Papers by Jean-François Delaigle

Réduction du débit et de la complexité de décodage par l'analyse de scène pour la télé surveillance basée sur motion JPEG 2000
ABSTRACT - Dans ce papier, nous proposons un système de codage/transmission vidéo orienté objet u... more ABSTRACT - Dans ce papier, nous proposons un système de codage/transmission vidéo orienté objet utilisant le standard Motion JPEG 2000 [1] pour le stockage et la diffusion efficaces de vidéo surveillance sur les canaux bas débit. La méthode présente les mêmes avantages que les techniques actuelles de codage de régions d'intérêt tout en améliorant considérablement le rapport débit/qualité moyen de la vidéo transmise, lorsque les caméras sont statiques. Nous proposons ici de transmettre le flux vidéo en transmettant d'une part un flux Motion JPEG 2000 contenant une estimation du fond rafraîchie régulièrement et, d'autre part, un second flux Motion JPEG 2000 ne contenant que les objets mobiles de la scène. Cette méthode fournit une meilleure qualité de la vidéo décodée, qui se rapproche de celle obtenue avec un codeur MPEG-4, mais aussi une complexité réduite pour le client par rapport à un encodage Motion JPEG2000 standard, avec un surcoût de stockage négligeable. Les flux de surveillance stockés sur le serveur sont complètement conformes au standard Motion JPEG 2000.
<title>Integrated fingerprinting in secure digital cinema projection</title>
Proceedings of SPIE, Dec 7, 2001
<title>Intelligent video storage of visual evidences on site in fast deployment</title>
Proceedings of SPIE, Jul 15, 2004
ABSTRACT In this article we present a generic, flexible, scalable and robust approach for an inte... more ABSTRACT In this article we present a generic, flexible, scalable and robust approach for an intelligent real-time forensic visual system. The proposed implementation could be rapidly deployable and integrates minimum logistic support as it embeds low complexity devices (PCs and cameras) that communicate through wireless network. The goal of these advanced tools is to provide intelligent video storage of potential video evidences for fast intervention during deployment around a hazardous sector after a terrorism attack, a disaster, an air crash or before attempt of it. Advanced video analysis tools, such as segmentation and tracking are provided to support intelligent storage and annotation.
A generic flexible and robust approach for intelligent real-time video-surveillance systems
Proceedings of SPIE, May 18, 2004
In this article we present a generic, flexible and robust approach for an intelligent real-time v... more In this article we present a generic, flexible and robust approach for an intelligent real-time video-surveillance system. A previous version of the system was presented in [1]. The goal of these advanced tools is to provide help to operators by detecting events of interest in visual scenes and highlighting alarms and compute statistics. The proposed system is a multi-camera platform
Real-time high-level video understanding using data warehouse
Proceedings of SPIE, Feb 2, 2006
... level and mid-level semantic meta data (such a blob profile, spatio-temporal location), but .... more ... level and mid-level semantic meta data (such a blob profile, spatio-temporal location), but ... of attributes of an entity can be used to optimise data replication for real-time constraints ... element is detected in sensor A, following a lot of replication rules, data warehouse subscription is ...

Benoit Macq has made a number of original contributions to the design of algorithms for visual co... more Benoit Macq has made a number of original contributions to the design of algorithms for visual communications systems, and his work has inspired many researchers and made significant industrial impact. His contributions span a range of areas, including video analysis, multiresolution analysis, morpholological descriptions, and hardware implementations. He is best known for his pioneering work on image coding and watermarking based on human vision perceptual models as well as for innovative work on watermarking of 3-D meshes, and more recently, key contributions to the digital cinema initiative. Macq is the general coordinator of the SIMILAR (www.similar.cc) Network of Excellence dedicated to link the Signal Processing and Human Computer Interaction European research communities. SIMILAR has got a 6M€ grant. In this framework, Macq created the open interface scientific foundation and the "Journal on Multimodal User Interfaces" (see www.openinterface.org) which will be in the Springer Verlag portfolion from 2008. He is leading the open jpeg (www.openjpeg.org) initiative which is the reference software for the Digital Cinema compliance tests. He is also leading the EDCINE European project grouping all the leading companies in Digital Cinema (8M€ grant). Creation of 7 new companies from research in his laboratory (spin-off companies) Research by Macq and his team in the areas of image compression, image protection and image analysis has led to the creation of 7 (seven) spin-off companies, each of them being staffed with about 20 employees: Telemis (www.telemis.com) in the field of medical image communications Octalis (www.octalis.com) in the field of image security (for digital cinema) bought by www.newtec.be Alterface (www.alterface.com) for mixed reality in edutainment POLYMEDIS (www.polymedis.com) managing workflows in hospital ACIC in the field of videosurveillance (www.acic.eu) Smart-Wear in the field of network of sensors for motion analysis Intopix for JPEG-2000 solutions for the digital cinema (www.intopix.com) Macq's contributions are thus not limited to academic circles, he has been a catalyst and a driving force behind high-tech industry in the image processing area.

<title>Improving data hiding by using convolutional codes and soft-decision decoding</title>
Proceedings of SPIE, May 9, 2000
This paper presents an other way of considering watermarking methods, which are analyzed from the... more This paper presents an other way of considering watermarking methods, which are analyzed from the point of view of the Information Theory. Watermarking is thus a communication problem in which some information bits have to be transmitted through an additive noise channel subjected to distortions and attacks. Designing watermarking methods in such a way that this channel is Gaussian can be profitable. This paper shows to what extent error protection techniques extensively studied for digital communication through Gaussian channels can be used advantageously for watermarking. Convolutional codes combined with soft-decision decoding are the best example. Especially, when soft-decision Viterbi decoding is employed, this kind of coding schemes can achieve much better performance than BCH codes, at comparable levels of complexity and redundancy, both for still and moving images.

<title>Compensation of geometrical deformations for watermark extraction in digital cinema application</title>
Proceedings of SPIE, Aug 1, 2001
In this paper, we investigate the restoration of geometrically altered digital images with the ai... more In this paper, we investigate the restoration of geometrically altered digital images with the aim of recovering an embedded watermark information. More precisely, we focus on the distorsion taking place by the camera acquisition of an image. Indeed, in the cinema industry, a large part of early movie piracy comes from copies made in the theater itself with a camera. The evolution towards digital cinema broadcast enables watermark based fingerprinting protection systems. The first step for fingerprint extraction of a counterfeit material is the compensation of the geometrical deformation inherent to the acquisition process. In order to compensate the deformations, we use a modified 12-parameters bilinear transformation model which closely matches the deformations taking place by an analog acquisition process. The estimation of the parameters can either be global, either vary across regions within the image. Our approach consist in the estimation of the displacement of a number of of pixels via a modified block-matching technique followed by a minimum mean square error optimization of the parameters on basis of those estimated displacement-vectors. The estimated transformation is applied to the candidate image to get a reconstruction as close as possible to the original image. Classical watermark extraction procedure can follow.

Digital watermarking consists of hiding subliminal information into digital media content, also c... more Digital watermarking consists of hiding subliminal information into digital media content, also called host data. It can be the basis of many applications, including security and media asset management. In this paper, we focus on the imperceptibility requirement for image watermarking. We present the main features of the Human Visual System (HVS) to be translated into watermarking technology. This paper highlights the need for dedicated inputs from the human vision community. The human visual system (HVS) is very complex and able to deal with a huge amount of information. Roughly speaking, it is composed of a receiver with a pre-processing stage, the eye and the retina, a transmission channel, the optic nerve, and a processing engine, the visual cortex. Mainly because of our lack of knowledge about brain behavior, i.e. about the way a stimulus is processed through its huge neural network, the large effort to understand and model the HVS behavior has partly remained fruitless. The aim of this paper is not to provide a thorough description of the HVS. For complete HVS models and more specific details, the reader is referred to existing literature [7], [14], [42], [51]. Here, we only try to understand, in a synthetic way and from an engineering perspective, the HVS features on which the designer of a watermarking algorithm can rely, i.e. its sensitivity and masking capabilities.

Signal Processing, Jun 1, 2001
Most watermarking techniques rely on redundancy where signature bits are encoded in a su$ciently ... more Most watermarking techniques rely on redundancy where signature bits are encoded in a su$ciently large amount of sites for robustness against distortions and attacks while the watermark energy is kept low enough to remain imperceptible. The goal of this paper is to explore some strategies for exploiting this redundancy using error correcting codes. In some watermarking techniques bits are extracted via hard-decisions leading to a binary symmetric channel model while in others the extraction is carried out with soft-decisions leading to a additive Gaussian channel model. First, we consider error correcting codes for very high error rates of the watermarking channel where the trade-o!s of Bose}Chaudury}Hocquenheim (BCH) and repetition codes are investigated. We also present the performance and a fast implementation of soft-decoders. We give two potential realizations of soft-decoding, namely, Viterbi decoder for convolutional codes and a new algorithm for soft-BCH decoding.
A block based watermarking technique for MPEG2 signals: Optimization and validation on real digital TV distribution links
Lecture Notes in Computer Science, 1998
This paper presents a block based spatial watermarking method. The main interest of this method i... more This paper presents a block based spatial watermarking method. The main interest of this method is that it attempts to realize a good compromise between robustness performance, quality of the embedding and computational cost. This method is based on elementary perceptual ...

Robust image watermarking algorithms have been proposed among others as methods for discouraging ... more Robust image watermarking algorithms have been proposed among others as methods for discouraging illicit copying and distribution of copyright material. Having robustness to pixels modifications in mind, many watermarking designers use techniques coming from the communications domain such as spreading spectrum to embed hidden information, be it in the spatial or in the transform domain. Most of the attacks dedicated to make watermarking algorithms inefficient degrade images through geometric distortions. One solution to counter them is to add synchronization information. In this paper we present an analysis of this type of distortions and we propose a metric to estimate the distortion undergone by an image. This metric is content independent, invariant to global translation, rotation and scaling, which can be considered as non-meaningful transformations. To demonstrate the relevance of this metric, we compare some of its results with the subjective degradation of the image produced by the Stirmark software.

IET eBooks, Oct 6, 2011
Video security is becoming more and more important today. CCTV (closed circuit television), after... more Video security is becoming more and more important today. CCTV (closed circuit television), after broadcast television, is currently migrating from analogue to digital. At the same time, electronics have rapidly progressed in miniaturizing components and standardization initiatives have became popular in the IT world. Due to these innovations, it is now possible to deploy easily and rapidly CCTV in site for permanent or temporary uses. Examples of challenging surveillance applications are monitoring metro stations, detection of loitering or abandoned objects, etc. This chapter describes a practical implementation of a distributed surveillance system with emphasis on video transmission issues (acquisition, visualisation) and image processing necessary for useful event detection. The requirements for these systems are to be easy to use, robust and flexible. Our goals are to obtain efficiently implemented systems that can meet these strong industrial requirements. A computer cluster based approach with network connections is the innovative solution proposed. The main advantage of this approach is its flexibility. Since mobile objects are important in videosurveillance, these systems will include image analysis tools such as segmentation and object tracking. First we present the typical requirements of such a system besides the typical robustness of the analysis (e.g. low false alarm rate and low missed detection rate). We consider issues like the facility to deploy and administer network-connected real-time multicameras, with reusable modular and generic technologies. Then we analyze how to cope with the needs to integrate a solution with state-of-the-art technologies. As an answer we then propose a global system architecture and we describe its main features to explain each underlying module. To illustrate the applicability of the proposed system architecture in real case studies, we develop some scenarios of deployment for indoors or outdoors applications.

Digital watermarking of images
In this exercise, we will study the digital watermarking of images. The exercise is categorized i... more In this exercise, we will study the digital watermarking of images. The exercise is categorized in different sections where various basic watermarking techniques are introduced. A necessary prerequisite for this exercise is some basic course in digital image processing. After finishing the exercise, return by email your well-commented MATLAB functions and written report. In your report, you should describe what you have done, give answers to the predefined questions (1-8), and give some comments about the exercise. Answers to the questions can (and should) be deduced without any references. The written report should resemble more of an essay than just a discrete list of answers to the questions. Remember also to include your name(s), student number(s) and email address(es) to the report. It is recommended that the report is returned in pdf format. NOTE: All required functions (tasks 1-5) should be implemented using MATLAB as separate m-files. Input parameters for the functions are specified separately for each of the tasks, but in general, the required input images must be matrices, not names of the image files. Each of the functions must have one output parameter: the result of the current task.
Circular interpretation of bijective transformations in lossless watermarking for media asset management
IEEE Transactions on Multimedia, Mar 1, 2003
A seamless modular image analysis architecture for surveillance systems
WCAM: content-based coding and securing of motion JPEG 2000 and H.264 for wireless surveillance video transmission
2nd European Workshop on the Integration of Knowledge, Semantics and Digital Media Technology (EWIMT 2005), 2005
ABSTRACT This paper presents the integrated method of the 1ST WCAM project for content-based Moti... more ABSTRACT This paper presents the integrated method of the 1ST WCAM project for content-based Motion JPEG 20000 and H.264 video coding. The idea is to link statistical segmentation with the video coders so as to guarantee high visual quality for semantically relevant objects while meeting the wireless bandwidth constraints. In the case of Motion JPEG 2000 coding, the segmentation results are also used for selective encryption. WCAM&#39;s contributions to this challenging problem and ongoing work are presented with current results. Possible extensions are discussed.

IEE Symposium Intelligent Distributed Surveillance Systems, 2003
In this article we present a generic, flexible and robust approach for an intelligent real-time v... more In this article we present a generic, flexible and robust approach for an intelligent real-time videosurveillance system. The proposed system is a multi-camera platform that is able to handle different standards of video inputs (composite, IP, IEEE1394). The system implementation is distributed over a scalable computer cluster based on Linux and IP network. Data flows are transmitted between the different modules using multicast technology, video flows are compressed with the MPEG4 standard and the flow control is realized through a TCP-based command network (e.g. for bandwidth occupation control). The design of the architecture is optimized to display, compress, store and playback data and video flows in an efficient way. This platform also integrates advanced video analysis tools, such as motion detection, segmentation, tracking and neural networks modules. The goal of these advanced tools is to provide help to operators by detecting events of interest in visual scenes and store them with appropriate descriptions. This indexation process allows one to rapidly browse through huge amounts of stored surveillance data and play back only interesting sequences. We report here some preliminary results and we show the potential use of such a flexible system in third generation video surveillance system. We illustrate the interest of the system in a real case study, which is the surveillance of a reception desk.
User-centric retrieval of visual content

Real-Time Image Processing 2008, 2008
On board video analysis has attracted a lot of interest over the two last decades with as main go... more On board video analysis has attracted a lot of interest over the two last decades with as main goal to improve safety by detecting obstacles or assisting the driver. Our study aims at providing a real-time understanding of the urban road traffic. Considering a video camera fixed on the front of a public bus, we propose a cost-effective approach to estimate the speed of the vehicles on the adjacent lanes when the bus operates on a dedicated lane. We work on 1-D segments drawn in the image space, aligned with the road lanes. The relative speed of the vehicles is computed by detecting and tracking features along each of these segments. The absolute speed can be estimated from the relative speed if the camera speed is known, e.g. thanks to an odometer and/or GPS. Using pre-defined speed thresholds, the traffic can be classified into different categories such as 'fluid', 'congestion' etc. The solution offers both good performances and low computing complexity and is compatible with cheap video cameras, which allows its adoption by city traffic management authorities.
Uploads
Papers by Jean-François Delaigle