Paper Search Console

Home Search Page About Contact

Journal Title

Title of Journal: Multimed Tools Appl

Search In Journal Title:

Abbravation: Multimedia Tools and Applications

Search In Journal Abbravation:

Publisher

Springer US

Search In Publisher:

DOI

10.1002/cplu.201100010

Search In DOI:

ISSN

1573-7721

Search In ISSN:
Search In Title Of Papers:

Special issue on multimedia analysis and security

Authors: Shiguo Lian Sergio Velastin
Publish Date: 2010/09/01
Volume: 57, Issue: 1, Pages: 1-4
PDF Link

Abstract

Multimedia analysis aims to provide various means to understand multimedia content automatically Although it is still a challenging topic various achievements have been obtained and used in practical applications eg contentbased image search automatic news program segmentation and automatic sports highlight extraction Especially some multimedia analysis techniques are potential for securityrelated applications eg intelligent surveillance based on event detection sensitive content detection/filtering based on content understanding and mining piracy tracking based on content fingerprinting and person identification based on biometric recognition This field is attracting more and more researchers However few special issues on journals have been organizedThis special issue aims to expose the readership to the latest research results on Multimedia Analysis and Security It includes a number of related topics demonstrates pioneer work investigates novel solutions and discussed the future trends in this field This issue is composed of six papers selected from 22 submissions Each paper is reviewed by at least two experts with at least two roundsSome of the papers are recommended by 2009 International Conference on Multimedia Information NEtworking and Security MINES 2009 http//lisswhueducn/mines2009/ which aims to provide a platform for worldwide researchers and engineers to exchange the latest research results on multimedia information services with the focuses on networking and security This conference keeps the paper acceptance rate of 40 The recommended best papers have at least 40 difference from the conference paperThe first paper “Image Similarity From Syntax to Weak Semantics” by J Perkio et al investigates the measurement of image similarity which is important for such applications as media search copy detection piracy tracing etc In this paper the authors examined the use of simple syntactic image features lower level and context free combined with other multimodal features to derive a similarity measure that captures the weak semantics of an image in order to solve the problem that the semantic higher contextual level features are still difficult to obtained The weak semantics can be seen as an intermediate step between low level image understanding and full semantic image understanding The measure is tested for multimedia retrieval task on a tv series data which shows how different modalities relate to each other This paper provides valuable information to researchers in multimedia analysisIn the second paper “An Algorithmic Analysis of Zernike Moments in the Presence of Rotation with Crop and Loose Modes” by S Xiang Zernike moments’ performance against rotations is investigated Zernike moments have some desirable properties such as rotational invariance noise robust and efficient representation of pattern and are often used in pattern recognition and robust watermarking In both theoretical and experimental ways this paper analyzes the effect of image rotations including crop rotation and loose rotation on Zernike moments and proposes the solutions to extract better Zernike moments For example for the crop rotation it suggests to extract the Zernike moments by mapping the image over a disc instead of inside a circle since the outside of an image after the crop rotation will be distorted For the loose rotation a preprocessing step ie image size normalization will be introduced in order to eliminate the effect of image size change Experimental results show the improved Zernike moments computing methods get some apparent advantagesThe third paper “Content Distribution and Copyright Authentication Based on Combined Indexing and Watermarking” by S Lian et al proposes a media content distribution and copyright authentication system based on both media index and watermarking techniques Before media distribution the media content is marked by embedding the customer information and the robust features used both for media index and content emendation are extracted from the watermarked media and registered in a feature database To detect whether a media content over Internet is copyrightprotected or not a watermark is extracted from the media and compared with the original one If the watermark is not found a robust feature is computed from the media and matched with the feature database The matching result gives the operation parameters that are used to emend the media content After media emendation a watermark is extracted again and used to authenticate the copyright Experimental results show that the combination of media index and watermark detection can improve the detection rate greatly This paper tells an interesting research topic of detecting piracy by combining media index and watermarkingIn the fourth paper “Watermarking Geographical Data on Spatial Topological Relations” by C Wang et al a watermarking algorithm is proposed to protect the copyright of geographical data With the wide application of geographical data the copyright protection of geographical data becomes a hot research topic In this paper the spatial topological relation existing between polygons is chosen as cover data and the watermark is embedded by slightly modifying the metric measure of spatial topological relation and some geographical objects are scaled to derive the watermarked data To measure the distortions caused by watermark embedding Global Main Scaling Distance is introduced The comparative results show that the proposed algorithm has some good performances eg a good robustness against geometrical attacks simplification interpolation etc and a good tradeoff between robustness and fidelity is acquiredThe fifth paper “ParameterEstimation and AlgorithmSelection Based UnitedJudgment for Image Steganalysis” by J Lu et al investigates steganalysis algorithms that are used to detect whether the secret message is transmitted via the carrier eg text image video audio etc Considering that there exist various steganalysis algorithms this paper synthetically utilize multiple existing algorithms to construct unitedjudgment methods For example the principles are proposed to select multiple algorithms and parameters accordingly In evaluations both the blind and specific steganalysis are investigated Various experiments are done and the results show that the proposed algorithms achieve more reliable detectionIn the sixth paper “What are suspicious VoIP delays” by W Mazurczyk et al the steganalysis in VoIP networks is investigated Since Voice over IP VoIP is now one of the most popular realtime services in IP networks it is also adopted by anonymous users to transmit secret information via information hiding techniques Considering that the modification of an RTP packet stream may lead to packet delay reordering or intentionally lost the information hiding in VoIP may be detectable Motivated by this point the paper examines real RTP traffic traces eg telling what the “normal” delays in RTP packet streams look like and what the steganographic one differs And thus shows the potential means to detect steganographic exchanges in VoIP This paper mentions an interesting research topicThe guest editors wish to thank Prof Borko Furht for providing the opportunity to edit this special issue on Multimedia Analysis and Security and Ms Laura A Lander Ms Maria Mhanilet de Leon and Ms Monalisa Castaneda for providing latest publishing information and making this issue published We would also like to thank the authors for submitting their works as well as the referees who have critically evaluated the papers within the short stipulated time Finally we hope the reader will share our joy and find this special issue very useful


Keywords:

References


.
Search In Abstract Of Papers:
Other Papers In This Journal:

  1. A novel specific image scenes detection method
  2. An image watermarking based on the pdf modeling and quantization effects in the wavelet domain
  3. Using augmented reality for students health - case of combining educational learning with standard fitness
  4. A fast and effective image retrieval scheme using color-, texture-, and shape-based histograms
  5. A zero-vision music recording paradigm for visually impaired people
  6. Content-based search in multilingual audiovisual documents using the International Phonetic Alphabet
  7. Open media service architecture for advanced collaboration environments
  8. Editorial: Semantic Media Adaptation and Personalization
  9. Editorial: Semantic Media Adaptation and Personalization
  10. Scene-adaptive accurate and fast vertical crowd counting via joint using depth and color information
  11. Analyzing three-party authentication and key agreement protocol for real time IP multimedia server–client systems
  12. Evaluation on diffusion tensor image registration algorithms
  13. Efficient quantization algorithm for real-time MP-3 encoders
  14. Learning spherical hashing based binary codes for face recognition
  15. Implementing situation-aware and user-adaptive music recommendation service in semantic web and real-time multimedia computing environment
  16. Unsupervised digital movie restoration with spatial models of color
  17. An efficient segmentation method using saliency object detection
  18. IoT as a applications: cloud-based building management systems for the internet of things
  19. An improved block size selection method based on macroblock movement characteristic
  20. Categorization for grouping associative items using data mining in item-based collaborative filtering
  21. Directional texture transfer for video
  22. Multimedia cloud transmission and storage system based on internet of things
  23. Steganography integrated into linear predictive coding for low bit-rate speech codec
  24. Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices
  25. An evaluation of image based steganography methods
  26. Segmentation-based multi-class semantic object detection
  27. A hybrid hierarchical framework for classification of breast density using digitized film screen mammograms
  28. Action recognition using lie algebrized gaussians over dense local spatio-temporal features
  29. Action recognition using lie algebrized gaussians over dense local spatio-temporal features
  30. DCAF: An MPEG-21 Dynamic Content Adaptation Framework
  31. An innovative image encryption scheme based on chaotic map and Vigenère scheme
  32. Subjective and objective quality assessment of videos in error-prone network environments
  33. Full-scale 3D multimedia preoperative planning system for total ankle joint replacement
  34. Visual graph modeling for scene recognition and mobile robot localization
  35. Spectral segmentation via minimum barrier distance
  36. Learning correlations for human action recognition in videos
  37. A grouped-scalable secret image sharing scheme
  38. Polyline curvatures based robust vector data hashing
  39. Providing universally accessible interactive services through TV sets: implementation and validation with elderly users
  40. Hierarchical multi-classifier system design based on evolutionary computation technique
  41. Anomaly detection in compressed H.264/AVC video
  42. A novel multiple-level secret image sharing scheme
  43. Pathological brain detection using curvelet features and least squares SVM
  44. Non-local sparse regularization model with application to image denoising
  45. Open annotations on multimedia Web resources
  46. Craniofacial reconstruction based on multi-linear subspace analysis
  47. Liver medical image registration based on biomechanical model
  48. Content-based image retrieval using fuzzy perceptual feedback
  49. Ranking algorithm for book reviews with user tendency and collective intelligence
  50. Tamper detection and image recovery for BTC-compressed images
  51. Wavelet tree based digital image watermarking by adopting the chaotic system for security enhancement
  52. Design of USIM-based secure user authentication scheme in a mobile office environment
  53. Face verification with feature fusion of Gabor based and curvelet based representations
  54. Finding a needle in a haystack: an interactive video archive explorer for professional video searchers
  55. Rightful ownership through image adaptive DWT-SVD watermarking algorithm and perceptual tweaking
  56. Applications for a people detection and tracking algorithm using a time-of-flight camera
  57. Novel correspondence-based approach for consistent human skeleton extraction
  58. View synthesis distortion elimination filter for depth video coding in 3D video broadcasting
  59. Blind detection of median filtering using linear and nonlinear descriptors
  60. Fast source camera identification using matching signs between query and reference fingerprints
  61. A framework for unsupervised mesh based segmentation of moving objects
  62. Modeling and evaluating IPTV applications in WiMAX networks
  63. Partial matching of 3D cultural heritage objects using panoramic views
  64. Efficient image colorization based on seed pixel selection
  65. Towards exploratory video search using linked data
  66. Audio splicing detection and localization using environmental signature
  67. The foundation of a color-chip evaluation system of jadeite-jade green with color difference control of medical device
  68. An image encryption algorithm based on DNA sequence operations and cellular neural network
  69. An automatic feature generation approach to multiple instance learning and its applications to image databases
  70. A secured robust watermarking scheme based on majority voting concept for rightful ownership assertion
  71. A hybrid bio-inspired learning algorithm for image segmentation using multilevel thresholding
  72. Adaptive image data hiding using transformation and error replacement
  73. An effective head pose estimation approach using Lie Algebrized Gaussians based face representation
  74. A speech content authentication algorithm based on a novel watermarking method
  75. Application of a generalized difference expansion based reversible audio data hiding algorithm
  76. Positioning corners of human mouth based on local gradient operator
  77. A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos
  78. Pyramid coding based rate control for constant bit rate video streaming
  79. Video streaming over the internet with optimal bandwidth resource allocation
  80. Image classification based on convolutional neural networks with cross-level strategy
  81. Video streaming over the internet with optimal bandwidth resource allocation
  82. Estimating material properties of deformable objects by considering global object behavior in video streams
  83. Pyramid coding based rate control for constant bit rate video streaming
  84. A Learning to Rank framework applied to text-image retrieval
  85. Authorship verification applied to detection of compromised accounts on online social networks
  86. Color texture segmentation based on active contour model with multichannel nonlocal and Tikhonov regularization
  87. Discriminative transform of receptive field patterns for feature representation
  88. Multimedia framework to support eHealth applications
  89. Image denoising using 2-D FIR filters designed with DEPSO

Search Result: