Results 31 to 40 of about 75,296 (317)

Perception-Based CTU Level Bit Allocation for Intra High Efficiency Video Coding

open access: yesIEEE Access, 2019
The conventional rate control algorithm does not fully consider the characteristics of the Human Visual System (HVS). To address this problem, in this paper, a perception based Coding Tree Unit (CTU) level bit allocation algorithm for intra High ...
Xiaoyan Liu   +3 more
doaj   +1 more source

High capacity audio watermarking using FFT amplitude interpolation [PDF]

open access: yes, 2009
An audio watermarking technique in the frequency domain which takes advantage of interpolation is proposed. Interpolated FFT samples are used to generate imperceptible marks. The experimental results show that the suggested method has very high capacity (
Fallahpour Reza, Mehdi   +1 more
core   +2 more sources

The Perceptual Consequences of Curved Screens [PDF]

open access: yes, 2017
Flat panels are by far the most common type of television screen. There are reasons, however, to believe that curved screens create a greater sense of immersion, reduce distracting reflections, and minimize some perceptual distortions that are ...
Banks, Martin S, Zannoli, Marina
core   +1 more source

Weighted universal image compression [PDF]

open access: yes, 1999
We describe a general coding strategy leading to a family of universal image compression systems designed to give good performance in applications where the statistics of the source to be compressed are not available at design time or vary over time or ...
Chou, Philip A.   +2 more
core   +1 more source

Perceptual hashing method for video content authentication with maximized robustness

open access: yesEURASIP Journal on Image and Video Processing, 2021
Perceptual video hashing represents video perceptual content by compact hash. The binary hash is sensitive to content distortion manipulations, but robust to perceptual content preserving operations. Currently, boundary between sensitivity and robustness
Qiang Ma, Ling Xing
doaj   +1 more source

Image Steganography Technology Based on Karhunen-Loeve Transform Optimization [PDF]

open access: yesJisuanji gongcheng, 2016
For the problem of perceptual distortion is too large and the high image error rate exists in steganography technology of the current information security area,an image steganography based Karhunen-Loeve Transform(KLT) optimization technology is designed.
ZHANG Guolin,GUAN Juhua,ZHANG Shuye
doaj   +1 more source

Reduced-Reference Stereoscopic Image Quality Assessment Using Gradient Sparse Representation and Structural Degradation

open access: yesIEEE Access, 2021
Reduced-reference stereoscopic image quality assessment (RRSIQA) models evaluate stereoscopic image quality degradation with partial information about the “ideal-quality” reference stereopair.
Jian Ma, Guoming Xu, Xiyu Han
doaj   +1 more source

The Perception-Distortion Tradeoff

open access: yes, 2019
Image restoration algorithms are typically evaluated by some distortion measure (e.g. PSNR, SSIM, IFC, VIF) or by human opinion scores that quantify perceived perceptual quality.
Blau, Yochai, Michaeli, Tomer
core   +1 more source

Rate-Distortion Theory for Clustering in the Perceptual Space

open access: yesEntropy, 2017
How to extract relevant information from large data sets has become a main challenge in data visualization. Clustering techniques that classify data into groups according to similarity metrics are a suitable strategy to tackle this problem.
Anton Bardera   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy