Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
The transmission of JPEG2000 images over wireless channels is examined using reorganization of the compressed images into error-resilient, product-coded streams. The product-code consists of Turbo-codes and Reed-Solomon codes which are optimized using an i ...
Institute of Electrical and Electronics Engineers2006
Video Coding with Superimposed Motion-Compensated Signals: Applications to H.264 and Beyond, a professional monograph, will capture recent advances in motion compensation for efficient video compression. This book investigates linearly combined motion comp ...
In this paper, we address the problem of scrambling regions of interest in a video sequence. We target applications such as video surveillance preserving privacy, anonymous video communications, or TV news safeguarding the anonymity of a source. We propose ...
This chapter discusses the problem of coding images using very redundant libraries of waveforms, also referred to as dictionaries. We start with a discussion of the shortcomings of classical approaches based on orthonormal bases. More specifically, we show ...
In this paper we introduce a low complexity and accurate technique for target image search and retrieval. This method, which oper- ates directly in the compressed JPEG domain, addresses two of the CBIR challenges stated by The Benchathlon Network regarding ...
This paper introduces a simple, fast, and efficient algorithm for image change detection in the compressed domain. The proposed technique operates directly on Discrete Cosine Transformed (DCT-ed) data which makes it suitable for processing compressed bitst ...
This paper describes a video surveillance system which is composed of three key components, smart cameras, a server, and clients, connected through IP-networks in wired or wireless configurations. The system has been designed so as to protect the privacy o ...
In many applications, the amount and resolution of digi- tal images have significantly increased over the past few years. For this reason, there is a growing interest for techniques allowing to efficiently browse and seek information inside such huge data ...
Compact or efficient representation for either images or image sequences is key operation to performing image and video processing tasks, such as compression, analysis, etc. The efficiency of an approximation is evaluated by the sparsity measure of the app ...
This paper presents a fingerprinting method based on equivalence classes. An equivalence class is composed of a reference image and all its variations (or replicas). For each reference image, a decision function is built. The latter determines if a given i ...