首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 34 毫秒
1.
Multimedia Tools and Applications - Counting-based secret sharing is becoming a vital efficient multimedia technique for raising the security of sensitive data especially when collective access to...  相似文献   

2.
Multimedia Tools and Applications - Watermarking is the process of embedding secret data to prove ownership copyright authentication validation. It is becoming urgently required within e-videos to...  相似文献   

3.
Multimedia Tools and Applications - The secret sharing scheme is a data security tool to provide safe reliability and robustness for multi-user authentication systems. This work focus on expanding...  相似文献   

4.
Multimedia Tools and Applications - Watermarking of multimedia gives more attention to the research society. This paper presents the non-blind watermarking technique on video; initially, a...  相似文献   

5.
超长指令字(VLIW)架构数字信号处理器(DSP)具有强大的处理能力,在该DSP处理器上一方面通过增加专用指令,另一方面通过改进算法,达到了硬件软件全面加速,实现了密码芯片,满足了高清多媒体监控系统的实时加解密和认证等需求.该密码处理芯片首次实现符合安全防范监控数字音视频编码技术标准的可伸缩音视频编码(SVAC[1])码流的安全认证处理,并增加了与音/视频芯片之间的接口,接收音/视频编码流,进行加解密等.密码处理芯片与音/视频芯片共同组成了高清多媒体监控系统.大量的软件和FPGA评估验证保证了数据安全认证的实时性、安全性、正确性.  相似文献   

6.
Multimedia Tools and Applications - Secret Sharing is required in situations where access to important resources has to be protected by more than one person. We propose new secret-sharing scheme...  相似文献   

7.
8.
This paper describes security and privacy issues for multimedia database management systems. Multimedia data includes text, images, audio and video. It describes access control for multimedia database management systems and describes security policies and security architectures for such systems. Privacy problems that result from multimedia data mining are also discussed.
Bhavani ThuraisinghamEmail:
  相似文献   

9.
This paper is derived from a keynote address given that the DMS-03 meeting. It chronicles the need and development of next generation networks (NGN) in the United States. Specific organizational examples are derived from the Internet2-Abilene Network. The technical characteristics of a next generation network versus the Internet are discussed. Examples are given from the point of view of the need for a quality of service based network to deliver distributed multimedia healthcare information to the point of need. The concepts of network trust and of a network based scalable information infrastructure for the reliable delivery of distributed multimedia information is also introduced.
Michael J. AckermanEmail:
  相似文献   

10.
The amount of video content available nowadays makes video abstraction techniques a necessary tool to ease the access to the already huge and ever growing video databases. Nevertheless, many of the existing video abstraction approaches have high computational requirements, complicating the integration and exploitation of current technologies in real environments. This paper presents a novel method for news bulletin abstraction which combines on-line story segmentation, on-line video skimming and layout composition techniques. The developed algorithm provides an efficient, automatic and on-line news abstraction method which takes advantage of the specific characteristics of news bulletins for obtaining representative news abstracts.  相似文献   

11.
Automating the generation of coordinated multimedia explanations   总被引:1,自引:0,他引:1  
Feiner  S.K. McKeown  K.R. 《Computer》1991,24(10):33-41
  相似文献   

12.
为了解决显示屏亮度不统一所引起的多媒体网页图像色彩退化的问题,设计一种基于RGB模式的图像色彩增强模型。根据RGB模式的要求,对视觉图像从照度和反射两个分量的角度进行光滑化处理,在此基础上,利用RGB格式的增强系数,建立视觉图像的色彩增强函数。通过增强多媒体网页中视觉图像的整体亮度、调整图像局部对比度,恢复图像色彩的方式,增强视觉图像的色彩。在Windows XP系统内进行图像色彩增强效果的检测,结果显示,基于RGB模式的色彩增强模型能够切实增强图像的亮度、信息熵、饱和度。说明该模型具备有效性,较传统的直方图均衡模型的图像色彩增强效果好,符合实际推广应用标准。  相似文献   

13.
This paper introduces a secure speech communication approach, which is based on encryption and authentication. This system is based on Advanced Encryption Standard (AES) for encryption and private image database for enhancement of encryption and for authentication. The idea of this cryptosystem is based on XOR of one image from image database with the clear speech before encryption and embedding the index number of this image in the database as a least significant bit watermark into speech. A comparison study is held between the AES block cipher algorithm and the proposed algorithm. This proposed cryptosystem used to enhance the security of AES algorithm and increase its immunity to brute force attacks. It used also to provide authentication and enhance security by addition of extra key which don’t need to be exchanged between parts depending on the embedded image. The extra proposed step remove residual intelligibility from clear speech and fill the silent periods within speech conversation and help in destroy format and pitch information. Security analyses are presented for the proposed cryptosystem from a strict cryptographic viewpoint. Experimental results verify and prove that the proposed cryptosystem is highly secure from the cryptographic viewpoint.  相似文献   

14.
The thermal band of the Airborne Thematic Mapper (ATM) has the same spatial resolution as that of the reflective spectral bands and therefore can be used together with other bands without degrading the resolution as happens with Landsat TM. Here we show that the total solar irradiance on the land surface can be simulated by a properly weighted summation of the thermal band and all the reflective spectral bands. The simulated reflectance as well as emittance can then be derived from the relation between irradiance, thermal emittance, spectral reflectance and albedo based on a simplified energy conservation model of solar radiation incident on a land surface. Compared with other methods for spectral enhancement and topography suppression, such as ratio and logarithmic residual, this method has the advantage of conserving surface albedo information and thus produces a reasonable simulation of reflectance.  相似文献   

15.
Digital watermarking techniques have been proposed as a solution to the problem of copyright protection of multimedia data. In this paper, we propose a novel Chinese remainder theorem (CRT)-based technique for digital watermarking. The use of CRT for this purpose provides additional security along with resistance to some familiar attacks. We have shown that this technique is quite resilient to addition of the noise. We have compared performance of the proposed technique with recently reported two singular value decomposition (SVD)-based watermarking techniques and shown its superior performance in terms of tampering assessment function (TAF), computational efficiency and peak signal to noise ratio (PSNR). For example, the embedding time of the proposed CRT-based scheme is 6 and 3 times faster than the SVD-based Schemes 1 and 2, respectively. This technique can also be applied to document, audio and video contents.  相似文献   

16.
The IP Multimedia Subsystem (IMS) is defined by the 3rd Generation Partnership Project (3GPP) as a new core network domain. IMS provides a service control platform that allows creation of new multimedia and multi-session applications utilizing wireless and wireline transport capabilities. In this paper we will cover the concepts and standards defining IMS and review the network architecture from a mobile perspective. We will see how IMS interacts with the Packet Switched Domain (e.g. Wireless LAN, GPRS, and UMTS networks), the Internet, and application services. Then we will examine the key IMS capabilities and show how they can be combined to create new mobile IP services. Finally, we present a software architecture, which is enabled by IMS and allows development of unique applications (with multimedia/multi-session functionality, single/multi-user, service to user). The software architecture is illustrated by an example of a prototype application. This work was done when the author was with Siemens Communications Inc., Boca Raton, FL  相似文献   

17.
The IP Multimedia Subsystem (IMS) is defined by the 3 rd Generation Partnership Project (3GPP) as a new core network domain. IMS provides a service control platform that allows creation of new multimedia and multi-session applications utilizing wireless and wireline transport capabilities. In this paper we will cover the concepts and standards defining IMS and review the network architecture from a mobile perspective. We will see how IMS interacts with the Packet Switched Domain (e.g. Wireless LAN, GPRS, and UMTS networks), the Internet, and application services. Then we will examine the key IMS capabilities and show how they can be combined to create new mobile IP services. Finally, we present a software architecture, which is enabled by IMS and allows development of unique applications (with multimedia/multi-session functionality, single/multi-user, service to user). The software architecture is illustrated by an example of a prototype application. This work was done when the author was with Siemens Communications Inc., Boca Raton, FL  相似文献   

18.
Because of the differences in the nature of rapid prototyping (RP) processes, there is no standard machine path code for them. Each RP process, based on its characteristics and requirements, uses the standard CAD file format to extract the required data for the process. Selective inhibition of sintering (SIS) is a new layered fabrication method based on powder sintering. Like other RP systems, SIS needs a specialized machine path generator to create an appropriate machine path file. Machine path (i.e., boundary path and hatch path) should produce the printing pattern that enables the SIS machine user to easily remove the fabricated part from the surrounding material. A new machine path algorithm, which generates appropriate boundary and hatch paths for the SIS process is proposed. The new machine path generator provides the ability to process CAD models of any size and complexity, the ability for machine path verification before sending the file to the SIS machine, and the ability to fix the possible STL files disconnection errors. In this system, very large STL files can be processed in a relatively small computer memory. The system has been successfully tested on STL files as large as 200 MB. The generated path files have been used in fabrication of several parts by the SIS process.  相似文献   

19.
本文在广播扩声系统中采用多媒体技术,给出了具有windows界面的录放控制系统,实现无人化自动播出。  相似文献   

20.
描述了Ku波段多媒体证券信息单向卫星广播系统的安全方案,它在条件接收的安全基础上加上了自己的地址过滤函数和USB密钥,实现了平台的安全功能。方案的关键是让解扰密钥、业务密钥和个人分配密钥从链路层保证安全,而USB密钥则从报文层保证安全。通过自定义地址过滤函数,本方案使用户可以方便地扩充安全功能。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号

京公网安备 11010802026262号