Reverse Seam Carving 2011 Sixth International conference on Image and Graphics Gang Pan, Weishu Li, Wei Bai, Jinyan Chen, and Luyuan Li Speaker: Hon-Hang.

Slides:



Advertisements
Similar presentations
Adaptive Image and Video Retargeting Technique Based on Fourier Analysis Jun-Seong Kim, Jin-Hwan Kim, and Chang-Su Kim School of Electrical Engineering,
Advertisements

Improved Seam Carving for Video Retargeting Authors: Michael Rubinstein, Ariel Shamir and Shai Avidan Source: ACM Transactions on Graphics (TOG), Volume.
多媒體網路安全實驗室 Source:International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH- MSP),2010 Sixth. Authors:Hsiang-Cheh.
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
 Introduction  Principles of context – aware saliency  Detection of context – aware saliency  Result  Application  Conclusion.
Video Coding with Spatio-temporal Texture Synthesis and Edge-based inpainting Chunbo Zhu, Xiaoyan Sun, Feng Wu, and Houqiang Li ICME 2008.
資訊碩一 蔡勇儀 Date : 603.  Introduction  Basic Theory  Application & Implementation ◦ Aspect Ratio Change ◦ Retargeting with Optimal.
Reversible Image Watermarking Using Interpolation Technique Source: IEEE Transcation on Information Forensics and Security, Vol. 5, No. 1, March 2010 Authors:
Reconstructing shredded documents through feature matching Authors: Edson Justino, Luiz S. Oliveira, Cinthia Freitas Source: Forensic Science International.
Kshitij Padalkar 13 th Oct Contents: In one Line… Need Solutions and Other Work Definition and Maths Energy, Seam Pixel Removal Criteria Other Energy.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
MPEG4 Fine Grained Scalable Multi-Resolution Layered Video Encoding Authors from: University of Georgia Speaker: Chang-Kuan Lin.
Improved Census Transforms for Resource-Optimized Stereo Vision
SPIHT algorithm combined with Huffman encoding Wei Li, Zhen Peng Pang, Zhi Jie Liu, 2010 Third International Symposium on Intelligent Information Technology.
多媒體網路安全實驗室 Source: IEICE Trans. Fundamentals, Vol. E90-A, No. 4, April 2007, pp Authors:Hong Lin Jin, Masaaki Fujiyoshi, Hitoshi Kiya Speaker:Cheng.
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
Content-Aware Image Resizing Jack Breese Computer Systems Quarter 1, Pd. 7.
A Fast Video Noise Reduction Method by Using Object-Based Temporal Filtering Thou-Ho (Chao-Ho) Chen, Zhi-Hong Lin, Chin-Hsing Chen and Cheng-Liang Kao.
Efficient Huffman Decoding Aggarwal, M. and Narayan, A., International Conference on Image Processing, vol. 1, pp. 936 – 939, 2000 Presenter :Yu-Cheng.
出處: 2004 IEEE International Conference on Multimedia and Expo 作者: Chuan-Yu Chan A Contextual-based Hopfield Neural Network for Medical Image Edge Detection.
Watermarking Scheme Capable of Resisting Sensitivity Attack
Author: Chun-Liang Tung, Tung-Shou Chen and Yung-Chang Chiang
Der-Chyuan Lou and Jiang-Lung Liu,
Source: Multimed Tools Appl (2017) 76:1875–1899
Image camouflage by reversible image transformation
Picode: A New Picture-Embedding 2D Barcode
Reversible Data Hiding in JPEG Images using Ordered Embedding
Small target detection combining regional stability
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Wavelet in POCS for image segment
Source: Mobile Information Systems, vol. 2017, 2017.
Centrality Bias Measure for High Density QR Code Module Recognition
Mean value based reversible data hiding in encrypted images
Small target detection combining regional stability
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Source: Pattern Recognition Vol. 38, May, 2005, pp
Reduction of blocking artifacts in DCT-coded images
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Source: Signal Processing, Vol. 125, pp , August 2016.
Inverse Functions Inverse Functions.
Source : Journal of Visual Communication and Image Representation, vol
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Data hiding method using image interpolation
Source : Journal of Visual Communication and Image Representation, vol
Partial reversible data hiding scheme using (7, 4) hamming code
A new chaotic algorithm for image encryption
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Data hiding method using image interpolation
Mean quantization based image watermarking
New Framework for Reversible Data Hiding in Encrypted Domain
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
An Algorithm for Removable Visible Watermarking
Blind Reversible Authentication Based on PEE and CS Reconstruction
Source: IEEE Transactions on Circuits and Systems,
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
Hidden Digital Watermarks in Images
Pairwise IPVO-Based Reversible Data Hiding
Sourse: Information Sciences, Vol. 494, pp , August 2019
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Dynamic improved pixel value ordering reversible data hiding
Source : Digital Signal Processing. Vol. 73, pp , Feb
Improvements of Image Sharing with Steganography and Authentication
An Efficient Spatial Prediction-Based Image Compression Scheme
Lossless Data Hiding in the Spatial Domain for High Quality Images
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
Source: Circuits and Systems for Video Technology,
Rich QR Codes With Three-Layer Information Using Hamming Code
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

Reverse Seam Carving 2011 Sixth International conference on Image and Graphics Gang Pan, Weishu Li, Wei Bai, Jinyan Chen, and Luyuan Li Speaker: Hon-Hang Chang (Sica) Date: 2012. 02. 17

Outline Introduction Related Works Proposed Method Experimental Results Conclusions

Introduction (b) (a) Target Size (c) Remove Seams (e) (d) Insert Seams

= 10 Related Works Gy Gx Image I Edge I’ + B3,2 × 5 3 9 4 7 1 6 2 10 8 12 10 11 8 1 Block B3,2 Edge I’ + 4 5 3 1 6 2 8 -1 -2 × = 10 Gy Gx B3,2

Related Works (Cont.) Edge I’ 7 6 4 5 3 2 8 8 4 9 13 15 13 11 18 19 21 12 10 11 8 1 17 15 21 21 22 22 20 21 25 24 Energy Map 7 6 6 4 5 3 8 2 8 8 4 9 13 15 13 Edge I’ 11 11 18 19 21 21 17 15 15 21 21 22 22 20 20 21 25 24 Choose the Minimum Coefficient Energy Map

Related Works (Cont.) M. Rubinstein, A. Shamir, and S. Avidan, “Improved seam carving for video retargeting,” ACM Trans. Graph., vol. 27, pp. 16:1–16:9, August 2008.

Proposed method Straight Term Inverse Term Proposed Energy Function Inverse Map Straight Map Proposed method Proposed Energy Function Straight Term Inverse Term

Proposed Method (Cont.) Visual Point Structure Image I C

Proposed Method (Cont.) Visual Point Structure (Cont.) Case 1: Case 2: Case 3:

Proposed Method (Cont.) Visual Point Structure (Cont.)

Experimental Results Seam Carving Original Proposed Method Original Width Reduce Seam Carving Proposed Method Fig. 4 Resizing performance comparison.

Experimental Results(Cont.) Proposed Method Seam Carving Original

Experimental Results(Cont.) Proposed Method Seam Carving Original

Conclusions This paper present an improved energy function to make the seam insert and remove process more reversible. To large scale cases, the insertion process cannot satisfy the quality as well as the removal process.