The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents the design and Research of the Streaming Media Video Teaching System. The techniques of multi-media teaching, Computer Assisted Instruction and network are all involved in this system. The teaching environment, teaching resources, teaching content and student information can all be managed through Network Video Teaching System. Teachers can integrate the multi-media elements provided...
Digital fingerprinting is an emerging technology that provides a method for protecting multimedia content from unauthorized redistribution. Collusion attack is a cost-efficient attack for fingerprinting schemes where classes of users com-bine their fingerprinted copies for the purpose of attenuating or removing the fingerprints. This paper presents a new app-roach that is based on social networks...
IMS (IP Multimedia System) facilitates a rapid deployment of new services enable new revenue streams for service providers, and improves the operating efficiency of the network by a convergence of heterogeneous into an existing IP network. In addition, it enables operators to simultaneously meet the requirements of fixed and mobile telephony. Because IMS “standardization” is limited to architecture,...
The following topics are dealt with: multimedia computing; information networking; information security; communication security; network security; cultural heritage environment security; information privacy; social network; watermarking; multimedia search; multimedia mining; mobile Internet; wireless network security; network steganography; service-oriented architecture; services computing; and multimedia...
Tardos constructed the optimal probabilistic codes that are ε-secure against c pirates have length O(c2 log(1/ε)) and are full power of randomization. Many improved versions of Tardos' codes are proposed to shorten its code length while they are still not used in multimedia content. In this paper, the multimedia content tracing scheme based on the Tardos' fingerprint codes is proposed. Before embedding/extracting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.