Video Shot boundary detection is a fundamental task in any kind of video content manipulation and retrieval. The area of shot boundary detection has been extensively studied, but achieving highly accurate detection re...
详细信息
ISBN:
(纸本)9781424403660
Video Shot boundary detection is a fundamental task in any kind of video content manipulation and retrieval. The area of shot boundary detection has been extensively studied, but achieving highly accurate detection results remains a challenge. In this paper, we present a novel algorithm for video cut detection. The algorithm is implemented and evaluated on the TRECVID benchmark platform. The experimental results show the effectiveness of the proposed approach. The algorithm provides a clue to the gradual transition detection.
Encryption is one of the most important security tools for secure message communication. There is increasing need for secure digital multimedia communication technologies to restrict unauthorized access. Prior to the ...
详细信息
Encryption is one of the most important security tools for secure message communication. There is increasing need for secure digital multimedia communication technologies to restrict unauthorized access. Prior to the availability of variable bit rate (VBR) communication services, systems typically treat every portion of a message equally and encrypt each and every bit of a message that is decrypted at the same rate as encrypted. Hence, encryption/decryption processes at both ends of the network were required to operate at the same rate. The advent of VBR multimedia communication services require new cryptography system implementations that can operate at different data rates, i.e., be scaled to different speed, different network bandwidth, and diverse receiver device capabilities. In this paper, we describe a progressive and scalable encryption scheme that supports scalability. One desirable feature of the proposed scheme is its simplicity and flexibility in supporting scalable multimedia communication and multimediacontentaccess control.
Developing an efficient system that manages distributed multimediacontent supposes to minimize resource consumption while providing the most relevant results for a user's query in the shortest time. This paper pr...
详细信息
作者:
Coorg, SRIBM Corp
Thomas J Watson Res Ctr Yorktown Hts NY 10598 USA
Combining 3-D graphics and video to generate a seamless visual stream is an important problem encountered in producing multimediacontent. Difficulties in dealing with perspective, occlusion, and illumination make thi...
详细信息
ISBN:
(纸本)0780365364
Combining 3-D graphics and video to generate a seamless visual stream is an important problem encountered in producing multimediacontent. Difficulties in dealing with perspective, occlusion, and illumination make this problem challenging. In this paper, I propose techniques based on standard computer vision algorithms that address perspective and occlusion problems effectively. The key insight employed is that while the general vision problem is difficult to solve, the nature of this application permits simple, effective solutions. I present results of the proposed algorithms on a sample test video sequence.
As the usage of wireless packet data services increases, wireless carriers today are faced with the challenge of offering multimedia applications with QoS requirements within current 3G data networks. End-to-end QoS r...
详细信息
ISBN:
(纸本)0819451258
As the usage of wireless packet data services increases, wireless carriers today are faced with the challenge of offering multimedia applications with QoS requirements within current 3G data networks. End-to-end QoS requires support at the application, network, link and medium access control (MAC) layers. We discuss existing CDMA2000 network architecture and show its shortcomings that prevent supporting multiple classes of traffic at the Radio access Network (RAN). We then propose changes in RAN within the standards framework that enable support for multiple traffic classes. In addition, we discuss how Session Initiation Protocol (SIP) can be augmented with QoS signaling for supporting end-to-end QoS. We also review state of the art scheduling algorithms at the base station and provide possible extensions to these algorithms to support different classes of traffic as well as different classes of users.
content Distribution Networks (CDNs) have proliferated rapidly with the growth in network bandwidth and the variety of content files. The CDN service is one of the most popular Web services from Internet Service Provi...
详细信息
ISBN:
(纸本)9780889866522
content Distribution Networks (CDNs) have proliferated rapidly with the growth in network bandwidth and the variety of content files. The CDN service is one of the most popular Web services from Internet Service Providers (ISPs), since most ISPs are currently striving to provide additional services besides their original Internet access service. The Internet has seen an explosive increase in the number of users, which causes network servers to become overloaded, and we are currently facing several serious issues, such as declining reliability, increased response time, and so on. The replicated allocation of content files on cache servers for load-balancing is known as an effective solution to overcome these issues. In CDNs, one of the most important problems is how we allocate cache servers and content files while considering trade-offs between the cost, reliability, and delay. In this paper, we examine an example of the CDN service in an ISP "BBit-Japan", which is one of the biggest CDN service providers in Japan. We apply this example to the cache server and content allocation model which we have proposed. This optimization model introduces 0-1 integer programming to determine the optimal allocation of cache servers and content files. In this optimization model, we aim to maximize the reliability of the whole system subject to restrictions of cost and delay, and in considering trade-offs between reliability, cost, and delay. The use of this optimization model makes it possible to show precisely how they can properly allocate cache servers and content files at limited cost and within permissible delays to the CDN service providers.
Legacy buffer cache management schemes for multimedia server are grounded at the assumption that the application sequentially accesses the multimedia file. However, user access pattern may not be sequential in some ci...
详细信息
ISBN:
(纸本)0819446408
Legacy buffer cache management schemes for multimedia server are grounded at the assumption that the application sequentially accesses the multimedia file. However, user access pattern may not be sequential in some circumstances, for example, in distance learning application, where the user may exploit the VCR-like function(rewind and play) of the system and accesses the particular segments of video repeatedly in the middle of sequential playback. Such a looping reference can cause a significant performance degradation of interval-based caching algorithms. And thus an appropriate buffer cache management scheme is required in order to deliver desirable performance even under the workload that exhibits looping reference behavior. We propose Adaptive Buffer cache Management(ABM) scheme which intelligently adapts to the file access characteristics. For each opened file, ABM applies either the LRU replacement or the interval-based caching depending on the Looping Reference Indicator, which indicates that how strong temporally localized access pattern is. According to our experiment, ABM exhibits better buffer cache miss ratio than interval-based caching or LRU, especially when the workload exhibits not only sequential but also looping reference property.
Increasingly, multimedia collections are associated with networked communities consisting of interconnected groups of users who create, annotate, browse, search, share, view, critique and remix collection content. Inf...
详细信息
ISBN:
(纸本)9781605588155
Increasingly, multimedia collections are associated with networked communities consisting of interconnected groups of users who create, annotate, browse, search, share, view, critique and remix collection content. Information arises within networked communities via connections among users and in the course of interactions between users and content. Community-derived information can be exploited to improve user access to multimedia. This paper provides a survey of techniques that make use of a combination of three information sources: community-contributed information (e.g., tags and ratings), network structure and techniques for multimediacontent analysis. This triple synergy offers a wide range of opportunities for improving access to multimedia in networked communities. We focus our survey on three areas important for multimediaaccess: annotation, distribution and retrieval. The picture that emerges is promising: information derived from the social community is remarkably effective in improving access to multimediacontent, and participation in networked communities has a high payoff. Copyright 2010 ACM.
The major drawback of interactive retrieval systems is the potential frustration of the user that is caused by an excessive labelling work. Active learning has proven to help solving this issue, by carefully selecting...
详细信息
Recent research results in the field of multimediacontent Analysis (MCA) have been marked by an abundance of theoretical and algorithmic solutions covering narrow application domains only. In this paper we analyze th...
详细信息
ISBN:
(纸本)0863415954
Recent research results in the field of multimediacontent Analysis (MCA) have been marked by an abundance of theoretical and algorithmic solutions covering narrow application domains only. In this paper we analyze this tendency and its origin in more detail and explain why, in our view, this should not be considered "the way to go" in providing easy access to content in multimediasystems and applications of the future. In particular, we concentrate on the case study of digital video, which we see as a straightforward example of multimedia. Through this case study we will discuss the needs and challenges of improving the generic potential of MCA algorithms.
暂无评论