Page 29 - untitled
P. 29

Multimedia  Processing and Application Labs (MP
                 Multimedia  Processing and Application Labs (MPALs)ALs)
                     Over the past few years, the Multimedia Tech-    D. Digital watermarking: The technique is                         cient strategy. We propose an embedded block hash   in supporting this challenging research.  In the past
                 nologies Group has achieved accomplishments on   useful for digital right management, where robust-                    searching scheme at the decoder side to achieve mo-  year, we have developed a trajectory-based real-time
                 addressing several key problems and exciting ap-  ness is a critical issue affecting the practicability                tion estimation for recovery of lost packets, while   event detection system.  The developed system is
                 plications, and meanwhile displayed impressive   of the watermarking system. However, the major                        maintaining format compliance and cryptographic   able to conduct on-line surveillance and the proto-
                 teamwork for establishing itself as one of the lead-  disadvantage of known watermarking methods is                    provable security.                               type system is ready for use.  In the future, we shall
                 ing teams in Taiwan. Our recent research efforts are   their limited resistance to extensive geometric at-                                                              develop new algorithms which will result in better
                                                                                                                                            B. Available Bandwidth Estimation and
                 highlighted as follows.                          tacks. We propose a new robust image watermark-                                                                        accuracy and efficiency.
                                                                                                                                        Wireless TCP: Available bandwidth is an important
                                                                  ing scheme that can withstand geometric distortions
                 I. Multimedia Image and Video Processing                                                                               factor that can be used to adapt the sending rate to   B. Addressing Lighting for Vision Prob-
                                                                  and WEAs simultaneously. Extensive experimental
                                                                                                                                        network conditions, so that packet loss, caused by   lems: Handling lighting is one of the most chal-
                                                                  results obtained using the standard benchmark (i.e.,
                     A. Video Retrieval: In content-based video
                                                                  Stirmark) and thorough comparisons with state                         congestion, can be significantly reduced before error   lenging problems in computer vision. We proposed   Research Groups
                 retrieval area, we have developed a video shot-based
                                                                  of the art technologies confirm the excellent per-                    control mechanisms are employed. To this end, we   a method, generic intrinsic illumination subspace,
                 fast video clip retrieval system.  We make use of the
                                                                  formance of our method in improving robustness.                       propose a one-way delay jitter based scheme, ``Jit-  which can reduce lighting effects for objects of the
                 statistics extracted at the shot level to execute fast
                                                                  To our knowledge, such thorough evaluations and                       terPath,'' for available bandwidth estimation without   same class (eg. human face). This method learns a
                 search.  The results of this work has been published
                                                                  comparisons have not been reported in the literature                  relying on common assumptions, including uses of   low-dimension subspace of the general appearance
                 by IEEE Transactions on Circuits and Systems for
                                                                  before. In addition, we have proposed an asymmet-                     the fluid traffic model and bottleneck link capac-  space formed by images of all the lighting condi-
                 Video Technology (May issue, 2006).  In addition to
                                                                  ric watermarking method, and demonstrated its se-                     ity. Extensive simulations and Internet experiments   tions of pose-fixed objects of the same class. Then,
                 the above work, we also calculate the trajectory of
                                                                                                                                                                                                                                           Research Groups
                                                                  curity and robustness for some attacks. Based on the                  have been conducted, and comparisons with other   this subspace is applied for lighting normalization.
                 a moving object at the shot level, and then use the
                                                                  method, we have developed a number of application                     methods have been made to verify the effectiveness   The result was published in one of the most impor-
                 trajectory to perform fast video retrieval.  The devel-
                                                                  algorithms.                                                           of our method. Our ongoing work is to distinguish   tant conferences in computer vision, ICCV 2005. In
                 oped technique can be applied to general monitor-
                                                                                                                                        congestion loss based on wireless loss based on the   addition, we introduced a method that can do photo-
                 ing systems.  The core technology developed by our
                                                                      E. Perceptual Hashing: Perceptual hashing or                      relationship between available bandwidth and prob-  metric stereo under general lighting conditions with
                 team has been transferred to the Advanced Technol-
                                                                  digital fingerprinting has been recognized as an al-                  ing rate to develop a reliable wireless TCP.     only four images.
                 ogy Center (ATC) of ITRI in Taiwan.  In the future,
                                                                  ternative approach for many applications previously
                 we shall put our emphasis on the development of                                                                            C. Video codec:  Conventional video              C. Object Tracking: We proposed a method
                                                                  accomplished with watermarking. In fact, perceptual
                 more accurate retrieval algorithms.                                                                                    coding standards, such as MPEG-4 and H.264/      that uses object appearance information to assist
                                                                  hash is a compact representation of media data. The
                                                                                                                                        AVC usually perform motion estimation among      object tracking. Object tracking can be treated as a
                     B. Representation and Retrieval of 3D        major disadvantage of the existing media hashing                                                                       state estimation problem of a dynamic system, and
                                                                  technologies is their limited resistance to geometric                 successive frames so that the encoder is typically
                 Graphical Models: We are proposing a visual                                                                            more complex than the decoder. However, this     particle filtering is a typical method for object track-

                                                                  attacks. We propose a novel geometric distortion-
                 salience-guided mesh decomposition strategy.  Its                                                                      kind of architecture is not suitable for some emerg-  ing. However, when the state space dimensionality
                                                                  invariant image hashing scheme, which is capable
                 main idea is based on a theory of part salience,                                                                       ing video coding applications that need resource-  is high, particle filtering usually results in drifting
                                                                  of achieving robustness against extensive geometric
                 originated from cognitive psychology.  The theory                                                                      limited encoders (e.g. video sensor networks and   or local-minimum problem in tracking. Our method
                                                                  distortions (e.g., standard benchmarks, Stirmark3.1).
                 asserts that the salience of a part is determined by                                                                   wireless mobile video communications). Based on   adds ‘attractors’ in the state space, and uses attrac-
                                                                  In addition, a sophisticated hash database for error-
                 three factors: the boundary strength, the degree of                                                                    the Wyner-Ziv information theorem, distributed   tors to assist tracking. We derived a particle fi ltering
                                                                  resilient and fast matching is constructed. Our future
                 protrusion, and the relative size of a part.  Since the                                                                video coding systems (called Wyner-Ziv video co-  method that estimates the maximum a posteriori
                                                                  work is to study its security against forgery attack.
                 above-mentioned factors are all conceptual, com-                                                                                                                        (MAP) solution when the transition probability is
                                                                                                                                        dec) shift part of the computational burden from the
                 putational processes for modeling these factors are                                                                                                                     assumed to be a mixture distribution. The result was
                                                                      F. Texture synthesis: We study texture syn-                       encoder to the decoder and result in a kind of video
                 required.  We have thus developed a systematic way                                                                                                                      published in one of the most important conferences
                                                                  thesize problems by analyzing the performance of                      codec with low-complexity encoder and high-com-
                 to conduct 3D mesh decomposition based on visual                                                                                                                        in computer vision, CVPR 2005. We have applied
                                                                  the patchwork-based algorithm, which has been                         plexity decoder. However, this new coding paradigm
                 salience.  The paper describing our results of salient                                                                                                                  this method to 3D hand tracking and lip-contour
                                                                  used in a wide variety of applications. Based on our                  still cannot be applied to applications constrained
                 component decomposition has been accepted by                                                                                                                            tracking.
                                                                  analysis, we extend the algorithm to multi-scale,                     to need both low-complexity encoder and decoder
                 IEEE Transactions on Multimedia (March 2006).
                                                                  multi-class and other applications.                                   (e.g. wireless mobile video communications). In
                 In the future, we plan to apply this technique to ex-                                                                  view of this, we study a new media hash-based low-
                 tracting significant components from a 3D mesh for   II.  Multimedia Networking, Coding, and                           complexity Wyner-Ziv video codec, where motion-
                 3D mesh retrieval.                                 Transmission
                                                                                                                                        compensated interpolation/extrapolation and feed-
                     C. Video compression: We study several cod-      A. Error Resilient Video Encryption and                           back channel are not required.
                 ing techniques, such as codecs based on matching   Transmission: Media encryption technologies ac-
                                                                                                                                        III.  Computer Vision and Pattern Recognition
                 pursuits, 3D wavelet transforms, and traditional   tively play the first line of defense in securing the
                 hybrid motion compensation approaches. We also   access of multimedia data. Traditional cryptograph-                       A. Real-time Event Detection and Analy-
                 study multimedia transmission problems, such as   ic encryption can achieve provable security but is                   sis: The aim of the project is to design effective
                 transmitting in a packet loss environment. Our goal   unfortunately sensitive to a single bit error, which             algorithms to automatically detect, recognize, and
                 is to improve current techniques, and produce a new   will cause an unreliable packet to be dropped to                 analyze video objects and events.  In the past, we
                 coding representation and techniques for the next   create packet loss. In order to achieve robust media               have developed a number of computer vision and
                 generation of coders.                            encryption, error resilience is considered an effi-                   pattern recognition techniques that would be useful
        20                                                                                                                                                                                                                                21
   24   25   26   27   28   29   30   31   32   33   34