Combined concealment, synchronization, and error detection using data hiding

Download
2003-04-11
Yilmaz, A
Esen, E
Alatan, Abdullah Aydın
Utilization of data hiding for concealment of video transmission errors provides a reserve information about the video to the receiver while unchanging the transmitted bit-stream syntax; hence, improves the reconstruction video quality without extra channel utilization. A spatial domain error concealment technique, which hides edge orientation information of a block, and a resynchronization technique, which embeds bit length of a block into other blocks are composed. The proposed method also uses these techniques for detecting errors. Simulation results show that these approaches cooperate quite well in concealing the errors.
4th European Workshop on Image Analysis for Multimedia Interactive Services

Suggestions

Robust video transmission using data hiding
Yılmaz, Ayhan; Alatan, Abdullah Aydın; Department of Electrical and Electronics Engineering (2003)
Video transmission over noisy wireless channels leads to errors on video, which degrades the visual quality notably and makes error concealment an indispensable job. In the literature, there are several error concealment techniques based on estimating the lost parts of the video from the available data. Utilization of data hiding for this problem, which seems to be an alternative of predicting the lost data, provides a reserve information about the video to the receiver while unchanging the transmitted bit-...
Partial encryption of video for communication and storage
Yüksel, Turan; Yarman Vural, Fatoş Tunay; Akar, Gözde Bozdağı; Department of Computer Engineering (2003)
In this study, a new method is proposed to protect video data through partial encryption. Unlike previous methods, the bit rate of the encrypted portion can be controlled. In order to accomplish this task, a simple model for the time to break the partial encryption by a chipertext-only attack is defined. Then, the encrypted bit budget distribution strategy maximizing the time subject to the bitrate constraint is found. An algorithm to estimate the model parameters is constructed and it isthen implemented ov...
An image encryption algorithm robust to post-encryption bitrate conversion
Akdağ, Sadık Bahaettin; Candan, Çağatay; Department of Electrical and Electronics Engineering (2006)
In this study, a new method is proposed to protect JPEG still images through encryption by employing integer-to-integer transforms and frequency domain scrambling in DCT channels. Different from existing methods in the literature, the encrypted image can be further compressed, i.e. transcoded, after the encryption. The method provides selective encryption/security level with the adjustment of its parameters. The encryption method is tested with various images and compared with the methods in the literature ...
Graph-based joint channel estimation and data detection for large-scale multiuser MIMO-OFDM systems /
Tekin, Şeref Yaşar; Yılmaz, Ali Özgür; Department of Electrical and Electronics Engineering (2015)
In this thesis, a graph-based soft iterative receiver for large-scale multiuser MIMO-OFDM systems is proposed that performs joint channel estimation and data detection over time-varying frequency selective channel. In an uplink scenario, factor graph structures for the transmitter of users and the receiver of base-station are presented, which provide Gaussian message passing between nodes. Instead of LLR, reliability information of symbols are used to decrease complexity of the proposed algorithm. Training ...
A reality check for radiometric camera response recovery algorithms
Akyüz, Ahmet Oğuz (Elsevier BV, 2013-11-01)
The radiometric response of a camera governs the relationship between the incident light on the camera sensor and the output pixel values that are produced. This relationship, which is typically unknown and nonlinear, needs to be estimated for applications that require accurate measurement of scene radiance. Until now, various camera response recovery algorithms have been proposed each with different merits and drawbacks. However, an evaluation study that compares these algorithms has not been presented. In...
Citation Formats
A. Yilmaz, E. Esen, and A. A. Alatan, “Combined concealment, synchronization, and error detection using data hiding,” presented at the 4th European Workshop on Image Analysis for Multimedia Interactive Services, Univ London, Queen Mary, Queen Mary, ENGLAND, 2003, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/38262.