Pub Date : 2024-04-11DOI: 10.1109/mmul.2024.3380128
{"title":"IEEE Computer Society - Call for Papers","authors":"","doi":"10.1109/mmul.2024.3380128","DOIUrl":"https://doi.org/10.1109/mmul.2024.3380128","url":null,"abstract":"","PeriodicalId":13240,"journal":{"name":"IEEE MultiMedia","volume":"66 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140594863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-11DOI: 10.1109/mmul.2024.3378058
Balakrishnan Prabhakaran
The detection of manipulation of multimedia data can be categorized as active and passive approaches.1 The active approaches use source information, such as watermarks and digital signatures. For instance, Bahirat et al.2 proposed a watermarking-based framework for authentication and localization of tampering in red, green, blue (RGB) and the 3-D point cloud. The watermarking methods, which are computationally expensive, cannot be applied on raw unprocessed data. Passive approaches, or blind forensics,3 are intended for testing multimedia data where the original or source information is not available. Deep-learning-based tampering detection avoids the need to perform various forensic tests to detect whether multimedia data have been manipulated or not.4 However, deep-learning-based methodologies need to balance false positives and negatives, as pointed out by Bayar and Stamm.4 Apart from the need for detecting manipulations in multimedia data, there is also a need for localizing (i.e., identifying the region) where the manipulation occurred.
{"title":"Multimedia Data and Security","authors":"Balakrishnan Prabhakaran","doi":"10.1109/mmul.2024.3378058","DOIUrl":"https://doi.org/10.1109/mmul.2024.3378058","url":null,"abstract":"The detection of manipulation of multimedia data can be categorized as active and passive approaches.1 The active approaches use source information, such as watermarks and digital signatures. For instance, Bahirat et al.2 proposed a watermarking-based framework for authentication and localization of tampering in red, green, blue (RGB) and the 3-D point cloud. The watermarking methods, which are computationally expensive, cannot be applied on raw unprocessed data. Passive approaches, or blind forensics,3 are intended for testing multimedia data where the original or source information is not available. Deep-learning-based tampering detection avoids the need to perform various forensic tests to detect whether multimedia data have been manipulated or not.4 However, deep-learning-based methodologies need to balance false positives and negatives, as pointed out by Bayar and Stamm.4 Apart from the need for detecting manipulations in multimedia data, there is also a need for localizing (i.e., identifying the region) where the manipulation occurred.","PeriodicalId":13240,"journal":{"name":"IEEE MultiMedia","volume":"14 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140594837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-11DOI: 10.1109/mmul.2024.3375610
Samah S. Baraheem, Tam V. Nguyen
{"title":"S5: Sketch-to-image Synthesis via Scene and Size Sensing","authors":"Samah S. Baraheem, Tam V. Nguyen","doi":"10.1109/mmul.2024.3375610","DOIUrl":"https://doi.org/10.1109/mmul.2024.3375610","url":null,"abstract":"","PeriodicalId":13240,"journal":{"name":"IEEE MultiMedia","volume":"6 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140107222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}