• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Song Chuanming, Tan Ru, Wang Xianghai, Liu Dan. Wavelet-Domain Motion Estimation with Initial Search Point Prediction Using Low Bit-Depth Pixels[J]. Journal of Computer Research and Development, 2013, 50(4): 776-786.
Citation: Song Chuanming, Tan Ru, Wang Xianghai, Liu Dan. Wavelet-Domain Motion Estimation with Initial Search Point Prediction Using Low Bit-Depth Pixels[J]. Journal of Computer Research and Development, 2013, 50(4): 776-786.

Wavelet-Domain Motion Estimation with Initial Search Point Prediction Using Low Bit-Depth Pixels

More Information
  • Published Date: April 14, 2013
  • This paper proposes a fast wavelet-domain motion estimation algorithm with initial search point prediction using pixels of two-bit depth. Firstly, we formalize the procedure of bit-depth transformation by two successive steps, namely interval partitioning and interval mapping. A non-uniform quantization method is employed to compute three coarse thresholds. Then they are refined by using a membership function so as to obtain a video representation whose pixels are two-bit depth. Secondly, we design a non-uniform search point pattern and subsequently put forward an initial search point prediction algorithm based on two-bit depth presentation. Finally, centered on the predicted initial search point, the modified low-band-shift-based scalable video motion estimation (MLBSSME) is accepted to search motion vectors in a size-reduced window. Experimental results illustrate that the proposed algorithm can always achieve high motion estimation precision for video sequences with various characteristics. Our algorithm separately gains 0.41 dB and 1.43 dB higher average peak signal-to-noise ratio (PSNR) than the low-band-shift and band-to-band motion estimations, but 0.07 dB lower than full search (FS) in spatial domain. Nevertheless, the computational complexity of our algorithm is about 4.66% of FS, 4.62% of the low-band-shift motion estimation, and 22.70% of the band-to- band motion estimation.
  • Related Articles

    [1]Wu Jian, Fu Yinjin, Fang Yanmei, Liu Yao, Fu Wei, Cao Xiaochun, Xiao Nong. A Review on Encrypted Data Deduplication Attacks and Countermeasures in Cloud Storage[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440379
    [2]Li Haobo, Li Mohan, Chen Peng, Sun Yanbin, Tian Zhihong. A Corruption-resistant Data Identification Technology Based on Dataset Honeypoint[J]. Journal of Computer Research and Development, 2024, 61(10): 2417-2432. DOI: 10.7544/issn1000-1239.202440496
    [3]Kuang Boyu, Li Yuze, Gu Fangming, Su Mang, Fu Anmin. Review of Internet of Vehicle Security Research: Threats, Countermeasures, and Future Prospects[J]. Journal of Computer Research and Development, 2023, 60(10): 2304-2321. DOI: 10.7544/issn1000-1239.202330464
    [4]Wang Chong, Wei Shuai, Zhang Fan, Song Ke. A Survey of Cache-Based Side Channel Countermeasure[J]. Journal of Computer Research and Development, 2021, 58(4): 794-810. DOI: 10.7544/issn1000-1239.2021.20200500
    [5]Ji Zhong, Nie Linhong. Texture Image Classification with Noise-Tolerant Local Binary Pattern[J]. Journal of Computer Research and Development, 2016, 53(5): 1128-1135. DOI: 10.7544/issn1000-1239.2016.20148320
    [6]Wang Yonggang, Yan Hanbing, Xu Junfeng, Hu Jianbin, Chen Zhong. Research on Countermeasures Against Tag Spam[J]. Journal of Computer Research and Development, 2013, 50(10): 2029-2043.
    [7]Yue Daheng, Qi Shubo, Li Shaoqing, and Zhang Minxuan. A DPA Resistant Technology Based on Register Switching Time Randomization[J]. Journal of Computer Research and Development, 2012, 49(3): 491-498.
    [8]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. Quantitative Evaluation of the Cryptographic Block’s Resistibility to Power Analysis Attack at Different Design Level[J]. Journal of Computer Research and Development, 2009, 46(6): 940-947.
    [9]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. A DPA and HO-DPA Resistant Implementation of AES[J]. Journal of Computer Research and Development, 2009, 46(3): 377-383.
    [10]Zhao Jia, Zeng Xiaoyang, Han Jun, Wang Jing, and Chen Jun. VLSI Implementation of an AES Algorithm Resistant to Differential Power Analysis Attack[J]. Journal of Computer Research and Development, 2007, 44(3).

Catalog

    Article views (656) PDF downloads (425) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return