By Topic

Multimedia Signal Processing, 2002 IEEE Workshop on

Date 9-11 Dec. 2002

Filter Results

Displaying Results 1 - 25 of 116
  • Proceedings of 2002 IEEE Workshop on Multimedia Signal Processing (Cat. No.02TH8661)

    Publication Year: 2002
    Save to Project icon | Request Permissions | PDF file iconPDF (288 KB)  
    Freely Available from IEEE
  • Author index

    Publication Year: 2002 , Page(s): 469 - 471
    Save to Project icon | Request Permissions | PDF file iconPDF (136 KB)  
    Freely Available from IEEE
  • Text-to-speech for low-resource systems

    Publication Year: 2002 , Page(s): 259 - 262
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (319 KB) |  | HTML iconHTML  

    This article describes the restrictions and requirements low-resource systems to impose on text-to-speech (TTS) software. The most important point is available memory size, but computing time and implementation issues are discussed as well. For each restriction, one or more solutions are presented. The proferred solutions have been implemented by Infineon Technologies AG and the Technical Universi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D rigid structure from video: what are "easy" shapes and "good" motions?

    Publication Year: 2002 , Page(s): 97 - 100
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (401 KB) |  | HTML iconHTML  

    Factorization algorithms are increasingly popular to recover 3D rigid structure from video. In this paper, we analyze the rank 1 factorization algorithm to determine what are the most suitable 3D shapes or the best 3D motions to recover the 3D structure from the 2D trajectories of the features. We show that the shape is best retrieved from orthogonal views aligned with the longest and smallest axe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Eyeball Video Communications Platform

    Publication Year: 2002 , Page(s): 396 - 399
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (472 KB) |  | HTML iconHTML  

    Eyeball Video Communications Platform (VCP) provides a comprehensive solution for video communications, instant messaging, remote collaboration and application development. Eyeball VCP supports one-to-one and many-to-many video communications and collaboration utilizing peer-to-peer data transport without employing any reflector service. This structure is not only cost effective but also provides ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Audio fingerprinting: nearest neighbor search in high dimensional binary spaces

    Publication Year: 2002 , Page(s): 182 - 185
    Cited by:  Papers (15)  |  Patents (12)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (364 KB) |  | HTML iconHTML  

    Audio fingerprinting is an emerging research field in which a song must be recognized by matching an extracted "fingerprinting" to a database of known fingerprints. Audio fingerprinting must solve the two key problems of representation and search. In this paper, we are given an 8192-bit binary representation of each five second interval of a song and therefore focus our attention on the problem of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A joint channel estimation and unequal error protection scheme for image transmission in wireless OFDM systems

    Publication Year: 2002 , Page(s): 380 - 383
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (496 KB) |  | HTML iconHTML  

    Orthogonal frequency division multiplexing (OFDM) modulation, adopted by the digital video broadcasting (DVB-T) standard, has been recognized for its good performance for high data rate wireless communications. Therefore, the study of the robust transmission of multimedia data over OFDM systems has attracted extensive research interests. In the past, channel estimation, which is an important aspec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context based coding of quantized alpha planes for video objects

    Publication Year: 2002 , Page(s): 101 - 104
    Cited by:  Papers (4)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (342 KB) |  | HTML iconHTML  

    In object based video, each frame is a composition of objects that are coded separately. The composition is performed through the alpha plane that represents the transparency of the object. We present an alternative to MPEG-4 for coding of alpha planes that considers their specific properties. Comparisons in terms of rate and distortion are provided, showing that the proposed coding scheme for sti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse link analysis of cellular packet data networks with multiple receive antennas

    Publication Year: 2002 , Page(s): 400 - 403
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (357 KB) |  | HTML iconHTML  

    The reverse link of a wireless packet data system with a varying number of users is considered. A time scale separation approximation is used to justify the analysis of this system based on a processor sharing model, and to compute the tradeoff between the offered load and the throughput seen by a typical user. When multiple receive antennas are available at the base station, it is shown that simp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedded signature-based authentication by channel statistics using watermarking techniques

    Publication Year: 2002 , Page(s): 328 - 331
    Cited by:  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (353 KB) |  | HTML iconHTML  

    This study examines the feasibility of using statistics to perform embedded signature-based authentication. Doing so is an attempt to view a reference watermark embedded with signature as side information. The reference watermark is extracted to determine channel statistics, based on the Bayes theorem, and used to extract the embedded signature. The reliability of the extracted signature and the u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Color image watermarking based on a color visual model

    Publication Year: 2002 , Page(s): 367 - 370
    Cited by:  Papers (3)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (362 KB) |  | HTML iconHTML  

    To locate the right places for embedding watermark signals, and to set the proper strength of the embedded watermark signal is a critical problem for obtaining a robust and transparent watermark in color images. In this paper, a color visual model and the associated watermarking scheme are proposed for solving this problem. The visual model can estimate the profile of error visibility thresholds f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedded image compression using DCT based subband decomposition and SLCCA data organization

    Publication Year: 2002 , Page(s): 81 - 84
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (375 KB) |  | HTML iconHTML  

    Wavelet transform provides harmonic space-frequency localization and great energy compaction, but with generally high computational complexity. In this paper, an 8×8 fast discrete cosine transform (DCT) approach is adopted to perform subband decomposition, followed by SLCCA data organization and entropy coding. Simulation results showed that the embedded DCT-SLCCA image compression reduced t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast DCT-domain filtering using frequency division processing

    Publication Year: 2002 , Page(s): 45 - 48
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (386 KB) |  | HTML iconHTML  

    This paper presents a new scheme for the development of efficient DCT-domain algorithms based on frequency division processing (FDP). In this scheme, a manipulation in the DCT domain is decomposed into multiple simple operations, each of which is performed independently on certain sets of DCT coefficients. Using FDP we designed a fast DCT-domain algorithm for two-dimensional convolution. The algor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An optimal shape encoding scheme using skeleton decomposition

    Publication Year: 2002 , Page(s): 85 - 88
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (363 KB) |  | HTML iconHTML  

    This paper presents an operational rate-distortion (ORD) optimal approach for skeleton-based boundary encoding. The boundary information is first decomposed into skeleton and distance signals, by which a more efficient representation of the original boundary results. Curves of arbitrary order are utilized for approximating the skeleton and distance signals. For a given bit budget for a video frame... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Musical query-by-description as a multiclass learning problem

    Publication Year: 2002 , Page(s): 153 - 156
    Cited by:  Papers (7)  |  Patents (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (382 KB)  

    We present the query-by-description (QBD) component of "Kandem", a time-aware music retrieval system. The QBD system we describe learns a relation between descriptive text concerning a musical artist and their actual acoustic output, making such queries as "Play me something loud with an electronic beat" possible by merely analyzing the audio content of a database. We show a novel machine learning... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-stream video transport over MPLS networks

    Publication Year: 2002 , Page(s): 384 - 387
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (371 KB) |  | HTML iconHTML  

    This paper presents a study on traffic management for transporting progressive video streams over multiprotocol label switching (MPLS) networks. Based on the variety of MPLS service models, a unique multi-stream video transport scheme is proposed. A 3-D subband video coder is used in generating the source data traffic. A special feature of this video coder is that the coded bit stream can be easil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy based collaborative source localization using acoustic micro-sensor array

    Publication Year: 2002 , Page(s): 371 - 375
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (446 KB) |  | HTML iconHTML  

    A novel sensor network source localization method based on acoustic energy measurements is presented. This method makes use of the characteristics that the acoustic energy decays exponentially with respect to the distance from an omni-directional acoustic source. By comparing energy readings measured at surrounding acoustic sensors during the same time interval can be accurately estimated. We show... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Medium access control with channel state information for large sensor networks

    Publication Year: 2002 , Page(s): 416 - 419
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (384 KB) |  | HTML iconHTML  

    Traditionally, random access protocols have been designed and studied by assuming simple models for the physical layer. We introduce a reception model that incorporates the channel states of the transmitting users and allows for multiple simultaneous successes. We assume that each user has access to his channel state and propose a variant of the Slotted ALOHA protocol for medium access where the t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data masking: a secure-covert channel paradigm

    Publication Year: 2002 , Page(s): 339 - 342
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (354 KB) |  | HTML iconHTML  

    It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypted streams through statistical test and capture them for further cryptanalysis. Hence, the communicating entities can use steganography to achieve covertness. In this paper, we propose a new form of multimedia steganography ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unequal error protection of embedded multimedia objects for packet-erasure channels

    Publication Year: 2002 , Page(s): 61 - 64
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (527 KB) |  | HTML iconHTML  

    The application of forward-error-correcting codes to data organized as multiple, independent multimedia objects and encoded with modern embedded coders is investigated. Capitalizing on the strict importance-ordering characteristics of embedded encodings, the strength of the error protection is optimized such that is more important to the reconstructed quality of the dataset is assigned stronger pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delay-optimal rate allocation in multiaccess communications: a cross-layer view

    Publication Year: 2002 , Page(s): 404 - 407
    Cited by:  Papers (12)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (394 KB) |  | HTML iconHTML  

    The literature on multiaccess communications has traditionally treated "network-layer" issues such as source burstiness, network delay, and buffer overflow, apart from "physical-layer" issues such as channel modeling, coding, and detection. The recent work of Telatar and Gallager [I. E. Telatar and R. Gallager, Combining Queueing Theory with Information Theory for Multiaccess, August 1995] [I.E. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust watermarking of 3D mesh models

    Publication Year: 2002 , Page(s): 332 - 335
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (358 KB) |  | HTML iconHTML  

    A robust watermarking algorithm for the 3D mesh models is proposed. The algorithm is based on the watermarking of images from a virtual 3D scanner, which mimics the operation of 3D scanner in the real world. The position of the object in the scanner is determined by the principle component analysis of the vertex points. After obtaining 2D range image from the virtual scanner, we embed the watermar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparing the quality of multiple descriptions of multimedia documents

    Publication Year: 2002 , Page(s): 241 - 244
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (375 KB) |  | HTML iconHTML  

    With the definition of the MPEG-7 standard, thanks to its inter-operability behaviors, it is now possible for applications to use content descriptions of a same document, coming from different sources. This implies that the overall information available at the application can be highly redundant and mechanisms for filtering the information are hence required. In this work, a general approach to de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A speech-centric perspective for human-computer interface

    Publication Year: 2002 , Page(s): 263 - 267
    Cited by:  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (509 KB) |  | HTML iconHTML  

    Speech technology has been playing a central role in enhancing human-machine interactions, especially for small devices for which GUI has obvious limitations. The speech-centric perspective for human-computer interface advanced in this paper derives from the view that speech is the only natural and expressive modality to enable people to access information from and to interact with any device. In ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Content-based movie coding - an overview

    Publication Year: 2002 , Page(s): 89 - 92
    Cited by:  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (375 KB) |  | HTML iconHTML  

    In this paper we discuss modalities of exploiting the distinct characteristics of entertainment movie sequences in the framework of content-based coding. In the content-based movie coding, methods that originate from model-based analysis synthesis and region-based coding, content-based retrieval, content re-purposing and computer graphics domains contribute to achieving simultaneous bit rate reduc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.