Encoding of motion video sequences for the MPEG environment using arithmetic coding

1990 ◽  
Author(s):  
Eric Viscito ◽  
Cesar A. Gonzales
1990 ◽  
Vol 2 (2) ◽  
pp. 145-154 ◽  
Author(s):  
C.A. Gonzales ◽  
L. Allman ◽  
T. McCarthy ◽  
P. Wendt ◽  
A.N. Akansu

2018 ◽  
Vol 13 (3) ◽  
pp. 1-11
Author(s):  
Fábio Luís Livi Ramos ◽  
Bruno Zatt ◽  
Marcelo Schiavon Porto ◽  
Sergio Bampi

HEVC is one of the most recent video coding standards, designed to face a new age of video processing challenges, such as higher video resolutions and limited traffic share bandwidth. The HEVC standard is divided into multiple steps, whereas the entropy encoding is the final stage before the coded bitstream generation. The CABAC (Context Adaptive Binary Arithmetic Coding) is the sole algorithm used for the entropy encoding at HEVC, providing reduced final bitstream generation, at the cost of increasing computational complexity and difficulties for parallelism opportunities. One of the novelties of the CABAC for the HEVC is the increase of certain types of input data (called bins), which have smaller dependencies among them (i.e. bypass bins), thus leading to the possibility to process multiples of them in parallel at once. The present work introduces a novel scheme for multiple bypass bins processing at once, leading to increasing bins-per-cycle throughput compared to related works. Moreover, the new technique is suitable for achieving a BAE (Binary Arithmetic Encoder) architecture (the CABAC critical part) able to process 8K UHD videos. Along with the multiple bypass bins technique, a low-power approach is achieved, based on statistical analysis of the recommended test video sequences, accomplishing around 15%of power savings.


Author(s):  
Estefanía Alcocer ◽  
Otoniel López-Granado ◽  
Roberto Gutierrez ◽  
Manuel P Malumbres

2020 ◽  
Vol 2020 (4) ◽  
pp. 116-1-116-7
Author(s):  
Raphael Antonius Frick ◽  
Sascha Zmudzinski ◽  
Martin Steinebach

In recent years, the number of forged videos circulating on the Internet has immensely increased. Software and services to create such forgeries have become more and more accessible to the public. In this regard, the risk of malicious use of forged videos has risen. This work proposes an approach based on the Ghost effect knwon from image forensics for detecting forgeries in videos that can replace faces in video sequences or change the mimic of a face. The experimental results show that the proposed approach is able to identify forgery in high-quality encoded video content.


2017 ◽  
Vol 13 (10) ◽  
pp. 6552-6557
Author(s):  
E.Wiselin Kiruba ◽  
Ramar K.

Amalgamation of compression and security is indispensable in the field of multimedia applications. A novel approach to enhance security with compression is discussed in this  research paper. In secure arithmetic coder (SAC), security is provided by input and output permutation methods and compression is done by interval splitting arithmetic coding. Permutation in SAC is susceptible to attacks. Encryption issues associated with SAC is dealt in this research method. The aim of this proposed method is to encrypt the data first by Table Substitution Box (T-box) and then to compress by Interval Splitting Arithmetic Coder (ISAC). This method incorporates dynamic T-box in order to provide better security. T-box is a method, constituting elements based on the random output of Pseudo Random Generator (PRNG), which gets the input from Secure Hash Algorithm-256 (SHA-256) message digest. The current scheme is created, based on the key, which is known to the encoder and decoder. Further, T-boxes are created by using the previous message digest as a key.  Existing interval splitting arithmetic coding of SAC is applied for compression of text data. Interval splitting finds a relative position to split the intervals and this in turn brings out compression. The result divulges that permutation replaced by T-box method provides enhanced security than SAC. Data is not revealed when permutation is replaced by T-box method. Security exploration reveals that the data remains secure to cipher text attacks, known plain text attacks and chosen plain text attacks. This approach results in increased security to Interval ISAC. Additionally the compression ratio  is compared by transferring the outcome of T-box  to traditional  arithmetic coding. The comparison proved that there is a minor reduction in compression ratio in ISAC than arithmetic coding. However the security provided by ISAC overcomes the issues of compression ratio in  arithmetic coding. 


2013 ◽  
Vol 22 (5-6) ◽  
pp. 387-404
Author(s):  
Guerchi Maher ◽  
Makram Zghibi

Abstract Our research focuses on describing what is really happening when a teacher wants to transmit to pupils - girls and boys - knowledge socially marked as masculine. To describe the processes involved in effective didactic interactions between a teacher a pupil and knowledge, we opted for qualitative methodology, consisting on a close observation of the didactic interactions of a teacher with his pupils (girls and boys). Analysis of the interviews focused especially on the nature of knowledge actually transmitted for girls and boys. The studied video sequences permitted to study the didactic interactions more precisely as are actually happening on the pitch. Both tools allowed us to identify the educational intentions of teachers (specialist or not); women or men in the teaching of football. The results show that teachers’ conceptions influence implicitly or explicitly the modalities of their interventions and the nature of football knowledge transmitted to pupils. This makes us think that the impact of social facts (backgrounds) on Tunisian teachers is great. This phenomenon may lock the physical education teacher in some representations modeling masculine and feminine stereotypes and affect his didactic and teaching contribution. Therefore, the teacher must be aware of the impact of the connotation that may have certain “masculine” practices on his interventions and consequently over the pupils learning (either boys or girls).


1993 ◽  
Author(s):  
Krystyna Ohnesorge ◽  
Peter Stucki ◽  
Hartwig Thomas

Sign in / Sign up

Export Citation Format

Share Document