Skip to main content
Edward Delp
  • West Lafayette, Indiana, United States

Edward Delp

Purdue University, ECE, Faculty Member
The characteristics of "non natural" images, such as predictive error frames used in video compression, pre- sent a challenge for traditional compression techniques. Particularly difficult are small images, such as QCIF, where... more
The characteristics of "non natural" images, such as predictive error frames used in video compression, pre- sent a challenge for traditional compression techniques. Particularly difficult are small images, such as QCIF, where compression artifacts at low data rates are more noticeable. In this paper, we investigate techniques to improve the performance of a wavelet-based, rate scal- able video codec at
Image and video compression have been the object of intensive research in the last thirty years. The field is now mature as is proven by the large number of applications that make use of this technology. Digital Video Broadcasting,... more
Image and video compression have been the object of intensive research in the last thirty years. The field is now mature as is proven by the large number of applications that make use of this technology. Digital Video Broadcasting, Digital Versatile Disc, and Internet ...
The contribution of this paper is two-fold. First, we describe an improved version of a blind steganalysis method previously proposed by Holotyak et al. and compare it to current state-of-the-art blind steganalyzers. The features for the... more
The contribution of this paper is two-fold. First, we describe an improved version of a blind steganalysis method previously proposed by Holotyak et al. and compare it to current state-of-the-art blind steganalyzers. The features for the blind classifier are calculated in the wavelet domain as higher-order absolute moments of the noise residual. This method clearly shows the benefit of calculating the features from the noise residual because it increases the features' sensitivity to embedding, which leads to improved detection results ...
Cardiac function is evaluated using echocardiographic analysis of shape attributes, such as the heart wall thickness or the shape change of the heart wall boundaries. This requires that the complete boundaries of the heart wall be... more
Cardiac function is evaluated using echocardiographic analysis of shape attributes, such as the heart wall thickness or the shape change of the heart wall boundaries. This requires that the complete boundaries of the heart wall be detected from a sequence of two-dimensional ultrasonic images of the heart. The image segmentation process is made difficult since these images are plagued by poor intensity contrast and dropouts caused by the intrinsic limitations of the image formation process. Current studies often require having trained operators manually trace the heart walls. A review of previous work is presented, along with how this problem can be viewed in the context of the computer vision area. A novel algorithm is presented for detecting the boundaries. This algorithm first detects spatially significant features based on the measurement of image intensity variations. Since the detection step suffers from false alarms and missing boundary points, further processing uses high-level knowledge about the heart wall to label the detected features for noise rejection and to fill in the missing points by interpolation.
The authors describe a novel algorithm, known as sequential edge linking (SEL), for the automatic definition of coronary arterial edges in cineangiograms. This algorithm is based on sequential tree searching of possible coronary artery... more
The authors describe a novel algorithm, known as sequential edge linking (SEL), for the automatic definition of coronary arterial edges in cineangiograms. This algorithm is based on sequential tree searching of possible coronary artery boundary locations. Using a coronary artery phantom, the authors compared the results obtained using SEL with hand-traced boundaries. Using a magnification of 2*, the results are generally good, with the average error being 1.7% of the diameter. Actual coronary artery images were also processed and a similar comparison indicated that total areas were comparable but the hand-drawn stenoses were, on average, 7% greater than the unobstructed diameter. Based on these data it is concluded that the SEL algorithm is an accurate method for fully automatic definition of coronary artery dimensions.>
Video parsing is a fundamental operation used in many digital video applications such as digital libraries and video servers. The accuracy and execution speed of the parsing algorithm is critical if large amounts of video data are to be... more
Video parsing is a fundamental operation used in many digital video applications such as digital libraries and video servers. The accuracy and execution speed of the parsing algorithm is critical if large amounts of video data are to be processed, particularly in real-time. We present a new algorithm to reconstruct DC coefficient images of a DCT and motion compensation compressed video sequence, e.g. MPEG. The histograms of the DC coefficient images can be used to detect scene changes
Page 1. Overview of image security techniques with applications in multimedia systems ... One approach is to mark an image by adding an invisible structure known as a digital watermark to the image. ... Digital media includes text,... more
Page 1. Overview of image security techniques with applications in multimedia systems ... One approach is to mark an image by adding an invisible structure known as a digital watermark to the image. ... Digital media includes text, digital audio, images, video and software. ...
... This is particularly true for image and video data. ... visible watermark to protect images that are part of the digital Vatican library project [5]. In this paper we pres-ent a watermark which is a two-dimensional extension of [2].... more
... This is particularly true for image and video data. ... visible watermark to protect images that are part of the digital Vatican library project [5]. In this paper we pres-ent a watermark which is a two-dimensional extension of [2]. We describe a forgery detection scheme with a new ...
... sive transmission [4]. In embedded coding, all the com-pressed data is embedded in a ... Therefore our algorithm can be readily applied to our rate scalable video compres-sion algorithm [la]. A postscript version of the paper and the... more
... sive transmission [4]. In embedded coding, all the com-pressed data is embedded in a ... Therefore our algorithm can be readily applied to our rate scalable video compres-sion algorithm [la]. A postscript version of the paper and the color images produced by our algorithm along ...
... to one of the mesh routing chips (MRCs) which are interconnected via a network with a two-dimensional mesh topology. ... 10] K. Shen, GW Cook, LH Jamieson, and EJ Delp, \An overview of parallel processing approaches to image... more
... to one of the mesh routing chips (MRCs) which are interconnected via a network with a two-dimensional mesh topology. ... 10] K. Shen, GW Cook, LH Jamieson, and EJ Delp, \An overview of parallel processing approaches to image compression," Proceedings of the ...