method for generating continuously surfable waves utilising a moving pressure source. The aim was to measure and assess the waves generated by two parabolic pressure sources and a wavedozer [1] for their suitability for future development of continuous breaking surfable waves. The tests were conducted at the Australian Maritime College (AMC), University of Tasmania (UTas) 100 metre long towing tank. The experimental results as variations in wave height (H) divided by water depth (h) as functions of depth Froude number (Frh) and h, together with predictions from both methods, are presented in this paper. Finally, measures of the wave making energy efficiency of each pressure source, and the surfable quality of the waves generated by it, were developed and are presented.


2013 ◽  
Vol 427-429 ◽  
pp. 1836-1840 ◽  
Author(s):  
Yong Zhuo Wu ◽  
Zhen Tu ◽  
Lei Liu

Iamge repair using the digital image processing technology has become a new research point in computer application. A novel method of local statistic enhancement based on genetic algorithm is proposed in this paper for the image enhancement. The modified amplified function are used as the jugement criterion, and the optimal paremeters are searched by the genetic algorithm. Experimental results show that the quality of images is improved dramatically by using this method.


Author(s):  
Laibin Zhang ◽  
Zhigang Chen ◽  
Wei Liang ◽  
Mingda Wang

It is an effective method to detect leak using negative pressure wave (NPW). When heat oil pipelines in low transfer throughput and complex operational changes, usually noise will be very strong and feature signal of leak is difficult to extract. In order to improve quality of parameter information collected, a novel method based on Independent Component Analysis (ICA) is proposed to separate and filter weak aim signal from noise. In this paper signal processing principle based ICA is introduced and experiments are illustrated. The experimental results show that signal-to-noise ratio (SNR) of processed pressure signals is raised effectively and feature signal become easy to extract. At the same time, in heat oil pipelines pressure wave velocity is affected by oil and axial temperature drop. Location usually has obvious error. To solve this problem axial temperature drop is analyzed and velocity of NPW was revised. By means of Newton-Cotes integration method location formula is modified. The real experimental results show that the improved located formula made location accuracy from 2.5% to 1.0%.


2018 ◽  
Vol 2018 ◽  
pp. 1-11
Author(s):  
Junhui He ◽  
Junxi Chen ◽  
Shichang Xiao ◽  
Xiaoyu Huang ◽  
Shaohua Tang

Steganography is a means of covert communication without revealing the occurrence and the real purpose of communication. The adaptive multirate wideband (AMR-WB) is a widely adapted format in mobile handsets and is also the recommended speech codec for VoLTE. In this paper, a novel AMR-WB speech steganography is proposed based on diameter-neighbor codebook partition algorithm. Different embedding capacity may be achieved by adjusting the iterative parameters during codebook division. The experimental results prove that the presented AMR-WB steganography may provide higher and flexible embedding capacity without inducing perceptible distortion compared with the state-of-the-art methods. With 48 iterations of cluster merging, twice the embedding capacity of complementary-neighbor-vertices-based embedding method may be obtained with a decrease of only around 2% in speech quality and much the same undetectability. Moreover, both the quality of stego speech and the security regarding statistical steganalysis are better than the recent speech steganography based on neighbor-index-division codebook partition.


2014 ◽  
Vol 989-994 ◽  
pp. 2245-2249
Author(s):  
Zhe Tang ◽  
Ke Luo

Aiming to resolve the problems of the traditional k-means clustering algorithm such as random selecting of initial clustering centers,the low efficiency of clustering,low in the real,this paper proposed a novel k-means clustering algorithm method based on shuffled frog leaping algorithm.This algorithm combined the advantages of k-means algorithm and shunffled forg leaping algorithm.A chaotic local search was introduced to improve the quality of the initial individual,a new searching strategy was presented to update frog position,that increased the optimization ability of algorithm.According to the variation of the frog’s finess variance used k-means algorithm,it has the advantages in the global search ability and convergence speed.The experimental results show that this algorithm has higher accuracy..


The author analyzes the reasons that objectively reduce the importance and quality of the organizational and technological solutions of work production plans and the content of their main documents. Based on a generalization of practical experience, one of the real ways of increasing the level of work production plans is proposed as a result of the development of "The Unified Rules for Work Production on the Site" as part of the construction organization project, in the form of fundamental requirements, followed by the inclusion of this document in the work production plan as an input document. The structure and content of the Unified Rules are described with the disclosure of the main documents - calendar plans of work, construction master plans, technological schemes of works. The first section of the document contains requirements for the content of tasks for the development of the project of work execution, the order of its approval, and requirements for the quality of solutions. The second section presents principal solutions, methods of work execution and their technological schemes. The organizational and technological solutions adopted in the proposed document are specified and detailed by the General Contractor Construction Organization with due regard for the resource capabilities and the actual conditions of construction or reconstruction.


2020 ◽  
Vol 10 (2) ◽  
pp. 175
Author(s):  
Nomensen Freddy Siahaan

After a long time was not heard to the public area, lately death penalty toward the criminal cases that classified as extraordinary crime are appear. The author discovers electronic article about the execution of the death penalty which is the prosecutor prepares to execute death penalty toward the drugs dealer. The president of Republic of Indonesia stated that it is necessary to give a deterrent effect to the convicted  criminal and keep the morality of Indonesian teenagers. According to my opinion, the author argues that it will be better and wiser if we discuss about renovating all of the Penitentiary in Indonesia than debating whether death penalty could be done in Indonesia or not, because it will be displeasure many parties, death penalty infringed the human rights of the convicted criminals and cause psychological burden to them, families, the executor of the death penalty, and other parties. Because if we have to improve the quality of the Penitentiary, if the function of Penitentiary for fostering moralily has been optimal or properly enough to the convicted criminals, Indonesia will be no longer need the death penalty option as sanction to the convicted crimanals including for the extraordinary crime (especially for drugs trafficking in our country). Penitentiary is one of the public services which aims for fostering the people that initially have bad habits (commited to the crime), so that they will have the awareness to change their bad attitude into the be better ones, will not harm others, and positively contributed to the society. Already Penitentiary’s conditions should be designed in such a way and as good as possible, so that the inmates feels like at their own home (like having a second home after his own home), and feel humaner to spend their days in the Penitentiary. The author believes that if the Penitentiary has been improved and optimized its function well, then the real purpose of Penitentiary will definitely achieved. As stated in Law Number 12 Year 1995 regarding to Penitentiary Article 2 which states "sanction system are organized in order to fostering the convicted criminals in order to be the real man, aware of their fault, improve themselves, and not to repeat the criminal act so that they can be friendly received by the community, can actively participated in the development of our country, and can socialize themselves as good citizen."Article 3 on this regulation also intensifies the function of Penitentiary "the function of Penitentiary is to prepare convicted criminals to be able to properly integrated to the society, so they can be accepted again as members of the public who are free and responsible ones." 


Sign in / Sign up

Export Citation Format

Share Document