The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Empowered by today’s rich tools for media generation and distribution, and the convenient Internet access , streaming crowdsourced multimedia content (crowdsourced streaming, in brief) generalizes the single-source streaming paradigm by including massive contributors for a video/data channel. It calls a joint optimization along the path from crowdsourcers , through streaming servers, to the end-users...
A passive forensics method for detecting copy-move attacks was proposed. In the proposed method, tested image was segmented into non-overlapping blocks, DCT and DWT are applied to each image block to extract features, and then compare the statistics of each image block to detection replication regions. Our method was robust to compression up to JPEG quality level 20 and against additive noise. The...
In this paper, we present a music information retrieval system which enables users to retrieve music by vocal query. Three essential components are query processing, database construction by MIDI and an approximate search engine. For query processing, we have achieved a real-time and robust voice-to- melody converter. For database construction, proposed MIDI analysis methods to obtain music melody...
We propose a DRM oriented authenticated group key agreement scheme from multilinear forms. The new scheme is ID-based, but need not trusted PKG and random oracle model, which effectively solves the key escrow problem. Our scheme can be used to replace the keys distribution scheme of existing DRM system, which avoids the trouble to build trusted channels between each pairs of users. The ID-based cryptography...
An ID-based authenticated multi-party key agreement scheme without trusted PKG is proposed in this paper. The proposed scheme is ID-based, but without any assumption of prefixed trust relationship between members, which effectively solves the problem that exists in some existing ID-based key agreement protocols in which a trusted PKG and key escrow is needed. The proposed scheme employs shared password...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.