Charles G. Boncelet

Charles G. Boncelet
  • PhD
  • University of Delaware

About

91
Publications
14,953
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,943
Citations
Current institution
University of Delaware

Publications

Publications (91)
Conference Paper
Group cohesiveness is a compelling and often studied composition in group dynamics and group performance. The enormous number of web images of groups of people can be used to develop an effective method to detect group cohesiveness. This paper introduces an automatic group cohesiveness prediction method for the 7th Emotion Recognition in the Wild (...
Preprint
Group cohesiveness is a compelling and often studied composition in group dynamics and group performance. The enormous number of web images of groups of people can be used to develop an effective method to detect group cohesiveness. This paper introduces an automatic group cohesiveness prediction method for the 7th Emotion Recognition in the Wild (...
Preprint
Full-text available
A graph neural network (GNN) for image understanding based on multiple cues is proposed in this paper. Compared to traditional feature and decision fusion approaches that neglect the fact that features can interact and exchange information, the proposed GNN is able to pass information among features extracted from different models. Two image unders...
Conference Paper
Full-text available
This paper presents a hybrid deep learning network submitted to the 6th Emotion Recognition in the Wild (EmotiW 2018) Grand Challenge [9], in the category of group-level emotion recognition. Advanced deep learning models trained individually on faces, scenes, skeletons and salient regions using visual attention mechanisms are fused to classify the...
Article
Full-text available
Entropy coders fall into several general categories: Huffman and Huffman-like coders that parse the input into fixed length pieces and encode each with a vari-able length output, arithmetic coders that take an arbi-trarily long string as an input and encode with a single output string, and Tunstall-like coders that parse the in-put into variable le...
Article
We describe a new image steganography method that uses permutations of selected pixels to hide information. The basic idea is that a subset of pixels is selected by a keyed random number generator. The values of these pixels are altered by as little as possible but such that the sorted ordering of these values corresponds to a specific permutation....
Patent
Full-text available
Electrical connection systems and methods are disclosed. An electrical system includes an electrical plug and an electrical receptacle. The electrical plug has at least one prong having at least one opening. The electrical receptacle has at least one socket, an electrical contact positioned within the at least one socket, a light source positioned...
Conference Paper
We consider an anomaly detection problem. We are interested in whether or not a stream of data contains an unusual number or distribution of positives. Abstractly, the problem can be stated as follows: given a binary string, we wish to determine if the number or distribution of 1's differs significantly from a known spontaneous rate. Furthermore, w...
Conference Paper
We consider the following question: given a sequence X1, . . . , Xn of binary values, how likely is it that the sequence was the output of n i.i.d. Bernoulli trials? And if it was not, can we detect the presence of clustering - increased local density on smaller consecutive intervals - in a reliable way? In this paper we propose a relatively simple...
Article
Noise occurs in images for many reasons. Probably the most frequently occurring noise is additive Gaussian noise. It is widely used to model thermal noise and, under some often reasonable conditions, is the limiting behavior of other noises, e.g., photon counting noise and film grain noise. Gaussian noise is a part of almost any signal. For example...
Conference Paper
Steganography techniques can be used to convey hidden information. If done well, the information is difficult to discover and is unknown to an observer. The detection of steganography, known as steganalysis, is an important research pursuit. In previous work, we developed a method of steganalysis for images with messages embedded by an LSB plusmn1...
Conference Paper
We present a rate insensitive method for detecting steganog- raphy using ±1 embedding. ±1 embedding is generally con- sidered to be difficult to detect. In prior work, we developed a high performing method based on statistics computed by a lossless image compressor. However, the method suffered a weakness that the embedding rate needed to be known....
Conference Paper
We present results of an experiment to detect the presence of ±1 embedding in digital images employing a realistic operating scenario. The ±1 embedding steganography (also known as LSB matching) is simple to implement but not easy to detect. Many of the results presented in the literature to date demonstrate detection performance for a system tha...
Conference Paper
A new method of steganalysis for images with embedded messages is presented. We consider two embedding methods: least significant bit (LSB) replacement and plusmn1 LSB embedding. Our method uses lossless image compression to generate statistics that are fed into a support vector machine classifier. We compare results against the pairs method, one o...
Article
We present a new message authentication code (MAC) called the cyclic redundancy check-noise-tolerant message authentication code (CRC-NTMAC). The CRC-NTMAC improves upon the recently developed NTMAC. Unlike conventional MACs, such as the keyed-hash MAC (HMAC), the CRC-NTMAC and NTMAC tolerate a modest number of errors, such as might be caused by a...
Conference Paper
We present a method for detecting steganography using plusmn1 embedding. The method uses a lossless compression technique to compress the last two bitplanes in an effort to model the image structure where the data may be hidden. A small number of statistics are then computed using the model and fed into a support vector machine to classify detectio...
Article
Full-text available
We present a context-weighting algorithm that adaptively weights in real-time three-context models based on their relative accuracy. It can automatically select the better model over different regions of an image, producing better probability estimates than using either one of these models exclusively. Combined with the previously proposed block ar...
Conference Paper
In this paper, we present a new approach, the image CRC Noise Tolerant Message Authentication Code (image CRC- NTMAC), to ensure the credibility of multimedia, such as images. The image CRC-NTMAC can accuratelyidentifythe specific regionsof the image that have been modified and vis- ibly displaythe authenticationresult. Moreover,the tolerance to th...
Conference Paper
We present a new lossless image compression algorithm called BCTW, for bitplane context tree weighting, and a correspond- ing study into lossless image compression using several num- ber representations and various algorithms. BCTW processes the image bitplane by bitplane and uses Context Tree Weight- ing (CTW) to estimate the probability of each p...
Article
Full-text available
PMAC is a medium access protocol designed for wireless sensor networks. The protocol is based on exploiting the periodicity inherent in carrier sensing schemes like CSMA/CA combined with a relaxed time-access arbitration regime among the competing nodes. Transmission and reception of data frames are made to be strictly receiver-triggered events whi...
Conference Paper
We present a new message authentication code (MAC) called the BCH-NTMAC. The BCH-NTMAC improves on the recently developed CRC-NTMAC and the NTMAC. Similar to the CRC-NTMAC and the NTMAC, the BCH-NTMAC can tolerate a modest number of errors, such as might be caused by a noisy communications channel. Moreover, all these new NTMACs provide estimates o...
Conference Paper
We present a new scheme to reduce the communications requirements for sending noise-tolerant message authentication codes (NTMACs), by sending the NTMAC's over direct sequence spread spectrum wireless channels. We greatly reduce the number of chips required by replacing each sub-MAC with a chip sequence (sub-tag) considered as a whole, while all ad...
Article
This paper introduces a new construct, called the Noise Tolerant Message Authentication Code (NTMAC), for noisy message authentication. The NTMAC can tolerate a small number of errors, such as might be caused by a noisy communications channel. The NTMAC uses a conventional Message Authentication Code (MAC) in its constructions and it inherits the c...
Article
We present a new method of steganalysis, the detection of hidden messages, for least significant bits (LSB) replacement embedding. The method uses lossless image compression algorithms to model images bitplane by bitplane. The basic premise is that messages hidden by replacing LSBs of image pixels do not possess the same statistical properties and...
Chapter
This chapter discusses the problem of compressing binary images. A binary image is one where each pixel takes on one of two colors, conventionally black and white. Binary images are widely used in facsimile communication and in digital printing. This chapter reviews traditional compression methods, newer standards, and some of the recent research.
Chapter
Noise occurs in images for many reasons. Probably the most frequently occurring noise is additive Gaussian noise. It is widely used to model thermal noise and, under some often reasonable conditions, is the limiting behavior of other noises, e.g., photon counting noise and film grain noise. Gaussian noise is a part of almost any signal. For example...
Conference Paper
Full-text available
In this paper, we present a new scheme to reduce the communications requirements to send message authentication tags (MAC's), by sending the MAC's over direct sequence spread spectrum wireless channels. We greatly reduce the number of chips required by considering the chip sequence as a whole. In one example, based on the IS-95 CDMA digital cellula...
Conference Paper
We present a new method for authenticating and tamperproofing images. It is based on the recently developed NT-MAC (noise tolerant message authentication code). The NTMAC is designed for multimedia transmitted over noisy channels. Unlike ordinary cryptographic codes, the NT-MAC fails gradually in the presence of noise or bit errors. In this work, w...
Conference Paper
A context-weighting algorithm as an improvement of previously proposed block arithmetic coder for image compression (BACIC) is presented. The proposed algorithm weights two context models, so that it can automatically select the better model over different regions of an image, producing better probability estimates. The overall performance of this...
Conference Paper
We present a two-part method for lossless image compression: the first is a simple transformation based on JPEG-LS and the second is the use of a general purpose file compressor such as gzip, bzip2 or rk. The transformation is invertible and uses only integer arithmetic. It achieves no compression directly; however, on some images, it can significa...
Conference Paper
In this paper, we present a new method for authenticating messages. The method is suitable in situations where severe power or computational constraints prevent the use of conventional authentication algorithms. It is based on a computationally simple message authentication code (MAC) and the generation of a chain of keys that have a limited lifeti...
Article
Full-text available
This paper presents the block arithmetic coding for image compression (BACIC) algorithm: a new method for lossless bilevel image compression which can replace JBIG, the current standard for bilevel image compression. BACIC uses the block arithmetic coder (BAC): a simple, efficient, easy-to-implement, variable-to-fixed arithmetic coder, to encode im...
Article
Full-text available
In this paper, we present two tamper-detection techniques. The first is a fragile technique that can detect the most minor changes in a marked image using a DCT-based data hiding method to embed a tamper-detection mark. The second is a semi-fragile technique that detects the locations of significant manipulations while disregarding the less importa...
Article
This study introduces error control to the block arithmetic coding for image compression (BACIC): a new method for lossless bilevel image compression. BACIC can successfully transmit bilevel images when channel bit error rates are as high as 10(-3) while providing compression ratios twice that of G3, the only facsimile standard which incorporates e...
Article
Many digital steganographic systems employ the capacity of an additive white Gaussian noise (WGN) channel as a performance metric. We present results that show that this capacity metric understates the capacity potential of these systems and propose a more accurate measure based on the arbitrary noise channel. This measure is compared to the capaci...
Article
Full-text available
Many applications could be enhanced by the ability to transmit images over narrow-bandwidth noisy channels. Robust source coding provides both the compression and noise mitigation that is necessary for successful image transmission in hostile environments without channel coding. In this paper, two methods of robust source coding are presented. The...
Article
Full-text available
In this paper, we present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is int...
Article
One of the greatest advantages of the ubiquitous Internet, the free and easy transmission of information, is also one of its greatest weaknesses, leading to the copying and outright theft of information. Of particular interest to the readers of this journal is the theft of images and videos. A content provider may want to publish information withou...
Article
Full-text available
In this paper, we introduce a new multiresolution watermarking method for digital images. The method is based on the discrete wavelet transform (DWT). Pseudo-random codes are added to the large coefficients at the high and middle frequency bands of the DWT of an image. It is shown that this method is more robust to proposed methods to some common i...
Article
Full-text available
One of the greatest advantages of the ubiquitous Internet, the free and easy transmission of information, is also one of its greatest weaknesses, leading to the copying and outright theft of information. Of particular interest to the readers of this journal is the theft of images and videos. A content provider may want to publish information withou...
Conference Paper
Full-text available
We present a new method of embedding information within digital images, called spread spectrum image steganography (SSIS). Steganography, which means “covered writing” in Greek, is the science of communicating in a hidden manner. SSIS conceals a message of substantial length within digital imagery while maintaining the original image size and dynam...
Conference Paper
We present a method of embedding information within digital images, called spread spectrum image steganography (SSIS) along with its payload capacity. Steganography is the science of communicating in a hidden manner. SSIS conceals a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The...
Article
Full-text available
Robust source coding provides both compression and noise mitigation without channel coding. In this paper, two methods of robust source coding are presented. The first is DPCM incorporating a nonlinear filter; the second is Predictive Trellis-Coded Quantization (PTCQ), whose prediction filter is also nonlinear. Findings show that the incorporation...
Conference Paper
Full-text available
. In this paper we present a new method for reliable blind image steganography that can hide and recover a message of substantial length within digital imagery while maintaining the original image size and dynamic range. Image processing, error-control coding, and spread spectrum techniques are utilized to conceal hidden data and the performance of...
Article
Full-text available
In this paper# weintroduce a new multiresolution water# marking method for digital images. The method is based on the discrete wavelet transform #DWT#. Pseudo#random codes are added to the large coe#cients at the high and middle frequency bands of the DWT of an image. It is shown that this method is more robust to often proposed methods to some com...
Conference Paper
Full-text available
BACIC is a new method of lossless bi-level image compression introduced to replace JBIG and G3, the current standards for bi-level and facsimile image compression. This paper applies the BACIC (block arithmetic coding for image compression) algorithm to reduced grayscale and full grayscale image compression. BACIC's compressed files are slightly sm...
Conference Paper
We introduce a new multiresolution watermarking method for digital images. The method is based on the discrete wavelet transform (DWT). Pseudo-random codes are added to the large coefficients at the high and middle frequency bands of the DWT of an image. It is shown that this method is more robust to often proposed methods to some common image dist...
Conference Paper
We propose a new scheme for multicasting in a binary tree that combines packet self-replication and routing in a space- division ATM switch. We revisit Law and Leon-Garcia's approach for packet self-replication and routing. Then we propose a new packet self-replication and routing scheme using only 2b address bits for a b-level binary tree. This me...
Article
Many battlefield applications require the ability to transmit images over narrow bandwidth noisy channels. Previous research has demonstrated that the utilization of predictive trellis-coded quantization (PTCQ) incorporating a nonlinear prediction filter results in a method of robust source coding. Robust source coding provides both compression and...
Article
Full-text available
1. ABSTRACT Despite considerable appeal in the statistics literature, the Huber estimate is little used in engineering. We believe this is due primarily to two factors: difficulty computing the es-timate and the need for a corresponding scale estimate. We present a variation of the Huber estimate which we call the "trimmed-Huber" estimate that addr...
Article
We propose a new design for a self-routing, space-division fast packet switch for ATM B-ISDN. This is an expansion switch based on binary expansion, concentration, and combination of neighboring blocks of packets. Internal buffers are needed for local synchronization and packet buffering for eventualities of path collision and/or next stage buffer...
Conference Paper
Robust source coding provides both compression and noise mitigation without channel coding. Two methods of robust source coding are presented. The first is DPCM incorporating a nonlinear filter; the second is predictive trellis-coded quantization (PTCQ), whose prediction filter is also nonlinear. Findings show that the incorporation of the nonlinea...
Conference Paper
Finding optimal kinematics for manipulators dedicated to working within enclosed workspaces can be applied to assembly-line tasks such as welding, grinding, and spray-painting within automobile interiors. This paper presents a method of designing redundant and hyper-redundant manipulators for enclosed workspaces. A heuristic search is used to gener...
Article
This correspondence examines the use of nonlinear edge enhancers as prefilters for edge detectors. The filters are able to convert smooth edges to step edges and suppress noise simultaneously. Thus, false alarms due to noise are minimized and edge gradient estimates tend to be large and localized. This leads to significantly improved edge maps
Article
Full-text available
The Internet Routing Project, referred to in this report as the 'Highball Project', has been investigating architectures suitable for networks spanning large geographic areas and capable of very high data rates. The Highball network architecture is based on a high speed crossbar switch and an adaptive, distributed, TDMA scheduling algorithm. The sc...
Conference Paper
We discuss the combination of block arithmetic coding (BAC), a technique for entropy compression, and error correcting coding. In essence, this is a joint source-channel coding problem. BAC is used to entropy code the input sequence and ordinary linear block codes are used to combat channel errors
Article
Presents two VLSI architectures for multidimensional order statistic filtering. The first architecture is a parallel VLSI design suitable for implementing generalized, multidimensional, order statistic filtering. The design maintains the samples in sorted order and updates the order as new samples arrive and old samples leave. The samples carry tag...
Article
We introduce “Block Arithmetic Coding” (BAC), a technique for entropy coding that combines many of the advantages of ordinary stream arithmetic coding with the simplicity of block codes. The code is variable length in to fixed out (V to F), unlike Huffman coding which is fixed in to variable out (F to V). We develop two versions of the coder: 1) an...
Article
Full-text available
A new class of rank-order-based filters, called lower-upper-middle (LUM) filters, is introduced. The output of these filters is determined by comparing a lower- and an upper-order statistic to the middle sample in the filter window. These filters can be designed for smoothing and sharpening, or outlier rejection. The level of smoothing done by the...
Conference Paper
First Page of the Article
Conference Paper
Full-text available
1 Abstract This paper describes a scheduling algorithm for high speed, TDMA communication networks. The problem is to find a route and determine switch schedules so that a burst of information can traverse the network from source to destination. We show that this problem is difficult, i.e., that several simple variations are NP- complete, We presen...
Article
This paper describes a scheduling algorithm for high speed, TDMA communication networks. The problem is to find a route and determine switch schedules so that a burst of information can traverse the network from source to destination. We show that this problem is difficult, i.e., that several simple variations are NP-complete. We present an algorit...
Article
We introduce an adaptive variant of the LUM smoother. The smoother operates on a sliding window and is designed to eliminate impulsive components with minimal distortion. In any particular window, the amount of filtering is adjusted based upon the quasi range measures of dispersion. As the results of simulations indicate, in most cases, the adaptiv...
Conference Paper
Based on a recently developed class of sorting networks, new VLSI architectures suitable for order statistic filtering are developed. The major advantage of these architectures is minimal response-time regardless of the number of stages in the pipeline; an effective characteristic for implementing recursive order statistic filters. The devised word...
Article
This paper considers the problem of prefiltering images to enhance edge detection. In particular, several order statistics based sharpeners are considered with a traditional linear technique, unsharp masking. The order statistics sharpeners include the LUM sharpener, the CS-filter, and the GOS filter.
Article
We introduce the LUM filter for both smoothing and sharpening. The LUM filter is a moving window estimator that does the following: it finds the order statistics by sorting the samples in the window, and it compares a lower order statistic, an upper order statistic, and the middle sample. The two order statistics define a range of 'normal' values....
Article
Algorithms for computing the distributions of order statistic related estimators with moving or multiple windows are presented. These algorithms may be used to compute joint distributions of moving window estimators, such as moving median filters, or of estimators made from ranking operations on multiple windows, such as many stacked or morphologic...
Article
Full-text available
A network architecture called Highball and a preliminary design for a prototype, wide-area data network designed to operate at speeds of 1 Gbps and beyond are described. It is intended for applications requiring high speed burst transmissions where some latency between requesting a transmission and granting the request can be anticipated and tolera...
Article
Nonlinear filters are analyzed from a spectral point of view. The equivalent frequency behavior of a filter is described by its linear part, which represents the linear nonrecursive filter, that best matches, in the mean-square sense, the behavior of the filter. The class considered includes all the order statistic filters (L-filters) such as media...
Article
This paper discusses two examples of the design and use of order statistic filters in image compression. The first example is a pre-filter. The pre-filter is designed to gently smooth the image to promote better compression. However, this filter must not blur edges significantly. Various order statistic estimators, such as a simple median, are idea...
Article
This paper considers an image filter to remove small features of low contrast based on a simple model of a quantum limited detector. That is, it removes image noise that can't be seen or that, in other circumstances, can't represent real information. The filtering scheme asks how large an area can be covered with one color without introducing visib...
Conference Paper
The removal of noise by a class of order statistic filters, called multistage order statistic filters or multiwindow filters, is described. These filters take `ranks of ranks'. A new filter type is defined and its equivalence under special circumstances to a filter defined in the literature is shown. This filter's deterministic and statistical prop...
Article
The L l -filters are introduced to generate the order statistic filters (L-filters) and the nonrecursive linear, or finite-duration impulse-response (FIR), filters. Such estimators are particularly effective filtering signals that do not necessarily follow Gaussian distributions. They can be designed to restore one-dimensional or multidimensional s...
Article
The method presented to detect and quantify the porosity value content of composite materials is part of a development effort to establish an integrated ultrasonic evaluation system 1. The overall research effort aims to automate the NDE process and predict mechanical and structural properties of composite materials using NDE techniques. The ultras...
Conference Paper
We present the results of a study of error free compression of digitized medical x-ray images. This study used high resolution (2048 x 1684), high quality (8 to 11 bits per pixel) images, each approximately 5 Mbytes before compression. Since the medical community is very reluctant to introduce unnecessary noise into their imaging, we require error-...
Conference Paper
Median filters and the more general order-statistic-based filters have proven very useful in filtering signals corrupted by noise with heavier tails than the Gaussian, in filtering signals with jumps or edges, or in situations where both occur. The author presents two simple recursive definitions for the k th order statistic taken from n samples. F...
Conference Paper
A generalized framework for the description of a large class of nonlinear filters is introduced. This framework includes nonrecursive linear filters (FIR), order statistic filters (OSF or L-filters), L l -filters, Volterra filters, and ZNL-LTI filters. The L l -filters have been proposed to generalize and combine FIR and OSF filters. LMS and RLS al...
Article
We are interested in multi-agent contracting, in which customers must solicit the resources and capabilities of other, self-interested agents in order to accomplish their goals. Goals may involve the execution of multi-step plans, in which different ...
Article
We consider the problem of implementing the Kalman filter recursions in square root information filter form. We suggest a general linear, dynamical model which directly incorporates the fact that many of the unknowns are not time varying. The resulting implementation is widely applicable, numerically sound, and extends easily to smoothing problems.
Article
We consider the problem of computing the DFT and present two reductions over the standard formula. In the special case of an N-point sequence with N = 2<sup>l</sup>, the number of multiplications per output point required by this algorithm is, at most, N/4 - 1 and, on the average, N/6 - 1. Each output point requires no more than N - 1 additions. In...
Conference Paper
We consider the problem of robustifying the Kalman filter. First, we review some known approaches to the problem. Then we establish the equivalence between the Kalman filter and a particular least squares regression problem. We suggest that the regression problem be solved robustly. Some well known approaches for doing this are discussed. Finally,...
Article
The development of approaches and algorithms for robust signal processing are discussed. Robust signal processing, refers to the problem of smoothing, filtering or estimating noisy and unknown signals. The linear estimation problem in the formalism of linear regression is considered. The specific problem of filtering or smoothing a discrete time se...

Network

Cited By