The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
While cloud services are becoming more and more widely used, their security issues are noticed by researchers. Multimedia data, especially images, which usually contain a lot of private information, sometimes are carelessly handled by users and the cloud servers as well. There for, it is necessary to protect those outsourced image data. Although data encryption is useful for storage purposes, data...
Image retrieval has become an important function in many emerging computer vision applications e.g. online shopping via images, medical health care systems. More and more images are being generated and stored in public clouds. However, recent photo leakage events raise concerns about privacy leaks for images stored in public clouds. In this paper, we present an efficient scalable hierarchical image...
In order to address the high transmission bandwidth requirement of an Internet-of-Video-Things (IoVT), an object-based on-line video summarization algorithm is proposed to summarize the captured video information at the sensor nodes before being transmitted to the server. It is composed of two stages: intra-view and inter-view stages. In the intra-view stage, human object detector is employed with...
Cloud computing has many attractive countenance, because of those countenance; it has become much easier to store large amount of data on it. Hence, preserving the data on cloud helps user to access the data from any place whenever it is needed. Thus due to the vast data, a very big concern emerges i.e. security and privacy. Encryption helps user to prevent their data from illegal access and thus...
The extreme volume and staggeringly increasing rate inevitably produce unprecedented pressure on any large scale video sharing and hosting systems. Among the efforts to mitigate this pressure, content-based video similarity search is becoming more and more important with the exponential growth of the data size. Though various approaches have been proposed to address this problem, they are mainly focusing...
The increasing popularity of cloud computing makes the data owner to outsource sensitive data in encrypted form onto the cloud. To tackle the problem of searching over encrypted cloud data, many keyword-based searchable encryption schemes have been proposed. However, there are few document-based search schemes in this field, which are also important in real applications. In this paper, we use the...
This paper uses retrieval technology to create a video content analysis system for collaborative film production. Present film production handles all contents as digital files and demands the collaboration of remote locations. This process requires contents transfer among locations and also collaboration tools like comment-based communication. For more creative collaboration, automatic content analysis...
Rapidly growing applications on smartphones have provided an excellent platform for mobile visual search. Most of previous visual search systems adopt the framework of ”Bag of Words”, in which words indicate quantized codes of visual features. In this work, we propose a novel visual search system based on ”Bag of Hash Bits” (BoHB), in which each local feature is encoded to a very small number of hash...
In recent years, due to the appealing features of cloud computing, large amount of data have been stored in the cloud. Although cloud based services offer many advantages, privacy and security of the sensitive data is a big concern. To mitigate the concerns, it is desirable to outsource sensitive data in encrypted form. Encrypted storage protects the data against illegal access, but it complicates...
According to the characters of openness, modularization and interface of the NC control SINUMERIK 840D on machine tools, we use MPI, DDE to communicate/data-exchange with SINUMERIK 840D. And a data acquisition system for circular tests on NC machine tools is designed and developed. Based on ISO 230-4-2005 standard for circular tests, some evaluation parameters of circular tests is introduced. And...
In this paper, they address a key challenge for scaling image search up to larger databases: the amount of memory consumed by the inverted index. In a VT-based image retrieval system, the most memory-intensive structure is the inverted index. For example, in a database of one million images where each image contains hundreds of features, the inverted index consumes 2.5 GB of RAM. Such large memory...
The economies of virtual worlds are driven by the exchange of virtual good and services. These goods are available in the form of image textures, 3D objects, and scripts. The theft or unauthorized use of these goods was and still is a serious problem for virtual world users and content providers. In our work we try to point out various aspects of IPR violations in virtual worlds and suggest a platform...
For content level access, very often database needs the query as a sample image. However, the image may contain private information and hence the user does not wish to reveal the image to the database. Private content based image retrieval (PCBIR) deals with retrieving similar images from an image database without revealing the content of the query image - not even to the database server. We propose...
A web-based system for retrieving imaged documents from a digital library is described in this paper. First, some image preprocessing is performed off-line on the underlying imaged document to extract its word objects. Then, each word object is represented by a string known as its feature code, based on which a feature code file of the corresponding document is constructed. On the web interface side,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.