Search Results - "Lagendijk, R. L."
-
1
Automated high-level movie segmentation for advanced video-retrieval systems
Published in IEEE transactions on circuits and systems for video technology (01-06-1999)“…We present a newly developed strategy for automatically segmenting movies into logical story units. A logical story unit can be understood as an approximation…”
Get full text
Journal Article -
2
Video segmentation by MAP labeling of watershed segments
Published in IEEE transactions on pattern analysis and machine intelligence (01-03-2001)“…This paper addresses the problem of spatio-temporal segmentation of video sequences. An initial intensity segmentation method (watershed segmentation) provides…”
Get full text
Journal Article -
3
Correction of intensity flicker in old film sequences
Published in IEEE transactions on circuits and systems for video technology (01-10-1999)“…Temporal intensity flicker is a common artifact in old film sequences. Removing disturbing temporal fluctuations in image intensities is desirable because it…”
Get full text
Journal Article -
4
Iterative methods for image deblurring
Published in Proceedings of the IEEE (01-05-1990)“…The authors discuss the use of iterative restoration algorithms for the removal of linear blurs from photographic images that may also be assumed to be…”
Get full text
Journal Article -
5
Perceptual tagging of video files in P2P networks
Published in 2010 IEEE International Conference on Image Processing (01-09-2010)“…Identification of a video file in current peer-to-peer (P2P) networks is achieved by its tag or by a (100-200 bits) cryptographic hash of the entire file…”
Get full text
Conference Proceeding -
6
Perceptual video hashing in P2P networks
Published in 2010 IEEE International Conference on Acoustics, Speech and Signal Processing (01-03-2010)“…Content identification in peer-to-peer (P2P) networks has until now been achieved by using metadata or cryptographic hashes. However, with increasing number of…”
Get full text
Conference Proceeding -
7
Advances in Digital Video Content Protection
Published in Proceedings of the IEEE (01-01-2005)“…The use of digital video offers immense opportunities for creators; however, the ability for anyone to make perfect copies and the ease by which those copies…”
Get full text
Journal Article -
8
Optimal differential energy watermarking of DCT encoded images and video
Published in IEEE transactions on image processing (01-01-2001)“…This paper proposes the differential energy watermarking (DEW) algorithm for JPEG/MPEG streams. The DEW algorithm embeds label bits by selectively discarding…”
Get full text
Journal Article -
9
Error Resilient Video Compression Using Behavior Models
Published in EURASIP journal on advances in signal processing (01-02-2004)“…Wireless and Internet video applications are inherently subjected to bit errors and packet errors, respectively. This is especially so if constraints on the…”
Get full text
Journal Article -
10
Distributed Content Based Video Identification in Peer-to-Peer Networks: Requirements and Solutions
Published in IEEE transactions on multimedia (01-03-2017)“…In this paper, we first discuss the essential requirements for a fingerprint (perceptual hash)-based distributed video identification system in peer-to-peer…”
Get full text
Journal Article -
11
Low-complexity rate-distortion optimal transcoding of MPEG I-frames
Published in Signal processing. Image communication (01-03-2000)“…The transcoding of MPEG video streams is important in a variety of situations such as in rate reduction for small bandwidth downstream channels and in…”
Get full text
Journal Article -
12
Music2Share - copyright-compliant music sharing in P2P systems
Published in Proceedings of the IEEE (01-06-2004)“…Peer-to-peer (P2P) networks are generally considered to be free havens for pirated content, in particular with respect to music. We describe a solution for the…”
Get full text
Journal Article -
13
Estimation of attacker's scale and noise variance for QIM-DC watermark embedding
Published in 2004 International Conference on Image Processing, 2004. ICIP '04 (2004)“…Quantization-based watermarking schemes are vulnerable to amplitude scaling. Therefore, the scaling factor needs to be estimated at the decoder side, such that…”
Get full text
Conference Proceeding -
14
Accurate overlaying for mobile augmented reality
Published in Computers & graphics (01-12-1999)“…Mobile augmented reality requires accurate alignment of virtual information with objects visible in the real world. We describe a system for mobile…”
Get full text
Journal Article -
15
A fragile watermark error detection scheme for wireless video communications
Published in IEEE transactions on multimedia (01-04-2005)“…In video communications over error-prone channels, compressed video streams are extremely sensitive to bit errors. Often random and burst bit errors impede…”
Get full text
Journal Article -
16
Real-time video delivery using peer-to-peer bartering networks and multiple description coding
Published in 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583) (2004)“…Broadband Internet access using ADSL or cable modems provides sufficient bandwidth for real-time video streaming. If television channels could be distributed…”
Get full text
Conference Proceeding -
17
Noise reduction of image sequences using motion compensation and signal decomposition
Published in IEEE transactions on image processing (01-03-1995)“…In this paper, a new spatio-temporal filtering method for removing noise from image sequences is proposed. This method combines the use of motion compensation…”
Get full text
Journal Article -
18
Noise reduction filters for dynamic image sequences: a review
Published in Proceedings of the IEEE (01-09-1995)“…In this paper, a thorough review is presented of noise reduction filters for digital image sequences. Detailed descriptions of several spatiotemporal and…”
Get full text
Journal Article -
19
Rate constrained multiresolution transmission of video
Published in IEEE transactions on circuits and systems for video technology (01-06-1995)“…Multiresolution transmission of compressed video is performed using subbands. Multistage quantization is necessary for efficient embedded video transmission on…”
Get full text
Journal Article -
20
Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing
Published in IEEE transactions on information forensics and security (01-06-2012)“…Recommender systems have become an important tool for personalization of online services. Generating recommendations in online services depends on…”
Get full text
Journal Article