scholarly journals Sparse Signal Decomposition Techniques For Multimedia Fingerprinting

2021 ◽  
Author(s):  
Xiaoli Li

This dissertation focuses on digital multimedia content protection from the copyright point of view. Several approaches aiming to resolve the challenge to some extent in the emerging area of multimedia protection were proposed and studied. This study proposes an approach to secure the authorized media sharing in Peer-to-Peer (P2P) networks. The P2P networks was initially designed for bandwidth saving, but its file sharing property was later on put to use for pirate. This situation has not been improved effectively until now. The approach aims to embed an unique-mark (fingerprint) into each authorized copy in the P2P networks so that it can be used to track the pirate initiator. This study also proposes another scheme for protecting the ownership of digital media files that have been circulated without copyright mark embedded. To protect this type of files, the ownership of each file needs to be stored associated with its meta-data (such as the ownership, title and artist) and can be identified correctly later on. Since the size and the number of the media files to be stored are extremely large, the mini versions (fingerprints) of the files become necessary to be derived. The common criteria of designing these two approaches are to ensure the fingerprint is compact, robust, discriminative, and ease of computation. To well balance the criteria, the sparse decomposition techniques play a very important role. The results of the tests under various distortions show the proposed fingerprinting schemes are very promising for real applications.

2021 ◽  
Author(s):  
Xiaoli Li

This dissertation focuses on digital multimedia content protection from the copyright point of view. Several approaches aiming to resolve the challenge to some extent in the emerging area of multimedia protection were proposed and studied. This study proposes an approach to secure the authorized media sharing in Peer-to-Peer (P2P) networks. The P2P networks was initially designed for bandwidth saving, but its file sharing property was later on put to use for pirate. This situation has not been improved effectively until now. The approach aims to embed an unique-mark (fingerprint) into each authorized copy in the P2P networks so that it can be used to track the pirate initiator. This study also proposes another scheme for protecting the ownership of digital media files that have been circulated without copyright mark embedded. To protect this type of files, the ownership of each file needs to be stored associated with its meta-data (such as the ownership, title and artist) and can be identified correctly later on. Since the size and the number of the media files to be stored are extremely large, the mini versions (fingerprints) of the files become necessary to be derived. The common criteria of designing these two approaches are to ensure the fingerprint is compact, robust, discriminative, and ease of computation. To well balance the criteria, the sparse decomposition techniques play a very important role. The results of the tests under various distortions show the proposed fingerprinting schemes are very promising for real applications.


2018 ◽  
Vol 9 ◽  
pp. 135-143
Author(s):  
Anna Hłuszko

Shock content as a manipulative component of conflict discourseDifficult socio-political situation in Ukraine creates specific media discourse, which in turn gives rise to a number of phenomena, connected to information war categories, war of meanings, hate speech etc. Active entry of military issues into web news content affects traditional approach to the media-text drafting. The report examines the trends of shock visual content and its announcement in the web headlines. The influence of the content emotionalization, which is one of the common features for conflict discourse, not only on text style, but also on features of page making, selection and use of photo illustrations, headline creation, is studied. The material covering military developments usually involve deaths, injuries, loss, destruction of settlements as a result of hostilities, that is, they focus on information on suffering of both military and civilians. This results in stronger integration of shock visual content into the news, which in turn may be used as manipulation and propaganda tool. On the one hand it is used to demonstrate crimes of the enemy, on the other — as an evidence of Ukrainian military success. From the point of view of ethic and humanism the justification of such tactic is doubtful in both cases. However, the study shows that open image of death, blood, injuries in the materials and the announcement of such content in headlines are the cause of high popularity of such publications, and this mainstreams the problem of dehumanizing impact both on material’s subjects and on media audience.


2013 ◽  
pp. 376-399
Author(s):  
Ali Al-Haj ◽  
Ahmad Mohammad ◽  
Samir Abou El-Seoud ◽  
Tuqa Manasrah ◽  
Lama Rajab ◽  
...  

The tremendous advancement of digital technology has increased the ease with which digital multimedia signals (image, video, audio) are stored, transmitted, and reproduced. Consequently, the content providers and owners are faced with problems of protection against copyright violation and other forms of abuse to their digital property. Digital watermarking has been proposed in the last decade as a solution to prevent illegal and malicious copying and distribution of digital media by embedding an unnoticeable information into the media content. This chapter describes three imperceptible and robust watermarking algorithms for different types of multimedia objects (image, video, audio). The three algorithms are based on cascading two powerful mathematical transforms; the Discrete Wavelet Transform (DWT), and the Singular Value Decomposition (SVD). The two transforms are different, and thus provide complementary levels of robustness against the same attack. In the proposed dual-transform algorithms, the watermark bits are not embedded directly on the wavelet coefficients, but rather on the elements of singular values of the DWT sub-bands of the multimedia object. Effectiveness of the proposed algorithms is demonstrated through extensive experimentation.


Author(s):  
M. Nur Erdem

Violence has been a part of daily life in both traditional and digital media. Consequently, neither the existence of violence in the media nor the debates on this subject are new. On the other hand, the presentation of violence in fictional content should be viewed from a different point of view, especially in the context of aesthetization. Within this context, in this chapter, the serial of Penny Dreadful is analyzed. As analyzing method, Tahsin Yücel's model of the “space/time coordinates of narrative” is used. And the subject of “aestheticization of violence” is analyzed through a serial with the elements of person, space, and time. Thus, the role of not only physical beauty but also different components in the aestheticization of violence is examined.


2020 ◽  
Vol 15 ◽  
pp. 33-55
Author(s):  
Katarzyna Garwol ◽  

The article attempts to answer the question whether being a celebrity can be considered as a profession in the world which is nowadays dominated by digital media. In the initial part of the text, the enthemology of the term “celebrity” is presented and the definitions of the celebrity are given in relation to traditional media, such as television or the press, and to the virtual internet space, where celebrities are called influencers. Then, it was presented how popular people can earn on their recognition, and what the amounts are. Rankings of the most valuable, from the advertising campaigns' point of view, celebrities were presented. The most popular profiles of people presently performing in social media in Poland were analyzed, including those with the largest Instagram account ranges or the most profitable YouTube channels. The contents and ranges related to the presented topics were discussed. The most lucrative social issues in the media space are listed, which includes topics related to fashion, travel, healthy lifestyle, luxury products or showing private lives of people who are related to broadly understood showbiz (including actors, singers, journalists). Examples of people from celebrity families are given, who have become popular due to the fact that they are associated with an active person in the media (including celebrity children) and earn on the internet by running their profiles on social networks. Also, the dangerous phenomenon of patoinfluencers, who gain publicity by presenting content related to violence, the use of stimulants, aggression, profanity, etc. was highlighted. As a summary, it was recognized that being a modern celebrity/influencer can be considered as a type of profession, because earning popularity allows to obtain such remuneration, which is a source of income, and being a celebrity determines the position of the individual in the society.


Author(s):  
Ali Al-Haj ◽  
Ahmad Mohammad ◽  
Samir Abou El-Seoud ◽  
Tuqa Manasrah ◽  
Lama Rajab ◽  
...  

The tremendous advancement of digital technology has increased the ease with which digital multimedia signals (image, video, audio) are stored, transmitted, and reproduced. Consequently, the content providers and owners are faced with problems of protection against copyright violation and other forms of abuse to their digital property. Digital watermarking has been proposed in the last decade as a solution to prevent illegal and malicious copying and distribution of digital media by embedding an unnoticeable information into the media content. This chapter describes three imperceptible and robust watermarking algorithms for different types of multimedia objects (image, video, audio). The three algorithms are based on cascading two powerful mathematical transforms; the Discrete Wavelet Transform (DWT), and the Singular Value Decomposition (SVD). The two transforms are different, and thus provide complementary levels of robustness against the same attack. In the proposed dual-transform algorithms, the watermark bits are not embedded directly on the wavelet coefficients, but rather on the elements of singular values of the DWT sub-bands of the multimedia object. Effectiveness of the proposed algorithms is demonstrated through extensive experimentation.


Author(s):  
Jitendra Saturwar ◽  
D.N. Chaudhari

<p>With the growth in digital world, it is becoming more important to find a method to<br />protect the security of digital media. An image watermarking model based on visual secret<br />sharing (VSS) is proposed for protection of ownership. In the embedding phase, the<br />watermark is first divided by VSS into two parts, a hiding watermark and a secret watermark.<br />Then only the hiding watermark is embedded into the original image and the secret<br />watermark is reserved for watermark extracting by the owner. In the extracting phase, the<br />hiding watermark is extracted from the watermarked image first and then directly<br />superimposed on the secret watermark to recover the watermark information. Digital<br />watermarking has been proposed as a possible brick of such protection systems. However,<br />application of watermarking for multimedia content protection in realistic scenarios poses<br />several security issues.<br />A digital watermarking technique is used to generate meaningful shares. The secret image<br />shares are watermarked with different cover images and are transmitted. At the receiving side,<br />the cover images are extracted from the shares and stacked one by one which reveals the secret<br />image progressively. Digital watermarking using visual cryptography provides improved security<br />for encrypting secret images.</p>


Author(s):  
Cássio Eduardo Soares Miranda

Este ensaio tem como objetivo analisar os discursos construídos acerca da violência urbana pela revista Veja online no intuito de se verificar o modo de organização do discurso acerca do tema, bem como os saberes compartilhados pela revista. Assume como referencial as teorizações sobre o discurso midiático proposto por P. Charaudeau e seus efeitos nos imaginários sociais a partir de J. Lacan. Metodologicamente, o ensaio descreve o corpus coletado, apresenta as regularidades discursivas, identifica suas visadas e demonstra  a intencionalidade do veículo de comunicação. Por fim, apresenta os critérios comuns que regem a construção do discurso informativo. Como resultado preliminar, contata-se o uso recorrente da encenação argumentativa pelo sujeito argumentante jornalista com predomínio de fórmulas discursivas que acionam valores compartilhados por um grupo tendo em vista o alcance do horizonte de expectativas desse grupo pela fabricação do consenso social.Abstract: This essay aims to analyze the discourses about urban violence by Veja online magazine to verify the way of organizing the discourse about the theme, as well as the knowledge shared by the magazine. It assumes as reference the theories on the media discourses proposed by P. Charaudeau and its effects on the social imaginaries from J. Lacan. Methodologically, the essay describes the collected corpus, presents the discursive regularities, identifies its aims and demonstrates the intentionality of the communication vehicle. Finally, it presents the common criteria that govern the construction of informative discourse. As a preliminary result, we contact the recurrent use of argumentative staging by the argumentative journalist subject with a predominance of discursive formulas that trigger values shared by a group in order to reach the expectations horizon of this group by the fabrication of social consensus.


1969 ◽  
Vol 21 (01) ◽  
pp. 001-011 ◽  
Author(s):  
K Onoyama ◽  
K Tanaka

SummaryThe tissue fibrinolysis was studied in 550 specimens of 7 kinds of arteries from 80 fresh cadavers, using Astrup’s biochemical method and Todd’s histochemical method with human fibrinogen.In the microscopically normal aortic wall, almost all specimens had the fibrinolytic activity which was the strongest in the adventitia and the weakest in the media.The fibrinolytic activity seemed to be localized in the endothelium.The stronger activity lay in the adventitia of the aorta and the pulmonary artery and all layers of the cerebral artery.The activity of the intima and media of the macroscopically normal areas seemed to be stronger in the internal carotid artery than in the common carotid artery.Mean fibrinolytic activity of the macroscopically normal areas seemed to decrease with age in the intima and the media of the thoracic aorta and seemed to be low in the cases with a high atherosclerotic index.The fibrinolytic activities of all three layers of the fibrous thickened aorta seemed to decrease, and those of the media and the adventitia of the atheromatous plaque to increase.The fibrinolytic activity of the arterial wall might play some role in the progress of atherosclerosis.


Author(s):  
B. Aparna ◽  
S. Madhavi ◽  
G. Mounika ◽  
P. Avinash ◽  
S. Chakravarthi

We propose a new design for large-scale multimedia content protection systems. Our design leverages cloud infrastructures to provide cost efficiency, rapid deployment, scalability, and elasticity to accommodate varying workloads. The proposed system can be used to protect different multimedia content types, including videos, images, audio clips, songs, and music clips. The system can be deployed on private and/or public clouds. Our system has two novel components: (i) method to create signatures of videos, and (ii) distributed matching engine for multimedia objects. The signature method creates robust and representative signatures of videos that capture the depth signals in these videos and it is computationally efficient to compute and compare as well as it requires small storage. The distributed matching engine achieves high scalability and it is designed to support different multimedia objects. We implemented the proposed system and deployed it on two clouds: Amazon cloud and our private cloud. Our experiments with more than 11,000 videos and 1 million images show the high accuracy and scalability of the proposed system. In addition, we compared our system to the protection system used by YouTube and our results show that the YouTube protection system fails to detect most copies of videos, while our system detects more than 98% of them.


Sign in / Sign up

Export Citation Format

Share Document