MULTIMEDIA '00最新文献

筛选
英文 中文
Learning image similarities and categories from content analysis and relevance feedback 从内容分析和相关反馈中学习图像的相似性和类别
MULTIMEDIA '00 Pub Date : 2000-11-04 DOI: 10.1145/357744.357927
Zijun Yang, C.-C. Jay Kuo
{"title":"Learning image similarities and categories from content analysis and relevance feedback","authors":"Zijun Yang, C.-C. Jay Kuo","doi":"10.1145/357744.357927","DOIUrl":"https://doi.org/10.1145/357744.357927","url":null,"abstract":"In this work, a scheme that learns image similarities and categories from relevance feedback is presented. First, we choose the most suitable features to describe images by content analysis and categorize each image by predicting its semantic meanings. During the retrieval process, users are allowed to confirm semantic classification of the query example and evaluate retrieval results with relevance feedback. By analyzing the feedback information, the system learns both image similarities and semantic meanings. In similarity learning, the retrieving results are refined by modifying the similarity metric. Semantic learning is performed by using the decision tree training algorithm.","PeriodicalId":234597,"journal":{"name":"MULTIMEDIA '00","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121996215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Virtual Garden: a vision-based multimedia installation 虚拟花园:基于视觉的多媒体装置
MULTIMEDIA '00 Pub Date : 2000-11-04 DOI: 10.1145/357744.357753
A. Senior
{"title":"Virtual Garden: a vision-based multimedia installation","authors":"A. Senior","doi":"10.1145/357744.357753","DOIUrl":"https://doi.org/10.1145/357744.357753","url":null,"abstract":"This paper describes a project proposal for a vision-based multimedia installation, bringing together computer vision, computer graphics and other modalities to generate a virtual Japanese garden. The installation provides a platform for exploring human-computer interaction through physical objects.","PeriodicalId":234597,"journal":{"name":"MULTIMEDIA '00","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125653122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Audio watermarking for monitoring and copy protection 音频水印监控和复制保护
MULTIMEDIA '00 Pub Date : 2000-11-04 DOI: 10.1145/357744.357895
J. Haitsma, M. V. D. Veen, T. Kalker, Fons Bruekers
{"title":"Audio watermarking for monitoring and copy protection","authors":"J. Haitsma, M. V. D. Veen, T. Kalker, Fons Bruekers","doi":"10.1145/357744.357895","DOIUrl":"https://doi.org/10.1145/357744.357895","url":null,"abstract":"Based on existing technology used in image and video watermarking, we have developed a robust audio watermarking technique. The embedding algorithm operates in frequency domain, where the magnitudes of the Fourier coefficients are slightly modified. In the temporal domain, an additional scale parameter and gain function are necessary to refine the watermark and achieve perceptual transparency. Watermark detection relies on the Symmetrical Phase Only Matched Filtering (SPOMF) cross-correlation approach. Not only the presence of a watermark, but also its cyclic shift is detected. This shift supports a multi-bit payload for one particular watermark sequence. The watermarking technology proved to be very robust to a large number of signal processing “attacks” such as MP3 (64 kb/s), all-pass filtering, echo addition, time-scale modification, resampling, noise addition, etc. It is expected that this approach may contribute in a wide variety of existing (e.g. monitoring and copy protection) and future applications.","PeriodicalId":234597,"journal":{"name":"MULTIMEDIA '00","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129038023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 79
Coimbra: secure Web access to multimedia content 科英布拉:安全的网络访问多媒体内容
MULTIMEDIA '00 Pub Date : 2000-11-04 DOI: 10.1145/357744.357913
E. Weippl
{"title":"Coimbra: secure Web access to multimedia content","authors":"E. Weippl","doi":"10.1145/357744.357913","DOIUrl":"https://doi.org/10.1145/357744.357913","url":null,"abstract":"In this paper, we describe various concepts how Web content can be published in a way so that copies cannot be illegally distributed. The required access control mechanisms are implemented using well-known cryptographic algorithms. A modified Web browser decrypts the content on-the-fly so that it is impossible for unauthorized users to copy and distribute the presented multimedia content.","PeriodicalId":234597,"journal":{"name":"MULTIMEDIA '00","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123272256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Associating network flows with user and application information 关联网络流与用户和应用信息
MULTIMEDIA '00 Pub Date : 2000-11-04 DOI: 10.1145/357744.357914
R. Ackermann, U. Roedig, M. Zink, C. Griwodz, R. Steinmetz
{"title":"Associating network flows with user and application information","authors":"R. Ackermann, U. Roedig, M. Zink, C. Griwodz, R. Steinmetz","doi":"10.1145/357744.357914","DOIUrl":"https://doi.org/10.1145/357744.357914","url":null,"abstract":"The concept of authenticating users e.g. by means of a login process is very well established and there is no doubt that it is absolutely necessary and helpful in a multiuser environment. Unfortunately specific information about a user originating a data stream or receiving it, is often no longer available at the traversed network nodes. This applies to the even more specific question of what application is used as well. Routers, gateways or firewalls usually have to base their classification of data on IP header inspection or have to try to extract information from the packets payload.\u0000We present an approach that works transparently and allows to associate user and application specific information with IP data streams by only slightly modifying components of the operating system environment and infrastructure components. On top of this framework we show usage scenarios for dedicatedly placing copyright information in media content and for an enhancement of the interoperation with the security infrastructure.","PeriodicalId":234597,"journal":{"name":"MULTIMEDIA '00","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116926040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Multimedia content protection by cryptography and watermarking in tamper-resistant hardware 在防篡改硬件中采用加密和水印技术保护多媒体内容
MULTIMEDIA '00 Pub Date : 2000-11-04 DOI: 10.1145/357744.357909
F. Bao
{"title":"Multimedia content protection by cryptography and watermarking in tamper-resistant hardware","authors":"F. Bao","doi":"10.1145/357744.357909","DOIUrl":"https://doi.org/10.1145/357744.357909","url":null,"abstract":"With the rapid growth of broadband network, distribution of multimedia via Internet is a must way to go. Content protection has become one of the most significant and challenging problems of this field. In this paper, we propose a general scheme that combines public key cryptography and watermarking technology together, to achieve wonderful content protection. The scheme is reliable, flexible and efficient.","PeriodicalId":234597,"journal":{"name":"MULTIMEDIA '00","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122887772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Secure data hiding in wavelet compressed fingerprint images 安全数据隐藏在小波压缩指纹图像
MULTIMEDIA '00 Pub Date : 2000-11-04 DOI: 10.1145/357744.357902
N. Ratha, J. Connell, R. Bolle
{"title":"Secure data hiding in wavelet compressed fingerprint images","authors":"N. Ratha, J. Connell, R. Bolle","doi":"10.1145/357744.357902","DOIUrl":"https://doi.org/10.1145/357744.357902","url":null,"abstract":"With the rapid growth of the Internet, electronic commerce revenue now amounts to several billion US dollars. To avoid fraud and misuse, buyers and sellers desire more secure methods of authentication than today's userid and password combinations. Automated biometrics technology in general, and fingerprints in particular, provide an accurate and reliable authentication method. However, fingerprint-based authentication requires accessing fingerprint images scanned remotely at the user's workstation, a potentially weak point in the security system. Stored or synthetic fingerprint images might be fraudulently transmitted, even if the communication channel itself is encrypted. In this paper we describe an algorithm for secure data hiding in wavelet compressed fingerprint images to alleviate this problem. Assuming the image capture device is secure, then only the decompressor on the server can locate the embedded message and thereby validate the submitted image.","PeriodicalId":234597,"journal":{"name":"MULTIMEDIA '00","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123468527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 130
Watermarking at point of origin 在原点进行水印
MULTIMEDIA '00 Pub Date : 2000-11-04 DOI: 10.1145/357744.357907
A. Tirkel, T. Hall
{"title":"Watermarking at point of origin","authors":"A. Tirkel, T. Hall","doi":"10.1145/357744.357907","DOIUrl":"https://doi.org/10.1145/357744.357907","url":null,"abstract":"We describe a proposed scheme for watermarking images or video at the camera. This addresses the issue of image security between the point of origin and the point of distribution. The scheme is expected to find application in the security industry, where proof of tampering is important and in commercial photography, where breach of copyright is important.","PeriodicalId":234597,"journal":{"name":"MULTIMEDIA '00","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128904759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Video transcoding for universal multimedia access 用于通用多媒体访问的视频转码
MULTIMEDIA '00 Pub Date : 2000-11-04 DOI: 10.1145/357744.357764
N. Björk, C. Christopoulos
{"title":"Video transcoding for universal multimedia access","authors":"N. Björk, C. Christopoulos","doi":"10.1145/357744.357764","DOIUrl":"https://doi.org/10.1145/357744.357764","url":null,"abstract":"This paper discusses the issue of adapting video streams to different type of terminals with different terminal capabilities such as screen size, amount of available memory, processing power and type of network access. This functionality will be very useful for the Universal Multimedia Access application related to MPEG-7 standardization activities. Two different models for transcoding are examined, rate reduction and resolution reduction. Results will show that the computational complexity of the basic transcoding model can be reduced for each model by, on average, 39% and 23% without significant loss in quality. Comparisons with the scaleable coding model are also shown.","PeriodicalId":234597,"journal":{"name":"MULTIMEDIA '00","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128283431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Similarity-based retrieval of temporal documents 基于相似度的时态文档检索
MULTIMEDIA '00 Pub Date : 2000-11-04 DOI: 10.1145/357744.357955
P. Yamuna, K. Candan
{"title":"Similarity-based retrieval of temporal documents","authors":"P. Yamuna, K. Candan","doi":"10.1145/357744.357955","DOIUrl":"https://doi.org/10.1145/357744.357955","url":null,"abstract":"In this paper, we describe a similarity-based retrieval framework that addresses the challenges associated with the temporal nature of multimedia documents. Multimedia documents consist of multiple media objects and a set of specifications (eg. temporal) that tie these objects together. Therefore, we describe similarity/dissimilarity measures that aim to capture document authors' intensions. We use a prioritized constraint-based framework to evaluate these measures. We also develop algorithms that efficiently compute these measures for special cases.","PeriodicalId":234597,"journal":{"name":"MULTIMEDIA '00","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132166699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信