Page 30 - untitled
P. 30

Multimedia  Processing and Application Labs (MP
 Multimedia  Processing and Application Labs (MPALs)ALs)
 Over the past few years, the Multimedia Tech-  D. Digital watermarking: The technique is   cient strategy. We propose an embedded block hash   in supporting this challenging research.  In the past
 nologies Group has achieved accomplishments on   useful for digital right management, where robust-  searching scheme at the decoder side to achieve mo-  year, we have developed a trajectory-based real-time
 addressing several key problems and exciting ap-  ness is a critical issue affecting the practicability   tion estimation for recovery of lost packets, while   event detection system.  The developed system is
 plications, and meanwhile displayed impressive   of the watermarking system. However, the major   maintaining format compliance and cryptographic   able to conduct on-line surveillance and the proto-
 teamwork for establishing itself as one of the lead-  disadvantage of known watermarking methods is   provable security.  type system is ready for use.  In the future, we shall
 ing teams in Taiwan. Our recent research efforts are   their limited resistance to extensive geometric at-  develop new algorithms which will result in better
                    B. Available Bandwidth Estimation and
 highlighted as follows.  tacks. We propose a new robust image watermark-  accuracy and efficiency.
               Wireless TCP: Available bandwidth is an important
 ing scheme that can withstand geometric distortions
 I. Multimedia Image and Video Processing  factor that can be used to adapt the sending rate to   B. Addressing Lighting for Vision Prob-
 and WEAs simultaneously. Extensive experimental
               network conditions, so that packet loss, caused by   lems: Handling lighting is one of the most chal-
 results obtained using the standard benchmark (i.e.,
 A. Video Retrieval: In content-based video
 Stirmark) and thorough comparisons with state   congestion, can be significantly reduced before error   lenging problems in computer vision. We proposed   Research Groups
 retrieval area, we have developed a video shot-based
 of the art technologies confirm the excellent per-  control mechanisms are employed. To this end, we   a method, generic intrinsic illumination subspace,
 fast video clip retrieval system.  We make use of the
 formance of our method in improving robustness.   propose a one-way delay jitter based scheme, ``Jit-  which can reduce lighting effects for objects of the
 statistics extracted at the shot level to execute fast
 To our knowledge, such thorough evaluations and   terPath,'' for available bandwidth estimation without   same class (eg. human face). This method learns a
 search.  The results of this work has been published
 comparisons have not been reported in the literature   relying on common assumptions, including uses of   low-dimension subspace of the general appearance
 by IEEE Transactions on Circuits and Systems for
 before. In addition, we have proposed an asymmet-  the fluid traffic model and bottleneck link capac-  space formed by images of all the lighting condi-
 Video Technology (May issue, 2006).  In addition to
 ric watermarking method, and demonstrated its se-  ity. Extensive simulations and Internet experiments   tions of pose-fixed objects of the same class. Then,
 the above work, we also calculate the trajectory of
                                                                                                                  Research Groups
 curity and robustness for some attacks. Based on the   have been conducted, and comparisons with other   this subspace is applied for lighting normalization.
 a moving object at the shot level, and then use the
 method, we have developed a number of application   methods have been made to verify the effectiveness   The result was published in one of the most impor-
 trajectory to perform fast video retrieval.  The devel-
 algorithms.   of our method. Our ongoing work is to distinguish   tant conferences in computer vision, ICCV 2005. In
 oped technique can be applied to general monitor-
               congestion loss based on wireless loss based on the   addition, we introduced a method that can do photo-
 ing systems.  The core technology developed by our
 E. Perceptual Hashing: Perceptual hashing or   relationship between available bandwidth and prob-  metric stereo under general lighting conditions with
 team has been transferred to the Advanced Technol-
 digital fingerprinting has been recognized as an al-  ing rate to develop a reliable wireless TCP.  only four images.
 ogy Center (ATC) of ITRI in Taiwan.  In the future,
 ternative approach for many applications previously
 we shall put our emphasis on the development of   C. Video codec:  Conventional video   C. Object Tracking: We proposed a method
 accomplished with watermarking. In fact, perceptual
 more accurate retrieval algorithms.  coding standards, such as MPEG-4 and H.264/  that uses object appearance information to assist
 hash is a compact representation of media data. The
               AVC usually perform motion estimation among      object tracking. Object tracking can be treated as a
 B. Representation and Retrieval of 3D   major disadvantage of the existing media hashing   state estimation problem of a dynamic system, and
 technologies is their limited resistance to geometric   successive frames so that the encoder is typically
 Graphical Models: We are proposing a visual   more complex than the decoder. However, this   particle filtering is a typical method for object track-

 attacks. We propose a novel geometric distortion-
 salience-guided mesh decomposition strategy.  Its   kind of architecture is not suitable for some emerg-  ing. However, when the state space dimensionality
 invariant image hashing scheme, which is capable
 main idea is based on a theory of part salience,   ing video coding applications that need resource-  is high, particle filtering usually results in drifting
 of achieving robustness against extensive geometric
 originated from cognitive psychology.  The theory   limited encoders (e.g. video sensor networks and   or local-minimum problem in tracking. Our method
 distortions (e.g., standard benchmarks, Stirmark3.1).
 asserts that the salience of a part is determined by   wireless mobile video communications). Based on   adds ‘attractors’ in the state space, and uses attrac-
 In addition, a sophisticated hash database for error-
 three factors: the boundary strength, the degree of   the Wyner-Ziv information theorem, distributed   tors to assist tracking. We derived a particle fi ltering
 resilient and fast matching is constructed. Our future
 protrusion, and the relative size of a part.  Since the   video coding systems (called Wyner-Ziv video co-  method that estimates the maximum a posteriori
 work is to study its security against forgery attack.
 above-mentioned factors are all conceptual, com-               (MAP) solution when the transition probability is
               dec) shift part of the computational burden from the
 putational processes for modeling these factors are            assumed to be a mixture distribution. The result was
 F. Texture synthesis: We study texture syn-  encoder to the decoder and result in a kind of video
 required.  We have thus developed a systematic way             published in one of the most important conferences
 thesize problems by analyzing the performance of   codec with low-complexity encoder and high-com-
 to conduct 3D mesh decomposition based on visual               in computer vision, CVPR 2005. We have applied
 the patchwork-based algorithm, which has been   plexity decoder. However, this new coding paradigm
 salience.  The paper describing our results of salient         this method to 3D hand tracking and lip-contour
 used in a wide variety of applications. Based on our   still cannot be applied to applications constrained
 component decomposition has been accepted by                   tracking.
 analysis, we extend the algorithm to multi-scale,   to need both low-complexity encoder and decoder
 IEEE Transactions on Multimedia (March 2006).
 multi-class and other applications.  (e.g. wireless mobile video communications). In
 In the future, we plan to apply this technique to ex-  view of this, we study a new media hash-based low-
 tracting significant components from a 3D mesh for   II.  Multimedia Networking, Coding, and   complexity Wyner-Ziv video codec, where motion-
 3D mesh retrieval.  Transmission
               compensated interpolation/extrapolation and feed-
 C. Video compression: We study several cod-  A. Error Resilient Video Encryption and   back channel are not required.
 ing techniques, such as codecs based on matching   Transmission: Media encryption technologies ac-
               III.  Computer Vision and Pattern Recognition
 pursuits, 3D wavelet transforms, and traditional   tively play the first line of defense in securing the
 hybrid motion compensation approaches. We also   access of multimedia data. Traditional cryptograph-  A. Real-time Event Detection and Analy-
 study multimedia transmission problems, such as   ic encryption can achieve provable security but is   sis: The aim of the project is to design effective
 transmitting in a packet loss environment. Our goal   unfortunately sensitive to a single bit error, which   algorithms to automatically detect, recognize, and
 is to improve current techniques, and produce a new   will cause an unreliable packet to be dropped to   analyze video objects and events.  In the past, we
 coding representation and techniques for the next   create packet loss. In order to achieve robust media   have developed a number of computer vision and
 generation of coders.  encryption, error resilience is considered an effi-  pattern recognition techniques that would be useful
 20                                                                                                               21
   25   26   27   28   29   30   31   32   33   34   35