首页 > 最新文献

Proceedings. International Conference on Information Technology: Coding and Computing最新文献

英文 中文
Information transformations for Web based documentation 基于Web的文档的信息转换
R. Newman, N. Bussard, T. Morvan
This paper presents two pieces of work which together form part of a chain of information transformation leading from engineering design models to useable hypermedia technical documentation. The building of such a chain needs to take account of two major constraints, those of efficiency of the transformation process and that of usability of the end result. The first piece of work presented here addresses the first problem by providing a means of automatically simplifying a model to a stage where it is usable as an interactive VRML document. The second piece of work addresses the second issue by investigating and prototyping novel means of presentation which provide greater 'readability' for the resultant models.
本文介绍了两项工作,它们共同构成了从工程设计模型到可用的超媒体技术文档的信息转换链的一部分。构建这样一个链需要考虑两个主要的约束条件,即转换过程的效率和最终结果的可用性。本文介绍的第一部分工作解决了第一个问题,它提供了一种方法,可以自动将模型简化到可作为交互式VRML文档使用的阶段。第二部分工作通过研究和原型化新颖的表示方式来解决第二个问题,这种方式为生成的模型提供了更大的“可读性”。
{"title":"Information transformations for Web based documentation","authors":"R. Newman, N. Bussard, T. Morvan","doi":"10.1109/ITCC.2002.1000413","DOIUrl":"https://doi.org/10.1109/ITCC.2002.1000413","url":null,"abstract":"This paper presents two pieces of work which together form part of a chain of information transformation leading from engineering design models to useable hypermedia technical documentation. The building of such a chain needs to take account of two major constraints, those of efficiency of the transformation process and that of usability of the end result. The first piece of work presented here addresses the first problem by providing a means of automatically simplifying a model to a stage where it is usable as an interactive VRML document. The second piece of work addresses the second issue by investigating and prototyping novel means of presentation which provide greater 'readability' for the resultant models.","PeriodicalId":115190,"journal":{"name":"Proceedings. International Conference on Information Technology: Coding and Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134491274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Audio watermarking quality evaluation: robustness to DA/AD processes 音频水印质量评价:对DA/AD过程的鲁棒性
M. Steinebach, A. Lang, J. Dittmann, Chr. Neubauer
Audio watermarking has become an important technology for the recording and advertisement industry. Today's embedding and detection strategies often rely on digital/ high quality channels, like CD or mp3. However for numerous applications, watermarks surviving noisy analog environments are better suited or even required. Using such schemes allows to identify, audio signals with monitoring devices which are 'listening' to the incoming signals. In the same way, illegal recordings of concerts can be identified. In this paper we describe a test environment for noisy, acoustic, (analog) channels and present results obtained from a particular watermarking scheme. We identify changes in the affected audio material, like frequency response or the amount of noise added to the signal. In order to do automatic robustness evaluations of watermarking schemes, the Stirmark Benchmark environment can be used. We analyze if it is possible to simulate an acoustic, noisy DA/AD environment with filters, quantization and noise generators. Based on the presented test results, we identify the parameters relevant for watermarks to successfully survive noisy acoustic channels and thereby provide valuable hints for audio watermark designers. We also describe a design concept for a DA/AD simulation.
音频水印技术已成为录音和广告行业的一项重要技术。今天的嵌入和检测策略通常依赖于数字/高质量通道,如CD或mp3。然而,对于许多应用来说,水印在嘈杂的模拟环境中更适合甚至是必需的。使用这样的方案可以识别音频信号与监控设备,这是“听”进来的信号。同样,音乐会的非法录音也可以被识别出来。本文描述了噪声、声学、(模拟)信道的测试环境,并给出了从特定的水印方案中获得的结果。我们识别受影响音频材料的变化,如频率响应或添加到信号中的噪声量。为了对水印方案进行鲁棒性自动评估,可以使用Stirmark Benchmark环境。我们分析了是否有可能用滤波器、量化和噪声发生器来模拟声学、噪声的DA/AD环境。基于测试结果,我们确定了水印在噪声信道中成功存在的相关参数,从而为音频水印设计者提供了有价值的提示。我们还描述了DA/AD仿真的设计概念。
{"title":"Audio watermarking quality evaluation: robustness to DA/AD processes","authors":"M. Steinebach, A. Lang, J. Dittmann, Chr. Neubauer","doi":"10.1109/ITCC.2002.1000368","DOIUrl":"https://doi.org/10.1109/ITCC.2002.1000368","url":null,"abstract":"Audio watermarking has become an important technology for the recording and advertisement industry. Today's embedding and detection strategies often rely on digital/ high quality channels, like CD or mp3. However for numerous applications, watermarks surviving noisy analog environments are better suited or even required. Using such schemes allows to identify, audio signals with monitoring devices which are 'listening' to the incoming signals. In the same way, illegal recordings of concerts can be identified. In this paper we describe a test environment for noisy, acoustic, (analog) channels and present results obtained from a particular watermarking scheme. We identify changes in the affected audio material, like frequency response or the amount of noise added to the signal. In order to do automatic robustness evaluations of watermarking schemes, the Stirmark Benchmark environment can be used. We analyze if it is possible to simulate an acoustic, noisy DA/AD environment with filters, quantization and noise generators. Based on the presented test results, we identify the parameters relevant for watermarks to successfully survive noisy acoustic channels and thereby provide valuable hints for audio watermark designers. We also describe a design concept for a DA/AD simulation.","PeriodicalId":115190,"journal":{"name":"Proceedings. International Conference on Information Technology: Coding and Computing","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132850911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Efficient key-frame extraction and video analysis 高效的关键帧提取和视频分析
J. Calic, E. Izquierdo
Content-based video indexing and retrieval has its foundations in the analyses of the prime video temporal structures. Consequently, technologies for video segmentation and key-frame extraction have become crucial for the development of advanced digital video systems. Conventional algorithms for video partitioning and key-frame extraction are mainly implemented autonomously. By focusing the analysis on compressed video features, this paper introduces a real-time algorithm for scene change detection and key-frame extraction that generates frame difference metrics by analysing the statistics of the macro-block features extracted from an MPEG compressed stream. The key-frame extraction method is implemented using difference metrics in curve simplification by means of a discrete contour evolution algorithm. This approach resulted in a fast and robust algorithm. Results of computer simulations are reported.
基于内容的视频索引与检索的基础是对主要视频时间结构的分析。因此,视频分割和关键帧提取技术对先进数字视频系统的发展至关重要。传统的视频分割和关键帧提取算法主要是自主实现的。通过对压缩视频特征的分析,本文介绍了一种实时场景变化检测和关键帧提取算法,该算法通过分析从MPEG压缩流中提取的宏块特征的统计量来生成帧差度量。关键帧提取方法采用离散轮廓进化算法,利用曲线化简中的差分度量实现。这种方法产生了一种快速且鲁棒的算法。报告了计算机模拟的结果。
{"title":"Efficient key-frame extraction and video analysis","authors":"J. Calic, E. Izquierdo","doi":"10.1109/ITCC.2002.1000355","DOIUrl":"https://doi.org/10.1109/ITCC.2002.1000355","url":null,"abstract":"Content-based video indexing and retrieval has its foundations in the analyses of the prime video temporal structures. Consequently, technologies for video segmentation and key-frame extraction have become crucial for the development of advanced digital video systems. Conventional algorithms for video partitioning and key-frame extraction are mainly implemented autonomously. By focusing the analysis on compressed video features, this paper introduces a real-time algorithm for scene change detection and key-frame extraction that generates frame difference metrics by analysing the statistics of the macro-block features extracted from an MPEG compressed stream. The key-frame extraction method is implemented using difference metrics in curve simplification by means of a discrete contour evolution algorithm. This approach resulted in a fast and robust algorithm. Results of computer simulations are reported.","PeriodicalId":115190,"journal":{"name":"Proceedings. International Conference on Information Technology: Coding and Computing","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131612031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 100
Coding k-ary trees for efficient loopless generation in lexicographic order 编码k-ary树,以便按照字典顺序高效地无循环生成
Limin Xiang, K. Ushijima, Y. Asahiro
In this paper, e-words are used for coding k-ary trees with n internal nodes. The properties of e-words are discussed in depth, such as the necessary and sufficient condition of e-words, and based on the properties, a loopless algorithm is obtained to generate e-words for k-ary trees in lexicographic order, which is more efficient in both space and time than the previous algorithm. In addition, e-words can also be easily generated in lexicographic order by a recursive algorithm, and in the order with the Strong Minimal Change Property (SMCP) by a loopless algorithm.
在本文中,e-words用于编码具有n个内部节点的k元树。深入讨论了e-words的性质,如e-words的充分必要条件,并基于这些性质,得到了一种基于字典顺序的k元树生成e-words的无循环算法,该算法在空间和时间上都比以前的算法更高效。此外,e-words还可以通过递归算法轻松地按字典顺序生成,并通过无循环算法以具有强最小变化属性(SMCP)的顺序生成。
{"title":"Coding k-ary trees for efficient loopless generation in lexicographic order","authors":"Limin Xiang, K. Ushijima, Y. Asahiro","doi":"10.1109/ITCC.2002.1000422","DOIUrl":"https://doi.org/10.1109/ITCC.2002.1000422","url":null,"abstract":"In this paper, e-words are used for coding k-ary trees with n internal nodes. The properties of e-words are discussed in depth, such as the necessary and sufficient condition of e-words, and based on the properties, a loopless algorithm is obtained to generate e-words for k-ary trees in lexicographic order, which is more efficient in both space and time than the previous algorithm. In addition, e-words can also be easily generated in lexicographic order by a recursive algorithm, and in the order with the Strong Minimal Change Property (SMCP) by a loopless algorithm.","PeriodicalId":115190,"journal":{"name":"Proceedings. International Conference on Information Technology: Coding and Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122985278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
FSM implementation in embedded memory blocks of programmable logic devices using functional decomposition FSM实现在嵌入式内存块中使用可编程逻辑器件进行功能分解
H. Selvaraj, M. Rawski, T. Luba
Since modern programmable devices contain embedded memory blocks, there exists the possibility of implementing finite state machines (FSM) using such blocks. However, the size of the memory available in programmable devices is limited. The paper presents a general method for the synthesis of sequential circuits using embedded memory blocks. The method is based on the serial decomposition concept and relies on decomposing the memory block into two blocks: a combinational address modifier and a smaller memory block. An appropriately chosen decomposition strategy may allow reducing the required memory size at the cost of additional logic cells for address modifier implementation. This makes possible the implementation of FSMs that exceed available memory by using embedded memory blocks and additional programmable logic.
由于现代可编程设备包含嵌入式内存块,因此存在使用这些块实现有限状态机(FSM)的可能性。然而,可编程器件中可用的存储器的大小是有限的。本文提出了一种利用嵌入式存储块合成顺序电路的通用方法。该方法基于串行分解概念,并依赖于将内存块分解为两个块:一个组合地址修饰符和一个较小的内存块。适当选择的分解策略可以减少所需的内存大小,但代价是地址修饰符实现的额外逻辑单元。这使得通过使用嵌入式内存块和额外的可编程逻辑来实现超出可用内存的fsm成为可能。
{"title":"FSM implementation in embedded memory blocks of programmable logic devices using functional decomposition","authors":"H. Selvaraj, M. Rawski, T. Luba","doi":"10.1109/ITCC.2002.1000415","DOIUrl":"https://doi.org/10.1109/ITCC.2002.1000415","url":null,"abstract":"Since modern programmable devices contain embedded memory blocks, there exists the possibility of implementing finite state machines (FSM) using such blocks. However, the size of the memory available in programmable devices is limited. The paper presents a general method for the synthesis of sequential circuits using embedded memory blocks. The method is based on the serial decomposition concept and relies on decomposing the memory block into two blocks: a combinational address modifier and a smaller memory block. An appropriately chosen decomposition strategy may allow reducing the required memory size at the cost of additional logic cells for address modifier implementation. This makes possible the implementation of FSMs that exceed available memory by using embedded memory blocks and additional programmable logic.","PeriodicalId":115190,"journal":{"name":"Proceedings. International Conference on Information Technology: Coding and Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115299069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Error resilient image communication using content-based multiple description coding 基于内容的多重描述编码的图像通信容错性
S. Shirani
Multiple description coding has been studied as an approach for transmission of images over error prone environments. The multiple description coding method proposed takes into account the content of the image and provides the least amount of degradation, caused by loss of descriptors, for those areas of the image which are of greater interest. This is achieved by employing a nonlinear geometrical transform to add redundancy mainly to the area of interest followed by a partitioning of the non-linearly transformed image into sub-images which are coded and transmitted over separate channels. Simulations show that this approach yields exceptional performance even when only one descriptor is received. Moreover the method proposed can be implemented through pre- and postprocessing of the image data, without modification to the source codecs (e.g., JPEG).
多次描述编码作为一种方法被研究用于在容易出错的环境中传输图像。提出的多重描述编码方法考虑了图像的内容,并为图像中更感兴趣的区域提供了由描述符丢失引起的最小退化。这是通过采用非线性几何变换来实现的,主要是在感兴趣的区域添加冗余,然后将非线性变换后的图像划分为子图像,这些子图像通过单独的通道编码和传输。仿真表明,即使只接收到一个描述符,这种方法也能产生出色的性能。此外,所提出的方法可以通过对图像数据进行预处理和后处理来实现,而不需要修改源编解码器(例如JPEG)。
{"title":"Error resilient image communication using content-based multiple description coding","authors":"S. Shirani","doi":"10.1109/ITCC.2002.1000369","DOIUrl":"https://doi.org/10.1109/ITCC.2002.1000369","url":null,"abstract":"Multiple description coding has been studied as an approach for transmission of images over error prone environments. The multiple description coding method proposed takes into account the content of the image and provides the least amount of degradation, caused by loss of descriptors, for those areas of the image which are of greater interest. This is achieved by employing a nonlinear geometrical transform to add redundancy mainly to the area of interest followed by a partitioning of the non-linearly transformed image into sub-images which are coded and transmitted over separate channels. Simulations show that this approach yields exceptional performance even when only one descriptor is received. Moreover the method proposed can be implemented through pre- and postprocessing of the image data, without modification to the source codecs (e.g., JPEG).","PeriodicalId":115190,"journal":{"name":"Proceedings. International Conference on Information Technology: Coding and Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126955792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Power: a metric for evaluating watermarking algorithms 功率:用于评估水印算法的度量
R. Sion
An important parameter in evaluating data hiding methods is hiding capacity (Cohen et al., 1999) i.e. the amount of data that a certain algorithm can "hide" until reaching allowable distortion limits. One fundamental difference between watermarking (Cox et al., 1997; 1999) and generic data hiding resides exactly in the main applicability and descriptions of the two domains. In the digital framework, watermarking algorithms that make use of information hiding techniques have been developed and hiding capacity was naturally used as a metric in evaluating their power to hide information. Whereas the maximal amount of information that a certain algorithm can "hide" (while keeping the data within allowable distortion bounds) is certainly related to the ability to assert ownership in court, it is not directly measuring its power of persuasion, in part also because it does not consider directly the existence and power of watermarking attacks. We show why, due to its particularities, watermarking requires a different metric, more closely related to its ultimate purpose, claiming ownership in a court of law. We define one suitable metric (watermarking power) and show how it relates to derivates of hiding capacity. We prove that there are cases where considering hiding capacity is sub-optimal as a metric in evaluating watermarking methods whereas the metric of watermarking power delivers good results.
评估数据隐藏方法的一个重要参数是隐藏能力(Cohen et al., 1999),即某种算法可以“隐藏”的数据量,直到达到允许的失真限制。水印的一个根本区别(Cox et al., 1997;1999)和通用数据隐藏恰恰存在于这两个领域的主要适用性和描述中。在数字框架下,利用信息隐藏技术的水印算法已经被开发出来,隐藏能力自然被用作评估其隐藏信息能力的一个指标。尽管某种算法可以“隐藏”的最大信息量(同时将数据保持在允许的失真范围内)肯定与在法庭上主张所有权的能力有关,但它并不能直接衡量其说服力,部分原因还在于它没有直接考虑水印攻击的存在和威力。我们展示了为什么,由于其特殊性,水印需要一个不同的度量,与它的最终目的更密切相关,在法庭上声称所有权。我们定义了一个合适的度量(水印能力),并展示了它与隐藏能力的导数的关系。我们证明了在某些情况下,将隐藏容量作为评估水印方法的指标是次优的,而将水印功率作为评估水印方法的指标则可以获得良好的结果。
{"title":"Power: a metric for evaluating watermarking algorithms","authors":"R. Sion","doi":"10.1109/ITCC.2002.1000367","DOIUrl":"https://doi.org/10.1109/ITCC.2002.1000367","url":null,"abstract":"An important parameter in evaluating data hiding methods is hiding capacity (Cohen et al., 1999) i.e. the amount of data that a certain algorithm can \"hide\" until reaching allowable distortion limits. One fundamental difference between watermarking (Cox et al., 1997; 1999) and generic data hiding resides exactly in the main applicability and descriptions of the two domains. In the digital framework, watermarking algorithms that make use of information hiding techniques have been developed and hiding capacity was naturally used as a metric in evaluating their power to hide information. Whereas the maximal amount of information that a certain algorithm can \"hide\" (while keeping the data within allowable distortion bounds) is certainly related to the ability to assert ownership in court, it is not directly measuring its power of persuasion, in part also because it does not consider directly the existence and power of watermarking attacks. We show why, due to its particularities, watermarking requires a different metric, more closely related to its ultimate purpose, claiming ownership in a court of law. We define one suitable metric (watermarking power) and show how it relates to derivates of hiding capacity. We prove that there are cases where considering hiding capacity is sub-optimal as a metric in evaluating watermarking methods whereas the metric of watermarking power delivers good results.","PeriodicalId":115190,"journal":{"name":"Proceedings. International Conference on Information Technology: Coding and Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121984853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
MIRE: a multidimensional information retrieval engine for structured data and text MIRE:用于结构化数据和文本的多维信息检索引擎
Jinho Lee, D. Grossman, R. Orlandic
This paper presents an original information-retrieval engine, called MIRE, for integrating structured data and text. Among other things, MIRE is designed to work in a natural and efficient way with the inherent hierarchies of structured data. While multidimensional access methods have originally been developed for spatial applications, they can be successfully used to index hierarchical structured data and add to an existing information retrieval engine the capability of navigating hierarchical dimensions. To support this capability, MIRE enhances the processing algorithms of an existing multidimensional access method to avoid overflow and support for hierarchical dimensions. Compared to a search engine with multiple indexes for a different type of search, the multidimensional approach shows a significant reduction in the number of page accesses over a large document collection.
本文提出了一个原始的信息检索引擎,称为MIRE,用于集成结构化数据和文本。除此之外,MIRE被设计成以一种自然而有效的方式使用结构化数据的固有层次结构。虽然多维访问方法最初是为空间应用程序开发的,但它们可以成功地用于索引分层结构化数据,并向现有信息检索引擎添加导航分层维度的功能。为了支持这种能力,MIRE增强了现有多维访问方法的处理算法,以避免溢出并支持分层维度。与针对不同类型的搜索使用多个索引的搜索引擎相比,多维方法可以显著减少对大型文档集合的页面访问次数。
{"title":"MIRE: a multidimensional information retrieval engine for structured data and text","authors":"Jinho Lee, D. Grossman, R. Orlandic","doi":"10.1109/ITCC.2002.1000391","DOIUrl":"https://doi.org/10.1109/ITCC.2002.1000391","url":null,"abstract":"This paper presents an original information-retrieval engine, called MIRE, for integrating structured data and text. Among other things, MIRE is designed to work in a natural and efficient way with the inherent hierarchies of structured data. While multidimensional access methods have originally been developed for spatial applications, they can be successfully used to index hierarchical structured data and add to an existing information retrieval engine the capability of navigating hierarchical dimensions. To support this capability, MIRE enhances the processing algorithms of an existing multidimensional access method to avoid overflow and support for hierarchical dimensions. Compared to a search engine with multiple indexes for a different type of search, the multidimensional approach shows a significant reduction in the number of page accesses over a large document collection.","PeriodicalId":115190,"journal":{"name":"Proceedings. International Conference on Information Technology: Coding and Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122220898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Watermarking in online media e-business 在线媒体电子商务中的水印
S. Kwok, Christopher C. Yang
The need for copyright protection has become a detachable requirement for online media e-business as online multimedia businesses and enabling technologies become viable in recent years. Watermarking enables copyright protection in e-business but it also slows down the packaging process for delivery. The requirement of instant delivery is a prime requirement for online business. In the literature, extensive research on watermarking performance has been emphasized on imperceptibility and robustness but not the efficiency factor for online e-business, for example processing time and storage requirement that are crucial to the success of online e-business. We investigate four watermarking schemes derived from one-bit watermarking, multiple-bit watermarking and their combinations in order to identify a viable watermarking scheme that can meet the requirements of online e-business. The performance of these schemes in terms of preparation time, delivery time and storage requirement are measured and reported. Our analysis proves that the watermarking schemes with multiple-bit watermarking can ensure instant delivery with a penalty of some extra storage requirements.
近年来,随着网上多媒体业务和使能技术变得可行,保护版权的需要已成为网上媒体电子商务的一项不可分割的要求。水印可以在电子商务中保护版权,但它也减慢了交付的包装过程。即时交付的需求是在线业务的主要需求。在文献中,对水印性能的广泛研究强调的是不可感知性和鲁棒性,而不是在线电子商务的效率因素,例如对在线电子商务成功至关重要的处理时间和存储要求。本文研究了由一比特水印、多比特水印及其组合衍生而来的四种水印方案,以确定一种能够满足在线电子商务要求的可行的水印方案。测量并报告了这些方案在准备时间、交货时间和存储要求方面的表现。我们的分析证明了采用多比特水印的水印方案可以保证即时传输,但会损失一些额外的存储需求。
{"title":"Watermarking in online media e-business","authors":"S. Kwok, Christopher C. Yang","doi":"10.1109/ITCC.2002.1000380","DOIUrl":"https://doi.org/10.1109/ITCC.2002.1000380","url":null,"abstract":"The need for copyright protection has become a detachable requirement for online media e-business as online multimedia businesses and enabling technologies become viable in recent years. Watermarking enables copyright protection in e-business but it also slows down the packaging process for delivery. The requirement of instant delivery is a prime requirement for online business. In the literature, extensive research on watermarking performance has been emphasized on imperceptibility and robustness but not the efficiency factor for online e-business, for example processing time and storage requirement that are crucial to the success of online e-business. We investigate four watermarking schemes derived from one-bit watermarking, multiple-bit watermarking and their combinations in order to identify a viable watermarking scheme that can meet the requirements of online e-business. The performance of these schemes in terms of preparation time, delivery time and storage requirement are measured and reported. Our analysis proves that the watermarking schemes with multiple-bit watermarking can ensure instant delivery with a penalty of some extra storage requirements.","PeriodicalId":115190,"journal":{"name":"Proceedings. International Conference on Information Technology: Coding and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122441010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
SUGGEST: a Web usage mining system 建议:一个Web使用挖掘系统
R. Baraglia, P. Palmerini
During their navigation, Web users leave many records of their activity. This huge amount of data can be a useful source of knowledge. Sophisticated data mining processes are needed for this knowledge to be extracted, understood and used. In this paper, we propose a Web usage mining (WUM) system, called SUGGEST, which dynamically generates suggested links to Web pages of potential interest for a user. SUGGEST is designed to efficiently integrate the WUM process with the ordinary Web server functionalities. It can provide useful information to make the user's Web navigation easier and to optimize the Web server's performance. Two quantities are introduced in order to give a measure of the quality of our WUM system.
在他们的导航过程中,Web用户留下了许多他们的活动记录。大量的数据可以成为有用的知识来源。需要复杂的数据挖掘过程来提取、理解和使用这些知识。在本文中,我们提出了一个Web使用挖掘(WUM)系统,称为SUGGEST,它动态地生成指向用户潜在兴趣的Web页面的建议链接。SUGGEST旨在有效地将WUM流程与普通Web服务器功能集成在一起。它可以提供有用的信息,使用户的Web导航更容易,并优化Web服务器的性能。为了给出我们WUM系统质量的一个度量,引入了两个量。
{"title":"SUGGEST: a Web usage mining system","authors":"R. Baraglia, P. Palmerini","doi":"10.1109/ITCC.2002.1000401","DOIUrl":"https://doi.org/10.1109/ITCC.2002.1000401","url":null,"abstract":"During their navigation, Web users leave many records of their activity. This huge amount of data can be a useful source of knowledge. Sophisticated data mining processes are needed for this knowledge to be extracted, understood and used. In this paper, we propose a Web usage mining (WUM) system, called SUGGEST, which dynamically generates suggested links to Web pages of potential interest for a user. SUGGEST is designed to efficiently integrate the WUM process with the ordinary Web server functionalities. It can provide useful information to make the user's Web navigation easier and to optimize the Web server's performance. Two quantities are introduced in order to give a measure of the quality of our WUM system.","PeriodicalId":115190,"journal":{"name":"Proceedings. International Conference on Information Technology: Coding and Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133991902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
期刊
Proceedings. International Conference on Information Technology: Coding and Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1