The mobility and ubiquity for any type of device to access the IPTV network must be supplied by the service provider. The minimum bandwidth required in the access network to provide IPTV services jointly with the nece...
详细信息
ISBN:
(纸本)9781605585918
The mobility and ubiquity for any type of device to access the IPTV network must be supplied by the service provider. The minimum bandwidth required in the access network to provide IPTV services jointly with the necessity to guarantee the Quality of Experience (QoE) to the user makes the need of algorithms to combine different wireless standards and technologies in the access network. In this paper, we propose a system that decides which type of wireless access network to connect with (for dual-band and tri-band devices) depending on the requirements of the IPTV client, the available networks, and some network parameters, such as the number of loss packets and packet delay, to provide the maximum QoE to the customer. The measurements taken in a real environment from the wireless networks allow us to know the weight of the parameters in the proposed algorithm. Copyright 2009 ACM.
Video adaptation has been introduction to tailor the same video to different derived user contexts to allow end users with different access network, client device and user profiles to access the same information sourc...
详细信息
Video adaptation has been introduction to tailor the same video to different derived user contexts to allow end users with different access network, client device and user profiles to access the same information source. Therefore, there is a need for the increase of automated auditing and intelligent reporting mechanisms for the download digital contents. This paper presents a proposed architecture of an intelligent adaptation model (IAM). The objective of this system investigation into the potential security issues involved in content adaptation, especially video content adaptation, in multimedia intelligent system. For delivery video content we suggest the intelligent adaptation model that uses the digital item description in MPEG-21 multimedia framework.
P2P technology is promising for large-scale content distribution over the Internet. Evaluating and analyzing new and existing algorithms and protocols is a key issue for developers of P2P systems. Simulation has becom...
详细信息
In this article we are presenting a solution for the problem of combining various indexation algorithms in order to acquire a semantic multimedia indexation and to provide responses to the user complex queries. The ch...
详细信息
ISBN:
(纸本)9781424435692
In this article we are presenting a solution for the problem of combining various indexation algorithms in order to acquire a semantic multimedia indexation and to provide responses to the user complex queries. The challenge of this problem concerns the big heterogeneity of the multimedia indexation algorithms and the weak semantic aspect they address. Our solution considers a generic interface for the indexation algorithms, an implementation as Web services, as well as a semantic description in terms of WSMO (Web Service Modeling Ontology) of their functionality and orchestration. Original contribution of the article concerns the idea of organizing the various multimedia metadata types into a generic structure,used to express the user queries, the algorithms' generic interface, as well as the algorithms' WSMO metadata. This approach facilitates the definition of algorithm combination rules, and enables the reduction of the multimedia retrieval task to a metadata matching process.
In comparison to traditional voice based circuit switched mobile systems, the multimediacontent puts forward significantly strict quality of service requirements. In this perspective, a noticeable proportion of conte...
详细信息
The proceedings contain 37 papers. The topics discussed include: stable protocols for the medium access control in wireless networks;new approaches of parallel calculus in groups of firms;mathematical theory of inform...
ISBN:
(纸本)9789604741342
The proceedings contain 37 papers. The topics discussed include: stable protocols for the medium access control in wireless networks;new approaches of parallel calculus in groups of firms;mathematical theory of information technology;AI, granular computing, and automata with structured memory;using cloud computing for E-Learning systems;quality model for M-Learning applications;robustness of information systems and technologies;using some web content mining techniques for Arabic text classification;a modified C-Means clustering algorithm;new implementation of unsupervised ID3 algorithm (NIU-ID3) using Visual ***;distributed algorithms for power saving optimization in sensor network;secure automatic ticketing system;and secure distribution of confidential information via self-destructing data.
Digital rights management systems (DRMS) are supposed to protect copyrights of the precious content for content provider. Besides access control, usage control focuses on how consumers use the digital works and preven...
详细信息
Digital rights management systems (DRMS) are supposed to protect copyrights of the precious content for content provider. Besides access control, usage control focuses on how consumers use the digital works and prevents their content from being copied and distributed illegally. This paper introduces a technique called Windows Kernel Hook (WKH) to carry out the goal and protect the digital content from being replicated and stored. Windows Kernel Hook(WKH) has been implemented in C++ through hooking the system service dispatch table (SSDT) and adopted to Adobe Reader. The result indicates that this technique has the capabilities to solve the problem and potentials to contribute to a compatible DRMS on Windows NTs.
An IPTV system that transmits contents through an IP network needs to adopt a conditional access system allowing only authorized subscribers to view premium content as in other Pay-TV systems. IPTV systems adopting on...
详细信息
An IPTV system that transmits contents through an IP network needs to adopt a conditional access system allowing only authorized subscribers to view premium content as in other Pay-TV systems. IPTV systems adopting one of conditional accesssystems provided by a specific major vendor have a difficulty in changing the conditional access system loaded on a set-top box or on a removable hardware device, such as Smart card. However, a software download scheme through an IP network enables an IPTV set-top box to change the existing conditional access system in a secure way. This paper proposes a dynamic conditional access system for an IPTV set-top box that securely downloads cryptographic software and dynamically executes the cryptographic software when it is required. Therefore, the proposed system enables an IPTV multimedia system to provide seamless conditional access services to IPTV subscribers without rebooting the IPTV set-top box or replacing a hardware security device while changing the running cryptographic software.
Ubiquitous multimedia applications are becoming more and more popular. However, the solutions that confirm content and interaction security in these applications are still open issues because of various network conver...
详细信息
Ubiquitous multimedia applications are becoming more and more popular. However, the solutions that confirm content and interaction security in these applications are still open issues because of various network convergences and device interconnections. This paper investigates a ubiquitous multimedia scheme and proposes a secure service solution. In the ubiquitous scheme, the multimediacontent is encoded with scalable video coding and broadcasted via digital video broadcasting for handheld terminals (DVB-H) to mobile terminals, the access right is transmitted by global system for mobile (GSM) channel, and the media content and access right can also be transmitted from mobile terminals to home TV through WiFi based wireless local area network. The proposed secure solution supports three kinds of business models by using various content encryption modes and secure interaction protocols. The solution's security is evaluated and discussed. Since few works have been done to solve this problem, this paper is expected to attract more researchers.
Peer-to-peer content distribution provides high network throughput with relatively low server cost and scales better than traditional content distribution networks with respect to the number of clients. It is ideal fo...
详细信息
Peer-to-peer content distribution provides high network throughput with relatively low server cost and scales better than traditional content distribution networks with respect to the number of clients. It is ideal for applications requiring large data transfer such as video-on-demand or live video streaming. Traditional forensic watermarking systems are based on the assumption that each user receives a unique copy of video content to allow for tracking of pirated content back to the original recipient. However, P2P-based distribution systems are typically designed to supply identical copies to each user. This paper proposes a new watermarking framework that is suitable for P2P-based content delivery systems. Watermarking algorithms that are appropriate for this system are also discussed.
暂无评论