Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
It is important to do research on the source trustworthiness of the massive data under network environment. A detection method of source trustworthiness in text is proposed and designed based on cognitive hash. Based on the HowNet semantic features, this paper designs a text cognitive hash, and proposes a method evaluating feasible hash distance. Experimental results show the effectiveness of the...
Multimedia communication networks, such as the Internet, are heterogeneous in their nature due to the usage of different methods for content distribution. The efficiency of multimedia distribution depends on the variety of communication protocols that are simultaneously running (composed) over different network hosts in order to resolve packet conflicts. A very natural question that arises in such...
In this paper,based on the analysis and comparison of the several current typical multiple constraints routing algorithms,a kind of simple multiple contraints multimedia routing algorithm is researched and implemented.Multiple contraints embodied in the two indicators bandwidth and latency.In this algorithm,all links not meeting the bandwidth requirements are eliminated firstly,then we select the...
This paper proposes a novel encryption scheme based on invertible watermarking. In the past encryption algorithms, diffusion and confusion algorithms are used to increase the effect of the encryption, however, these algorithms can only change the cover itself to be encrypted. In this paper, the invertible watermarking can be used to perform the encryption, which can not only use the additional information...
This paper presents the design and Research of the Streaming Media Video Teaching System. The techniques of multi-media teaching, Computer Assisted Instruction and network are all involved in this system. The teaching environment, teaching resources, teaching content and student information can all be managed through Network Video Teaching System. Teachers can integrate the multi-media elements provided...
Network Steganography which uses length of the packets for hiding the secret data are getting more importance day by day. Various steganographic algorithms have been proposed which embeds the data length modulating sequence of packet lengths with secret data stream. In this paper, a network steganalysis scheme has been proposed which can detect the presence of steganographic embedding by modifying...
As the advent and growing popularity of image editing software, digital images can be manipulated easily without leaving obvious visual clues. If the tampered images are abused, it may lead to potential social, legal or private consequences. To this end, it's very necessary and also challenging to find effective methods to detect digital image forgeries. In this paper, a fast method to detect image...
Digital fingerprinting is an emerging technology that provides a method for protecting multimedia content from unauthorized redistribution. Collusion attack is a cost-efficient attack for fingerprinting schemes where classes of users com-bine their fingerprinted copies for the purpose of attenuating or removing the fingerprints. This paper presents a new app-roach that is based on social networks...
With rapid advances in video processing technologies, video data increased rapidly and becomes popular in our daily life for both professional and consumer applications, e.g., surveillance, education, entertainment. Such needs require the data management system not only can store and access the video content, but also able to optimize the queries with expensive video predications in an effective and...
IMS (IP Multimedia System) facilitates a rapid deployment of new services enable new revenue streams for service providers, and improves the operating efficiency of the network by a convergence of heterogeneous into an existing IP network. In addition, it enables operators to simultaneously meet the requirements of fixed and mobile telephony. Because IMS “standardization” is limited to architecture,...
In developed countries, technical service system is a basic national policy of the government. As China's economic and social progress, government's service capability is more strengthen, a variety of departments provide related services for the trade or industry. The MVC design model is composed of Data layer, Page layer and Control layer. Through the example of e-service application system for local...
Multimedia Monitoring System Based on Wireless Network with its intuitive, convenient is widely used in production management, security and so on, become a important safety precaution tool in financial, transportation, commerce, electricity, public security, customs, national defense, and even communities. In this paper mpe-4 format as a multimedia message storage format, combined with the needs of...
This paper discusses the classification and relationship of course knowledge nodes, building the network of knowledge nodes, setting appropriate teaching strategies according to different types of knowledge nodes, and established courseware pages using HCI template in which screen layout and color use is defined. Finally, methods and experience of developing network courseware were described combined...
Key management in sensor networks is the core security protocols for wireless sensor networks (WSNs) in the hostile environment. Due to the resource constraints, pre-distribution secrets keys into sensor nodes before they are deployment are an applicable approach. Several key pre-distribution schemes have been proposed in literature to establish pairwise keys between sensor nodes. However, as the...
Tardos constructed the optimal probabilistic codes that are ε-secure against c pirates have length O(c2 log(1/ε)) and are full power of randomization. Many improved versions of Tardos' codes are proposed to shorten its code length while they are still not used in multimedia content. In this paper, the multimedia content tracing scheme based on the Tardos' fingerprint codes is proposed. Before embedding/extracting...
We propose a secure image delivery scheme which can protect privacy of the secret region in sending image. In the scheme, the bits of the chosen secret region are first reversibly embedded into non-protection region. The secret region is then concealed or substituted with other meaningful content by our modified Poisson editing method, in which twice Laplacian operator is used to achieve better seamless...
This paper studies the potential for passive steganalysis in correlated image frames using non-classical detection theory.In particular,an algorithm for digital video steganalysis,named MoViSteg for Motion-based Video Steganalysis, is developed that exploits the temporal correlation among individual image frames in video signals to enhance steganalysis performance. The method differs from prior art...
Scene change detection in videos is a primary requirement of video processing applications used for the purpose of generating data needed by video data management systems and digital rights management (DRM) systems. Scene change data can be used in DRM systems for effective IPR protection by means of watermarking and fingerprinting selected scenes. In this paper, we present a 2-pass algorithm for...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.