The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper introduces an open-source HEVC video call application called Kvazzup. This academic proposal is the first HEVC-based end-to-end video call system with a user-friendly Graphical User Interface for call management. Kvazzup is built on the Qt framework and it makes use of four open-source tools: Kvazaar for HEVC encoding, OpenHEVC for HEVC decoding, Opus codec for audio coding, and Live555...
In this research, we attempt to develop for artistic music loop performance on a de facto standard digital DJ system with TouchOSC. Through the analysis on the functions and UI of de facto DJ software and controllers, the 4 shortage of functions for artistic music loop performance were found. Therefore, we built the remote controller system by TouchOSC. It enables to control the complicated music...
This study firstly points out the essence of knowledge acquirement can be accounted for learners' process of decoding and encoding for knowledge from the perspective of knowledge learning. This process includes the encoding and decoding of knowledge transfer process from the perspective of communication, and knowledge information in different storage forms from the perspective of knowledge management...
A balanced code is a set of words over [a, b} such that the number of a's and the number of b's in a word are equal, and many applications using balanced codes have been proposed so far. Recently, not only the original balanced code, but also balanced codes with some other constraints have been studied mainly for an application of data storage media. However, contrary to other typical sets of words...
This paper presents channel model and error correction coding for correlated insertion/deletion errors in high-density magnetic recording media. Simulation results show that the bit error rate can be lowered by the presented coding.
A combination of single parity check-code and Two-Dimensional (2D) Bahl Cocke Jelinek Raviv (BCJR) detector is used in this paper for joint detection and decoding of 2D interference channel. This is applied to a multi-track two dimensional magnetic recording (TDMR) system. The multi-level 2D BCJR detector handled the code constraint while performing joint detection and single parity decoding. Two...
We present a formal probabilistic framework for process learning to compose service specific overlays (SSO) in cloud networks. The approach provides a learning mechanism that relies on previous composition results to build service composition process models that can be adopted for future composition requests. The process is then translated into a workflow-net to provide guaranteed delivery of requested...
This preliminary study surveys whether/which avatar body parts are visible in first-wave consumer virtual reality (VR) applications for the HTC Vive (n = 200). A simple coding schema for assessing avatar bodily coherence (ABC) is piloted and evaluated. Results provide a snapshot of ABC in popular high-end VR applications in Q3 2016. It is reported (Table 1) that 86.5% of sampled items feature fully...
Cyber crime is the biggest shortcoming in this fully connected internetworking world. Third party attacks, phishing by intruder like hackers are always active to leak official, personal or legislative information in the form of a message using this public networks. This is why we call for Steganography where the sneaky message has been hiding the data/information firmly. Steganography is one of the...
Multimedia application on mobile phone platform is a hot topic in Information Technology industry accompanying with the advances of technologies in Internet, smart operating system and wireless network. The development of streaming media technology boosts the audio and video application over the Internet. This paper describes a mobile video live streaming system with Wi-Fi/4G mobile phone to capture...
Today's internetworking globe is full of busy roads for transferring data. Challenges on sending or receiving various kinds of hidden data, messages or information especially using this public networks. Hackers took place to leak this surreptitious data. That's the reason behind the need of a cover media where the furtive message has been hiding our information securely. Steganography, one of the...
In the internet age, the security of data exchange becomes risky from some tapping attacks. One of the ways to maintain the data's security is by using steganography techniques. In this paper, steganography is combined with cryptography for security enhancement. The cover media is mp3 audio file. Since mp3 is a file that has been widely used in the Internet as a medium of entertainment, the secret...
Recent research examining learning in informal environments reflects a growing recognition of the important role adults play as learning brokers by identifying and orchestrating connections to learning opportunities such as access to people, spaces, programs, and information sources. In order to broker learning, educators need to have knowledge about youth as well as potential opportunities. This...
This electronic document is a “live” template and already defines the components of your paper [title, text, heads, etc.] in its style sheet. Video streaming is a technique for distributing media content, in which it is not necessary for the streams of the requested file to arrive in full in order to begin playing the video. Traditionally, streaming has been supported by RTP and RTSP protocols, requiring...
In this paper, a compressed domain drift compensated reversible watermarking scheme is proposed with a high embedding capacity and the least amount of visual quality degradation for H.265/HEVC videos. Using compressed domain syntax elements, such as motion vector and transformed residual, a set of 4 × 4 Transform Blocks (TB) of similar texture are chosen from consecutive I Frames for watermark embedding...
Earlier research has shown the efficacy of using geometry discontinuities, encoded using “breakpoints,” in improving the coding efficiency of piecewise smooth media, such as depth maps and motion flows. This work proposes a new structure for encoding these breakpoints that is more suited for piecewise affine media, such as affine motion flows. Here, we choose to employ belief propagation over a graphical...
Adaptive video playing methods are mainly based on solutions involving the usage of HTTP together with TCP in the transport layer. However, TCP no longer seems to be the only solution. Other transport protocols (e.g., UDP) with different transport features (e.g., new error correction techniques) are also possible candidates. In this demo we demonstrate a flexible media delivery framework which is...
This paper proposes a simple and robust method of audio data embedding into videos. Robustness in this method comes because of the use of double coding mechanism. Here double coding means using two kinds of codes on the same data one after another. This provides more security and reliability to the hidden data into video. As security is the most important matter of concern in present data communication...
Video is a digital media that is often used now. Because of that, information security issues in the video have been popular now, which one of the issues is steganography. Neighbouring similarity (NS) is the steganography method for video. This method is using macro block that is generated in video encoding process, called prediction error (PE), to embed a secret message. Generated PE is able to improve...
Nowadays, multiview video, as an advanced form of educational video, is in development phase. In this article, positive and problematic aspects of educational video are described from the point of view of a teacher. The technical properties and problems of multiview video streaming, such as Multiview Video Coding (MVC), streaming technology, and multiview video database systems are briefly mentioned...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.