In digital fingerprinting, preventing piracy of images by colluders is an important and tedious issue. Each image will be embedded with a unique User IDentification (UID) code that is the fingerprint for tracking th...In digital fingerprinting, preventing piracy of images by colluders is an important and tedious issue. Each image will be embedded with a unique User IDentification (UID) code that is the fingerprint for tracking the authorized user. The proposed hiding scheme makes use of a random number generator to scramble two copies of a UID, which will then be hidden in the randomly selected medium frequency coefficients of the host image. The linear support vector machine (SVM) will be used to train classifications by calculating the normalized correlation (NC) for the 2class UID codes. The trained classifications will be the models used for identifying unreadable UID codes. Experimental results showed that the success of predicting the unreadable UID codes can be increased by applying SVM. The proposed scheme can be used to provide protections to intellectual property rights of digital images aad to keep track of users to prevent collaborative piracies.展开更多
To improve the performance of video compression for machine vision analysis tasks,a video coding for machines(VCM)standard working group was established to promote standardization procedures.In this paper,recent advan...To improve the performance of video compression for machine vision analysis tasks,a video coding for machines(VCM)standard working group was established to promote standardization procedures.In this paper,recent advances in video coding for machine standards are presented and comprehensive introductions to the use cases,requirements,evaluation frameworks and corresponding metrics of the VCM standard are given.Then the existing methods are presented,introducing the existing proposals by category and the research progress of the latest VCM conference.Finally,we give conclusions.展开更多
The virtual machine of code mechanism (VMCM) as a new concept for code mechanical solidification and verification is proposed and can be applied in MEMS (micro-electromechanical systems) security device for high c...The virtual machine of code mechanism (VMCM) as a new concept for code mechanical solidification and verification is proposed and can be applied in MEMS (micro-electromechanical systems) security device for high consequence systems. Based on a study of the running condition of physical code mechanism, VMCM's configuration, ternary encoding method, running action and logic are derived. The cases of multi-level code mechanism are designed and verified with the VMCM method, showing that the presented method is effective.展开更多
Based on the driver surveillance video data and controller area network(CAN)data,the methods of studying commercial vehicles’driving behavior is relatively advanced.However,these methods have difficulty in covering p...Based on the driver surveillance video data and controller area network(CAN)data,the methods of studying commercial vehicles’driving behavior is relatively advanced.However,these methods have difficulty in covering private vehicles.Naturalistic driving studies have disadvantages of small sample size and high cost,one new driving behavior evaluation method using massive vehicle trajectory data is put forward.An automatic encoding machine is used to reduce the noise of raw data,and then driving dynamics and self-organizing mapping(SOM)classification are used to give thresholds or the judgement method of overspeed,rapid speed change,rapid turning and rapid lane changing.The proportion of different driving behaviors and typical dangerous driving behaviors is calculated,then the temporal and spatial distribution of drivers’driving behavior and the driving behavior characteristics on typical roads are analyzed.Driving behaviors on accident-prone road sections and normal road sections are compared.Results show that in Shenzhen,frequent lane changing and overspeed are the most common unsafe driving behaviors;16.1%drivers have relatively aggressive driving behavior;the proportion of dangerous driving behavior is higher outside the original economic special zone;dangerous driving behavior is highly correlated with traffic accident frequency.展开更多
文摘In digital fingerprinting, preventing piracy of images by colluders is an important and tedious issue. Each image will be embedded with a unique User IDentification (UID) code that is the fingerprint for tracking the authorized user. The proposed hiding scheme makes use of a random number generator to scramble two copies of a UID, which will then be hidden in the randomly selected medium frequency coefficients of the host image. The linear support vector machine (SVM) will be used to train classifications by calculating the normalized correlation (NC) for the 2class UID codes. The trained classifications will be the models used for identifying unreadable UID codes. Experimental results showed that the success of predicting the unreadable UID codes can be increased by applying SVM. The proposed scheme can be used to provide protections to intellectual property rights of digital images aad to keep track of users to prevent collaborative piracies.
基金supported by ZTE Industry-University-Institute Cooperation Funds.
文摘To improve the performance of video compression for machine vision analysis tasks,a video coding for machines(VCM)standard working group was established to promote standardization procedures.In this paper,recent advances in video coding for machine standards are presented and comprehensive introductions to the use cases,requirements,evaluation frameworks and corresponding metrics of the VCM standard are given.Then the existing methods are presented,introducing the existing proposals by category and the research progress of the latest VCM conference.Finally,we give conclusions.
基金Project supported by High-Technology Research and Develop-ment Program of China (Grant No .863 -2003AA404210)
文摘The virtual machine of code mechanism (VMCM) as a new concept for code mechanical solidification and verification is proposed and can be applied in MEMS (micro-electromechanical systems) security device for high consequence systems. Based on a study of the running condition of physical code mechanism, VMCM's configuration, ternary encoding method, running action and logic are derived. The cases of multi-level code mechanism are designed and verified with the VMCM method, showing that the presented method is effective.
基金The National Natural Science Foundation of China(No.71641005)the National Key Research and Development Program of China(No.2018YFB1601105)
文摘Based on the driver surveillance video data and controller area network(CAN)data,the methods of studying commercial vehicles’driving behavior is relatively advanced.However,these methods have difficulty in covering private vehicles.Naturalistic driving studies have disadvantages of small sample size and high cost,one new driving behavior evaluation method using massive vehicle trajectory data is put forward.An automatic encoding machine is used to reduce the noise of raw data,and then driving dynamics and self-organizing mapping(SOM)classification are used to give thresholds or the judgement method of overspeed,rapid speed change,rapid turning and rapid lane changing.The proportion of different driving behaviors and typical dangerous driving behaviors is calculated,then the temporal and spatial distribution of drivers’driving behavior and the driving behavior characteristics on typical roads are analyzed.Driving behaviors on accident-prone road sections and normal road sections are compared.Results show that in Shenzhen,frequent lane changing and overspeed are the most common unsafe driving behaviors;16.1%drivers have relatively aggressive driving behavior;the proportion of dangerous driving behavior is higher outside the original economic special zone;dangerous driving behavior is highly correlated with traffic accident frequency.