Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 3 de 3
Filtrar
Más filtros










Base de datos
Intervalo de año de publicación
1.
IEEE Trans Cybern ; PP2023 Dec 25.
Artículo en Inglés | MEDLINE | ID: mdl-38145521

RESUMEN

The quality of videos is the primary concern of video service providers. Built upon deep neural networks, video quality assessment (VQA) has rapidly progressed. Although existing works have introduced the knowledge of the human visual system (HVS) into VQA, there are still some limitations that hinder the full exploitation of HVS, including incomplete modeling with few HVS characteristics and insufficient connection among these characteristics. In this article, we present a novel spatial-temporal VQA method termed HVS-5M, wherein we design five modules to simulate five characteristics of HVS and create a bioinspired connection among these modules in a cooperative manner. Specifically, on the side of the spatial domain, the visual saliency module first extracts a saliency map. Then, the content-dependency and the edge masking modules extract the content and edge features, respectively, which are both weighted by the saliency map to highlight those regions that human beings may be interested in. On the other side of the temporal domain, the motion perception module extracts the dynamic temporal features. Besides, the temporal hysteresis module simulates the memory mechanism of human beings and comprehensively evaluates the video quality according to the fusion features from the spatial and temporal domains. Extensive experiments show that our HVS-5M outperforms the state-of-the-art VQA methods. Ablation studies are further conducted to verify the effectiveness of each module toward the proposed method. The source code is available at https://github.com/GZHU-DVL/HVS-5M.

2.
Artículo en Inglés | MEDLINE | ID: mdl-29994181

RESUMEN

During the past twenty years, there has been a great interest in the study of spread spectrum (SS) watermarking. However, it is still a challenging task to design a secure and robust SS watermarking method. In this paper, we first define a family of secure SS watermarking methods, named as spherical watermarking (SW). The watermarked correlation of SW is defined to be uniformly distributed on a spherical surface, and this makes SW be key-secure against the watermarked-only attack. Then, we propose an implementation of SW, called transportation SW (TSW), which is designed to decrease embedding distortion in a recursive manner using the transportation theory, meanwhile keeping the security of SW. Moreover, we present a theoretical analysis of the embedding distortion and robustness of the proposed method. Finally, extensive experiments are conducted on simulated signals and real images. The experimental results show that TSW is more robust than existing secure SS watermarking methods.

3.
IEEE Trans Cybern ; 48(8): 2307-2320, 2018 Aug.
Artículo en Inglés | MEDLINE | ID: mdl-28841562

RESUMEN

Security analysis is a very important issue for digital watermarking. Several years ago, according to Kerckhoffs' principle, the famous four security levels, namely insecurity, key security, subspace security, and stego-security, were defined for spread-spectrum (SS) embedding schemes in the framework of watermarked-only attack. However, up to now there has been little application of the definition of these security levels to the theoretical analysis of the security of SS embedding schemes, due to the difficulty of the theoretical analysis. In this paper, based on the security definition, we present a theoretical analysis to evaluate the security levels of five typical SS embedding schemes, which are the classical SS, the improved SS (ISS), the circular extension of ISS, the nonrobust and robust natural watermarking, respectively. The theoretical analysis of these typical SS schemes are successfully performed by taking advantage of the convolution of probability distributions to derive the probabilistic models of watermarked signals. Moreover, simulations are conducted to illustrate and validate our theoretical analysis. We believe that the theoretical and practical analysis presented in this paper can bridge the gap between the definition of the four security levels and its application to the theoretical analysis of SS embedding schemes.

SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA
...