Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
No-reference temporal flickering identification method for video
LU Qianqian, CHEN Li, TIAN Jing, HUANG Xiaotong
Journal of Computer Applications    2015, 35 (2): 519-522.   DOI: 10.11772/j.issn.1001-9081.2015.02.0519
Abstract377)      PDF (794KB)(370)       Save

Temporal flickering in the video is a key factor of affecting the quality of video. Accurate identification of temporal flickering is required for the automatic analysis and diagnosis of video quality. Moreover, it can be integrated with artifact removal and quality enhancement algorithms to promote the adaptivity of the proposed algorithm. A study of temporal flickering in video surveillance was given to demonstrate that the differential signal of temporal flickering in time domain follows the Laplacian distribution. Motivated by this statistical observation and the idea of small probability events, the proposed method iteratively segmented differential signal of motion in foreground, which affected the identification of temporal flickering. Furthermore, the proposed approach exploited the Just-Noticeable Difference (JND) mechanism of the human visual system to identify the temporal flickering using the flickering frequency and amplitude. The proposed method yielded superior performance to that of the conventional Gaussian Mixture model to achieve more accurate classification of the normal video and temporal flickering video, as verified in the ROC (Receiver Operating Characteristic) curve presented in experimental results. The proposed no-reference algorithm is able to achieve fairly good performance in temporal flickering identification.

Reference | Related Articles | Metrics
Efficient plaintext gathering method for data protected by SSL/TLS protocol in network auditing
DONG Haitao, TIAN Jing, YANG Jun, YE Xiaozhou, SONG Lei
Journal of Computer Applications    2015, 35 (10): 2891-2895.   DOI: 10.11772/j.issn.1001-9081.2015.10.2891
Abstract354)      PDF (827KB)(428)       Save
In order to solve the problem of auditing the data protected by Secure Sockets Layer/Transport Layer Security (SSL/TLS) protocol on the Internet, a plaintext gathering method for network data protected by SSL/TLS protocol based on the principles of man-in-the-middle was proposed. A data gatherer was connected between the server and the client in series, which was able to get the encryption key by modifying handshake messages during SSL/TLS handshake, so as to decrypt the secure data and then gather its plaintext. Compared with the existing gathering method based on the principles of proxy server, the proposed method has a shorter transmission delay, a larger SSL throughput and a smaller memory occupation. Compared with the existing gathering method in which the gatherer possesses the server's private key, the proposed method has a wider application scope, and also has the advantage of being unaffected by packet losses on the Internet. The experimental results show that the proposed method has a decrease in transmission delay of about 27.5% and an increase in SSL throughput of about 10.4% compared with the method based on the principles of proxy server. The experimental results also show that the SSL throughput of the proposed method approaches the ideal maximum value.
Reference | Related Articles | Metrics