multimedia contents
Recently Published Documents


TOTAL DOCUMENTS

310
(FIVE YEARS 40)

H-INDEX

11
(FIVE YEARS 2)

2022 ◽  
Vol 40 (2) ◽  
pp. 1-36
Author(s):  
Lei Zhu ◽  
Chaoqun Zheng ◽  
Xu Lu ◽  
Zhiyong Cheng ◽  
Liqiang Nie ◽  
...  

Multi-modal hashing supports efficient multimedia retrieval well. However, existing methods still suffer from two problems: (1) Fixed multi-modal fusion. They collaborate the multi-modal features with fixed weights for hash learning, which cannot adaptively capture the variations of online streaming multimedia contents. (2) Binary optimization challenge. To generate binary hash codes, existing methods adopt either two-step relaxed optimization that causes significant quantization errors or direct discrete optimization that consumes considerable computation and storage cost. To address these problems, we first propose a Supervised Multi-modal Hashing with Online Query-adaption method. A self-weighted fusion strategy is designed to adaptively preserve the multi-modal features into hash codes by exploiting their complementarity. Besides, the hash codes are efficiently learned with the supervision of pair-wise semantic labels to enhance their discriminative capability while avoiding the challenging symmetric similarity matrix factorization. Further, we propose an efficient Unsupervised Multi-modal Hashing with Online Query-adaption method with an adaptive multi-modal quantization strategy. The hash codes are directly learned without the reliance on the specific objective formulations. Finally, in both methods, we design a parameter-free online hashing module to adaptively capture query variations at the online retrieval stage. Experiments validate the superiority of our proposed methods.


Author(s):  
Esraa Jaffar Baker ◽  
Adil Abbas Majeed ◽  
Sundos Abdulameer Alazawi ◽  
Shahreen Kasim ◽  
Rohayanti Hassan ◽  
...  

Steganography techniques have taken a major role in the development in the field of transferring multimedia contents and communications. Therefore, field of steganography become interested as the need for security increased significantly. Steganography is a technique to hide information within cover media so that this media does not change significantly. Steganography process in a video is to hide the information from the intruder and prevent him access to that hidden information. This paper presents the algorithm of steganography in the video frames. The proposed algorithm selected the best frames to hide the message in video using 3D distance equation to increasing difficulty onto the intruder to detect and guess the location of the message in the video frames. As well as selected the best frames in this algorithm increased the difficulty and give us the best stego-video quality using structural similarity (SSIM). Also, the hash function was used to generate random positions to hide the message in the lines of video frames. The proposed algorithm evaluated with mean squared error (MSE), peak signalto-noise ratio (PSNR) and SSIM measurement. The results were acceptable and shows that is the difficulty of distinguishing the hidden message in stego-video with the human eye.


Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1839
Author(s):  
Ammar Armghan ◽  
Junaid Tariq ◽  
Fayadh Alenezi ◽  
Norah Alnaim ◽  
Ayman Alfalou ◽  
...  

The brute-force behaviour of High-Efficiency Video Coding (HEVC) is the biggest hurdle in the communication of the multimedia contents. Therefore, a novel method will be presented here to expedite the intra mode decision process of HEVC. In the first step, the feasibility of the odds-algorithm for the early intra mode decision is presented by using statistical evidence. Then, various elements of odds algorithm are analyzed and then mapped to the intra mode process (elements) of HEVC. Finally, the probability required by the odds algorithm is obtained by utilizing the correlation between the current and the neighboring blocks. The proposed algorithm accelerated the encoding process of the HEVC by 25% to 35%, while the Bjontegaard Delta Bit Rate (BD-BR) is 0.95% to 1.84%.


Entropy ◽  
2021 ◽  
Vol 23 (5) ◽  
pp. 535
Author(s):  
Karim H. Moussa ◽  
Ahmed I. El Naggary ◽  
Heba G. Mohamed

Multimedia wireless communications have rapidly developed over the years. Accordingly, an increasing demand for more secured media transmission is required to protect multimedia contents. Image encryption schemes have been proposed over the years, but the most secure and reliable schemes are those based on chaotic maps, due to the intrinsic features in such kinds of multimedia contents regarding the pixels’ high correlation and data handling capabilities. The novel proposed encryption algorithm introduced in this article is based on a 3D hopping chaotic map instead of fixed chaotic logistic maps. The non-linearity behavior of the proposed algorithm, in terms of both position permutation and value transformation, results in a more secured encryption algorithm due to its non-convergence, non-periodicity, and sensitivity to the applied initial conditions. Several statistical and analytical tests such as entropy, correlation, key sensitivity, key space, peak signal-to-noise ratio, noise attacks, number of pixels changing rate (NPCR), unified average change intensity randomness (UACI), and others tests were applied to measure the strength of the proposed encryption scheme. The obtained results prove that the proposed scheme is very robust against different cryptography attacks compared to similar encryption schemes.


TEM Journal ◽  
2021 ◽  
pp. 165-170
Author(s):  
Syifaul Fuada ◽  
Rosmianto Aji Saputro

The digital image, character/texts, audio (music), and video are the multimedia contents commonly used as objects to be transmitted on the VLC system. This paper has performed the real-time file transfer successfully using VLC technology with a UART connection. The FPGA was chosen as a DSP due to its capability in clocked-speed. We used an Ethernet connection due to its easy configuration and ability to meet the high-speed communication requirement. It was used for communicating between the host and the client device computer. This work covers the MAC layer implementation, SoC FPGA for UART connection, and analog front-end (AFE) transceiver. According to the functional test, the achieved bandwidth of the Ethernet connection is about 83.6 Mbps. However, the FPGA’s clock is set at 100 kHz only due to the transferred file does not require a high speed. Thus, the physical layer baud rate is fixed to 11520 bps; it can be used for real-time transfer of a digital image with 512 pixels with no compressed file and error at 22 cm of optical LoS channel (no lenses).


Author(s):  
Rakesh Ahuja ◽  
Sachin Ahuja ◽  
Deepali Gupta ◽  
Mohd. Junedul Haque

<p><span>Digital video watermarking is an effective way to protect the ownership of the multimedia contents. A novel compressed domain based digital video watermarking algorithm scheme is proposed by exploiting MPEG-2 structure. Watermark bits are embedded in DC and AC coefficients both of only smooth discrete cosine transform (DCT) blocks from selected I-frames in the original digital video. The algorithms never exploited entire frames but explore only three location from the subset of DCT blocks from the subgroup of I-frames only. This process maintains the perceptibility of the watermarked video. Two parameters, normalized correlation (NC) and bit error rate (BER) are used to evaluate the degree of similarity and dissimilarity respectively to check the robustness against image processing and video specific intentional and non-intentional attacks. The security of embedded watermark is enhanced by applying three cryptographic keys. The experimental results demonstrated that the better robustness and perceptibility achieved by comparing the results with the state of art. </span></p>


Author(s):  
Chang Bae Moon ◽  
Jong Yeol Lee ◽  
Dong-Seong Kim ◽  
Byeong Man Kim
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document