1 / 18

Methods for Investigation and Security of the Audio and Video Archive for Unique Bulgarian Bells

Methods for Investigation and Security of the Audio and Video Archive for Unique Bulgarian Bells. Galina Bogdanova, Institute of Mathematics and Informatics Tihomir Trifonov, University of Veliko Tarnovo Todor Todorov, Institute of Mathematics and Informatics

olague
Download Presentation

Methods for Investigation and Security of the Audio and Video Archive for Unique Bulgarian Bells

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Methods for Investigation and Security of the Audio and Video Archive for Unique Bulgarian Bells Galina Bogdanova, Institute of Mathematics and Informatics Tihomir Trifonov,University of Veliko Tarnovo Todor Todorov, Institute of Mathematics and Informatics Tsvetanka Georgieva, University of Veliko Tarnovo

  2. Introduction The aim of our project is to study and identify several dozens of the most valuable bells in our churches, monasteries and museums as well as to develop an audio archive and video (with the help of advanced technologies) for analysis, preservation and protection of the data.

  3. Introduction Tasks: • Spectrum and wavelet analysis, mathematical modeling of acoustics processes and sound wave spreading, localization and measuring of faults if such are found. • Development of audio and video archive with information collected by items, analysis, optimization and archiving, compression and protection of the database. Design and maintenance of the database and a web site for it. • Description and documentation of the cultural and historical value of the bells (historical data, information about their present state with digital photos, video clips, etc.). Advertising, Public Relations, translation, etc.

  4. Spectrum and wavelet analysis Analyzing and recording the frequency spectrum of the bells during a stroke and in main tone will provide possibilities to obtain the fine features of every bell, its present-day condition and reveal the future perspectives.

  5. Fast Fourier Analysis (FFTransform) Breaks down a signal into constituent sinusoids of different frequencies. Another way to think of Fourier analysis is as a mathematical technique for transforming our view of the signal from time-based into frequency-based one. As it is known, Fourier analysis has a serious drawback. During the transform to the frequency domain, the time information is lost. When looking at a Fourier transform of a signal, it is impossible to tell when a particular event took place.

  6. Fast Fourier Analysis (FFTransform) The power spectrum gives information about the frequency content, but doesn’t localize these components in time domain. Thus, while the time domain function indicates how a signal’s amplitude change over time, the frequency domain function tells how often such changes take place. The bridge between time and frequency is the Fourier transform (FT).

  7. Short-Time Fourier Transform (STFT) Maps a signal into a two-dimensional function of time and frequency. The STFT represents a sort of compromise between the time- and frequency-based views of a signal. It provides some information about both when and at what frequencies a signal event occurs. However, we can only obtain this information with limited precision, and that precision is determined by the size of the window.

  8. Short-Time Fourier Transform (STFT) The STFT is a modification of the Fourier transform. Instead of processing the entire signal at once, the STFT takes the FT on a block by block basis. Therefore, the resulting FT presents a signal frequency behavior during the time period covered by the data block.

  9. Wavelet analysis Represents the next logical step: a windowing technique with variable-sized regions. Wavelet analysis allows the use of long time intervals where we want more precise low-frequency information, and shorter regions where we want high-frequency information.

  10. WEB-BASED APPLICATIONS Multy layer architecture: First layer: web-client (web-browser). Second layer: web-server, CGI scriptsand API’s for database connection . Third layer: database server.

  11. DYNAMIC WEB TECHNOLOGIES • Client-side dynamic web technologies: ActiveX controls Java applets DHTML (Dynamic HTML) • Server-side dynamic web technologies: Common Gateway Interface (CGI) PHP Server-Side JavaScript (SSJS) Active Server Pages (ASP) Java Servlets и JSP

  12. Digital watermark • Special mark, imperceptibly embedded in an image, text or other signal in order to control its use. • Embedding and retrieving one information from another is of basic importance in steganography and is done by the stegosystem’s principles INFORMATION PROTECTION WITH A DIGITAL WATERMARK • precursory coder – structure for proper transforming of the secret message in order to embed it in the signal container. • stegocoder – structure for embedding the secret message in other data and reading its specialities. • structure for watermark retrieving. • stegodetector – structure for stegomessage’s presence determination. • decoder – structure for secret message’ s restoring.

  13. AUDIO WATERMARKING • Low-bit coding • Simplest way to embed data intoother data structures. By replacing the • least significantbit of eachsampling point by a coded binary string,we • can encode a large amount of data in an audio signal. • The major disadvantage of this method is its poorimmunity to • manipulation. Encoded information canbedestroyed by channel noise, • resampling etc. • Could be improved by error-correcting codes.

  14. AUDIO WATERMARKING • Echo data hiding • Echo data hiding embeds data into a host audio signal by introducing an • echo. The data are hidden by varying three parameters of the echo: initial • amplitude, decay rate, and offset. • The coder uses two delay times, one to represent abinary one (offset) • and another to represent a binaryzero (offset + delta). Both delay times • are below thethreshold at which the human ear can resolve theecho.

  15. AUDIO WATERMARKING Echo data hiding - decoding • Perform calculation autocorrelation of the cepstrum. • This transformatoin produces two defined spikes. Time delay between • the spike and the original signal determines the decoding decision.

  16. AUDIO WATERMARKING Phase coding • Substituting the phase of an initial audio segment with a reference • phase that represents the data. • The phase of subsequent segments is adjusted in order to preserve the • relative phase between segments.

  17. AUDIO WATERMARKING • Phase coding – decoding • Initial synchronization needed. • The value of the underlying phase of the first segment is detected as a 0 • or 1,which represents the coded binary string.

  18. Methods for data analyzing The data warehouse has enormous value by arranging operational data into meaningful information. They are designed for online analytical processing(OLAP). The data liable to OLAP is organized in multidimensional cubes. • The data cubes store preprocessed summaries of the data. • The data cubes creation and usage eliminates the need of joining the tables and preprocessing the values returned from the most frequently performed queries. One of the basic advantages of the OLAP mining is the usage of data extracted from data warehouses. The data is loaded into data warehouse after it is previously integrated, consolidated, cleaned, and transformed.

More Related