{"title":"使用加密生物识别多媒体保护电子学习系统","authors":"Afolabi Ao","doi":"10.19080/BBOAJ.2018.07.555710","DOIUrl":null,"url":null,"abstract":"With the introduction of streaming multimedia in the past few years, large multimedia files can now be delivered even over modem connections. Streaming multimedia is an Internet data transfer method that facilitates the transfer of audio and video files from computer to computer in a “stream.” Streamed media packets can be played as soon as the data starts arriving at the receiving computer—users do not have to wait until the full file has been downloaded. Streaming audio has been more successful than video, which has generally been limited to small picture sizes or low resolution (grainy) video Paperions, but as the bandwidth increases, higher quality, full-screen video becomes possible. When a sound file is to be prepared for streaming, it is compressed to reduce the overall size of the file. Streaming audio is currently being used as a supplement to classroom-based and online course delivery, usually in the form of pre-recorded lectures, interviews with guests, student Papers, samples of student classroom interaction, or sound bytes of content relevant to the course of study. When implemented wisely, video can alleviate the “page-turning” boredom of many online courses [1]. The multimedia based e-learning content of this site is protected by data encryption, as more users come to understand the internet’s open nature and the dangers of web surfing, Today’s web browsers automatically encrypt text when making a connection to a secure server. This prevents intruders from listening in on private communications. Even if they are able to capture the message, encryption allows them to only view scrambled text or what many call unreadable gibberish. Upon arrival, the data is decrypted, allowing the intended recipient to view. Without this security mechanism, information transferred over the internet can be easily captured and viewed by anyone listening. Data encryption refers to mathematical calculations and algorithmic schemes that transform plaintext into cyphertext, a form that is non-readable to unauthorized parties. The recipient of an encrypted message uses a key which triggers the algorithm mechanism to decrypt the data, transforming it to the original plaintext version. Another security mechanism implemented in this Paper is the Online face recognition which facilitates a user who is equipped with a display device. Our online singleimage face recognition system is implemented using still imagebased algorithms [2]. Principal Component Analysis based facial Abstract","PeriodicalId":72412,"journal":{"name":"Biostatistics and biometrics open access journal","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2018-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Securing E-Learning System with Crypto-Biometric Multimedia\",\"authors\":\"Afolabi Ao\",\"doi\":\"10.19080/BBOAJ.2018.07.555710\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the introduction of streaming multimedia in the past few years, large multimedia files can now be delivered even over modem connections. Streaming multimedia is an Internet data transfer method that facilitates the transfer of audio and video files from computer to computer in a “stream.” Streamed media packets can be played as soon as the data starts arriving at the receiving computer—users do not have to wait until the full file has been downloaded. Streaming audio has been more successful than video, which has generally been limited to small picture sizes or low resolution (grainy) video Paperions, but as the bandwidth increases, higher quality, full-screen video becomes possible. When a sound file is to be prepared for streaming, it is compressed to reduce the overall size of the file. Streaming audio is currently being used as a supplement to classroom-based and online course delivery, usually in the form of pre-recorded lectures, interviews with guests, student Papers, samples of student classroom interaction, or sound bytes of content relevant to the course of study. When implemented wisely, video can alleviate the “page-turning” boredom of many online courses [1]. The multimedia based e-learning content of this site is protected by data encryption, as more users come to understand the internet’s open nature and the dangers of web surfing, Today’s web browsers automatically encrypt text when making a connection to a secure server. This prevents intruders from listening in on private communications. Even if they are able to capture the message, encryption allows them to only view scrambled text or what many call unreadable gibberish. Upon arrival, the data is decrypted, allowing the intended recipient to view. Without this security mechanism, information transferred over the internet can be easily captured and viewed by anyone listening. Data encryption refers to mathematical calculations and algorithmic schemes that transform plaintext into cyphertext, a form that is non-readable to unauthorized parties. The recipient of an encrypted message uses a key which triggers the algorithm mechanism to decrypt the data, transforming it to the original plaintext version. Another security mechanism implemented in this Paper is the Online face recognition which facilitates a user who is equipped with a display device. Our online singleimage face recognition system is implemented using still imagebased algorithms [2]. Principal Component Analysis based facial Abstract\",\"PeriodicalId\":72412,\"journal\":{\"name\":\"Biostatistics and biometrics open access journal\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-06-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Biostatistics and biometrics open access journal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.19080/BBOAJ.2018.07.555710\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Biostatistics and biometrics open access journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.19080/BBOAJ.2018.07.555710","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Securing E-Learning System with Crypto-Biometric Multimedia
With the introduction of streaming multimedia in the past few years, large multimedia files can now be delivered even over modem connections. Streaming multimedia is an Internet data transfer method that facilitates the transfer of audio and video files from computer to computer in a “stream.” Streamed media packets can be played as soon as the data starts arriving at the receiving computer—users do not have to wait until the full file has been downloaded. Streaming audio has been more successful than video, which has generally been limited to small picture sizes or low resolution (grainy) video Paperions, but as the bandwidth increases, higher quality, full-screen video becomes possible. When a sound file is to be prepared for streaming, it is compressed to reduce the overall size of the file. Streaming audio is currently being used as a supplement to classroom-based and online course delivery, usually in the form of pre-recorded lectures, interviews with guests, student Papers, samples of student classroom interaction, or sound bytes of content relevant to the course of study. When implemented wisely, video can alleviate the “page-turning” boredom of many online courses [1]. The multimedia based e-learning content of this site is protected by data encryption, as more users come to understand the internet’s open nature and the dangers of web surfing, Today’s web browsers automatically encrypt text when making a connection to a secure server. This prevents intruders from listening in on private communications. Even if they are able to capture the message, encryption allows them to only view scrambled text or what many call unreadable gibberish. Upon arrival, the data is decrypted, allowing the intended recipient to view. Without this security mechanism, information transferred over the internet can be easily captured and viewed by anyone listening. Data encryption refers to mathematical calculations and algorithmic schemes that transform plaintext into cyphertext, a form that is non-readable to unauthorized parties. The recipient of an encrypted message uses a key which triggers the algorithm mechanism to decrypt the data, transforming it to the original plaintext version. Another security mechanism implemented in this Paper is the Online face recognition which facilitates a user who is equipped with a display device. Our online singleimage face recognition system is implemented using still imagebased algorithms [2]. Principal Component Analysis based facial Abstract