{"id":"https://openalex.org/W4417029987","doi":"https://doi.org/10.48550/arxiv.2512.03575","title":"UniComp: Rethinking Video Compression Through Informational Uniqueness","display_name":"UniComp: Rethinking Video Compression Through Informational Uniqueness","publication_year":2025,"publication_date":"2025-12-03","ids":{"openalex":"https://openalex.org/W4417029987","doi":"https://doi.org/10.48550/arxiv.2512.03575"},"language":null,"primary_location":{"id":"pmh:oai:arXiv.org:2512.03575","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2512.03575","pdf_url":"https://arxiv.org/pdf/2512.03575","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2512.03575","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060186258","display_name":"Chao Yuan","orcid":"https://orcid.org/0000-0002-4719-9702"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yuan, Chao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101499113","display_name":"Shimin Chen","orcid":"https://orcid.org/0009-0000-1043-6236"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen, Shimin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104061894","display_name":"Min\u2010Che Lin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lin, Minliang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016487740","display_name":"Liping Qiao","orcid":"https://orcid.org/0000-0001-6212-3995"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qiao, Limeng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105405208","display_name":"Gang Wan","orcid":"https://orcid.org/0000-0003-1658-5376"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wan, Guanglu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5100312281","display_name":"Lin Ma","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ma, Lin","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5060186258"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.2702000141143799,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.2702000141143799,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.22370000183582306,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10741","display_name":"Video Coding and Compression Technologies","score":0.11940000206232071,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/uniqueness","display_name":"Uniqueness","score":0.6406000256538391},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.5702999830245972},{"id":"https://openalex.org/keywords/fidelity","display_name":"Fidelity","score":0.531499981880188},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.5159000158309937},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.49779999256134033},{"id":"https://openalex.org/keywords/conditional-entropy","display_name":"Conditional entropy","score":0.4779999852180481},{"id":"https://openalex.org/keywords/inter-frame","display_name":"Inter frame","score":0.39259999990463257},{"id":"https://openalex.org/keywords/frame","display_name":"Frame (networking)","score":0.3741999864578247},{"id":"https://openalex.org/keywords/compression","display_name":"Compression (physics)","score":0.3716000020503998}],"concepts":[{"id":"https://openalex.org/C2777021972","wikidata":"https://www.wikidata.org/wiki/Q22976830","display_name":"Uniqueness","level":2,"score":0.6406000256538391},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6337000131607056},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.5702999830245972},{"id":"https://openalex.org/C2776459999","wikidata":"https://www.wikidata.org/wiki/Q2119376","display_name":"Fidelity","level":2,"score":0.531499981880188},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.5159000158309937},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.49779999256134033},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.47929999232292175},{"id":"https://openalex.org/C101721835","wikidata":"https://www.wikidata.org/wiki/Q813908","display_name":"Conditional entropy","level":3,"score":0.4779999852180481},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4097000062465668},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39959999918937683},{"id":"https://openalex.org/C39394851","wikidata":"https://www.wikidata.org/wiki/Q921594","display_name":"Inter frame","level":4,"score":0.39259999990463257},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3833000063896179},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.3741999864578247},{"id":"https://openalex.org/C180016635","wikidata":"https://www.wikidata.org/wiki/Q2712821","display_name":"Compression (physics)","level":2,"score":0.3716000020503998},{"id":"https://openalex.org/C52622258","wikidata":"https://www.wikidata.org/wiki/Q131222","display_name":"Information theory","level":2,"score":0.3301999866962433},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.32440000772476196},{"id":"https://openalex.org/C2778192920","wikidata":"https://www.wikidata.org/wiki/Q16874989","display_name":"Signal compression","level":4,"score":0.31949999928474426},{"id":"https://openalex.org/C106030495","wikidata":"https://www.wikidata.org/wiki/Q1797012","display_name":"Video compression picture types","level":4,"score":0.3190999925136566},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.3142000138759613},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.3059000074863434},{"id":"https://openalex.org/C1769480","wikidata":"https://www.wikidata.org/wiki/Q1345239","display_name":"Entropy encoding","level":3,"score":0.2904999852180481},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.2786000072956085},{"id":"https://openalex.org/C171752962","wikidata":"https://www.wikidata.org/wiki/Q255166","display_name":"Kullback\u2013Leibler divergence","level":2,"score":0.2784000039100647},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.27250000834465027},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.26499998569488525},{"id":"https://openalex.org/C172849965","wikidata":"https://www.wikidata.org/wiki/Q3148875","display_name":"Reference frame","level":3,"score":0.25859999656677246},{"id":"https://openalex.org/C57890076","wikidata":"https://www.wikidata.org/wiki/Q4680725","display_name":"Adaptive coding","level":4,"score":0.2574999928474426},{"id":"https://openalex.org/C60008888","wikidata":"https://www.wikidata.org/wiki/Q6031013","display_name":"Information bottleneck method","level":3,"score":0.2563999891281128},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.2563000023365021},{"id":"https://openalex.org/C94835093","wikidata":"https://www.wikidata.org/wiki/Q3113333","display_name":"Data compression ratio","level":5,"score":0.25459998846054077},{"id":"https://openalex.org/C81081738","wikidata":"https://www.wikidata.org/wiki/Q55542","display_name":"Lossless compression","level":3,"score":0.2531000077724457},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.2500999867916107}],"mesh":[],"locations_count":3,"locations":[{"id":"pmh:oai:arXiv.org:2512.03575","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2512.03575","pdf_url":"https://arxiv.org/pdf/2512.03575","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:doi:10.48550/arxiv.2512.03575","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2512.03575","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.03575","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2512.03575","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2512.03575","pdf_url":"https://arxiv.org/pdf/2512.03575","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Distinct":[0],"from":[1,32],"attention-based":[2],"compression":[3,13,40,112,132],"methods,":[4],"this":[5],"paper":[6],"presents":[7],"an":[8,42],"information":[9,22,64,128],"uniqueness":[10,65,129],"driven":[11],"video":[12,25],"framework,":[14],"termed":[15],"UniComp,":[16],"which":[17],"aims":[18],"to":[19,66,72],"maximize":[20],"the":[21,33,38,61,124],"fidelity":[23],"of":[24,63,127],"representations":[26],"under":[27,119],"constrained":[28],"computational":[29,121],"budgets.":[30],"Starting":[31],"information-theoretic":[34],"perspective,":[35],"we":[36,59,80],"formulate":[37],"vision":[39],"as":[41],"optimization":[43],"problem":[44],"that":[45,107],"minimizes":[46],"conditional":[47],"entropy":[48],"(reconstruction":[49],"error)":[50],"between":[51],"retained":[52],"and":[53,88,100],"full":[54],"tokens.":[55],"To":[56],"achieve":[57],"this,":[58],"introduce":[60],"notion":[62],"measure":[67],"intrinsic":[68],"redundancy":[69],"among":[70],"tokens":[71,118],"link":[73],"with":[74],"reconstruction":[75],"error.":[76],"Based":[77],"on":[78],"uniqueness,":[79],"design":[81],"three":[82],"modules-Frame":[83],"Group":[84],"Fusion,":[85],"Token":[86],"Allocation,":[87],"Spatial":[89],"Dynamic":[90],"Compression-that":[91],"progressively":[92],"perform":[93],"semantic":[94],"frame":[95],"grouping,":[96],"adaptive":[97],"resource":[98],"allocation,":[99],"fine-grained":[101],"spatial":[102],"compression.":[103],"Extensive":[104],"experiments":[105],"demonstrate":[106],"UniComp":[108],"consistently":[109],"outperforms":[110],"existing":[111],"methods":[113],"in":[114,130],"preserving":[115],"essential":[116],"visual":[117],"limited":[120],"budgets,":[122],"highlighting":[123],"pivotal":[125],"role":[126],"token":[131],"efficacy.":[133]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-12-05T00:00:00"}
