Hasil untuk "cs.MM"

Menampilkan 20 dari ~183353 hasil · dari CrossRef, arXiv

JSON API
arXiv Open Access 2024
Narrative Information Theory

Lion Schulz, Miguel Patrício, Daan Odijk

We propose an information-theoretic framework to measure narratives, providing a formalism to understand pivotal moments, cliffhangers, and plot twists. This approach offers creatives and AI researchers tools to analyse and benchmark human- and AI-created stories. We illustrate our method in TV shows, showing its ability to quantify narrative complexity and emotional dynamics across genres. We discuss applications in media and in human-in-the-loop generative AI storytelling.

en cs.MM, cs.IT
arXiv Open Access 2022
Technical Evaluation of HoloLens for Multimedia: A First Look

Yang Liu, Haiwei Dong, Longyu Zhang et al.

A recently released cutting-edge AR device, Microsoft HoloLens, has attracted considerable attention with its advanced capabilities. In this article, we report the design and execution of a series of experiments to quantitatively evaluate HoloLens' performance in head localization, real environment reconstruction, spatial mapping, hologram visualization, and speech recognition.

arXiv Open Access 2021
Spike Camera and Its Coding Methods

Siwei Dong, Tiejun Huang, Yonghong Tian

This paper introduces a spike camera with a distinct video capture scheme and proposes two methods of decoding the spike stream for texture reconstruction. The spike camera captures light and accumulates the converted luminance intensity at each pixel. A spike is fired when the accumulated intensity exceeds the dispatch threshold. The spike stream generated by the camera indicates the luminance variation. Analyzing the patterns of the spike stream makes it possible to reconstruct the picture of any moment which enables the playback of high speed movement.

en cs.MM
arXiv Open Access 2020
An adaptive algorithm for embedding information into compressed JPEG images using the QIM method

Anna Melman, Pavel Petrov, Alexander Shelupanov

The widespread use of JPEG images makes them good covers for secret messages storing and transmitting. This paper proposes a new algorithm for embedding information in JPEG images based on the steganographic QIM method. The main problem of such embedding is the vulnerability to statistical steganalysis. To solve this problem, it is proposed to use a variable quantization step, which is adaptively selected for each block of the JPEG cover image. Experimental results show that the proposed approach successfully increases the security of embedding.

en cs.MM, cs.CR
arXiv Open Access 2018
The diveXplore System at the Video Browser Showdown 2018 - Final Notes

Klaus Schoeffmann, Bernd Münzer, Jürgen Primus et al.

This short paper provides further details of the diveXplore system (formerly known as CoViSS), which has been used by team ITEC1 for the Video Browser Showdown (VBS) 2018. In particular, it gives a short overview of search features and some details of final system changes, not included in the corresponding VBS2018 paper, as well as a basic analysis of how the system has been used for VBS2018 (from a user perspective).

en cs.MM
arXiv Open Access 2018
Large-Scale and Fine-Grained Evaluation of Popular JPEG Forgery Localization Schemes

Pawel Korus

Over the years, researchers have proposed various approaches to JPEG forgery detection and localization. In most cases, experimental evaluation was limited to JPEG quality levels that are multiples of 5 or 10. Each study used a different dataset, making it difficult to directly compare the reported results. The goal of this work is to perform a unified, large-scale and fine-grained evaluation of the most popular state-of-the-art detectors. The obtained results allow to compare the detectors with respect to various criteria, and shed more light on the compression configurations where reliable tampering localization can be expected.

en cs.MM
arXiv Open Access 2017
Real-time Video Processing in Web Applications

Cristian Ionita, Alexandru Barbulescu

The OpenGL ES standard is implemented in modern desktop and mobile browsers through the WebGL API. This paper explores the potential for using OpenGL ES hardware acceleration for real time video processing in standard HTML5 applications. It analyses the WebGL performance across device types and compares it with the standard JavaScript and canvas performance.

en cs.MM
arXiv Open Access 2016
Streaming Virtual Reality Content

Tarek El-Ganainy, Mohamed Hefeeda

The recent rise of interest in Virtual Reality (VR) came with the availability of commodity commercial VR prod- ucts, such as the Head Mounted Displays (HMD) created by Oculus and other vendors. To accelerate the user adoption of VR headsets, content providers should focus on producing high quality immersive content for these devices. Similarly, multimedia streaming service providers should enable the means to stream 360 VR content on their platforms. In this study, we try to cover different aspects related to VR content representation, streaming, and quality assessment that will help establishing the basic knowledge of how to build a VR streaming system.

en cs.MM
arXiv Open Access 2016
Location-Based and Audience-Aware Storytelling

Jeff Burke, Jared J. Stein

While the daily user of digital, Internet-enabled devices has some explicit control over what they read and see, the providers fulfilling searches, offering options, and presenting material are using increasingly sophisticated real-time algorithms that tune and target content for the particular user. They redefine the historical relationships between tellers and users, providing a responsiveness paralleled only by forms of live performance incorporating elements of improvisation and audience interaction. The general accessibility of algorithmically driven content delivery techniques suggests significant untapped potential for new approaches to narrative beyond advertising and commercially orientated customization.

en cs.MM
arXiv Open Access 2015
The blind detection for palette image watermarking without changing the color

V. N. Gorbachev, E. M. Kaynarova, I. K. Metelev et al.

To hide a binary pattern in the palette image a steganographic scheme with blind detection is considered. The embedding algorithm uses the Lehmer code by palette color permutations for which the cover image palette is generally required. The found transformation between the palette and RGB images allows to extract the hidden data without any cover work.

en cs.MM
arXiv Open Access 2014
StegExpose - A Tool for Detecting LSB Steganography

Benedikt Boehm

Steganalysis tools play an important part in saving time and providing new angles of attack for forensic analysts. StegExpose is a solution designed for use in the real world, and is able to analyse images for LSB steganography in bulk using proven attacks in a time efficient manner. When steganalytic methods are combined intelligently, they are able generate even more accurate results. This is the prime focus of StegExpose.

en cs.MM, cs.CR
arXiv Open Access 2013
Compressive Sampling for the Packet Loss Recovery in Audio Multimedia Streaming

Angelo Ciaramella, Giulio Giunta

The aim of this paper is to introduce a new schema, based on a Compressive Sampling technique, for the recovery of lost data in multimedia streaming. The audio streaming data are encapsuled in different packets by using an interleaving technique. The Compressive Sampling technique is used to recover audio information in case of lost packets. Experimental results are presented on speech and musical audio signals to illustrate the performances and the capabilities of the proposed methodology.

en cs.MM
arXiv Open Access 2013
Adaptive Software Radio Steganography

David E. Robillard

This paper presents an adaptable steganography (information hiding) method for digital radio communication. Many radio steganography methods exist, but most are defined at higher levels of the protocol stack and are thus protocol dependent. In contrast, this method is defined at the physical layer, which makes it widely applicable regardless of the protocols used at higher layers. This approach is also adaptive; the covertness of the hidden channel is simple to control via a single continuous parameter either manually or automatically. Several variations are introduced, each with performance evaluated by simulation. Results show this to be a feasible method with a reasonable trade-off between performance and covertness.

en cs.MM
arXiv Open Access 2013
Using Bias Optimization for Reversible Data Hiding Using Image Interpolation

Andrew Rudder, Wayne Goodridge, Shareeda Mohammed

In this paper, we propose a reversible data hiding method in the spatial domain for compressed grayscale images. The proposed method embeds secret bits into a compressed thumbnail of the original image by using a novel interpolation method and the Neighbour Mean Interpolation (NMI) technique as scaling up to the original image occurs. Experimental results presented in this paper show that the proposed method has significantly improved embedding capacities over the approach proposed by Jung and Yoo.

en cs.MM, cs.CR
arXiv Open Access 2012
Content-based Multi-media Retrieval Technology

Yi Wang

This paper gives a summary of the content-based Image Retrieval and Content-based Audio Retrieval, which are two parts of the Content-based Retrieval. Content-based Retrieval is the retrieval based on the features of the content. Generally, it is a way to extract features of the media data and find other data with the similar features from the database automatically. Content-based Retrieval can not only work on discrete media like texts, but also can be used on continuous media, such as video and audio.

en cs.MM, cs.IR
arXiv Open Access 2009
Quality assessment of the MPEG-4 scalable video CODEC

Florian Niedermeier, Michael Niedermeier, Harald Kosch

In this paper, the performance of the emerging MPEG-4 SVC CODEC is evaluated. In the first part, a brief introduction on the subject of quality assessment and the development of the MPEG-4 SVC CODEC is given. After that, the used test methodologies are described in detail, followed by an explanation of the actual test scenarios. The main part of this work concentrates on the performance analysis of the MPEG-4 SVC CODEC - both objective and subjective.

en cs.MM, cs.CV

Halaman 3 dari 9168