With the growing ubiquity and portability of multimedia-enabled devices, Universal multimediaaccess is emerging as one of the important applications for the next generation of multimediasystems. The basic concept un...
详细信息
ISBN:
(纸本)0819442429
With the growing ubiquity and portability of multimedia-enabled devices, Universal multimediaaccess is emerging as one of the important applications for the next generation of multimediasystems. The basic concept underlying Universal multimediaaccess is the adaptation, summarization, and personalization of multimediacontent according to the user environment The different dimensions for adaptation include rate reduction, adaptive spatial and temporal sampling, quality reduction, summarization, personalization, and re-editing of the multimediacontent. The different relevant dimensions of the user environment include device capabilities, bandwidth, and user preferences, usage context, and spatial- and temporal-awareness. The emerging MPEG-7 and MPEG-21 standards are addressing Universal multimediaaccess in a number of ways. MPEG-7 provides tools for describing transcoding hints, content variations, space and frequency views, and summaries of multimediacontent. MPEG-7 also provides tools for describing user preferences and usage history. MPEG-21 is addressing the description of user environment, which includes terminals and networks. In this paper, we present an application-based perspective on Universal multimediaaccess using MPEG-7. We describe the different tools, methods, and systems that use MPEG-7 for enabling Universal multimediaaccess and describe a system for annotating and transcoding images using MPEG-7.
We present standards-compliant visible watermarking schemes for digital images and video in DCT-based compressed formats. The watermarked data is in the same compressed format as the original and can be viewed with st...
详细信息
ISBN:
(纸本)0819442429
We present standards-compliant visible watermarking schemes for digital images and video in DCT-based compressed formats. The watermarked data is in the same compressed format as the original and can be viewed with standard tools and applications. Moreover, for most of the schemes presented, the watermarked data has exactly the same compressed size as the original. The watermark can be inserted and removed using a key for applications requiring content protection. The watermark application and removal algorithms are very efficient and exploit some features of compressed data formats (such as JPEG and MPEG) which allow most of the work to be done in the compressed domain.
In this paper, we propose two time slot allocation algorithms for code division multiple access scheme with time division duplex (CDMA/TDD) systems to efficiently accommodate multimedia traffic. Assuming a practical m...
详细信息
ISBN:
(纸本)0780370058
In this paper, we propose two time slot allocation algorithms for code division multiple access scheme with time division duplex (CDMA/TDD) systems to efficiently accommodate multimedia traffic. Assuming a practical multiple cell environment and a multimedia service model which consists of several kinds of circuit-switched and packet-switched services with different quality of services (QoSs), we evaluate the average delay of the CDMA/TDD system with the proposed algorithms, and compare the performance with that of CDMA with frequency division duplex (CDMA/FDD) and time division multiple access with TDD (TDMA/TDD) systems. Our computer simulation results show that the CDMA/TDD system with one of the proposed algorithms, which can effectively avoid interference among users with different QoSs, can improve the average delay performance as compared with the other systems.
In today's digital world, multimediacontent is delivered to homes via the Internet, satellite, terrestrial and cable networks. Scrambling is a common approach used by conditional accesssystems to prevent unautho...
详细信息
ISBN:
(纸本)0819439924
In today's digital world, multimediacontent is delivered to homes via the Internet, satellite, terrestrial and cable networks. Scrambling is a common approach used by conditional accesssystems to prevent unauthorized access to audio/visual data. The descrambling keys are securely distributed to the receivers in the same transmission channel. Their protection is an important part of the key management problem. Although public-key cryptography provides a viable solution, alternative methods are sought for economy and efficiency. This paper presents a key transport protocol based on secret sharing. It eliminates the need for a cipher, yet combines the advantages of symmetric and public-key ciphers.
In many health care information systems medical images are an important part of the multimedia medical patient record. Most of the work on multimedia medical images security until now has focused on cryptographic appr...
详细信息
ISBN:
(纸本)9781581133936
In many health care information systems medical images are an important part of the multimedia medical patient record. Most of the work on multimedia medical images security until now has focused on cryptographic approaches. While valuable, cryptography is not enough to control access to medical images. Therefore additional protection approaches should be applied at a higher level. Role-based access control (RBAC) is a good candidate to provide access control in a multimedia medical image database system. Roles accurately describe which types of people need to access to certain types of objects. However, in a multimedia medical image database system, specifications of image access rights are often content and context-dependent as well as time-dependent. Unfortunately, RBAC cannot be used to handle the above requirements. In this paper we describe an extended role-based access control model by considering, in the specification of the Role-Permission relationship phase, the constraints which must be satisfied in order for the holders of the permission to use those permission. The use of constraints allows role-based access control to be tailored to specify very fine-grained, flexible, content, context and time-based access control policies. The proposed access control model preserves the advantages of scaleable security administration that RBAC-style models offer and yet offers the flexibility to specify complex access restrictions based on the semantic content of the images, the attributes of the user accessing the image, the relationship between the user and the patient whose images are to be accessed and the time. The description of an access control algorithm and a system architecture for a secure medical image DBMS are also presented.
This dissertation presents a solution to problems arising from the demand for fast information access and for sharing in real-time multimedia transmission over the Internet. Our solution exploits software agents that ...
This dissertation presents a solution to problems arising from the demand for fast information access and for sharing in real-time multimedia transmission over the Internet. Our solution exploits software agents that are placed throughout the network environment. These hierarchical video analysis agents process multimedia streams in real time, and automatically decompose and understand the multimediacontent so as to facilitate information access and sharing. multimediacontent contains both the perceptual content such as color, motion, or acoustic features and the conceptual content, which is specified based on concepts or semantics that can be expressed by text descriptions. Both types of contents are embedded simultaneously in multimedia streams, and usually are complementary to each other. This dissertation adaptively analyzes both kinds of video contents by combining mixed media cues from audio, video and text. First, a high-performance module for on-line video segmentation based on scene-change detection is developed. It serves as the first step of any video stream construction and analysis. To meet the high computational demand, our proposed video scene change detection algorithms are very efficient while maintaining high accuracy and recall rates for fast on-line video analysis. Second, the perceptual features of audio and video data are analyzed in a bottom-up manner and integrated so as to discriminate among the different events in any video stream effectively. An efficient decision-tree learning algorithm is used to induce a set of if-then rules which link perceptual features with the video conceptual semantic contents. These rules not only serve as a video classifier, but also guide on-line real-time video/audio feature extraction and data redistribution. A novel knowledge-based system, where knowledge is stored as learned rules, is proposed to serve as a video semantic inference/classification engine. Third, we propose a hierarchical video categorizatio
作者:
Wu, CWIBM Corp
Thomas J Watson Res Ctr Div Res Yorktown Hts NY 10598 USA
Recently, a number of authentication schemes have been proposed for multimedia data such as images and sound data. They include both label based systems and semifragile watermarks. The main requirement for such authen...
详细信息
ISBN:
(纸本)0819439924
Recently, a number of authentication schemes have been proposed for multimedia data such as images and sound data. They include both label based systems and semifragile watermarks. The main requirement for such authentication systems is that minor modifications such as lossy compression which do not alter the content of the data preserve the authenticity of the data, whereas modifications which do modify the content render the data not authentic. These schemes can be classified into two main classes depending on the model of image authentication they are based on. One of the purposes of this paper is to look at some of the advantages and disadvantages of these image authentication schemes and their relationship with fundamental limitations of the underlying model of image authentication. In particular, we study feature-based algorithms which generate an authentication tag based on some inherent features in the image such as the location of edges. The main disadvantage of most proposed feature-based algorithms is that similar images generate similar features, and therefore it is possible for a forger to generate dissimilar images that have the same features. On the other hand, the class of hash-based algorithms utilizes a cryptographic hash function or a digital signature scheme to reduce the data and generate an authentication tag. It inherits the security of digital signatures to thwart forgery attacks. The main disadvantage of hash-based algorithms is that the image needs to be modified in order to be made authenticatable. The amount of modification is on the order of the noise the image can tolerate before it is rendered inauthentic. The other purpose of this paper is to propose a multimedia authentication scheme which combines some of the best features of both classes of algorithms. The proposed scheme utilizes cryptographic hash functions and digital signature schemes and the data does not need to be modified in order to be made authenticatable. Several applica
作者:
Iyengar, GIBM Corp
Thomas J Watson Res Ctr Giridharan Iyengar Human Language Technol Yorktown Heights NY 10598 USA
The focus of this paper is to facilitate access into an important class of multimediacontent: unscripted and causally shot home videos. Unlike scripted video (such as movies and commercials), video that has been shot...
详细信息
ISBN:
(纸本)0819439894
The focus of this paper is to facilitate access into an important class of multimediacontent: unscripted and causally shot home videos. Unlike scripted video (such as movies and commercials), video that has been shot for the simple purpose of recording an event or place has no structure to facilitate its access. Our approach to tackling the unstructured video problem is to use clustering techniques to create multiple groupings of the video. We describe two clustering algorithms in this paper, which assume fairly general probability density descriptions of video. In addition, we describe an application built upon these clustering algorithms that enables browsing and rescripting unstructred content.
In 1999, the Archaeology Technologies Laboratory (ATL) at North Dakota State University (NDSU) began developing an Internet-based Digital Archive Network for Anthropology (DANA). This federation of databases links res...
详细信息
ISBN:
(纸本)0769514022
In 1999, the Archaeology Technologies Laboratory (ATL) at North Dakota State University (NDSU) began developing an Internet-based Digital Archive Network for Anthropology (DANA). This federation of databases links researchers, students, and the general public to distributed databases that include realistic, accurate, three-dimensional (313), visual representations of artifacts, fossils, and other objects, along with 2D digitized documents (e.g., maps, plan views, excavation profiles, and photographs) and various associated data. DANA is being created through development and implementation of cross-platform, open standards that will facilitate interoperability and exchange of information between remote systems. DANA enables dynamic use of digital models, virtual measurement tools, and an array of data supplied by contributing content providers (collaborators) for education and scholarly research. This online network of anthropology resources facilitates reliable, "anytime, anywhere" access to content and services. DANA constitutes an enormously valuable learning resource that can be accessed and used at all levels, from K-12, to undergraduate, to post-graduate, to professional, to lifelong learning.
E-learning or learning via the Web is now changing the way universities and corporations offer education and training. Rather than using conventional means for remotely distributing and delivering courses and classroo...
详细信息
E-learning or learning via the Web is now changing the way universities and corporations offer education and training. Rather than using conventional means for remotely distributing and delivering courses and classroom lectures, universities and enterprises are moving towards Web-based academic and training offerings. While content acquisition and distribution can be automated in a systematic fashion, research challenges remain in the area of personalized content delivery, access, and augmented interaction. Automated content indexing and annotation for easy and efficient access and navigation of various media elements associated with the course material become key tasks in flexible content delivery and use. E-Learning Media Navigator (ELM-N) from IBM Research is a system with which a user can access and interact with online courses presented as audiovisual material, along with related slides and white board contents in a time-synchronized fashion. In this demonstration, the system capabilities and the research technologies behind them will be presented.
暂无评论