Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Methods of video data transmission.

Статті в журналах з теми "Methods of video data transmission"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Methods of video data transmission".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Kataieva, Yevheniia, and Anton Rebrikov. "URGENCY OF USING HIDDEN DATA TRANSMISSION IN VIDEO FILES." Management of Development of Complex Systems, no. 46 (June 24, 2021): 48–54. http://dx.doi.org/10.32347/2412-9933.2021.46.48-54.

Повний текст джерела
Анотація:
The article examines the problems of protecting information from unwanted access, which have tried to solve throughout the existence of mankind. Nowadays, the widespread use of electronic means of communication, electronic eavesdropping and fraud, a variety of computer viruses and other electronic hazards, electronic systems place high demands on the protection of information. Thus, the study of digital steganography is an urgent task. There are two main areas of hidden data transmission: cryptography and steganography. The purpose of cryptography is to restrict access to information by encrypting it. Unlike cryptography, steganography allows you to hide the very fact of the presence of hidden data. The study examined the main methods of covert data transmission using computer steganography, namely: the method of using system-reserved areas of digital data formats, methods of hiding information by special formatting of text files, which include the use of word, sentence or paragraph shift, selection certain positions of letters in the text or the use of properties of system fields that are not displayed on the screen, the method of using simulation functions, methods of using unused disk sectors, the method of using redundant media files (audio, photo and video). Currently, due to the growth of information and increasing the bandwidth of communication channels, the issue of hiding information in video sequences is becoming increasingly important. The transmission of digital video in recent years is a typical event and does not arouse suspicion. In the course of the research the peculiarities of hiding information in video files are considered, the comparison of existing algorithms of computer video steganography is made. The task is to develop your own algorithm for embedding information in the blue color channel of video files. The object of research is the transfer of hidden data in digital media files. The subject of research is the transmission of hidden data in the video stream. The purpose of research is to review the subject area, to examine the available methods of embedding information in media files in general and specifically in video files, to identify the advantages and disadvantages of existing algorithms, to develop their own algorithm of video steganography based on previously obtained research results. Research methods - methods of information theory, probability theory and mathematical statistics; methods of digital processing of signals, static images and video files; methods of vector analysis. The results of research - an overview of the features of hiding information in video files, compared existing algorithms of computer video steganography.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Chavate, Shrikant, and Ravi Mishra. "Efficient Detection of Abrupt Transitions Using Statistical Methods." ECS Transactions 107, no. 1 (April 24, 2022): 6541–52. http://dx.doi.org/10.1149/10701.6541ecst.

Повний текст джерела
Анотація:
The rapid increment of technological advancements in the field of multimedia stream has piled up data production and consumption in cyberspace in the past two decades. It has prompted a swift increase in data transmission volume and repository size. Video is the most consumed data type on the internet. So, retrieval of selected video clips from the extra-large database of videos is extremely complex. The video shot boundary detection (SBD) is used for retrieval of desired video clips. It also is the fundamental step in video processing, which also was found important for applications like video browsing and indexing. The SBD handles the identification of abrupt and gradual transitions in the video database. In this paper, the statistical methods have implemented to detect the abrupt cuts. This benefitted the advantage of less complexity. The experiments are performed on TRECVID 2007 dataset, and the results obtained with high accuracy in less computational time.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Et. al., G. Megala,. "State-Of-The-Art In Video Processing: Compression, Optimization And Retrieval." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 5 (April 11, 2021): 1256–72. http://dx.doi.org/10.17762/turcomat.v12i5.1793.

Повний текст джерела
Анотація:
Video compression plays a vital role in the modern social media networking with plethora of multimedia applications. It empowers transmission medium to competently transfer videos and enable resources to store the video efficiently. Nowadays high-resolution video data are transferred through the communication channel having high bit rate in order to send multiple compressed videos. There are many advances in transmission ability, efficient storage ways of these compressed video where compression is the primary task involved in multimedia services. This paper summarizes the compression standards, describes the main concepts involved in video coding. Video compression performs conversion of large raw bits of video sequence into a small compact one, achieving high compression ratio with good video perceptual quality. Removing redundant information is the main task in the video sequence compression. A survey on various block matching algorithms, quantization and entropy coding are focused. It is found that many of the methods having computational complexities needs improvement with optimization.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Fadhel, Sabah, Mohd Shafry, and Omar Farook. "Chaos Image Encryption Methods: A Survey Study." Bulletin of Electrical Engineering and Informatics 6, no. 1 (March 1, 2017): 99–104. http://dx.doi.org/10.11591/eei.v6i1.599.

Повний текст джерела
Анотація:
With increasing dependence on communications over internet and networks, secure data transmission is coming under threat. One of the best solutions to ensure secure data transmissions is encryption. Multiple forms of data, such as text, audio, image, and video can be digitally transmitted, nowadays images being the most popular and old encryption techniques such as: AES,DES,RSA etc., show low security level when used for image encryption. This problem was resolved by using of chaos encryption which is an acceptable form of encryption for image data. The sensitivity to initial conditions and control parameters make chaos encryption suitable for image applications. This study discusses various chaos encryption techniques.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Liu, Yan, Xinheng Wang, and Liqiang Zhao. "Scalable Video Streaming in Wireless Mesh Networks for Education." International Journal of Distance Education Technologies 9, no. 1 (January 2011): 1–20. http://dx.doi.org/10.4018/jdet.2011010101.

Повний текст джерела
Анотація:
In this paper, a video streaming system for education based on a wireless mesh network is proposed. A wireless mesh network is a self-organizing, self-managing and reliable intelligent network, which allows educators to deploy a network quickly. Video streaming plays an important role in this system for multimedia data transmission. This new system adopts the scalable video coding scheme that enables the video server to deliver layered videos to different user groups. In addition, a quality control method was developed to automatically change the output data rate based on network conditions. Real implementation test results show the proposed methods are effective.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Czaplewski, Bartosz, and Krzysztof Czaplewski. "Protection of Visual Data Transmission for Vessel Traffic Systems Using Joint Fingerprinting and Decryption Method Based on Modified Hill Cipher." Annual of Navigation 19, no. 2 (December 1, 2012): 5–17. http://dx.doi.org/10.2478/v10367-012-0014-8.

Повний текст джерела
Анотація:
Abstract Vessel traffic systems provide a high level of safety on coastal waters due to coastal radar stations and industrial cameras transmitting information to traffic supervision centers, as well. To improve a vessel traffic services is very important to ensure the speed and secrecy for the transmission of video images. The paper presents the basic issues of the multimedia data protection by digital watermarking and fingerprinting methods. Main applications for such digital marking were described in the paper as well as its requirements. Furthermore, the importance of multicast transmission for fingerprinting methods was presented by comparing the scalability of methods using only unicast transmissions and methods using multicast transmissions. The paper also presents the greatest threat to fingerprinting methods, which are attacks performed by more than one pirate. These attacks are called collusion attacks. The criteria that should be followed during identifying rogue users taking part in the collusion attack on the security systems has been presented. The paper also contains description of the extended Hillcast method, which belongs to the group of JFD (Joint Fingerprinting and Decryption) methods. The method provides a cryptographic security and digital fingerprinting of multimedia content, while maintaining high scalability. Main purpose of this method is VoD (Video on Demand) service, but it can also be used in vessel traffic supervision systems, such as VTS and AIS. In the last part of paper, there are results of studies which indicate high resistance to most common collusion attacks. Method proposed by authors can enhance the security of visual data transmission in vessel traffic systems.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Gertsiy, O. "COMPARATIVE ANALYSIS OF COMPACT METHODS REPRESENTATIONS OF GRAPHIC INFORMATION." Collection of scientific works of the State University of Infrastructure and Technologies series "Transport Systems and Technologies" 1, no. 37 (June 29, 2021): 130–43. http://dx.doi.org/10.32703/2617-9040-2021-37-13.

Повний текст джерела
Анотація:
The main characteristics of graphic information compression methods with losses and without losses (RLE, LZW, Huffman's method, DEFLATE, JBIG, JPEG, JPEG 2000, Lossless JPEG, fractal and Wawelet) are analyzed in the article. Effective transmission and storage of images in railway communication systems is an important task now. Because large images require large storage resources. This task has become very important in recent years, as the problems of information transmission by telecommunication channels of the transport infrastructure have become urgent. There is also a great need for video conferencing, where the task is to effectively compress video data - because the greater the amount of data, the greater the cost of transmitting information, respectively. Therefore, the use of image compression methods that reduce the file size is the solution to this task. The study highlights the advantages and disadvantages of compression methods. The comparative analysis the basic possibilities of compression methods of graphic information is carried out. The relevance lies in the efficient transfer and storage of graphical information, as big data requires large resources for storage. The practical significance lies in solving the problem of effectively reducing the data size by applying known compression methods.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Al-Rawi, Muhanned. "Data-Aided Carrier Recovery with QPSK Modulation." Scientific Bulletin 24, no. 1 (June 1, 2019): 14–22. http://dx.doi.org/10.2478/bsaft-2019-0002.

Повний текст джерела
Анотація:
Abstract Digital communication has proven to be the most efficient method of data transmission especially where long distances are involved. This led to the invention of more sophisticated methods of communication ranging from mobile handset communication to more advanced satellite communication. The speeds of passing information have been improving over the years and real time video communication has been made possible with digital devices. Various methods of digital data transmission are employed based on the information to be transmitted. This paper focuses on carrier recovery in digital communication systems, especially those based on Quadrature Phase Shift Keying (QPSK) modulation and demodulation scheme. The design being implemented is that of coherent demodulation for QPSK scheme using SIMULINK design tool. Performance of QPSK is also investigated to make a comparison and the suitability of the scheme to use in digital data transmission applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Rajagopalan, Pradeep, and Sanjay Kumar Gengaiyan. "PRIVACY INFORMATION PROTECTION IN AN ENCRYPTED COMPRESSED H.264 VIDEO BITSTREAM." International Journal of Students' Research in Technology & Management 3, no. 4 (September 27, 2015): 343–45. http://dx.doi.org/10.18510/ijsrtm.2015.349.

Повний текст джерела
Анотація:
The paper presents that encryption of compressed video bit streams and hiding privacy information to protect videos during transmission or cloud storage. Digital video sometimes needs to be stored and processed in an encrypted format to maintain security and privacy. Here, data hiding directly in the encrypted version of H.264/AVC video stream is approached, which includes the following three parts. By analyzing he property of H.264/AVC codec, the code words of intra prediction modes, the code words of motion vector differences, and the code words of residual coefficients are encrypted with stream ciphers. Then, a data hider may embed additional data in the encrypted domain by using wrapping technique, without knowing the original video content. The paper results shows that used methods provides better performance in terms of computation efficiency, high data security and video quality after decryption. The parameters such as RMSE, PSNR, CC are evaluated to measure its efficiency
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Jiang, Hongxu, Shenglan Li, Huiyong Li, Tingshan Liu, and Jinyuan Lu. "A High-Performance and Hardware-Efficient PCIe Transmission for a Multi-Channel Video Using Command Caching and Dynamic Splicing on FPGA." Journal of Circuits, Systems and Computers 27, no. 04 (December 6, 2017): 1850067. http://dx.doi.org/10.1142/s0218126618500676.

Повний текст джерела
Анотація:
With the increasing requirements of transmitting larger amounts of diverse video and image data, the PCI express (PCIe) interface has been extensively used in high-speed digital systems for multimedia processing and communication. However, the existing PCIe transmission methods are not efficient to transmit multi-channel videos on FPGA processors, as they waste PCIe bandwidth and hardware resources. In this paper, an efficient PCIe transmission method for multi-channel video is presented on an FPGA processor. First, to reduce the programmed I/O (PIO) write latency, the command caching method is adopted. The traditional DMA descriptors are transformed into DMA commands, which are smaller, and the command buffer is used to store these commands. Second, a dynamic splicing mechanism is proposed for data transmission and commands the scheduling separately. The multi-type data is transmitted concurrently in this dynamic splicing mechanism. Moreover, the adjacent commands are spliced into one command, which reduces the DMA initiation times. Finally, the direct kernel memory access technique and timer self-feedback monitor technique are applied to improve the transmission efficiency and enhance the system reliability. The experimental results show that the transmission efficiency of the proposed method is increased by nearly 30% compared with other conventional methods, and the highest measured transfer rate is 1631 Mbytes/s on write and 1582 Mbytes/s on read, which reaches 84.4% of the theoretical maximum.
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Deepikaa, S., and R. Saravanan. "VoIP Steganography Methods, a Survey." Cybernetics and Information Technologies 19, no. 1 (March 1, 2019): 73–87. http://dx.doi.org/10.2478/cait-2019-0004.

Повний текст джерела
Анотація:
Abstract Achieving secured data transmission is not always an easy job. Secret data sharing requires confidentiality and Undetectability. Steganography is preferred than cryptography to achieve undetectability. Steganography hides the secret data inside the other file such as text, audio, video, so that the existence of the secret data is completely hidden. Recent research focuses much on utilizing Voice over Internet Protocol (VoIP) calls as a carrier for data hiding. VoIP calls are much preferred among internet users for its wide availability, dynamic time limit and low cost. This paper focuses on data hiding methods that uses VoIP as a carrier. The paper also analyzes the performance of the algorithms using the three metrics undetectability, bandwidth and robustness.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Jiang, Xiao Qiang. "Research of Multimedia Data Transmission Based on UDP." Advanced Materials Research 129-131 (August 2010): 1291–95. http://dx.doi.org/10.4028/www.scientific.net/amr.129-131.1291.

Повний текст джерела
Анотація:
The article focuses on the research of a reliable data transmission extension protocol -- UDT based on UDP, the related implementation method and transmission control method of multimedia data real-time and reliable transmission, the improvement to algorithm of its related methods in specific applications; as well as the improvement to AIMD (Additive Increase and Multiplicative Decrease) congestion controlling algorithm, proposing DAIMD congestion controlling algorithm; the sending rate increment is changed from the constant quantity to the variable quantity which continuously reduces with the continuous increase of the sending rates, so it not only makes a more rational use of limited network bandwidth, also reduces the larger oscillation in the network data transmission; the improvement of validation mechanisms, propose validation mechanisms based on the combination of time and data packets numbers, and improve the efficiency of data transmission. When the multimedia data network transmits, the transmitter and receiver need to identify a network transmission protocol. According to the above analysis, UDP is a simple transmission level protocol, non-connection-oriented, and itself does not provide data retransmission and confirmation, therefore adopting UDP as the network transmission protocol can improve the data transmission efficiency, besides UDP supports the webcast function, suitable for multimedia data network transmission [1]. However, the characteristic of multimedia data network transmission requests the network transmission protocol can handle the phenomenon of delay and vibration in the transmission process; can handle bursting multimedia data transmission; can judge the network condition according to the reception quality of the receiver and the sender can make the appropriate response; can ensure the reliability of multimedia data network transmission and so on. Features of UDP its own design make it deal with such situations not very well, also UDP limits the sending data packet size each time; when the multimedia data network transmits, a video data often exceed this limit. Therefore, according to the previous analysis of multimedia data network transmission characteristics and technical requirements, this article studies the reliable data transmission extension protocol -- UDT based on UDP, and improves the related algorithm and control mechanism in the protocol to make it more suitable for the multimedia data network transmission in the embedded video surveillance system.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

S, Balaji, Harold Robinson Y, and Golden Julie Y. "SECURE MULTIMEDIA DATA TRANSMISSION IN MOBILE AD-HOC NETWORKS." March 2019 01, no. 01 (March 24, 2019): 62–68. http://dx.doi.org/10.36548/jsws.2019.1.005.

Повний текст джерела
Анотація:
Multimedia file transmission with quality of service is the important issue in Mobile Ad-hoc Networks. The real-time data is in the form of audio file and the video file. These kinds of files can be divided into several data packets and the data packet is delivered from the begining node to the recipient node within the limited amount of time. The increase of throughput is possible only by means of secure data transmission. So, the secure data transmission methodology is used to implement the quality delivery of the multimedia files. The sequence of data packets are encoded and decoded using the encryption and the decryption process. The simulation results proved that the proposed method has the highest amount of throughput, delivery ratio and also improving the quality of service compared to all the other related methods.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Khan, Imran Ullah, M. A. Ansari, S. Hasan Saeed, and Kakul Khan. "Evaluation and Analysis of Rate Control Methods for H.264/AVC and MPEG-4 Video Codec." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 2 (April 1, 2018): 1273. http://dx.doi.org/10.11591/ijece.v8i2.pp1273-1280.

Повний текст джерела
Анотація:
<p class="Default">Audio, image and video signals produce a vast amount of data. The only solution of this problem is to compress data before storage and transmission. In general there is the three crucial terms as, Bit Rate Reduction, Fast Data Transfer and Reduction in Storage. Rate control is a vigorous factor in video coding. In video communications, rate control must ensure the coded bitstream can be transmitted effectively and make full use of the narrow bandwidth. There are various test models usually suggested by a standard during the development of video codes models in order to video coding which should be suffienciently be efficient based on H.264 at very low bit rate. These models are Test Model Number 5 (TMN5), Test Model Number 8 for H.263, and Verification Model 8 (VM8) for MPEG-4 and H.264 etc. In this work, Rate control analysis for H.264, MPEG-4 performed. For Rate control analysis test model verification model version 8.0 is adopted.</p>
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Khan, Imran Ullah, M. A. Ansari, S. Hasan Saeed, and Kakul Khan. "Evaluation and Analysis of Rate Control Methods for H.264/AVC and MPEG-4 Video Codec." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (October 1, 2018): 2788. http://dx.doi.org/10.11591/ijece.v8i5.pp2788-2794.

Повний текст джерела
Анотація:
<p class="Default"><span>Audio, image and video signals produce a vast amount of data. The only solution of this problem is to compress data before storage and transmission. In general there is the three crucial terms as, Bit Rate Reduction, Fast Data Transfer and Reduction in Storage. Rate control is a vigorous factor in video coding. In video communications, rate control must ensure the coded bitstream can be transmitted effectively and make full use of the narrow bandwidth. There are various test models usually suggested by a standard during the development of video codes models in order to video coding which should be suffienciently be efficient based on H.264 at very low bit rate. These models are Test Model Number 5 (TMN5), Test Model Number 8 for H.263, and Verification Model 8 (VM8) for MPEG-4 and H.264 etc. In this work, Rate control analysis for H.264, MPEG-4 performed. For Rate control analysis test model verification model version 8.0 is adopted.</span></p>
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Limanovskaya, O. V., E. A. Titov, D. I. Volkova, and A. V. Lemekh. "Algorithm for determining the tilt of support of electric power supplies by methods of deep learning with video data." Vestnik IGEU, no. 2 (2020): 72–80. http://dx.doi.org/10.17588/2072-2672.2020.2.072-080.

Повний текст джерела
Анотація:
The uninterrupted operation of power lines can only be ensured by constant monitoring of the state of power lines. The most promising direction in the automation of the diagnostics of power transmission lines are robotic systems, such as UAVs with video cameras mounted on them or robots crawling through wires, used for a detailed analysis of the state of power transmission line elements. The video data received by them is further analyzed by the methods of machine vision and neural networks. One of the defects of power line elements is the deviation of the supports from the vertical. Despite the fact that in a number of works the state of power transmission line supports was determined (fallen supports or not), the angle of inclination of the supports was not calculated. The goal of this work is to develop an algorithm for calculating the angle of inclination of power transmission line supports for the module of the diagnostic system of the CableWalker complex, which is an unmanned aerial platform with the ability to land on a wire and move along it. The YOLO v3 neural network was used to select objects in images. To identify the slope of concrete supports in the obtained bounding rectangles, machine vision methods (Canny, Hough Line, GrabCut algorithm) were used. The algorithm has been developed to identify the objects contained in the image using the YOLO v3 neural network and determine the edges of the supports by building straight lines along them. The angles between the found edges of the support and the horizon (the lower edge of the image) have been calculated as the arctangent of the ratio of the coordinates of the point on the edge of the support. The algorithm has passed laboratory tests which have shown its suitability for use in the diagnostic system of the CableWalker complex. The application of the algorithm reduces the image processing time from several days (in the case of an expert) to several minutes and eliminates the error associated with the human factor.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Estrela, Vania V. "SDR-Based High-Definition Video Transmission for Biomedical Engineering." Medical Technologies Journal 4, no. 3 (December 7, 2020): 584–85. http://dx.doi.org/10.26415/2572-004x-vol4iss3p584-585.

Повний текст джерела
Анотація:
Background: Software-Defined Radio (SDR) frameworks from cellular telephone base stations, e.g., Multiservice Distributed Access System (MDAS) and small cells, employ extensively integrated RF agile transceivers. The Internet of Medical Things (IoMT) is the collection of medical devices and applications that connect to healthcare IT systems through online computer networks. Medical devices equipped with Wi-Fi allow M2M communication, which is the backbone of IoMT and associated devices linked to cloud platforms containing stored data to be analyzed. Examples of IoMT include remote patient monitoring of people with chronic or long-term conditions, tracking patient medication orders and the location of patients admitted to hospitals, and patients' wearables to send info to caregivers. Infusion pumps connected to dashboards and hospital beds rigged with sensors measuring patients' vital signs are medical devices that can be converted to or deployed as IoMT technology. Methods: This work proposes an SDR architecture to allow wireless High-Definition (HD) video broadcast for biomedical applications. This text examines a Wideband Wireless Video (WWV) signal chain implementation using the transceivers, the data transmitted volume, the matching occupied RF bandwidth, the communication distance, the transmitter’s power, and the implementation of the PHY layer as Orthogonal Frequency Division Multiplexing (OFDM) with test results to evade RF interference. Results: As the IoMT grows, the amount of possible IoMT uses increases. Many mobile devices employ Near Field Communication (NFC) Radio Frequency Identification (RFID) tags allowing them to share data with IT systems. RFID tags in medical equipment and supplies allow hospital staff can remain aware of the quantities they have in stock. The practice of using IoMT devices to observe patients in their homes remotely is also known as telemedicine. This kind of treatment spares patients from traveling to healthcare facilities whenever they have a medical question or change in their condition. Conclusion: An SDR-based HD biomedical video transmission is proposed, with its benefits and disadvantages for biomedical WWV are discussed. The security of IoMT sensitive data is a developing concern for healthcare providers.
Стилі APA, Harvard, Vancouver, ISO та ін.
18

BEROUAL, Abdesselam, and Imad Fakhri Al-Shaikhli. "A Review of Steganographic Methods and Techniques." International Journal on Perceptive and Cognitive Computing 4, no. 1 (June 8, 2018): 1–6. http://dx.doi.org/10.31436/ijpcc.v4i1.56.

Повний текст джерела
Анотація:
The frequent and intensive transmission of information on the internet requires protection techniques to secure sensitive information. Steganography is one of many security techniques that consist of concealing information inside an appropriate multimedia (e.g. image, video, audio…etc.) with the objective to hide the embedded information. Many challenges confront steganography systems like capacity (size of data embedded) and imperceptibility (level of undetectability). These two aspects are inversely proportional to each other which produces a data hiding dilemma. This paper presents a review of the steganography methods used in recent years and a critical analysis based mainly on capacity measurement and, secondly, on imperceptibility measurement and steganography domain.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Falah Abbood, Mohammed, Mohammed Falih Kadhim, and Ahmed Raheem Kadhim. "Improving multimedia data transmission quality in wireless multimedia sensor networks though priority-based data collection." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 4 (August 1, 2022): 3595. http://dx.doi.org/10.11591/ijece.v12i4.pp3595-3606.

Повний текст джерела
Анотація:
<span>Wireless multimedia sensor networks (WMSNs) are special kinds of wireless sensor networks (WSN) that can send multimedia data such as audio and video streams. Sensors used in WMSNs are smart, tiny, and resource constraint sensor nodes (SNs) distributed in a large area. Typically, multimedia data are large in comparison to other data types. As a result, WMSNs have to deal with high volumes of packet transmission, leading to a high rate of packet loss and network congestion. Network congestion can significantly affect the quality of service and usually lead to high energy consumption. Thus, to improve the quality of service (QoS) and transmission performance, it is necessary to deal with network congestion. In the past, different packet prioritizing methods were proposed to deal with this issue. However, improving QoS usually requires high energy to function correctly. Consequently, using rechargeable sensor nodes to reduce energy consumption is an acute solution. In this research, priority-based data collection is considered to cut down on data distortion and improve the QoS of the multimedia sensor network. Additionally, energy harvesting sensor nodes were used to reduce energy consumption due to the high transmission rate. The simulation result shows a noticeable improvement in the performance of our proposed method in comparison to previous methods.</span>
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Przylucki, Slawomir. "Color-Aware Packet Marking Based on H.264AVC Coder Extensions for Improved Video Quality." Image Processing & Communications 19, no. 2-3 (September 1, 2014): 127–40. http://dx.doi.org/10.1515/ipc-2015-0017.

Повний текст джерела
Анотація:
Abstract In recent years there is a noticeable trend to implement the video transmission systems based on shared IP networks. At the same time new generations of video codecs such as H.264 are used in industrial installations. This situation forces the need for consideration of methods for efficient video transmission in industrial networks such as surveillance, identification and control systems. The first part of the article discusses the features of modern video codecs, relevant to the streaming applications. Attention is focused on the extensions of the H.264 standard that increase the error-resilience, particularly Data Partitioning (DP) and Flexible Macroblock Ordering (FMO). Next, the principles of prioritization of the video traffic based on the DiffServ architecture is discussed. In this context, separated section presents in detail the rules for packets marking which enable appropriate forwarding the video data. This information is referenced to current recommendations and technical standards. Next the performance of several classical packet marking algorithms and their possible modifications using FMO- and DP-based errorresilience configurations of H.264 are verified in simulations.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Jat, Dharm Singh, Lal Chand Bishnoi, and Shoopala Nambahu. "Dynamic Aggregation Mechanism for Efficient Transmission of H.264/ SVC Video Over IEEE 802.11n WLANs." Recent Patents on Computer Science 12, no. 2 (February 25, 2019): 135–41. http://dx.doi.org/10.2174/2213275911666181107115715.

Повний текст джерела
Анотація:
Background: In just last two-years most of the world’s video data has been created by the digital devices like smartphone, surveillance cameras, and wireless sensor networks. These days the IEEE 802.11n enabled devices for Wireless Local Area Networks (WLANs) are being used to achieve higher throughput at the Medium Access Control (MAC) layer. </p><p> Methods: In this research, the Dynamic Aggregation Mechanism (DAM) algorithm is proposed for H.264/SVC video transmission over IEEE 802.11n WLANs. The modified Network Simulator (NS2) was used to examine the quality of received H.264/SVC video over 802.11n WLAN. For quality measurement, PSNR was used for all nine H.264/SVC video traffic. </p><p> Results: The proposed mechanism improved the PSNR for received video.
Стилі APA, Harvard, Vancouver, ISO та ін.
22

SU, XIAO, and BENJAMIN W. WAH. "LOSS AWARE RATE ALLOCATIONS IN H.263 CODED VIDEO TRANSMISSIONS." Journal of Circuits, Systems and Computers 14, no. 06 (December 2005): 1157–71. http://dx.doi.org/10.1142/s0218126605002878.

Повний текст джерела
Анотація:
For packet video, information loss and bandwidth limitation are two factors that affect video playback quality. Traditional rate allocation approaches have focused on optimizing video quality under bandwidth constraint alone. However, in the best-effort Internet, packets carrying video data are susceptible to losses, which need to be reconstructed at the receiver side. In this paper, we propose loss aware rate allocations in both group-of-block (GOB) level and macroblock level, given that certain packets are lost during transmissions and reconstructed using simple interpolation methods at the receiver side. Experimental results show that our proposed algorithms can produce videos of higher quality when sent over lossy Internet.
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Barannik, Volodymyr, Mykola Dvorsky, Valeriy Barannik, Viktoria Himenko, and Anton Sorokun. "IMPROVEMENT OF METHODS OF MOTION COMPENSATION OF DYNAMIC OBJECTS MOVING IN VIDEO STREAM OF THE VIDEOCONFERENCING SYSTEM." Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska 8, no. 4 (December 16, 2018): 48–51. http://dx.doi.org/10.5604/01.3001.0012.8035.

Повний текст джерела
Анотація:
Videoconferencing gives us the opportunity to work and communicate in real time, as well as to use collective applications, interactive information exchange. Videoconferencing systems are one of the basic components of the organization of manegment, ensuring, the timeliness and necessary quality management of the implementation of objective control over the solution of the tasks. The quality of the image and the time of transmission of video information is unsatisfactory for the quality control of the troops. Considered ways to increase the efficiency of management and operational activities, due to methods of compensation of motion, using technology to reduce the volume of video data for quality improvement.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

DUDHAGARA, CHETAN R., and MAYUR M. PATEL. "A Comparative Study and Analysis of EZW and SPIHT methods for Wavelet based Image Compression." Oriental journal of computer science and technology 10, no. 3 (August 10, 2017): 669–73. http://dx.doi.org/10.13005/ojcst/10.03.17.

Повний текст джерела
Анотація:
In recent years there has been widely increase the use of digital media everywhere. To increase the use of digital media, there is a huge problem of storage, manipulation and transmission of data over the internet. These digital media such as image, audio and video require large memory space. So it is necessary to compress the digital data to require less memory space and less bandwidth to transmission of data over network. Image compressions techniques are used to compress the data for reduce the storage requirement. It plays an important role for transfer of data such as image over the network. Two methods are used in this paper on Barbara image. This compression study is performed by using Set Partitioning In Hierarchical Trees (SPIHT) and Embedded Zero tree Wavelet (EZW) compression techniques. There are many parameters are used to compare this techniques. Mean Square Error (MSE), Pick Signal to Noise Ration (PSNR) and Compression Ratio (CR) are used at different level of decompositions.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Naruse, Katsuhiko, Tomoya Yamashita, Yukari Onishi, Yuhi Niitaka, Fumikage Uchida, Kazuya Kawahata, Mayu Ishihara, and Hiroshi Kobayashi. "High-Quality Transmission of Cardiotocogram and Fetal Information Using a 5G System: Pilot Experiment." JMIR Medical Informatics 8, no. 9 (September 8, 2020): e19744. http://dx.doi.org/10.2196/19744.

Повний текст джерела
Анотація:
Background A cardiotocogram (CTG) is a device used to perceive the status of a fetus in utero in real time. There are a few reports of its use at home or during emergency transport. Objective The aim of this study was to test whether CTG and other perinatal information can be transmitted accurately using an experimental station with a 5G transmission system. Methods In the research institute, real-time fetal heart rate waveform data from the CTG device, high-definition video ultrasound images of the fetus, and high-definition video taken with a video camera on a single line were transmitted by 5G radio waves from the transmitting station to the receiving station. Results All data were proven to be transmitted with a minimum delay of less than 1 second. The CTG waveform image quality was not inferior, and there was no interruption in transmission. Images of the transmitted ultrasound examination and video movie were fine and smooth. Conclusions CTG and other information about the fetuses and pregnant women were successfully transmitted by a 5G system. This finding will lead to prompt and accurate medical treatment and improve the prognosis of newborns.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Segal, Yoram, and Ofer Hadar. "Covert channel implementation using motion vectors over H.264 compression." Revista de Estudos e Pesquisas Avançadas do Terceiro Setor 2, no. 2 (August 18, 2019): 111. http://dx.doi.org/10.31501/repats.v2i2.10567.

Повний текст джерела
Анотація:
Embedding information inside video streaming is a hot topic in the world of video broadcasting. Information assimilation can be used for positive purposes, such as copyright protection. On the other hand, it can be used for malicious purposes such as a hostile takeover, remotely, on end-user devices. The basic idea of information assimilation technology within a video is to take advantage of the sequence of frames that flows between the video server and the viewer. Casting foreigner data into each frame such a hidden communication channel is created namely - covert channel. Attackers find the multimedia world in general and video streaming, an attractive backdoor for cyber-attacks. Multimedia covert channels provide reasonable bandwidth and long-lasting transmission streams, suitable for planting malicious information and therefore used as an exploit alternative. In this article, we propose a method to protect against attacks that use video payload for transferring confidential data using a covert channel. This work is part of a large-scale study of video attack methods. The goal of the study is to build a generic platform that will investigate the reliability of video sequences. The platform allows to encoding and decoding video. A plugin can be added to each encoder or decoder. Each plugin is an algorithm that is studied and developed in the framework of this study. One of the algorithms in this platform is information transmission over video using motion vectors. This method is the topic off this article.
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Singer, Andrew C., Gizem Tabak, and Michael L. Oelze. "High data rate ultrasonic communications." Journal of the Acoustical Society of America 151, no. 4 (April 2022): A244. http://dx.doi.org/10.1121/10.0011201.

Повний текст джерела
Анотація:
Ultrasonic signals have been used in biomedical applications since at least the 1940s. Underwater acoustic signals have been used in the subsea industry for ranging since the early 1900s and for SONAR imaging and communication in the decades that followed. Since the development of subsea communication systems in the 1940s, increasingly sophisticated means have be developed for transmitting information acoustically through the highly variable ocean environment. State-of-the-art acoustic communication systems leverage ultrasonic transducers to achieve data transmission rates that mirror radio-frequency (RF)-based WiFi systems on land. The increasing use of wireless implanted medical devices (IMDs) have increased interest in through-tissue communications. Restrictions on the available bandwidth and transmit signal power limit the data rates of RF-based IMDs. In this talk, we give an overview of video-capable ultrasonic wireless communication between IMDs and external devices. We emphasize the potential of such a system for improving video capsule endoscopy and describe the challenges of through-tissue acoustic communication. Building on experience with subsea-communication systems, we discuss methods to cope with attenuation, dispersion, reflection, and nonlinear propagation. Some of our recent experiments performed ex vivo with soft tissue samples and in vivo with anesthetized animal subjects will be discussed.
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Felzen, Marc, Jörg C. Brokmann, Stefan K. Beckers, Michael Czaplik, Frederik Hirsch, Miriam Tamm, Rolf Rossaint, and Sebastian Bergrath. "Improved technical performance of a multifunctional prehospital telemedicine system between the research phase and the routine use phase – an observational study." Journal of Telemedicine and Telecare 23, no. 3 (April 13, 2016): 402–9. http://dx.doi.org/10.1177/1357633x16644115.

Повний текст джерела
Анотація:
Introduction Telemedical concepts in emergency medical services (EMS) lead to improved process times and patient outcomes, but their technical performance has thus far been insufficient; nevertheless, the concept was transferred into EMS routine care in Aachen, Germany. This study evaluated the system’s technical performance and compared it to a precursor system. Methods The telemedicine system was implemented on seven ambulances and a teleconsultation centre staffed with experienced EMS physicians was established in April 2014. Telemedical applications included mobile vital data, 12-lead, picture transmission and video streaming from inside the ambulances. The tele-EMS physician filled in a questionnaire regarding the technical performance of the applications, background noise and assessed clinical values of the transmitted pictures and videos after each mission between 15 May 2014–15 October 2014. Results Teleconsultation was established during 539 emergency cases. In 83% of the cases ( n = 447), only the paramedics and the tele-EMS physician were involved. Transmission success rates ranged from 98% (audio connection) to 93% (12-lead electrocardiogram (ECG) transmission). All functionalities, except video transmission, were significantly better than the pilot project ( p < 0.05). Severe background noise was detected to a lesser extent ( p = 0.0004) and the clinical value of the pictures and videos were considered significantly more valuable. Discussion The multifunctional system is now sufficient for routine use and is the most reliable mobile emergency telemedicine system compared to other published projects. Dropouts were due to user errors and network coverage problems. These findings enable widespread use of this system in the future, reducing the critical time intervals until medical therapy is started.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Гаврилов, Дмитро Сергійович, Сергій Степанович Бучік, Юрій Михайлович Бабенко, Сергій Сергійович Шульгін та Олександр Васильович Слободянюк. "Метод обробки вiдеодaних з можливістю їх захисту після квaнтувaння". RADIOELECTRONIC AND COMPUTER SYSTEMS, № 2 (2 червня 2021): 64–77. http://dx.doi.org/10.32620/reks.2021.2.06.

Повний текст джерела
Анотація:
The subject of research in the article is the video processing processes based on the JPEG platform for data transmission in the information and telecommunication network. The aim is to build a method for processing a video image with the possibility of protecting it at the quantization stage with subsequent arithmetic coding. That will allow, while preserving the structural and statistical regularity, to ensure the necessary level of accessibility, reliability, and confidentiality when transmitting video data. Task: research of known methods of selective video image processing with the subsequent formalization of the video image processing procedure at the quantization stage and statistical coding of significant blocks based on the JPEG platform. The methods used are an algorithm based on the JPEG platform, methods for selecting significant informative blocks, arithmetic coding. The following results were obtained. A method for processing a video image with the possibility of its protection at the stage of quantization with subsequent arithmetic coding has been developed. This method will allow, while preserving the structural and statistical regularity, to fulfill the set requirements for an accessible, reliable, and confidential transmission of video data. Ensuring the required level of availability is associated with a 30% reduction in the video image volume compared to the original volume. Simultaneously, the provision of the required level of confidence is confirmed by an estimate of the peak signal-to-noise ratio for an authorized user, which is dB. Ensuring the required level of confidentiality is confirmed by an estimate of the peak signal-to-noise ratio in case of unauthorized access, which is equal to dB. Conclusions. The scientific novelty of the results obtained is as follows: for the first time, two methods of processing video images at the quantization stage have been proposed. The proposed technologies fulfill the assigned tasks to ensure the required level of confidentiality at a given level of confidence. Simultaneously, the method of using encryption tables has a higher level of cryptographic stability than the method of using the key matrix. It is due to a a more complex mathematical apparatus. Which, in turn, increases the time for processing the tributes. To fulfill the requirement of data availability, it is proposed to use arithmetic coding for info-normative blocks, which should be more efficient compared with the methods of code tables. So, the method of using the scoring tables has greater cryptographic stability, and the method of using the matrix-key has higher performance. Simultaneously, the use of arithmetic coding will satisfy the need for accessibility by reducing the initial volume.
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Ahamed Z, Ghouse, and Anuj Jain. "Literature Review on High Definition Image Error Concealment." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 165. http://dx.doi.org/10.14419/ijet.v7i3.12.15910.

Повний текст джерела
Анотація:
This paper is give us a overview of Error control method used in image or video transmission. Data in transmission is lost due to link failure or due to congestion and loss in packets, so the aim of this method is to protect data from these errors. Error detection coding and Error correction coding are two types of error control mechanism. Some of the error control mechanisms are Retransmission, Forward error correction, error concealment and error resilience. We are discussing a summary of three methods and Error Concealment in details.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Prabowo, Hendro Eko, and Tohari Ahmad. "ENHANCEMENT OF PIXEL VALUE ORDERING BASED DATA HIDING BY ROW BLOCK PARTITION." Jurnal Ilmu Komputer dan Informasi 11, no. 2 (June 29, 2018): 77. http://dx.doi.org/10.21609/jiki.v11i2.539.

Повний текст джерела
Анотація:
The development of information and communication technology that support digital data transmission such as text, image, audio and video gives several effects. One of them is data security that becomes the main priority during the transmission process. Pixel-Value-Ordering (PVO) which one of data hiding methods can be implemented to achieve the requirement. It embeds data on maximum pixel and minimum pixel in a blok which is a part of the carrier image. However, PVO has capacity a problem, that only 2 bits per block can be hidden. To handle this problem, we propose a new approach by dividing blocks dinamically based on its complexity. These blocks are grouped into 4: smooth block, semi-smooth block, normal block and rough block. Using this approach, the stego capacity can be improved up to 2.6 times in average of previous method by keeping the quality stego more than 65 dB for all testing image.
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Zhu, Li, and Yi Min Yang. "Real-Time Multitasking Video Encoding Processing System of Multicore." Applied Mechanics and Materials 66-68 (July 2011): 2074–79. http://dx.doi.org/10.4028/www.scientific.net/amm.66-68.2074.

Повний текст джерела
Анотація:
This paper achieved the optimize which is based on the Series processors Produced by NVIDIA, such as Geforce, Tegra, Nexus and so on, and discussed the future development of the video image processor. Expounded the most popular DSP optimization techniques and objectives in the current, to optimized the design for the methods of the various papers available in existence. Based on the NVIDIA's series of products, specific discussed CUDA GPU architecture based on NVIDIA's products, raised the hardware and algorithms of the current most popular video encoding equipment, based on real practical technology to improve the transmission and encoding of multimedia data.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Zotin, Alexandr, and Margarita Favorskaya. "Application of bar coding for digital watermarking of video sequences based on frequency transforms." Information and Control Systems, no. 5 (October 20, 2020): 12–23. http://dx.doi.org/10.31799/1684-8853-2020-5-12-23.

Повний текст джерела
Анотація:
Introduction: Owners of multimedia products face an important problem of protecting their digital data. An effective way to solve it is digital watermarking of video sequences. The challenge is the need to improve the digital watermark tolerance for transcoding when the data are transmitted via unprotected channels. Purpose: Development of method for embedding data into a video sequence which would have a higher tolerance for transcoding. Methods: We propose a novel method for embedding and extracting textual digital watermarks based on the bar coding and Arnold transform. Results: Blind marking schemes have been developed for digital video sequences in chromatic components, based on the discrete wavelet transform and discrete cosine transform. An experimental study has been conducted to check the stability of the proposed method using encoders x264 (AVC/H.264) and x265 (HEVC/H.265). The estimation of transcoding impact has shown that the frequency method based on wavelet decomposition has a high degree of stability. It was discovered during the experiments that for the cases of video transcoding by single-pass compression with a Constant Rate Factor not exceeding 26, the embedded textual information is fully restorable. Practical relevance: The developed method allows you to reliably embed or extract textual data from video sequences compressed using highly efficient coding methods during their transmission viaunprotected channels, providing copyright protection for multimedia product owners.
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Takaya, Kunio, and R. Todd Reinhardt. "Low Bit-Rate Image Coding for Facial Movement." Journal of Circuits, Systems and Computers 07, no. 04 (August 1997): 249–59. http://dx.doi.org/10.1142/s0218126697000188.

Повний текст джерела
Анотація:
A method of low bit-rate facial image coding specifically designed for the use in video telephone is presented. The basic principle for this facial image coding is to exploit the capabilities of 2D image warping techniques to generate the replica of the sender's facial expression merely by deforming a master face image, which is sent once at the beginning of the telephone call. Several parameters that describe facial expressions are monitored at the transmitter at the video frame rate of 30 frames/s, and then transmitted to the receiver using the in-band data channel. Since transmission of actual image data happens once or when another image is required, the bit-rate is much lower that that required by ordinary video image transmission. A fast bilinear mapping method for warped images, a grid mesh set over the facial image, various warping algorithms to realize head movement and facial motions with respect to eyes and mouth are discussed. This paper also compares the presented low bit-rate facial image coding to its competing methods such as MPEG and the method using a 3D facial model.
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Barannik, Vladimir, Serhii Sidchenko, Natalia Barannik, and Valeriy Barannik. "Development of the method for encoding service data in cryptocompression image representation systems." Eastern-European Journal of Enterprise Technologies 3, no. 9(111) (June 30, 2021): 103–15. http://dx.doi.org/10.15587/1729-4061.2021.235521.

Повний текст джерела
Анотація:
The demand for image confidentiality is constantly growing. At the same time, ensuring the confidentiality of video information must be organized subject to ensuring its reliability with a given time delay in processing and transmission. Methods of cryptocompression representation of images can be used to solve this problem. They are designed to simultaneously provide compression and protection of video information. The service component is used as the key of the cryptocompression transformation. However, it has a significant volume. It is 25 % of the original video data volume. A method for coding systems of service components in a differentiated basis on the second cascade of cryptocompression representation of images has been developed. The method is based on the developed scheme of data linearization from three-dimensional coordinates of representation in a two-dimensional matrix into a one-dimensional coordinate for one-to-one representation of this element in a vector. Linearization is organized horizontally line by line. On the basis of the developed method, a non-deterministic number of code values of information components is formed. They have non-deterministic lengths and are formed on a non-deterministic number of elements. The uncertainty of positioning of cryptocompression codograms in the general code stream is provided, which virtually eliminates the possibility of their unauthorized decryption. The method provides a reduction in the volume of the service component of the cryptocompression codogram. The service data volume is 6.25 % of the original video data volume. The method provides an additional reduction in the volume of cryptocompression representation of images without loss of information quality relative to the original video data on average from 1.08 to 1.54 times, depending on the degree of their saturation
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Chądzyńska, Dominika, and Dariusz Gotlib. "Maps in video games – range of applications." Polish Cartographical Review 47, no. 3 (September 1, 2015): 137–45. http://dx.doi.org/10.1515/pcr-2015-0011.

Повний текст джерела
Анотація:
Abstract The authors discuss the role of the map in various game genres, specifically video games. Presented examples illustrate widespread map usage in various ways and forms by the authors of games, both classic and video. The article takes a closer look at the classification and development of video games within the last few decades. Presently, video games use advanced geospatial models and data resources. Users are keen on a detailed representation of the real world. Game authors use advanced visualization technologies, which often are innovative and very attractive. Joint efforts of cartographers, geo-information specialists and game producers can bring interesting effects in the future. Although games are mainly made for entertainment, they are more frequently used for other purposes. There is a growing need for data reliability as well as for some effective means of transmission cartographic content. This opens up a new area of both scientific and implementation activity for cartographers. There is no universally accessible data on the role of cartographers in game production, but apparently it is quite limited at the moment. However, a wider application of cartographic methodology would have a positive effect on the development of games and, conversely, methods and technologies applied by game makers can influence the development of cartography.
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Barannik, Vladimir, Andrii Krasnorutsky, Sergii Shulgin, Valerii Yeroshenko, Yevhenii Sidchenko, and Andrii Hordiienko. "Image compression based on classification coding of constant-pitched functions transformers." RADIOELECTRONIC AND COMPUTER SYSTEMS, no. 3 (October 5, 2021): 48–62. http://dx.doi.org/10.32620/reks.2021.3.05.

Повний текст джерела
Анотація:
The subject of research in the article are the processes of video image processing using an orthogonal transformation for data transmission in information and telecommunication networks. The aim is to build a method of compression of video images while maintaining the efficiency of its delivery at a given informative probability. That will allow to provide a gain in the time of delivery of compressed video images, a necessary level of availability and authenticity at transfer of video data with preservation of strictly statistical regulations and the controlled loss of quality. Task: to study the known algorithms for selective processing of static video at the stage of approximation and statistical coding of the data based on JPEG-platform. The methods used are algorithm based on JPEG-platform, methods of approximation by orthogonal transformation of information blocks, arithmetic coding. It is a solution of scientific task-developed methods for reducing the computational complexity of transformations (compression and decompression) of static video images in the equipment for processing visual information signals, which will increase the efficiency of information delivery.The following results were obtained. The method of video image compression with preservation of the efficiency of its delivery at the set informative probability is developed. That will allow to fulfill the set requirements at the preservation of structural-statistical economy, providing a gain in time to bring compressed images based on the developed method, relative to known methods, on average up to 2 times. This gain is because with a slight difference in the compression ratio of highly saturated images compared to the JPEG-2000 method, for the developed method, the processing time will be less by at least 34%.Moreover, with the increase in the volume of transmitted images and the data transmission speed in the communication channel - the gain in the time of delivery for the developed method will increase. Here, the loss of quality of the compressed/restored image does not exceed 2% by RMS, or not worse than 45 dB by PSNR. What is unnoticeable to the human eye.Conclusions. The scientific novelty of the obtained results is as follows: for the first time the method of classification (separate) coding (compression) of high-frequency and low-frequency components of Walsh transformants of video images is offered and investigated, which allows to consider their different dynamic range and statistical redundancy reduced using arithmetic coding. This method will allow to ensure the necessary level of availability and authenticity when transmitting video data, while maintaining strict statistical statistics.Note that the proposed method fulfills the set tasks to increase the efficiency of information delivery. Simultaneously, the method for reducing the time complexity of the conversion of highly saturated video images using their representation by the transformants of the discrete Walsh transformation was further developed. It is substantiated that the perspective direction of improvement of methods of image compression is the application of orthogonal transformations on the basis of integer piecewise-constant functions, and methods of integer arithmetic coding of values of transformant transformations.It is substantiated that the joint use of Walsh transformation and arithmetic coding, which reduces the time of compression and recovery of images; reduces additional statistical redundancy. To further increase the degree of compression, a classification coding of low-frequency and high-frequency components of Walsh transformants is developed. It is shown that an additional reduction in statistical redundancy in the arrays of low-frequency components of Walsh transformants is achieved due to their difference in representation. Recommendations for the parameters of the compression method for which the lowest value of the total time of information delivery is provided are substantiated.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Jalil, Bushra, Giuseppe Riccardo Leone, Massimo Martinelli, Davide Moroni, Maria Antonietta Pascali, and Andrea Berton. "Fault Detection in Power Equipment via an Unmanned Aerial System Using Multi Modal Data." Sensors 19, no. 13 (July 9, 2019): 3014. http://dx.doi.org/10.3390/s19133014.

Повний текст джерела
Анотація:
The power transmission lines are the link between power plants and the points of consumption, through substations. Most importantly, the assessment of damaged aerial power lines and rusted conductors is of extreme importance for public safety; hence, power lines and associated components must be periodically inspected to ensure a continuous supply and to identify any fault and defect. To achieve these objectives, recently, Unmanned Aerial Vehicles (UAVs) have been widely used; in fact, they provide a safe way to bring sensors close to the power transmission lines and their associated components without halting the equipment during the inspection, and reducing operational cost and risk. In this work, a drone, equipped with multi-modal sensors, captures images in the visible and infrared domain and transmits them to the ground station. We used state-of-the-art computer vision methods to highlight expected faults (i.e., hot spots) or damaged components of the electrical infrastructure (i.e., damaged insulators). Infrared imaging, which is invariant to large scale and illumination changes in the real operating environment, supported the identification of faults in power transmission lines; while a neural network is adapted and trained to detect and classify insulators from an optical video stream. We demonstrate our approach on data captured by a drone in Parma, Italy.
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Et. al., E. Manjula,. "WMSN: ANALYSIS OF AGRICULTURAL SOIL ENVIRONMENT MONITORING USING WIRELESS MULTIMEDIA SENSOR NETWORK." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 2 (April 11, 2021): 956–62. http://dx.doi.org/10.17762/itii.v9i2.436.

Повний текст джерела
Анотація:
This paper proposes an environmental monitoring for agriculture soil using Wireless Multimedia Sensor Network. WMSN is used to monitor the agriculture soil environment. In order to ensure optimal use of the sensor nodes in WMSN and accurate access to the collected data, the routing protocols with both energy efficiency and quality of service ( QoS) properties are necessary for the transmission of photo, video and scalar data. This paper proposes a priority aware energy efficient QoS based data transmission for agriculture soil environment and also detects the pest. It utilizes the available bandwidth and data rate in the best way and in order to be more energy efficient during data transmission. For performance analysis, the proposed system is simulated using Java and the results of the experiments suggest that the proposed algorithm is more efficient compared to other methods in terms of delay and energy consumption. The sink node provides the solution based on these collected values.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Lukman, Petrin Redayani, Alvin Saputra, Sylvia Detri Elvira, Heriani, Alfi Fajar Almasyhur, Leonita Ariesti Putri, César Alberto Alfonso, and Reina Rahma Noviasari. "Efficacy of video-based psychotherapy in reducing psychological distress of COVID-19 patients treated in isolation ward." Medical Journal of Indonesia 30, no. 4 (December 7, 2021): 250–5. http://dx.doi.org/10.13181/mji.oa.215473.

Повний текст джерела
Анотація:
BACKGROUND Hospitalized patients with COVID-19 experience isolation during treatment, which may cause psychological distress. Thus, alternative ways to deliver psychological support are needed when face-to-face therapy is not possible. This study aimed to investigate the efficacy of video-based psychotherapy in reducing distress in COVID-19 patients treated in an isolation ward. METHODS This quasi-experimental trial without a control group included 42 COVID-19 patients aged 20–59 years. Participants were recruited conveniently in the COVID-19 isolation ward in Cipto Mangunkusumo Hospital, Jakarta, Indonesia. They watched three brief psychotherapy videos including relaxation, managing thoughts and emotions, and mindfulness for approximately 30 min. The videos were created by the Department of Psychiatry, Faculty of Medicine, Universitas Indonesia. Subjective units of distress scale (SUDS) was measured before and after watching all videos. Data were analyzed using the Wilcoxon-signed rank test. RESULTS All 42 subjects finished watching the videos. 31 subjects experienced a significant median decrease in SUDS score after the intervention. The effect size of the psychotherapy videos for the SUDS score was 0.485 (95% CI 0.302 to 0.634). CONCLUSIONS Watching psychotherapy videos is effective in reducing the SUDS score for COVID-19 patients in an isolation ward. Our brief video-based psychotherapy intervention has reduced psychological distress in hospitalized COVID-19 patients with limited access to face-to-face consultations due to the risk of disease transmission.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Tirandaz, Hamed, and Ali Karami-Mollaee. "On active synchronization of fractional-order Bloch chaotic system and its practical application in secure image transmission." International Journal of Intelligent Computing and Cybernetics 11, no. 2 (June 11, 2018): 181–96. http://dx.doi.org/10.1108/ijicc-05-2017-0048.

Повний текст джерела
Анотація:
PurposeThe purpose of this paper is to propose a novel and secure image transmission based on the unpredictable behavior of the chaotic systems.Design/methodology/approachThe proposed approach includes two main contributions: synchronization scheme and transmission scheme. The synchronization scheme benefits the advantage of the fractional-order active synchronization method. A new control law is derived to asymptotically synchronize the underlined fractional-order Bloch chaotic system. The validity of the proposed synchronization scheme is proved by the Lyapunov stability theorem. Then, a novel image transmission scheme is designed to transfer image data via chaotic signals, which modulates the encrypted data in the sender signals and demodulates it at the receiver side.FindingsNumerical simulations are provided to show the validity and effectiveness of the proposed image transmission system. Furthermore, the performance of the image transmission system is evaluated using some illustrative examples and their corresponding statistical tests. The results demonstrate the effectiveness of the proposed method in comparison with other proposed methods in this subject.Originality/valueA new chaos-based image transmission system is developed based on the synchronization of Bloch chaotic system. The introduced transmission system is interesting and could be applicable to any kind of secure image/video transmission.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Ling, Peng, Maolin Li, and Weipeng Guan. "Channel-Attention-Enhanced LSTM Neural Network Decoder and Equalizer for RSE-Based Optical Camera Communications." Electronics 11, no. 8 (April 17, 2022): 1272. http://dx.doi.org/10.3390/electronics11081272.

Повний текст джерела
Анотація:
In an RGB-LED-based optical camera communication system, it is an essential goal to have better performance in the data rate and BER. However, in a higher symbol rate, due to the conventional sampling algorithm, the deterioration of transmission performance brought by the inter-symbol interference and inter-channel interference is significant. Innovatively, in this paper, the sub-image obtained by a captured frame of received video is encoded by a channel-attention-Net-based encoder to generate a descriptor without existing sampling methods. Moreover, we propose an LSTM-based equalizer to decode the descriptor and mitigate transmission performance deterioration. Utilizing the long-short-term memory of an LSTM unit, an equalizer not only can reduce bit error rates but also increase the data rate. The experimental results show that at a symbol rate of 46 kbaud/s, a record-high data rate at 44.03 kbit/s is achieved under random data transmission while still meeting the pre-forward error correction requirement.
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Chen, Long, Shuan Chen, Yu Qing He, Jian Guo Wei, and Jian Wu Dang. "IP Camera Based Network Video Surveillance Mobile Security System." Applied Mechanics and Materials 411-414 (September 2013): 1505–9. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.1505.

Повний текст джерела
Анотація:
In this paper, we proposed a mobile security system based on IP camera network video surveillance by improving the traditional monitoring methods. This system includes three parts: Android mobile client, cloud server, IP camera monitoring terminals. By setting IP cameras at 24 fps but only sending one frame each second, we can infer the situation by analyzing of the single image and reduce the amount of data transmission. User can check the live scenes and send control commands to monitoring terminal or receive the push information from the server to freely give alarm signal to users anytime, anywhere. And users can also select any regions or any specific objects to monitor, the server will real-time monitor each scene according to the specific requirements by using the algorithms of image contrast and depth estimation. The experiment results show that the system can greatly improve the accuracy of the alarm.
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Camarda, Pietro, Cataldo Guaragnella, and Domenico Striccoli. "Video Smoothing of Aggregates of Streams with Bandwidth Constraints." Journal of Communications Software and Systems 1, no. 1 (April 6, 2017): 57. http://dx.doi.org/10.24138/jcomss.v1i1.318.

Повний текст джерела
Анотація:
Compressed variable bit rate (VBR) video transmission is acquiring a growing importance in the telecommunication world. High data rate variability of compressed video over multiple time scales makes an efficient bandwidth resource utilization difficult to obtain. One of the approaches developed to face this problem are smoothing techniques. Various smoothing algorithms that exploit client buffers have been proposed, thus reducing the peak rate and highrate variability by efficiently scheduling the video data to be transmitted over the network. The novel smoothing algorithm proposed in this paper, which represents a significant improvements over the existing methods,performs data scheduling both for a single stream and for stream aggregations, by taking into account available bandwidth constraints. It modifies, whenever possible, the smoothing schedule in such a way as to eliminate frame losses due to available bandwidth limitations. This technique can be applied to any smoothing algorithm already present in literature and can be usefully exploited to minimize losses in multiplexed stream scenarios, like Terrestrial Digital Video Broadcasting (DVB-T), where a specific known available bandwidth must be shared byseveral multimedia flows. The developed algorithm has been exploited for smoothing stored video, although it can also be quite easily adapted for real time smoothing. The obtained numerical results, compared with the MVBA, another smoothing algorithm that is already presented and discussed in literature, show the effectiveness of the proposed algorithm, in terms of lost video frames, for different multiplexed scenarios.
Стилі APA, Harvard, Vancouver, ISO та ін.
45

He, Hongyang, Yue Gao, Yong Zheng, and Yining Liu. "Intelligent Power Grid Video Surveillance Technology Based on Efficient Compression Algorithm Using Robust Particle Swarm Optimization." Wireless Power Transfer 2021 (December 30, 2021): 1–12. http://dx.doi.org/10.1155/2021/8192582.

Повний текст джерела
Анотація:
Companies that produce energy transmit it to any or all households via a power grid, which is a regulated power transmission hub that acts as a middleman. When a power grid fails, the whole area it serves is blacked out. To ensure smooth and effective functioning, a power grid monitoring system is required. Computer vision is among the most commonly utilized and active research applications in the world of video surveillance. Though a lot has been accomplished in the field of power grid surveillance, a more effective compression method is still required for large quantities of grid surveillance video data to be archived compactly and sent efficiently. Video compression has become increasingly essential with the advent of contemporary video processing algorithms. An algorithm’s efficacy in a power grid monitoring system depends on the rate at which video data is sent. A novel compression technique for video inputs from power grid monitoring equipment is described in this study. Due to a lack of redundancy in visual input, traditional techniques are unable to fulfill the current demand standards for modern technology. As a result, the volume of data that needs to be saved and handled in live time grows. Encoding frames and decreasing duplication in surveillance video using texture information similarity, the proposed technique overcomes the aforementioned problems by Robust Particle Swarm Optimization (RPSO) based run-length coding approach. Our solution surpasses other current and relevant existing algorithms based on experimental findings and assessments of different surveillance video sequences utilizing varied parameters. A massive collection of surveillance films was compressed at a 50% higher rate using the suggested approach than with existing methods.
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Anderson, Brett R., S. Ram Kumar, Danielle Gottlieb-Sen, Matthew H. Liava’a, Kevin D. Hill, Jeffrey P. Jacobs, Francis X. Moga, et al. "The Congenital Heart Technical Skill Study: Rationale and Design." World Journal for Pediatric and Congenital Heart Surgery 10, no. 2 (March 2019): 137–44. http://dx.doi.org/10.1177/2150135118822689.

Повний текст джерела
Анотація:
Background: We report the rationale and design for a peer-evaluation protocol of attending congenital heart surgeon technical skill using direct video observation. Methods: All surgeons contributing data to The Society of Thoracic Surgeons—Congenital Heart Surgery Database (STS-CHSD) are invited to submit videos of themselves operating, to rate peers, or both. Surgeons may submit Norwood procedures, complete atrioventricular canal repairs, and/or arterial switch operations. A HIPPA-compliant website allows secure transmission/evaluation. Videos are anonymously rated using a modified Objective Structured Assessment of Technical Skills score. Ratings are linked to five years of contemporaneous outcome data from the STS-CHSD and surgeon questionnaires. The primary outcome is a composite for major morbidity/mortality. Results: Two hundred seventy-six surgeons from 113 centers are eligible for participation: 83 (30%) surgeons from 53 (45%) centers have agreed to participate, with recruitment ongoing. These surgeons vary considerably in years of experience and outcomes. Participants, both early and late in their careers, describe the process as “very rewarding” and “less time consuming than anticipated.” An initial subset of 10 videos demonstrated excellent interrater reliability (interclass correlation = 0.85). Conclusions: This study proposes to evaluate the technical skills of attending pediatric cardiothoracic surgeons by video observation and peer-review. It is notable that over a quarter of congenital heart surgeons, across a range of experiences, from almost half of United States centers have already agreed to participate. This study also creates a mechanism for peer feedback; we hypothesize that feedback could yield broad and meaningful quality improvement.
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Фахми, Ш. С., Н. В. Шаталова, Е. В. Костикова, Н. Ю. Пышкина, and Ю. И. Васильев. "Efficiency of spatially recursive algorithms for transmitting images of marine vessels." MORSKIE INTELLEKTUAL`NYE TEHNOLOGII)</msg>, no. 4(54) (December 2, 2021): 134–41. http://dx.doi.org/10.37220/mit.2021.54.4.044.

Повний текст джерела
Анотація:
На современном этапе развития интеллектуальных морских технологий необходимо включить в состав видеосистемы обработки изображений две подсистемы передачи видеоинформации морских сюжетов. Во первых на основе спектрального преобразования сигналов из пространственной области в частотную для оперативной доставки видеоинформации, полученной с различных камер подводного и надводного наблюдения. Во вторых, на основе пространственных методов обработки, без перехода в спектральную область сигнала для передачи выделенных ключевых точек объектов на изображениях. При этом важнейшая особенность этих подсистем заключается в улучшении информационных показателей качества морских видеосистем автоматизированной обработкой видеоинформации: точность визуальных данных, битовая скорость передачи по каналам связи и вычислительная сложность алгоритмов анализа и передачи видеоинформации. В предлагаемом исследовании приводятся алгоритмы спектральной и пространственной обработки видеоинформации, проведена оценка эффективности алгоритмов обработки изображений. А также отражены результаты моделирования алгоритмов и сравнительная оценка информационных показателей интеллектуальных морских видеосистем: точность, битовая скорость и вычислительная сложность видеосистем обработки морских изображений. At the present stage of the development of intelligent marine technologies, it is necessary to include two subsystems for the transmission of video information of marine scenes in the video image processing system: 1) based on the spectral conversion of signals from the spatial domain to the frequency domain for the rapid delivery of video information obtained from various underwater and surface surveillance cameras; 2) based on spatial processing methods without switching to the spectral domain of the signal to transmit selected key points of objects in the images. At the same time, the most important feature of these subsystems is to improve the information quality indicators of marine video systems by automated processing of video information: the accuracy of visual data, the bit rate of transmission over communication channels and the computational complexity of algorithms for analyzing and transmitting video information. The proposed study provides algorithms for spectral and spatial processing of video information. The results of algorithm modeling and comparative evaluation of information indicators of intelligent marine video systems are also presented: accuracy, bit rate and computational complexity of marine image processing video systems.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Ahmed, Mahmood Ali, and Khamees Khalaf Hasan. "Data Compression and Encryption for Remote Sensor Networks Using Different Techniques Methods." Journal of Cases on Information Technology 23, no. 2 (April 2021): 39–49. http://dx.doi.org/10.4018/jcit.20210401.oa4.

Повний текст джерела
Анотація:
Wireless sensor networks (WSNs) are widely used for the different multimedia applications in which the data in multimedia form (e.g., images and videos) are captured by visual sensors and transmitted to base stations or destination nodes, and such networks, commonly called wireless multimedia sensor networks (WMSN), transmit high-quality images over sensor nodes with image quality improvement and CS technique while the security of CS data is achieved. The one-way DF-based cooperative digital image transmission model over WSNs using advanced terminologies for image compression called advanced JPEG2000 compression and modified elliptical curve cryptography (ECC) encryption is proposed. Image quality improvement efficiency is essential in multimedia applications and wireless communications. The authors proposed a novel technique based on adaptive and dynamic noise removal and quality improvement for both before compression and after compression. The compression method designed is based on CS technique.
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Ferroukhi, Merzak, Abdeldjalil Ouahabi, Mokhtar Attari, Yassine Habchi, and Abdelmalik Taleb-Ahmed. "Medical Video Coding Based on 2nd-Generation Wavelets: Performance Evaluation." Electronics 8, no. 1 (January 14, 2019): 88. http://dx.doi.org/10.3390/electronics8010088.

Повний текст джерела
Анотація:
The operations of digitization, transmission and storage of medical data, particularly images, require increasingly effective encoding methods not only in terms of compression ratio and flow of information but also in terms of visual quality. At first, there was DCT (discrete cosine transform) then DWT (discrete wavelet transform) and their associated standards in terms of coding and image compression. The 2nd-generation wavelets seeks to be positioned and confronted by the image and video coding methods currently used. It is in this context that we suggest a method combining bandelets and the SPIHT (set partitioning in hierarchical trees) algorithm. There are two main reasons for our approach: the first lies in the nature of the bandelet transform to take advantage of capturing the geometrical complexity of the image structure. The second reason is the suitability of encoding the bandelet coefficients by the SPIHT encoder. Quality measurements indicate that in some cases (for low bit rates) the performance of the proposed coding competes with the well-established ones (H.264 or MPEG4 AVC and H.265 or MPEG4 HEVC) and opens up new application prospects in the field of medical imaging.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Bron, Cph, Ph Gremillet, D. Launay, M. Jourliny, HP Gautschi, Th Bächi, and J. Schüpbach. "Scanning Transmission and Computer-Aided Volumic Electron Microscopy: 3D Modeling of Entire Cells by Electronic Imaging." Proceedings, annual meeting, Electron Microscopy Society of America 48, no. 1 (August 12, 1990): 468–69. http://dx.doi.org/10.1017/s0424820100181099.

Повний текст джерела
Анотація:
The digital processing of electron microscopic images from serial sections containing laser-induced topographical references allows a 3-D reconstruction at a depth resolution of 30 to 40 nm of entire cells by the use of image analysis methods, as already demonstrated for Transmission Electron Microscopy (TEM) coupled with a video camera. (Cf ref)We decided to use a Scanning Transmission Electron Microscope (STEM) to get higher contrast and better resolution at medium magnification. The scanning of our specimens at video frequencies is an attractive and easy way to link a STEM with an image processing system (see Fig 1) but the hysteresis of the electronic spools responsible for the magnetic deviation of the scanning electron beam induces deformations of images which have to be modelized and corrected before registration. Computer algorithms developed for image analysis and treatment correct the artifacts caused by the use of STEM and by serial sectioning to automatically reconstruct the third dimension of the cells.(see Figs 2 and 3) They permit the normalization of the images through logarithmic processing of the original grey level information. The automatic extraction of cell limits allows to link the image analysis and treatments with image synthesis methods by minimal human intervention. The surface representation and the registered images provide an ultrastructural data base from which quantitative 3-D morphological parameters, as well as otherwise impossible visualizations, can be computed.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії