Broadband Video Networking >
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Automatic Detection of Perceived Ringing Regions in Compressed Images
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 4, Number 5 (2011), pp. 491-516 © International Research Publication House http://www.irphouse.com Automatic Detection of Perceived Ringing Regions in Compressed Images D. Minola Davids Research Scholar, Singhania University, Rajasthan, India Abstract An efficient approach toward a no-reference ringing metric intrinsically exists of two steps: first detecting regions in an image where ringing might occur, and second quantifying the ringing annoyance in these regions. This paper presents a novel approach toward the first step: the automatic detection of regions visually impaired by ringing artifacts in compressed images. It is a no- reference approach, taking into account the specific physical structure of ringing artifacts combined with properties of the human visual system (HVS). To maintain low complexity for real-time applications, the proposed approach adopts a perceptually relevant edge detector to capture regions in the image susceptible to ringing, and a simple yet efficient model of visual masking to determine ringing visibility. Index Terms: Luminance masking, per-ceptual edge, ringing artifact, texture masking. Introduction In current visual communication systems, the most essential task is to fit a large amount of visual information into the narrow bandwidth of transmission channels or into a limited storage space, while maintaining the best possible perceived quality for the viewer. A variety of compression algorithms, for example, such as JPEG[1] and MPEG/H.26xhave been widely adopted in image and video coding trying to achieve high compression efficiency at high quality. These lossy compression techniques, however, inevitably result in various coding artifacts, which by now are known and classified as blockiness, ringing, blur, etc. -
Mixbus V4 1 — Last Update: 2017/12/19 Harrison Consoles
Mixbus v4 1 — Last update: 2017/12/19 Harrison Consoles Harrison Consoles Copyright Information 2017 No part of this publication may be copied, reproduced, transmitted, stored on a retrieval system, or translated into any language, in any form or by any means without the prior written consent of an authorized officer of Harrison Consoles, 1024 Firestone Parkway, La Vergne, TN 37086. Table of Contents Introduction ................................................................................................................................................ 5 About This Manual (online version and PDF download)........................................................................... 7 Features & Specifications.......................................................................................................................... 9 What’s Different About Mixbus? ............................................................................................................ 11 Operational Differences from Other DAWs ............................................................................................ 13 Installation ................................................................................................................................................ 16 Installation – Windows ......................................................................................................................... 17 Installation – OS X ............................................................................................................................... -
VLC User Guide
VLC user guide Henri Fallon Alexis de Lattre Johan Bilien Anil Daoud Mathieu Gautier Clément Stenac VLC user guide by Henri Fallon, Alexis de Lattre, Johan Bilien, Anil Daoud, Mathieu Gautier, and Clément Stenac Copyright © 2002-2004 the VideoLAN project This document is the complete user guide of VLC. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. The text of the license can be found in the appendix. GNU General Public License. Table of Contents 1. Introduction.........................................................................................................................................................................1 What is the VideoLAN project ?.....................................................................................................................................1 What is a codec ?............................................................................................................................................................3 How can I use VideoLAN ?............................................................................................................................................3 Command line usage.......................................................................................................................................................4 2. Modules and options for VLC...........................................................................................................................................8 -
Symantec Web Security Service Policy Guide
Web Security Service Policy Guide Version 6.10.4.1/OCT.12.2018 Symantec Web Security Service/Page 2 Policy Guide/Page 3 Copyrights Copyright © 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks or registered trademarks of Symantec Corp. or its affiliates in the U.S. and other coun- tries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. Symantec Corporation 350 Ellis Street Mountain View, CA 94043 www.symantec.com Policy Guide/Page 4 Symantec Web Security Service Policy Guide The Symantec Web Security Service solutions provide real-time protection against web-borne threats. As a cloud-based product, the Web Security Service leverages Symantec's proven security technology as well as the WebPulse™ cloud com- munity of over 75 million users. -
Analysis of Ringing Artifact in Image Fusion Using Directional Wavelet
Special Issue - 2021 International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 NTASU - 2020 Conference Proceedings Analysis of Ringing Artifact in Image Fusion Using Directional Wavelet Transforms y z x Ashish V. Vanmali Tushar Kataria , Samrudhha G. Kelkar , Vikram M. Gadre Dept. of Information Technology Dept. of Electrical Engineering Vidyavardhini’s C.O.E. & Tech. Indian Institute of Technology, Bombay Vasai, Mumbai, India – 401202 Powai, Mumbai, India – 400076 Abstract—In the field of multi-data analysis and fusion, image • Images taken from multiple sensors. Examples include fusion plays a vital role for many applications. With inventions near infrared (NIR) images, IR images, CT, MRI, PET, of new sensors, the demand of high quality image fusion fMRI etc. algorithms has seen tremendous growth. Wavelet based fusion is a popular choice for many image fusion algorithms, because of its We can broadly classify the image fusion techniques into four ability to decouple different features of information. However, categories: it suffers from ringing artifacts generated in the output. This 1) Component substitution based fusion algorithms [1]–[5] paper presents an analysis of ringing artifacts in application of 2) Optimization based fusion algorithms [6]–[10] image fusion using directional wavelets (curvelets, contourlets, non-subsampled contourlets etc.). We compare the performance 3) Multi-resolution (wavelets and others) based fusion algo- of various fusion rules for directional wavelets available in rithms [11]–[15] and literature. The experimental results suggest that the ringing 4) Neural network based fusion algorithms [16]–[19]. artifacts are present in all types of wavelets with the extent of Wavelet based multi-resolution analysis decouples data into artifact varying with type of the wavelet, fusion rule used and levels of decomposition. -
Symantec Web Security Service Policy Guide
Web Security Service Policy Guide Revision: NOV.07.2020 Symantec Web Security Service/Page 2 Policy Guide/Page 3 Copyrights Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. Copyright © 2020 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit www.broadcom.com. Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability, function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does not assume any liability arising out of the application or use of this information, nor the application or use of any product or circuit described herein, neither does it convey any license under its patent rights nor the rights of others. Policy Guide/Page 4 Symantec WSS Policy Guide The Symantec Web Security Service solutions provide real-time protection against web-borne threats. As a cloud-based product, the Web Security Service leverages Symantec's proven security technology, including the WebPulse™ cloud community. With extensive web application controls and detailed reporting features, IT administrators can use the Web Security Service to create and enforce granular policies that are applied to all covered users, including fixed locations and roaming users. If the WSS is the body, then the policy engine is the brain. While the WSS by default provides malware protection (blocks four categories: Phishing, Proxy Avoidance, Spyware Effects/Privacy Concerns, and Spyware/Malware Sources), the additional policy rules and options you create dictate exactly what content your employees can and cannot access—from global allows/denials to individual users at specific times from specific locations. -
Isma Internet Streaming Media Alliance
ISMA INTERNET STREAMING MEDIA ALLIANCE Output Document Number TD00105 November 2007 TITLE: ISMA Ultravox Part 2: Ultravox 3.0 Protocol Specification Status: Provisional Specification © 2007 ISMA12/14/2007ISMA Ultravox Part 2: Ultravox 3 Protocol Provisional Specification 1 Table of Contents Abstract...........................................................................................................................3 1 Ultravox Protocol.........................................................................................................4 1.1 Overview...............................................................................................................4 1.2 Ultravox Frames....................................................................................................4 1.3 Encrypted Messages (Payload for any classes 3-15)...............................................5 2 Ultravox Broadcaster Protocol......................................................................................6 2.1 POST Headers.......................................................................................................6 2.1.1 Required Headers............................................................................................7 2.1.2 Optional Arguments........................................................................................7 2.2 Response Codes.....................................................................................................7 2.3 Response Headers..................................................................................................8 -
2D Signal Processing (III): 2D Filtering
6.003 Signal Processing Week 11, Lecture A: 2D Signal Processing (III): 2D Filtering 6.003 Fall 2020 Filtering and Convolution Time domain: Frequency domain: 푋[푘푟, 푘푐] ∙ 퐻[푘푟, 푘푐] = 푌[푘푟, 푘푐] Today: More detailed look and further understanding about 2D filtering. 2D Low Pass Filtering Given the following image, what happens if we apply a filter that zeros out all the high frequencies in the image? Where did the ripples come from? 2D Low Pass Filtering The operation we did is equivalent to filtering: 푌 푘푟, 푘푐 = 푋 푘푟, 푘푐 ∙ 퐻퐿 푘푟, 푘푐 , where 2 2 1 푓 푘푟 + 푘푐 ≤ 25 퐻퐿 푘푟, 푘푐 = ቊ 0 표푡ℎ푒푟푤푠푒 2D Low Pass Filtering 2 2 1 푓 푘푟 + 푘푐 ≤ 25 Find the 2D unit-sample response of the 2D LPF. 퐻퐿 푘푟, 푘푐 = ቊ 0 표푡ℎ푒푟푤푠푒 퐻 푘 , 푘 퐿 푟 푐 ℎ퐿 푟, 푐 (Rec 8A): 푠푛 Ω 푛 ℎ 푛 = 푐 퐿 휋푛 Ω푐 Ω푐 The step changes in 퐻퐿 푘푟, 푘푐 generated overshoot: Gibb’s phenomenon. 2D Convolution Multiplying by the LPF is equivalent to circular convolution with its spatial-domain representation. ⊛ = 2D Low Pass Filtering Consider using the following filter, which is a circularly symmetric version of the Hann window. 2 2 1 1 푘푟 + 푘푐 2 2 + 푐표푠 휋 ∙ 푓 푘푟 + 푘푐 ≤ 25 퐻퐿2 푘푟, 푘푐 = 2 2 25 0 표푡ℎ푒푟푤푠푒 2 2 1 푓 푘푟 + 푘푐 ≤ 25 퐻퐿1 푘푟, 푘푐 = ቐ Now the ripples are gone. 0 표푡ℎ푒푟푤푠푒 But image more blurred when compare to the one with LPF1: With the same base-width, Hann window filter cut off more high freq. -
Metadefender Core V4.19.0
MetaDefender Core v4.19.0 © 2019 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 14 Key Features of MetaDefender Core 15 1. Quick Start with MetaDefender Core 16 1.1. Installation 16 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 22 1.3. Process Files with MetaDefender Core 22 2. Installing or Upgrading MetaDefender Core 23 2.1. Recommended System Configuration 23 Microsoft Windows Deployments 24 Unix Based Deployments 26 Data Retention 28 Custom Engines 28 Browser Requirements for the Metadefender Core Management Console 28 2.2. Installing MetaDefender 29 Installation 29 Installation notes 29 2.2.1. MetaDefender Core 4.18.0 or older 30 2.2.2. MetaDefender Core 4.19.0 or newer 33 2.3. Upgrading MetaDefender Core 38 Upgrading from MetaDefender Core 3.x to 4.x 38 Upgrading from MetaDefender Core older version to 4.18.0 (SQLite) 38 Upgrading from MetaDefender Core 4.18.0 or older (SQLite) to 4.19.0 or newer (PostgreSQL): 39 Upgrading from MetaDefender Core 4.19.0 to newer (PostgreSQL): 40 2.4. MetaDefender Core Licensing 41 2.4.1. Activating Metadefender Licenses 41 2.4.2. Checking Your Metadefender Core License 46 2.5. Performance and Load Estimation 47 What to know before reading the results: Some factors that affect performance 47 How test results are calculated 48 Test Reports 48 2.5.1. -
Archive and Compressed [Edit]
Archive and compressed [edit] Main article: List of archive formats • .?Q? – files compressed by the SQ program • 7z – 7-Zip compressed file • AAC – Advanced Audio Coding • ace – ACE compressed file • ALZ – ALZip compressed file • APK – Applications installable on Android • AT3 – Sony's UMD Data compression • .bke – BackupEarth.com Data compression • ARC • ARJ – ARJ compressed file • BA – Scifer Archive (.ba), Scifer External Archive Type • big – Special file compression format used by Electronic Arts for compressing the data for many of EA's games • BIK (.bik) – Bink Video file. A video compression system developed by RAD Game Tools • BKF (.bkf) – Microsoft backup created by NTBACKUP.EXE • bzip2 – (.bz2) • bld - Skyscraper Simulator Building • c4 – JEDMICS image files, a DOD system • cab – Microsoft Cabinet • cals – JEDMICS image files, a DOD system • cpt/sea – Compact Pro (Macintosh) • DAA – Closed-format, Windows-only compressed disk image • deb – Debian Linux install package • DMG – an Apple compressed/encrypted format • DDZ – a file which can only be used by the "daydreamer engine" created by "fever-dreamer", a program similar to RAGS, it's mainly used to make somewhat short games. • DPE – Package of AVE documents made with Aquafadas digital publishing tools. • EEA – An encrypted CAB, ostensibly for protecting email attachments • .egg – Alzip Egg Edition compressed file • EGT (.egt) – EGT Universal Document also used to create compressed cabinet files replaces .ecab • ECAB (.ECAB, .ezip) – EGT Compressed Folder used in advanced systems to compress entire system folders, replaced by EGT Universal Document • ESS (.ess) – EGT SmartSense File, detects files compressed using the EGT compression system. • GHO (.gho, .ghs) – Norton Ghost • gzip (.gz) – Compressed file • IPG (.ipg) – Format in which Apple Inc. -
Handout 04 Filtering in the Frequency Domain
Digital Image Processing (420137), SSE, Tongji University, Spring 2013, given by Lin ZHANG Handout 04 Filtering in the Frequency Domain 1. Basic Concepts (1) Any periodic functions, no matter how complex it is, can be represented as the sum of a series of sine and cosine functions with different frequencies. (2) The signal’s frequency components can be clearly observed in the frequency domain. (3) Fourier transform is invertible. That means after the Fourier transform and the inverse Fourier transform, no information will be lost. (4) Usually, the Fourier transform F(u) is a complex number, from which we can define its magnitude, power spectrum, and the phase angle. (5) The impulse function, or Dirac function, is widely used in theoretical analysis of linear systems. It can be considered as an infinitely high, infinitely thin spike at the origin, with total area one under the spike. (6) Dirac function has a sift property, defined as f ()tttdtft (00 ) ( ). (7) The basic theorem linking the spatial domain to the frequency domain is the convolution theorem, ft()*() ht F ( ) H ( ). (8) The Fourier transform of a Gaussian function is also of a Gaussian shape in the frequency domain. (9) For visualization purpose, we often use fftshift to shift the origin of an image’s Fourier transform to its center position. (10) The basic steps for frequency filtering comprise the following, (11) Edges and other sharp intensity transitions, such as noise, in an image contribute significantly to the high frequency content of its Fourier transform. (12) The drawback of the ideal low-pass filter is that the filtering result has obvious ringing artifacts. -
Video Compression Optimized for Racing Drones
Video compression optimized for racing drones Henrik Theolin Computer Science and Engineering, master's level 2018 Luleå University of Technology Department of Computer Science, Electrical and Space Engineering Video compression optimized for racing drones November 10, 2018 Preface To my wife and son always! Without you I'd never try to become smarter. Thanks to my supervisor Staffan Johansson at Neava for providing room, tools and the guidance needed to perform this thesis. To my examiner Rickard Nilsson for helping me focus on the task and reminding me of the time-limit to complete the report. i of ii Video compression optimized for racing drones November 10, 2018 Abstract This thesis is a report on the findings of different video coding tech- niques and their suitability for a low powered lightweight system mounted on a racing drone. Low latency, high consistency and a robust video stream is of the utmost importance. The literature consists of multiple comparisons and reports on the efficiency for the most commonly used video compression algorithms. These reports and findings are mainly not used on a low latency system but are testing in a laboratory environment with settings unusable for a real-time system. The literature that deals with low latency video streaming and network instability shows that only a limited set of each compression algorithms are available to ensure low complexity and no added delay to the coding process. The findings re- sulted in that AVC/H.264 was the most suited compression algorithm and more precise the x264 implementation was the most optimized to be able to perform well on the low powered system.