The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid development of network technology, many multimedia streaming services are developing rapidly. The traditional multimedia providers use client-server architecture, where the server bottleneck and the cost of transmission bandwidth are the most obvious drawbacks. Therefore, P2P technology has been used in multimedia streaming services to enhance the scalability and performance of the...
This paper presents a real-time video stabilization method based on motion compensation for adjusting unstable frames captured by a vibrating camera. The basic strategy is first to check if the frame is vibrant and then to analyze the vibration type and calculate the vibration degree for compensating the vibration area. Based on block motion estimation, a feature block selected from nine fixed observation...
Model-driven development is worthy of further research because of its proven capabilities in increasing productivity and ensuring correctness. However, it has not yet been explored for multi-core processor-based embedded systems, whose programming is even more complex and difficult that that for conventional uni-processor systems. We propose a new VERTAF/Multi-Core (VMC) framework to bridge this gap...
Multicast video authentication is important to verify the authenticity of video data transmitted over the network. In this paper, we focus on unequal authenticity protection for video multicasting. A two-stage authentication strategy, which is composed of hash-based authentication and FEC-based correction, is proposed to resist the pollution attack. Different from the traditional methods, the FEC...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.