The advent of the Web, electronic commerce and the creation of electronic distribution channels for multimediacontent have brought new challenges regarding the protection of intellectual property. As it has become in...
详细信息
ISBN:
(纸本)0769512305
The advent of the Web, electronic commerce and the creation of electronic distribution channels for multimediacontent have brought new challenges regarding the protection of intellectual property. As it has become increasingly difficult to protect the distribution medium against copying, techniques for asserting the copyright on information have gained in importance. We review the requirements of practical copyright protection schemes and survey protocols that use symmetric and public-key watermarking algorithms.
The Java (TM) based application engine defined in the systems part (Part 1) of the MPEG-4 standard is called MPEG-J. MPEG-J, which stands for MPEG-Java, is designed to be used with the parametric, scene description ba...
详细信息
ISBN:
(纸本)081943874X
The Java (TM) based application engine defined in the systems part (Part 1) of the MPEG-4 standard is called MPEG-J. MPEG-J, which stands for MPEG-Java, is designed to be used with the parametric, scene description based, presentation engine defined by the same standard. It facilitates programmatic control as opposed to the parametric control provided by the presentation engine by defining a set of Java APIs to access and control the underlying MPEG-4 terminal. An MPEG-J application (MPEGlet) which uses these APIs can be embedded in the content as an MPEG-J elementary stream similar to audio and video streams. A delivery mechanism is defined in MPEG-J to carry the Java byte code and Java objects that makes an MPEG-J application. Complex algorithmic control can be used in such an application to include behavior based on time-varying terminal conditions. The lifecycle and scope of an MPEG-J application is defined in the standard along with a strict security model. content creation in MPEG-J involves a paradigm shift as it blurs the boundaries between media content and intelligent computer programs. As the MPEG-J application can leverage the power of Java, the application scenarios are Limited only by the ingenuity of the content creator.
This paper describes the COALA (content-Oriented Audiovisual Library access) project, which aims to offer a framework for the retrieval of audiovisual TV news documents. COALA's principal design features are based...
详细信息
"accessing information anytime, anywhere, with any device" is a widely used slogan. The problem, however, is how to bring multimedia services to terminals with limited capabilities. Our approach offers a sol...
详细信息
ISBN:
(纸本)081943874X
"accessing information anytime, anywhere, with any device" is a widely used slogan. The problem, however, is how to bring multimedia services to terminals with limited capabilities. Our approach offers a solution for delivering multimedia presentations to terminals connected to mobile or fixed networks with varying capabilities. Our media wrapper is used to adapt the original presentation according to end-to-end environment characteristics;e.g., the user, terminal, and network type. This paper presents a technique called 'media wrapper' that controls and models the media adaptation process. Using this approach, it is possible to scale and convert multimedia presentations to suit the end user's terminal by making only one original presentation and letting the media wrapper to scale it for the different environments. The adaptation is performed using special algorithms that are defined by dedicated software agents. The algorithms are implemented as agents and are controlled by the media wrapper management module. The agent control is managed based on knowledge base information that contains, e.g., logical rules consisting of the combinations of the needed adaptation parameters. The media wrapper uses CC/PP profiling for defining the parameters that affect the adaptation. These parameters concern terminal, network, and client behavior.
Benchmarking has always been a crucial problem in content-based image retrieval (CBIR).A key issue is the lack of a common access method to retrieval systems, such as SQL for relational databases. The multimedia Retri...
详细信息
ISBN:
(纸本)0769511988
Benchmarking has always been a crucial problem in content-based image retrieval (CBIR).A key issue is the lack of a common access method to retrieval systems, such as SQL for relational databases. The multimedia Retrieval Mark-up Language (MRML) solves this problem by standardizing access to CBIR systems (CBIRSs). Other difficult problems are also shortly addressed, such as obtaining relevance judgments and choosing a database for performance comparison. In this article we present a fully automated benchmark for CBIRSs based on MRML, which can be adapted to any image database and almost any kind of relevance judgment. The test evaluates the performance of positive and negative relevance feedback, which can be generated automatically from the relevance judgments. To illustrate our purpose, a freely available, non-copyright image collection is used to evaluate our CBIRS, Viper. All scripts described here are also freely available for download.
A speech content authentication scheme, which is integrated with CELP speech coders to minimize the total computational cost is proposed in this research. Speech features relevant to semantic meaning are extracted, en...
详细信息
ISBN:
(纸本)0769511988
A speech content authentication scheme, which is integrated with CELP speech coders to minimize the total computational cost is proposed in this research. Speech features relevant to semantic meaning are extracted, enciypted and attached as the header information. A low cost synchronization algorithm is used to resolve mis-synchronization caused by content preserving operations. Silent and tonal regions in the speech are identified with algorithms of low complexity to enhance the precision of integrity verification. This scheme is not only much faster than traditional cryptographic bitstream integrity algorithms, but also more compatible for a variety of applications. Experimental results are collected by using the GSM-AMR speech coder, and statistical analysis is performed to calculate the false positive rate of tamper detection.
Most of the work on multimedia medical images security until now has focused on cryptographic approaches. While valuable, cryptography is not enough to control access to images. Therefore additional protection approac...
详细信息
This paper presents a data warehousing approach to hierarchical multimedia information retrieval. To tackle the key issues such as multimedia data representation, storage, integration, indexing, similarity measures, s...
详细信息
This paper presents a data warehousing approach to hierarchical multimedia information retrieval. To tackle the key issues such as multimedia data representation, storage, integration, indexing, similarity measures, searching methods and query processing, the proposed algorithms allow one: 1) to extend the concepts of conventional data warehouse and multimedia databases to multimedia data warehouses for effective data representation and storage;2) to develop a multimedia starflake schema to integrate multiple data streams for hierarchical data representation and indexing;3) to apply data aggregation techniques for decision support to speed up query processing and searching. In addition, the new system architecture is compared with a conventional database structure. Furthermore, a case study is presented to illustrate the development of a content-based image retrieval system for cyclone pattern recognition. We conclude that the proposed approach can be applied to other multimediasystems with effective data storage, retrieval and integration.
The proceedings contain 15 papers. The topics discussed include: cinematic-based model for scene boundary detection;uncertainties and event conflict resolution within video analysis service;designing MPEG4 facial anim...
ISBN:
(纸本)9061965098
The proceedings contain 15 papers. The topics discussed include: cinematic-based model for scene boundary detection;uncertainties and event conflict resolution within video analysis service;designing MPEG4 facial animation tables for web applications;COALA: content-oriented audiovisual library access;hypermedia spatio-temporal synchronization relations also deserve first class status;GBN: an efficient progressive image transmission method based on guessing by neighbors;improving media fragment integration in emerging web formats;and the negotiation of multimediacontent services in heterogeneous environments.
On the one hand, new devices gaining access to the Internet need to obtain multimediacontents adapted to their specific capabilities but lack a generic framework for content negotiation. On the other hand, scalable f...
详细信息
暂无评论