The article focuses on digital video analysis and recognition. Digital video media analysis and recognition (DVMAR) has become an active research topic in multimediasystems and computer vision areas. This is because ...
The article focuses on digital video analysis and recognition. Digital video media analysis and recognition (DVMAR) has become an active research topic in multimediasystems and computer vision areas. This is because progress of computer and communication technologies has created strong demand for many applications of digital video in a wide variety of areas, many of which require managing video in a database or information system environment; on the other hand, indexing and retrieval schemes for traditional databases and video manipulation tools in current television systems cannot manage video in an effective, interactive, and content-based manner. The goal of DVMAR is to develop algorithms, tools, and systems to extract and analyze basic elements, features and structures of video so as to make content-based access and transmission of video data feasible and more effective. In general, video media is considered to have the following basic structural elements: shots, scenes, sequences and segments.
The nature of viewing is changing due to the huge volumes of content being produced including user content generated by amateurs and the proliferation of personalized services. The type of content being produced is no...
详细信息
ISBN:
(纸本)9781450368452
The nature of viewing is changing due to the huge volumes of content being produced including user content generated by amateurs and the proliferation of personalized services. The type of content being produced is not only for entertainment (movies/TV) purposes, but also can be instructional and directive (classroom, documentary and adult content). This leads to a type of viewing that is non-linear and requires increased random access into the content to be viewed effectively. Those who produce the content (or aggregate a number of existing ones) may not necessarily index it sufficiently for a variety of reasons. In-advance indexing would not work anyway in case the indexing used time-varying factors such as popularity, viewing frequency or duration. In this demo, we tackle this problem and present a new seekbar design for the *** player that allows the users to navigate the content more effectively and find the points of interest within the content faster. This new seekbar uses auxiliary metadata to show informative icons or color the parts of the media timeline differently to inform the users.
In many health care information systems medical images are an important part of the multimedia medical patient record. Most of the work on multimedia medical images security until now has focused on cryptographic appr...
详细信息
ISBN:
(纸本)9781581133936
In many health care information systems medical images are an important part of the multimedia medical patient record. Most of the work on multimedia medical images security until now has focused on cryptographic approaches. While valuable, cryptography is not enough to control access to medical images. Therefore additional protection approaches should be applied at a higher level. Role-based access control (RBAC) is a good candidate to provide access control in a multimedia medical image database system. Roles accurately describe which types of people need to access to certain types of objects. However, in a multimedia medical image database system, specifications of image access rights are often content and context-dependent as well as time-dependent. Unfortunately, RBAC cannot be used to handle the above requirements. In this paper we describe an extended role-based access control model by considering, in the specification of the Role-Permission relationship phase, the constraints which must be satisfied in order for the holders of the permission to use those permission. The use of constraints allows role-based access control to be tailored to specify very fine-grained, flexible, content, context and time-based access control policies. The proposed access control model preserves the advantages of scaleable security administration that RBAC-style models offer and yet offers the flexibility to specify complex access restrictions based on the semantic content of the images, the attributes of the user accessing the image, the relationship between the user and the patient whose images are to be accessed and the time. The description of an access control algorithm and a system architecture for a secure medical image DBMS are also presented.
Video Shot boundary detection is a fundamental task in any kind of video content manipulation and retrieval. The area of shot boundary detection has been extensively studied, but achieving highly accurate detection re...
详细信息
ISBN:
(纸本)9781424403660
Video Shot boundary detection is a fundamental task in any kind of video content manipulation and retrieval. The area of shot boundary detection has been extensively studied, but achieving highly accurate detection results remains a challenge. In this paper, we present a novel algorithm for video cut detection. The algorithm is implemented and evaluated on the TRECVID benchmark platform. The experimental results show the effectiveness of the proposed approach. The algorithm provides a clue to the gradual transition detection.
Traditional cryptography systems treat every portion of a message (a video, an image, or an audio) equally and encrypt the entire message as a whole. As a result, those security systems often have only two states: acc...
详细信息
Traditional cryptography systems treat every portion of a message (a video, an image, or an audio) equally and encrypt the entire message as a whole. As a result, those security systems often have only two states: access authorization and access denial. To facilitate multi-level access control with interoperability, scalable security mechanism is needed. Further, the availability of varying network bandwidth and diverse receiver device capabilities demand scalable and flexible approaches that are capable of adapting to changing network conditions as well as device capabilities. In this paper, we describe a multimedia encryption scheme that supports scalability. One desirable feature of the proposed scheme is its simplicity and flexibility in supporting scalable contentaccess control.
As the usage of wireless packet data services increases, wireless carriers today are faced with the challenge of offering multimedia applications with QoS requirements within current 3G data networks. End-to-end QoS r...
详细信息
ISBN:
(纸本)0819451258
As the usage of wireless packet data services increases, wireless carriers today are faced with the challenge of offering multimedia applications with QoS requirements within current 3G data networks. End-to-end QoS requires support at the application, network, link and medium access control (MAC) layers. We discuss existing CDMA2000 network architecture and show its shortcomings that prevent supporting multiple classes of traffic at the Radio access Network (RAN). We then propose changes in RAN within the standards framework that enable support for multiple traffic classes. In addition, we discuss how Session Initiation Protocol (SIP) can be augmented with QoS signaling for supporting end-to-end QoS. We also review state of the art scheduling algorithms at the base station and provide possible extensions to these algorithms to support different classes of traffic as well as different classes of users.
Encryption is one of the most important security tools for secure message communication. There is increasing need for secure digital multimedia communication technologies to restrict unauthorized access. Prior to the ...
详细信息
Encryption is one of the most important security tools for secure message communication. There is increasing need for secure digital multimedia communication technologies to restrict unauthorized access. Prior to the availability of variable bit rate (VBR) communication services, systems typically treat every portion of a message equally and encrypt each and every bit of a message that is decrypted at the same rate as encrypted. Hence, encryption/decryption processes at both ends of the network were required to operate at the same rate. The advent of VBR multimedia communication services require new cryptography system implementations that can operate at different data rates, i.e., be scaled to different speed, different network bandwidth, and diverse receiver device capabilities. In this paper, we describe a progressive and scalable encryption scheme that supports scalability. One desirable feature of the proposed scheme is its simplicity and flexibility in supporting scalable multimedia communication and multimediacontentaccess control.
Media consumers who are overwhelmed by multitudinous news content demand a system that would sift through tens or hundreds of broadcast TV channels on a daily basis to capture the most important clips that match users...
详细信息
ISBN:
(纸本)9781424403660
Media consumers who are overwhelmed by multitudinous news content demand a system that would sift through tens or hundreds of broadcast TV channels on a daily basis to capture the most important clips that match users' interests and deliver these personalized clips for easy viewing on a typical TV or home PC. In this paper, we present a personal media alert system that extracts video segments for the interested users. In addition, alerts with pointers to content stored on the home server can be-sent to mobile users who are authorized to access the content at home. To make content sharing feasible and scalable, we also propose a P2P payment scheme that would allow a consumer to have access to media clips aggregated on other consumers' personal media systems.
content Distribution Networks (CDNs) have proliferated rapidly with the growth in network bandwidth and the variety of content files. The CDN service is one of the most popular Web services from Internet Service Provi...
详细信息
ISBN:
(纸本)9780889866522
content Distribution Networks (CDNs) have proliferated rapidly with the growth in network bandwidth and the variety of content files. The CDN service is one of the most popular Web services from Internet Service Providers (ISPs), since most ISPs are currently striving to provide additional services besides their original Internet access service. The Internet has seen an explosive increase in the number of users, which causes network servers to become overloaded, and we are currently facing several serious issues, such as declining reliability, increased response time, and so on. The replicated allocation of content files on cache servers for load-balancing is known as an effective solution to overcome these issues. In CDNs, one of the most important problems is how we allocate cache servers and content files while considering trade-offs between the cost, reliability, and delay. In this paper, we examine an example of the CDN service in an ISP "BBit-Japan", which is one of the biggest CDN service providers in Japan. We apply this example to the cache server and content allocation model which we have proposed. This optimization model introduces 0-1 integer programming to determine the optimal allocation of cache servers and content files. In this optimization model, we aim to maximize the reliability of the whole system subject to restrictions of cost and delay, and in considering trade-offs between reliability, cost, and delay. The use of this optimization model makes it possible to show precisely how they can properly allocate cache servers and content files at limited cost and within permissible delays to the CDN service providers.
作者:
Coorg, SRIBM Corp
Thomas J Watson Res Ctr Yorktown Hts NY 10598 USA
Combining 3-D graphics and video to generate a seamless visual stream is an important problem encountered in producing multimediacontent. Difficulties in dealing with perspective, occlusion, and illumination make thi...
详细信息
ISBN:
(纸本)0780365364
Combining 3-D graphics and video to generate a seamless visual stream is an important problem encountered in producing multimediacontent. Difficulties in dealing with perspective, occlusion, and illumination make this problem challenging. In this paper, I propose techniques based on standard computer vision algorithms that address perspective and occlusion problems effectively. The key insight employed is that while the general vision problem is difficult to solve, the nature of this application permits simple, effective solutions. I present results of the proposed algorithms on a sample test video sequence.
暂无评论