Les Inscriptions à la Bibliothèque sont ouvertes en
ligne via le site: https://biblio.enp.edu.dz
Les Réinscriptions se font à :
• La Bibliothèque Annexe pour les étudiants en
2ème Année CPST
• La Bibliothèque Centrale pour les étudiants en Spécialités
A partir de cette page vous pouvez :
Retourner au premier écran avec les recherches... |
Signal processing. Image communication / European association for signal processing . Vol. 25 N° 6Signal processing. Image communicationMention de date : Juillet 2010 Paru le : 16/09/2012 |
Dépouillements
Ajouter le résultat dans votre panierA bibliography on blind methods for identifying image forgery / Babak Mahdian in Signal processing. Image communication, Vol. 25 N° 6 (Juillet 2010)
[article]
in Signal processing. Image communication > Vol. 25 N° 6 (Juillet 2010) . - pp. 389–399
Titre : A bibliography on blind methods for identifying image forgery Type de document : texte imprimé Auteurs : Babak Mahdian, Auteur ; Stanislav Saic, Auteur Année de publication : 2012 Article en page(s) : pp. 389–399 Note générale : Electronique Langues : Anglais (eng) Mots-clés : Image forensics Digital forgery Image tampering Blind forgery detection Multimedia security Résumé : Verifying the integrity of digital images and detecting the traces of tampering without using any protecting pre-extracted or pre-embedded information have become an important and hot research field. The popularity of this field and the rapid growth in papers published during the last years have put considerable need on creating a complete bibliography addressing published papers in this area. In this paper, an extensive list of blind methods for detecting image forgery is presented. By the word blind we refer to those methods that use only the image function. An attempt has been made to make this paper complete by listing most of the existing references and by providing a detailed classification group. ISSN : 0923-5965 En ligne : http://www.sciencedirect.com/science/article/pii/S0923596510000536 [article] A bibliography on blind methods for identifying image forgery [texte imprimé] / Babak Mahdian, Auteur ; Stanislav Saic, Auteur . - 2012 . - pp. 389–399.
Electronique
Langues : Anglais (eng)
in Signal processing. Image communication > Vol. 25 N° 6 (Juillet 2010) . - pp. 389–399
Mots-clés : Image forensics Digital forgery Image tampering Blind forgery detection Multimedia security Résumé : Verifying the integrity of digital images and detecting the traces of tampering without using any protecting pre-extracted or pre-embedded information have become an important and hot research field. The popularity of this field and the rapid growth in papers published during the last years have put considerable need on creating a complete bibliography addressing published papers in this area. In this paper, an extensive list of blind methods for detecting image forgery is presented. By the word blind we refer to those methods that use only the image function. An attempt has been made to make this paper complete by listing most of the existing references and by providing a detailed classification group. ISSN : 0923-5965 En ligne : http://www.sciencedirect.com/science/article/pii/S0923596510000536 Lossless 3D steganography based on MST and connectivity modification / P. Amat in Signal processing. Image communication, Vol. 25 N° 6 (Juillet 2010)
[article]
in Signal processing. Image communication > Vol. 25 N° 6 (Juillet 2010) . - pp. 400–412
Titre : Lossless 3D steganography based on MST and connectivity modification Type de document : texte imprimé Auteurs : P. Amat, Auteur ; W. Puech, Auteur ; S. Druon, Auteur Année de publication : 2012 Article en page(s) : pp. 400–412 Note générale : Electronique Langues : Anglais (eng) Mots-clés : Data hiding Steganography Watermarking 3D triangular mesh Quadruple Graph scanning Résumé : Data hiding has become increasingly important for many applications, like confidential transmission, video surveillance, military and medical applications. In this paper we present a new approach of 3D object data hiding without changing the position of vertices in the 3D space. The main idea of the proposed method is to find and to synchronize particular areas of the 3D objects used to embed the message. The embedding is carried out by changing the connectivity of edges in the selected areas composed of quadruples. The proposed approach of data hiding in 3D objects is based on minimum spanning tree (MST). This method is lossless in the sense that the positions of the vertices are remaining the same before and after embedding. Moreover the method is blind and does not depend of the order of the data in the files. This approach is very interesting when the 3D objects have been digitalized with high precision. ISSN : 0923-5965 En ligne : http://www.sciencedirect.com/science/article/pii/S0923596510000512 [article] Lossless 3D steganography based on MST and connectivity modification [texte imprimé] / P. Amat, Auteur ; W. Puech, Auteur ; S. Druon, Auteur . - 2012 . - pp. 400–412.
Electronique
Langues : Anglais (eng)
in Signal processing. Image communication > Vol. 25 N° 6 (Juillet 2010) . - pp. 400–412
Mots-clés : Data hiding Steganography Watermarking 3D triangular mesh Quadruple Graph scanning Résumé : Data hiding has become increasingly important for many applications, like confidential transmission, video surveillance, military and medical applications. In this paper we present a new approach of 3D object data hiding without changing the position of vertices in the 3D space. The main idea of the proposed method is to find and to synchronize particular areas of the 3D objects used to embed the message. The embedding is carried out by changing the connectivity of edges in the selected areas composed of quadruples. The proposed approach of data hiding in 3D objects is based on minimum spanning tree (MST). This method is lossless in the sense that the positions of the vertices are remaining the same before and after embedding. Moreover the method is blind and does not depend of the order of the data in the files. This approach is very interesting when the 3D objects have been digitalized with high precision. ISSN : 0923-5965 En ligne : http://www.sciencedirect.com/science/article/pii/S0923596510000512 Novel SCAN-CA-based image security system using SCAN and 2-D von Neumann cellular automata / Rong-Jian Chen in Signal processing. Image communication, Vol. 25 N° 6 (Juillet 2010)
[article]
in Signal processing. Image communication > Vol. 25 N° 6 (Juillet 2010) . - pp. 413–426
Titre : Novel SCAN-CA-based image security system using SCAN and 2-D von Neumann cellular automata Type de document : texte imprimé Auteurs : Rong-Jian Chen, Auteur ; Shi-Jinn Horng, Auteur Année de publication : 2012 Article en page(s) : pp. 413–426 Note générale : Electronique Langues : Anglais (eng) Mots-clés : Image security Stream cipher Encryption and decryption SCAN methodology Cellular automata Résumé : This paper presents a novel SCAN-CA-based image security system which belongs to synchronous stream cipher. Its encryption method is based on permutation of the image pixels and replacement of the pixel values. Permutation is done by scan patterns generated by the SCAN approach. The pixel values are replaced using the recursive cellular automata (CA) substitution. The proposed image encryption method satisfies the properties of confusion and diffusion as the characteristics of SCAN and CA substitution are flexible. The salient features of the proposed image encryption method are lossless, symmetric private key encryption, very large number of secret keys, key-dependent permutation, and key-dependent pixel value replacement. Simulation results obtained using some color and gray-level images clearly demonstrate the strong performance of the proposed SCAN-CA-based image security system. ISSN : 0923-5965 En ligne : http://www.sciencedirect.com/science/article/pii/S0923596510000330 [article] Novel SCAN-CA-based image security system using SCAN and 2-D von Neumann cellular automata [texte imprimé] / Rong-Jian Chen, Auteur ; Shi-Jinn Horng, Auteur . - 2012 . - pp. 413–426.
Electronique
Langues : Anglais (eng)
in Signal processing. Image communication > Vol. 25 N° 6 (Juillet 2010) . - pp. 413–426
Mots-clés : Image security Stream cipher Encryption and decryption SCAN methodology Cellular automata Résumé : This paper presents a novel SCAN-CA-based image security system which belongs to synchronous stream cipher. Its encryption method is based on permutation of the image pixels and replacement of the pixel values. Permutation is done by scan patterns generated by the SCAN approach. The pixel values are replaced using the recursive cellular automata (CA) substitution. The proposed image encryption method satisfies the properties of confusion and diffusion as the characteristics of SCAN and CA substitution are flexible. The salient features of the proposed image encryption method are lossless, symmetric private key encryption, very large number of secret keys, key-dependent permutation, and key-dependent pixel value replacement. Simulation results obtained using some color and gray-level images clearly demonstrate the strong performance of the proposed SCAN-CA-based image security system. ISSN : 0923-5965 En ligne : http://www.sciencedirect.com/science/article/pii/S0923596510000330 Hash key-based video encryption scheme for H.264/AVC / Xiaofeng Wang in Signal processing. Image communication, Vol. 25 N° 6 (Juillet 2010)
[article]
in Signal processing. Image communication > Vol. 25 N° 6 (Juillet 2010) . - pp. 427–437
Titre : Hash key-based video encryption scheme for H.264/AVC Type de document : texte imprimé Auteurs : Xiaofeng Wang, Auteur ; Nanning Zheng, Auteur ; Lihua Tian, Auteur Année de publication : 2012 Article en page(s) : pp. 427–437 Note générale : Electronique Langues : Anglais (eng) Mots-clés : Video encryption H.264/AVC Intra-prediction mode Motion vector difference Quantization coefficient Hash function Résumé : An improved H.264/AVC comprehensive video encryption scheme is proposed. In the proposed scheme, the intra-prediction mode, motion vector difference, and quantization coefficients are encrypted. A novel hierarchical key generation method is likewise proposed, in which the encryption keys are generated based on the cryptographic hash function. Generated frame keys are consistent with the corresponding frame serial numbers, which can ensure frame synchronization in the decrypting process when frame loss occurs. This function provides the property that our scheme is secure against some special attacks for video, such as the frame regrouping attack and frame erasure attack. Our method not only avoids the distribution of encryption keys, but also increases the security. Experimental results show that the proposed scheme is efficient in computing, the encryption process does not affect the compression ratio greatly, and the encryption/decryption process hardly affects the video quality. ISSN : 0923-5965 En ligne : http://www.sciencedirect.com/science/article/pii/S0923596510000366 [article] Hash key-based video encryption scheme for H.264/AVC [texte imprimé] / Xiaofeng Wang, Auteur ; Nanning Zheng, Auteur ; Lihua Tian, Auteur . - 2012 . - pp. 427–437.
Electronique
Langues : Anglais (eng)
in Signal processing. Image communication > Vol. 25 N° 6 (Juillet 2010) . - pp. 427–437
Mots-clés : Video encryption H.264/AVC Intra-prediction mode Motion vector difference Quantization coefficient Hash function Résumé : An improved H.264/AVC comprehensive video encryption scheme is proposed. In the proposed scheme, the intra-prediction mode, motion vector difference, and quantization coefficients are encrypted. A novel hierarchical key generation method is likewise proposed, in which the encryption keys are generated based on the cryptographic hash function. Generated frame keys are consistent with the corresponding frame serial numbers, which can ensure frame synchronization in the decrypting process when frame loss occurs. This function provides the property that our scheme is secure against some special attacks for video, such as the frame regrouping attack and frame erasure attack. Our method not only avoids the distribution of encryption keys, but also increases the security. Experimental results show that the proposed scheme is efficient in computing, the encryption process does not affect the compression ratio greatly, and the encryption/decryption process hardly affects the video quality. ISSN : 0923-5965 En ligne : http://www.sciencedirect.com/science/article/pii/S0923596510000366 Content-adaptive traffic prioritization of spatio-temporal scalable video for robust communications over QoS-provisioned 802.11e networks / A. Fiandrotti in Signal processing. Image communication, Vol. 25 N° 6 (Juillet 2010)
[article]
in Signal processing. Image communication > Vol. 25 N° 6 (Juillet 2010) . - pp. 438–449
Titre : Content-adaptive traffic prioritization of spatio-temporal scalable video for robust communications over QoS-provisioned 802.11e networks Type de document : texte imprimé Auteurs : A. Fiandrotti, Auteur ; D. Gallucci, Auteur ; E. Masala, Auteur Année de publication : 2012 Article en page(s) : pp. 438–449 Note générale : Electronique Langues : Anglais (eng) Mots-clés : H.264 scalable video Robust 802.11e video communications Content-adaptive prioritization Résumé : n this work a low complexity traffic prioritization strategy to transmit H.264 scalable video coding (SVC) video over 802.11e wireless networks is presented (the approach applies to any DiffServ-like network). The distinguishing feature of the proposed strategy is the ability to adapt the amount of error protection to the changing characteristics of the video content. First, we estimate the perceptual impact of data losses in the different types of enhancement layers, i.e., temporal or spatial, for a large set of H.264/SVC videos. The experiments show that perceptual impairments are highly correlated with the level of motion activity in the video sequence. Then, we propose a content-adaptive traffic prioritization strategy based on the identification of the most important parts of the enhancement layers of the video sequence by means of a low complexity macroblock analysis process. The prioritization algorithm is tested by simulating a realistic 802.11e ad hoc network scenario. Simulation results show that the proposed traffic prioritization strategy consistently outperforms, particularly for dynamic video sequences, fixed a priori approaches, as well as a traditional FEC-based UEP strategy. ISSN : 0923-5965 En ligne : http://www.sciencedirect.com/science/article/pii/S0923596510000524 [article] Content-adaptive traffic prioritization of spatio-temporal scalable video for robust communications over QoS-provisioned 802.11e networks [texte imprimé] / A. Fiandrotti, Auteur ; D. Gallucci, Auteur ; E. Masala, Auteur . - 2012 . - pp. 438–449.
Electronique
Langues : Anglais (eng)
in Signal processing. Image communication > Vol. 25 N° 6 (Juillet 2010) . - pp. 438–449
Mots-clés : H.264 scalable video Robust 802.11e video communications Content-adaptive prioritization Résumé : n this work a low complexity traffic prioritization strategy to transmit H.264 scalable video coding (SVC) video over 802.11e wireless networks is presented (the approach applies to any DiffServ-like network). The distinguishing feature of the proposed strategy is the ability to adapt the amount of error protection to the changing characteristics of the video content. First, we estimate the perceptual impact of data losses in the different types of enhancement layers, i.e., temporal or spatial, for a large set of H.264/SVC videos. The experiments show that perceptual impairments are highly correlated with the level of motion activity in the video sequence. Then, we propose a content-adaptive traffic prioritization strategy based on the identification of the most important parts of the enhancement layers of the video sequence by means of a low complexity macroblock analysis process. The prioritization algorithm is tested by simulating a realistic 802.11e ad hoc network scenario. Simulation results show that the proposed traffic prioritization strategy consistently outperforms, particularly for dynamic video sequences, fixed a priori approaches, as well as a traditional FEC-based UEP strategy. ISSN : 0923-5965 En ligne : http://www.sciencedirect.com/science/article/pii/S0923596510000524 Scalable object-based video retrieval in HD video databases / Cl. Morand in Signal processing. Image communication, Vol. 25 N° 6 (Juillet 2010)
[article]
in Signal processing. Image communication > Vol. 25 N° 6 (Juillet 2010) . - pp. 450–465
Titre : Scalable object-based video retrieval in HD video databases Type de document : texte imprimé Auteurs : Cl. Morand, Auteur ; J. Benois-Pineau, Auteur ; J.-Ph. Domenger, Auteur Année de publication : 2012 Article en page(s) : pp. 450–465 Note générale : Electronique Langues : Anglais (eng) Mots-clés : HD video Scalable video object extraction Object-based indexing Video retrieval Résumé : With exponentially growing quantity of video content in various formats, including the popularisation of HD (High Definition) video and cinematographic content, the problem of efficient indexing and retrieval in video databases becomes crucial. Despite efficient methods have been designed for the frame-based queries on video with local features, object-based indexing and retrieval attract attention of research community by the seducing possibility to formulate meaningful queries on semantic objects. In the case of HD video, the principle of scalability addressed by actual compression standards is of great importance. It allows for indexing and retrieval on the lower resolution available in the compressed bit-stream. The wavelet decomposition used in the JPEG2000 standard provides this property. In this paper, we propose a scalable indexing of video content by objects. First, a method for scalable moving object extraction is designed. Using the wavelet data, it relies on the combination of robust global motion estimation with morphological colour segmentation at a low spatial resolution. It is then refined using the scalable order of data. Second, a descriptor is built only on the objects extracted. This descriptor is based on multi-scale histograms of wavelet coefficients of objects. Comparison with SIFT features extracted on segmented object masks gives promising results. ISSN : 0923-5965 En ligne : http://www.sciencedirect.com/science/article/pii/S0923596510000482 [article] Scalable object-based video retrieval in HD video databases [texte imprimé] / Cl. Morand, Auteur ; J. Benois-Pineau, Auteur ; J.-Ph. Domenger, Auteur . - 2012 . - pp. 450–465.
Electronique
Langues : Anglais (eng)
in Signal processing. Image communication > Vol. 25 N° 6 (Juillet 2010) . - pp. 450–465
Mots-clés : HD video Scalable video object extraction Object-based indexing Video retrieval Résumé : With exponentially growing quantity of video content in various formats, including the popularisation of HD (High Definition) video and cinematographic content, the problem of efficient indexing and retrieval in video databases becomes crucial. Despite efficient methods have been designed for the frame-based queries on video with local features, object-based indexing and retrieval attract attention of research community by the seducing possibility to formulate meaningful queries on semantic objects. In the case of HD video, the principle of scalability addressed by actual compression standards is of great importance. It allows for indexing and retrieval on the lower resolution available in the compressed bit-stream. The wavelet decomposition used in the JPEG2000 standard provides this property. In this paper, we propose a scalable indexing of video content by objects. First, a method for scalable moving object extraction is designed. Using the wavelet data, it relies on the combination of robust global motion estimation with morphological colour segmentation at a low spatial resolution. It is then refined using the scalable order of data. Second, a descriptor is built only on the objects extracted. This descriptor is based on multi-scale histograms of wavelet coefficients of objects. Comparison with SIFT features extracted on segmented object masks gives promising results. ISSN : 0923-5965 En ligne : http://www.sciencedirect.com/science/article/pii/S0923596510000482
Exemplaires
Code-barres | Cote | Support | Localisation | Section | Disponibilité |
---|---|---|---|---|---|
aucun exemplaire |