By Topic

Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on

Date July 30 2000-Aug. 2 2000

Go

Filter Results

Displaying Results 1 - 25 of 132
  • 2000 ieee international conference on multimedia and expo - ICME 2000 [front matter]

    Publication Year: 2000, Page(s):i - xxxv
    Request permission for commercial reuse | PDF file iconPDF (1854 KB)
    Freely Available from IEEE
  • Joint downlink beamforming, power control, and data rate allocation for DS-CDMA mobile radio with multimedia services

    Publication Year: 2000, Page(s):1455 - 1458 vol.3
    Cited by:  Papers (1)  |  Patents (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (446 KB)

    Power control and rate allocation are two fundamental issues for improving the spectrum efficiency of downlink transmission for wireless multimedia communications. Downlink beamforming, on the other hand, can be used to suppress stronger interference induced by high rate users, thereby improving the system performance. We present a joint downlink beam-forming, power control and rate allocation tec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2000, Page(s):0_5 - 0_10
    Request permission for commercial reuse | PDF file iconPDF (510 KB)
    Freely Available from IEEE
  • Joint source/FEC rate selection for optimal MPEG-2 video delivery

    Publication Year: 2000, Page(s):1301 - 1304 vol.3
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    The paper deals with the optimal allocation of MPEG-2 encoding and media-independent FEC rates under a total given bandwidth. The optimality is defined in terms of minimum perceptual end-to-end distortion given a set of video and network parameters. We first derive the set of equations leading to the residual loss process parameters. That is, the packet loss ratio and the average burst length afte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image integrity and correction using parities of error control coding

    Publication Year: 2000, Page(s):1297 - 1300 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB)

    A novel function for image watermarking is proposed. We show how a watermarking sequence can be used for the correction of illegal modifications. To make this task possible, the parities generated by the conventional error control coding (ECC) technique are used for the watermarking sequence; then the receiver can correct any alterations by applying the ECC decoding to the received image data. To ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Geometric distortion correction through image normalization

    Publication Year: 2000, Page(s):1291 - 1294 vol.3
    Cited by:  Papers (25)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    A new approach for geometric distortion correction based on image normalization is presented in this paper. By normalization we mean geometrically transforming the image into a standard form. The parameters by which the image is normalized are estimated from the geometric moments of the image. This paper presents a system in which the watermark is embedded and detected in the normalized image. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Water-filling for watermarking?

    Publication Year: 2000, Page(s):1287 - 1290 vol.3
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    Addresses the question of whether water-filling is appropriate for watermarking. The water-filling paradigm is a traditional solution to the capacity maximization of parallel zero-mean additive white Gaussian channels subject to a signal energy constraint. We take an information theoretic approach to analyze the watermark communication problem in the presence of perceptual coding. Our effective wa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Watermarking through color image bands decorrelation

    Publication Year: 2000, Page(s):1283 - 1286 vol.3
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    Image watermarking has received great attention. Nevertheless, researchers are still faced with several problems: the extension of gray-level watermarking to the color case is one of them. To get rid of the problems raised by the correlation among image color bands, a new approach based on the decorrelation property of the Karhunen-Loeve transform (KLT) is proposed. The KLT is first applied to the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Skew detection and compensation for Internet audio applications

    Publication Year: 2000, Page(s):1687 - 1690 vol.3
    Cited by:  Papers (7)  |  Patents (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    Long lived audio streams, such as music broadcasts, and small differences in clock rates lead to buffer underflow or overflow events in receiving applications that manifest themselves as audible interruptions. We present a low complexity algorithm for detecting clock skew in network audio applications that function with local clocks and in the absence of a synchronization mechanism. A companion al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Steganalysis of LSB encoding in color images

    Publication Year: 2000, Page(s):1279 - 1282 vol.3
    Cited by:  Papers (50)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    Analyzes the security of least significant bit (LSB) embedding for hiding messages in high-color-depth digital images. We introduce a powerful steganalytic technique that enables us to reliably detect the presence of a pseudorandom binary message randomly spread in a color image. We estimate the probability of both false detections and missing a secret message. The method is based on statistical a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extension of SMIL with QoS control and its implementation

    Publication Year: 2000, Page(s):1683 - 1686 vol.3
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    We propose a language called QOS-SMIL where some QoS guarantee statements are added to a subclass of SMIL, and give its implementation technique. In QOS-SMIL, in addition to standard facilities of SMIL, dynamic media-scaling of each multimedia object and explicit inter-media synchronization among objects, can be specified. In the proposed implementation technique, we use real-time LOTOS as an inte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approaches to multimedia and security

    Publication Year: 2000, Page(s):1275 - 1278 vol.3
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    The requirements on security are increasing, particularly in the field of multimedia. Whether and in which way security mechanisms can be applied to multimedia data and their applications needs to be analyzed for each purpose separately. This is mainly due to the structure and complexity of multimedia. Based on the main issues of IT security, this paper introduces the most important security requi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Common time reference for interactive multimedia applications

    Publication Year: 2000, Page(s):1679 - 1682 vol.3
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB)

    A delay of about 100 ms gives human communicators the feeling of live interaction. Since in a global network the propagation delay alone is about 100 ms, every other delay component, such as processing and queuing, should be kept as short as possible. Moreover, the deployment of new high bandwidth multimedia applications will boost network traffic and consequently the demand for very high capacity... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A channel predictor for wireless packet networks

    Publication Year: 2000, Page(s):1269 - 1272 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    For wireless channels, interference mitigation techniques are typically applied at the bit/packet transmission level. In this paper, we present a simple channel predictor that responds to impairments that are present at the packet transmission time scale. A channel predictor determines whether to transmit a packet or not, depending on the state of the wireless channel. Channel state information pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • About the semantic verification of SMIL documents

    Publication Year: 2000, Page(s):1675 - 1678 vol.3
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    The paper presents a formal approach based on the RT-LOTOS formal description technique for the semantic verification of SMIL documents. The reachability analysis of RT-LOTOS specifications provides the verification of consistency properties of a document, and later on, it also enables the generation of a valid scheduling graph for its presentation. This graph characterizes the reference behaviors... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rate-distortion optimization for arbitrarily-shaped object coding

    Publication Year: 2000, Page(s):1601 - 1604 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB)

    The trade-off between rate and distortion suggests two approaches for the rate-distortion optimization: (1) reduce the rate at a smaller increase in distortion (pushing the rate-distortion curve to the left) and (2) reduce the distortion at a smaller increase in rate (pushing the rate-distortion curve downward). In general, only the first approach is applicable for ordinary fully-defined blocks of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Admission and flow control for multimedia CDMA

    Publication Year: 2000, Page(s):1265 - 1268 vol.3
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    QoS guarantees for an integrated CDMA system can be provided by a combination of admission and flow control. The admission control restricts the number of users in the system such that QoS requirements for all calls can be met. The flow control balances the system interference on a slot-by-slot basis such that bit error rate requirements are met for all users and the real-time users are given the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to checking consistency in multimedia synchronization constraints

    Publication Year: 2000, Page(s):1671 - 1674 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    The paper proposes a new method for analyzing multimedia synchronization constraints based on the constraint graph and classification, which is essential in developing efficient support tools for constraint based authoring systems. We specify the temporal relations between multimedia objects, and use a directed graph to represent the constraints among the objects in a multimedia scenario. We then ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart videoconferencing

    Publication Year: 2000, Page(s):1597 - 1600 vol.3
    Cited by:  Papers (8)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    The combination of acoustical and video processing to achieve a smart audio and video feed from a set of N microphones and M cameras is a task that might conventionally be accomplished by camera persons and control room staff. However, in the context of videoconferencing, this process needs to be performed by control software. We discuss the use of a multi-camera multi-microphone set-up for unatte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Issues on mobile ad-hoc WANs

    Publication Year: 2000, Page(s):1261 - 1264 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB)

    The authors present the main challenges in mobile ad-hoc wide area networks (MAWANs). A MAWAN is a wide area, large, (potentially) entirely wireless networks. We describe the Terminodes Project that investigates issues and challenges in MAWANs. The name of the project comes from the fact that the elements of the network act as nodes and terminals at the same (terminodes) View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive tutoring machine based on Web learning assessment

    Publication Year: 2000, Page(s):1667 - 1670 vol.3
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    Student performance is difficult to measure in distance learning. The authors discuss a system which keeps track of the interaction behavior of each student while one is visiting a distance learning Web document. The system also uses a dynamic finite state machine to generate new Web documents based on the interaction behavior. The contribution of such a mechanism benefits both teachers in underst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Networked Intelligent Collaborative Environment (NetICE)

    Publication Year: 2000, Page(s):1645 - 1648 vol.3
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    The paper presents NetICE, Networked Intelligent Collaborative Environment, which is a prototype designated to provide an immersive environment to allow people to communicate from anywhere at any time. The NetICE system consists of two components: an intelligent network and smart terminals. The intelligent network allows multiple users to be connected to the same virtual space. The smart terminals... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a multimodal meeting record

    Publication Year: 2000, Page(s):1593 - 1596 vol.3
    Cited by:  Papers (11)  |  Patents (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB)

    Face-to-face meetings usually encompass several modalities including speech, gesture, handwriting, and person identification. Recognition and integration of each of these modalities is important to create an accurate record of a meeting. However, each of these modalities presents recognition difficulties. Speech recognition must be speaker and domain independent, have low word error rates, and be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joint video scene segmentation and classification based on hidden Markov model

    Publication Year: 2000, Page(s):1551 - 1554 vol.3
    Cited by:  Papers (4)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    Video classification and segmentation are fundamental steps for efficient accessing, retrieval and browsing of large amounts of video data. We have developed a scene classification scheme using a hidden Markov model (HMM) based classifier. By utilizing the temporal behaviors of different scene classes, the HMM classifier can effectively classify video segments into one of the pre-defined scene cla... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SMMM-a Secure MultiMedia Mail system

    Publication Year: 2000, Page(s):1501 - 1504 vol.3
    Cited by:  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB)

    This paper presents Secure MultiMedia Mail System (SMMM), a secure multimedia electronic mail system that deals with issues related to security, network traffic reduction and storage management of multimedia messages. The composition of M/H (multimedia/hypermedia) messages in SMMM is based on NCM (Nested Context Model), a conceptual model for hypermedia documents. SMMM provides support for multime... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.