The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Application mobility is the paradigm where users can move parts of their running applications across multiple heterogeneous devices in a seamless manner. This mobility involves dynamic context changes of hardware, network resources, user environment and user preferences. State-of-the-art adaptive applications adapt in multiple ways to a subset of scenarios in application mobility, however, adaptation...
This paper describes a flexible multimedia stack which provides media content from number of different streaming protocols. The main goal is to facilitate and accelerate integration with different TV and Set Top Box platforms. Presented solution can be used on Android as well as on Linux based systems. Advantages of this solution are unified data flow and processing of media data. It provides elementary...
Brain decoding has become a hot topic in many recent brain studies. In a typical neuroimaging experiment, participants are presented with different categories of stimuli while their concurrent brain activity is recorded. Then a classifier is trained on the features extracted from the recorded brain data to discriminate different target stimuli classes. It is a common practice to hypothesize that the...
Enormous usage of multimedia necessitates maintaining a secured environment. Security in multimedia communication can be achieved with many cryptographic techniques. Perceptual video encryption is an essential technique to prevent the unwanted use of the video which is transmitted. Encryption is used in order to maintain a safe content of data from attackers. This paper explains about the perceptual...
In multimedia distribution platforms, one of the main challenges is to provide an efficient and accurate tracing process despite the lack of information about the colluders' strategy. Indeed, the original Tardos tracing performance is considered as suboptimal because of its agnostic behavior and conservative accusation regardless the collusion strategy. The Expectation Maximization algorithm has shown...
This paper proposes a generation scheme of compliance test streams for verifying conformance of a digital cable UHD (Ultra High Definition) receiver including video and audio decoders as well as system and closed caption modules. The proposed test streams for video and audio decoders can test compliance with HEVC (High Efficiency Video Coding) standard and DTS(Digital Theater System)-HD(High Definition)...
Multimedia streaming applications have stringent Quality-of-Service (QoS) requirements. Typically, each packet is associated with packet delivery deadline. We are interested in designing feedback-based adaptive network coding schemes with the aim of minimizing decoding delay and video distortion in wireless broadcasting networks over the packet-erasure channel. In this paper, we first introduce the...
To facilitate reliable data transmission over error prone networks, many error correction techniques have been developed to combat data corruption. The reliability requirement of different applications can vary. The multimedia streaming services can usually withstand a certain level of data loss, but they have a strict limitation on the latency tolerance. In this paper, a section-based protection...
This paper presents a no reference method for efficient detection of dropped video frames in live video streaming. Temporal information of video frames is calculated and is used to detect dropped video frames. The videos are analyzed in binary form instead of true color format RGB in order to reduce the computational time. The proposed method uses two separate thresholds for videos containing high...
Selective encryption approaches for efficient multimedia content protection is proposed in wireless multimedia sensor networks (WMSNs) by many authors. Apart from these methodologies, the other important aspect which is discussed in some literatures is the combined optimization of multimedia quality, content protection and energy issues pertaining to communication. However in these joint optimization...
An efficient framework of distributed compressive video coding using Enhanced side information for WSN is proposed. At the encoder, the incoming video frames are split into key frames and Wiener-Ziv (WZ) frames depending on Group of Picture (GOP). Based on Distributed Video Coding (DVC) these frames are processed independently and transmitted over WSN. Generally the WZ frames are encoded at a lower...
We investigate the fundamental information theoretic limits of cache-aided wireless networks, where edge nodes (or transmitters) are endowed with caches that can store popular content such as multimedia files. This architecture aims to localize popular multimedia content by proactively pushing it closer to the edge of the wireless network, thereby alleviating backhaul load. An information theoretic...
Power, area, timing these three characteristics are very important in the design of low power VLSI systems, especially in the multimedia applications and portable devices like hearing aids, mobiles, personal digital assistants are running with battery. In the early complex designs, to achieve power, and area, we had a conventional codec design has become a major problem in the portable devices consumes...
This paper presents a real-time closed-loop system to regulate the power consumption of multimedia mobile devices. The system feedback is an OS-level power estimator based on monitored events of the target system, i.e., an embedded development platform executing a video decoder. The implementation results match the expected ones from simulation and confirm that the system works with a suitable controller...
Raptor codes are the most advanced fountain codes that can provide dynamically changeable code rate and have linear time encoding and decoding. In multimedia communications and different other areas, it is desired that channel codes can provide the property of unequal error protection (UEP). In this paper, we study two methods to provide UEP Raptor codes on the binary erasure channel (BEC): (1) Using...
Video decoding is a must-have feature in modern electronic devices in consumer market. A real-time processing demand is crucial in H.264 video application. In this paper, we present a fast H.264 video decoding technology based on a fast and quick bit pattern extraction method in video stream that is coded with variable-length code stored in little-endian systems. The Key of our approach is to make...
Spread spectrum (SS) modulation is one of the most commonly used methods for data hiding. However, the capacity of SS-based methods is rather limited. To improve the hiding efficiency, this paper presents a method that employs the parallel combinatory spread spectrum (PCSS), in which the hidden data can be transmitted in parallel with a combination of a few pseudo noise sequences. An informed embedding...
Modern-day streaming digital signal processing (DSP) applications are often accompanied by real-time requirements. In addition, they expose increasing levels of dynamic behavior. Dynamic dataflow models of computation (MoCs) have been introduced to model and analyze such applications. Parametrized dataflow MoCs are an important subclass of dynamic dataflow MoCs because they integrate dynamic parameters...
Reversible data hiding has attracted more and more attention in recent years. With reversible data hiding, it requires embedding secret data into original image with devised algorithm at the encoder, and marked image can then be delivered to the decoder. At the decoder, both the secret data and original image should be perfectly separated from marked image to keep the reversibility. There are several...
Thanks to the property of provably capacity-achieving, the recently-discovered polar codes have been taken many attentions. However, the required long code length makes the decoding latency of the successive cancellation (SC) decoder high. This paper presents a new pre-computation look-ahead technique to reduce the decoding latency of SC. Its basic idea is to simultaneously estimate 2ko transmitted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.