The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Digital videos are to be stored, processed and transmitted in the encryption of compressed video bit streams in order to maintain security. Data has to be hidden in these encrypted videos for the purpose of content notation and tampering detection. Data hiding without decryption preserves the confidentiality of the content more efficiently. Data hiding is the encrypted version of H.264/AVC video streams...
PPC-Tree and N-list have been proven to be very efficient and been used in mining frequent itemsets widely. The main problem of the novel structures is that the way of First Constructing Last Encoding method is adopted in the tree-building phase. This causes excessive time consumption to mine frequent itemsets. In this paper, we propose SFO-Set based on SFO-Tree, a more efficient data structure, to...
Text encoding is considered as the most functional outset to store and retrieve data, with trees of information and lists of concordances as its first immediate results, but there is a wide range of possible results opening up when a complete encoding process is accomplished. The three case studies described in this paper are meant to give an overall view on the preliminary steps of a wider project...
The growing demand for smarter high-performance embedded systems leads to the integration of multiple functionalities in on-chip systems with tens (even hundreds) of cores. This trend opens a very challenging question about the optimal resource allocation in those manycore systems. Answering this question is key to meet the performance and energy requirements. This paper deals with a learning technique...
In recent years, mass atrocities, terrorism, and political unrest have caused much human suffering. Thousands of innocent lives have been lost to these events. With the help of advanced technologies, we can now dream of a tool that uses machine learning and natural language processing (NLP) techniques to warn of such events. Detecting atrocities demands structured event data that contain metadata,...
There are some atypical texts hidden in the Telecom's customer complaint text. These atypical complaints can be divided into several classes. Atypical items have high confidence with intergroup neighbor, but low support in full complaint set. After filtering out the high-frequency items, we can use k-means method to clustering the complaint texts. However, the clustering result is affected by the...
In order to measure the medical activity, hospitals are required to manually encode information concerning an inpatient episode using International Classification of Disease (ICD-10). This task is time consuming and requires substantial training for the staff. We propose to help by speeding up and facilitating the tedious task of coding patient information, specially while coding some secondary diagnoses...
This paper proposes a simple and robust method of audio data embedding into videos. Robustness in this method comes because of the use of double coding mechanism. Here double coding means using two kinds of codes on the same data one after another. This provides more security and reliability to the hidden data into video. As security is the most important matter of concern in present data communication...
Due to the wide variety of copy videos, the existing video copy detection methods using single feature face great challenges, especially for video content matching, which are difficult to deal with various copy video transformations. To overcome this problem, a video copy detection method based on sparse representation of MPEG-2 spatial and temporal features is proposed in this paper. Firstly, the...
Multimedia content is required at different quality levels due to heterogeneous network conditions and diverse consumption devices. A conventional scalable coder generates a layered bitstream, wherein a base layer produces a coarse reconstruction, and successive layers refine the quality, incrementally. However most multimedia sources are not successively refinable under their relevant distortion...
We study compressed representations of web graphs. Among previous work, the solution by Hernandez and Navarro [1] supports more queries than alternative approaches, including in-neighbour queries, out-neighbour queries and a set of mining queries. Their main strategy is to extract dense subgraphs from the given graph, and encode them using succinct data structures such as wavelet trees. Previous experimental...
In the modern digital era, we are welcoming the data with an enormous collection of information from different sorts of day to day life. There are promising challenges for handling as well as storing the data. For the past three decades many researchers have developed algorithms to meet the crucial challenges in frequent pattern mining; but still there is a thirst to overcome it. Based on this, a...
The problem of multilevel diversity coding with regeneration is considered in this work. Two new outer bounds on the optimal tradeoffs between the normalized storage capacity and repair bandwidth are established, by which the optimality of separate coding at the minimum-bandwidth-regeneration (MBR) point follows immediately. This resolves a question left open in a previous work by Tian and Liu.
Militaries all over the world have always used the best of the latest technologies to win wars. Recently developed Cloud computing technology can also act as a force multiplier for military organisations due to its merits of economy, flexibility, expansibility and reliability. The critical concern of storing, maintaining and securing mission critical video data containing reports/footage of aerial...
Political event data have been widely used to study international politics. Previously, natural text processing and event generation required a lot of human efforts. Today we have high computing infrastructure with advance NLP metadata to leverage those tiresome efforts. TABARI -- an open source non distributed event-coding software -- was an early effort to generate events from a large corpus. It...
In this paper, an improved lossless data hiding method with histogram shifting for medical images is proposed. In general, medical images consist of many pure black and white points. In the previous studies, it may need a lot of data as a location map to reconstruct the watermark and the cover image. To solve this problem, we present a new method to record the location map. We use two bits for each...
Intra coding is an indispensable part of all video coding systems. However, the intra prediction in the HEVC standard has several limitations with respect to the available amount of information which is exploited for the prediction and the limited number of prediction directions per block. In this paper, we propose a novel contour-based multidirectional intra coding mode which combines computer vision...
Intra prediction is an important component of video compression. The High Efficiency Video Coding (HEVC) standard supports advanced Intra prediction tools to achieve remarkable Intra coding performance. However, higher compression efficiency performance may be achieved using Combined Intra Prediction (CIP). CIP consists in combining conventional Intra reference samples, with samples extracted from...
To provide more powerful video enabled applications, e.g. in video surveillance environments, it is increasingly more critical not only to have access to the decoded video but also to, e.g. efficiently search for similar videos. In this context, this paper proposes a feature-based video coding solution adopting a hybrid approach where both pixels and local visual features are exploited for coding...
Eavesdropper tapping communication links is a common problem encountered in communication systems. The famous no cloning theorem and the uncertainity principle are instrumental in ensuring secrecy of classical information when transmitted using quantum states. With Wyner's wiretap channel as motivation, we study the effect of a unitarily interacting probe on the extraction of information by an eavesdropper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.