Methods for Investigation and Security of the Audio and Video Archive for Unique Bulgarian Bells - PowerPoint PPT Presentation

About This Presentation
Title:

Methods for Investigation and Security of the Audio and Video Archive for Unique Bulgarian Bells

Description:

Methods for Investigation and Security of ... of every bell, its present-day condition and reveal the future perspectives. Fast Fourier Analysis (FFTransform) ... – PowerPoint PPT presentation

Number of Views:132
Avg rating:3.0/5.0
Slides: 19
Provided by: Compu478
Category:

less

Transcript and Presenter's Notes

Title: Methods for Investigation and Security of the Audio and Video Archive for Unique Bulgarian Bells


1
Methods for Investigation and Security of the
Audio and Video Archive for Unique Bulgarian Bells
  • Galina Bogdanova, Institute of Mathematics and
    Informatics
  • Tihomir Trifonov, University of Veliko Tarnovo
  • Todor Todorov, Institute of Mathematics and
    Informatics
  • Tsvetanka Georgieva, University of Veliko Tarnovo

2
Introduction
  • The aim of our project is to study and identify
    several dozens of the most valuable bells in our
    churches, monasteries and museums as well as to
    develop an audio archive and video (with the help
    of advanced technologies) for analysis,
    preservation and protection of the data.

3
Introduction
  • Tasks
  • Spectrum and wavelet analysis, mathematical
    modeling of acoustics processes and sound wave
    spreading, localization and measuring of faults
    if such are found.
  • Development of audio and video archive with
    information collected by items, analysis,
    optimization and archiving, compression and
    protection of the database. Design and
    maintenance of the database and a web site for
    it.
  • Description and documentation of the cultural and
    historical value of the bells (historical data,
    information about their present state with
    digital photos, video clips, etc.). Advertising,
    Public Relations, translation, etc.

4
Spectrum and wavelet analysis
  • Analyzing and recording the frequency spectrum
    of the bells during a stroke and in main tone
    will provide possibilities to obtain the fine
    features of every bell, its present-day condition
    and reveal the future perspectives.

5
Fast Fourier Analysis (FFTransform)
  • Breaks down a signal into constituent sinusoids
    of different frequencies. Another way to think of
    Fourier analysis is as a mathematical technique
    for transforming our view of the signal from
    time-based into frequency-based one. As it is
    known, Fourier analysis has a serious drawback.
    During the transform to the frequency domain, the
    time information is lost. When looking at a
    Fourier transform of a signal, it is impossible
    to tell when a particular event took place.

6
Fast Fourier Analysis (FFTransform)
  • The power spectrum gives information about the
    frequency content, but doesnt localize these
    components in time domain. Thus, while the time
    domain function indicates how a signals
    amplitude change over time, the frequency domain
    function tells how often such changes take place.
    The bridge between time and frequency is the
    Fourier transform (FT).

7
Short-Time Fourier Transform (STFT )
  • Maps a signal into a two-dimensional function of
    time and frequency. The STFT represents a sort of
    compromise between the time- and frequency-based
    views of a signal. It provides some information
    about both when and at what frequencies a signal
    event occurs. However, we can only obtain this
    information with limited precision, and that
    precision is determined by the size of the window.

8
Short-Time Fourier Transform (STFT )
  • The STFT is a modification of the Fourier
    transform. Instead of processing the entire
    signal at once, the STFT takes the FT on a block
    by block basis. Therefore, the resulting FT
    presents a signal frequency behavior during the
    time period covered by the data block.

9
Wavelet analysis
  • Represents the next logical step a windowing
    technique with variable-sized regions. Wavelet
    analysis allows the use of long time intervals
    where we want more precise low-frequency
    information, and shorter regions where we want
    high-frequency information.

10
WEB-BASED APPLICATIONS
Multy layer architecture
First layer web-client (web-browser).
Second layer web-server, CGI scripts and APIs
for database connection .
Third layer database server.
11
DYNAMIC WEB TECHNOLOGIES
  • Client-side dynamic web technologies

ActiveX controls
Java applets
DHTML (Dynamic HTML)
  • Server-side dynamic web technologies

Common Gateway Interface (CGI)
PHP
Server-Side JavaScript (SSJS)
Active Server Pages (ASP)
Java Servlets ? JSP
12
  • Digital watermark
  • Special mark, imperceptibly embedded in an
    image, text or other signal in
  • order to control its use .
  • Embedding and retrieving one information from
    another is of basic
  • importance in steganography and is done by
    the stegosystems principles

INFORMATION PROTECTION WITH A DIGITAL WATERMARK
  • precursory coder structure for proper
    transforming of the secret
  • message in order to embed it in the signal
    container.
  • stegocoder structure for embedding the secret
    message in other data and
  • reading its specialities.
  • structure for watermark retrieving.
  • stegodetector structure for stegomessages
    presence determination.
  • decoder structure for secret message s
    restoring.

13
AUDIO WATERMARKING
  • Low-bit coding
  • Simplest way to embed data into other data
    structures. By replacing the
  • least significant bit of each sampling point
    by a coded binary string, we
  • can encode a large amount of data in an audio
    signal.
  • The major disadvantage of this method is its
    poor immunity to
  • manipulation. Encoded information can be
    destroyed by channel noise,
  • resampling etc.
  • Could be improved by error-correcting codes.

14
AUDIO WATERMARKING
  • Echo data hiding
  • Echo data hiding embeds data into a host audio
    signal by introducing an
  • echo. The data are hidden by varying three
    parameters of the echo initial
  • amplitude, decay rate, and offset.
  • The coder uses two delay times, one to
    represent a binary one (offset)
  • and another to represent a binary zero (offset
    delta). Both delay times
  • are below the threshold at which the human ear
    can resolve the echo.

15
AUDIO WATERMARKING
Echo data hiding
The delay (db) between the original signal and
the echo is dependent on which kernel or system
function we use. The one kernel is created with
a delay of (d1) seconds while the zero kernel
has a (d0) second delay.
16
AUDIO WATERMARKING
Echo data hiding - decoding
  • Perform calculation autocorrelation of the
    cepstrum.
  • This transformatoin produces two defined spikes.
    Time delay between
  • the spike and the original signal determines
    the decoding decision.

17
AUDIO WATERMARKING
Phase coding
  • Substituting the phase of an initial audio
    segment with a reference
  • phase that represents the data.
  • The phase of subsequent segments is adjusted in
    order to preserve the
  • relative phase between segments.

18
AUDIO WATERMARKING
Phase coding
19
AUDIO WATERMARKING
  • Phase coding decoding
  • Initial synchronization needed.
  • The value of the underlying phase of the first
    segment is detected as a 0
  • or 1,which represents the coded binary string.

20
Methods for data analyzing
  • The data warehouse has enormous value by
    arranging operational data into meaningful
    information. They are designed for online
    analytical processing (OLAP).
  • The data liable to OLAP is organized in
    multidimensional cubes.
  • The data cubes store preprocessed summaries of
    the data.
  • The data cubes creation and usage eliminates the
    need of joining the tables and preprocessing the
    values returned from the most frequently
    performed queries.
  • One of the basic advantages of the OLAP mining is
    the usage of data extracted from data warehouses.
    The data is loaded into data warehouse after it
    is previously integrated, consolidated, cleaned,
    and transformed.

21
Methods for data analyzing
  • Multimedia data mining
  • deals with the extraction of implicit knowledge,
    multimedia data relationships, or other patterns
    not explicitly stored in multimedia databases
  • includes mining of data containing text, images,
    audio and video information
  • aims multidimensional analyzing the multimedia
    data to find patterns characteristic of them,
    rules, hidden relationships and dependencies
    between the different attributes in database from
    multimedia objects.
  • The construction of multimedia data cubes
    facilitates multiple dimensional analysis of
    multimedia data, and the mining of multiple kinds
    of knowledge, including summarization,
    classification, and association, in image and
    video databases. 1

1 O. Zaïane, J. Han, Z. Li J. Hou. Mining
Multimedia Data, In Proceedings of the CASCON98
Meeting of Minds, 1998
Write a Comment
User Comments (0)
About PowerShow.com