Smart Algorithms for Multimedia and Imaging


Book Description

This book presents prospective, industrially proven methods and software solutions for storing, processing, and viewing multimedia content on digital cameras, camcorders, TV, and mobile devices. Most of the algorithms described here are implemented as systems on chip firmware or as software products and have low computational complexity and memory consumption. In the four parts of the book, which contains a total of 16 chapters, the authors address solutions for the conversion of images and videos by super-resolution, depth estimation and control and mono-to-stereo (2D to 3D) conversion; display applications by video editing; the real-time detection of sport episodes; and the generation and reproduction of natural effects. The practical principles of machine learning are illustrated using technologies such as image classification as a service, mobile user profiling, and automatic view planning with dictionary-based compressed sensing in magnetic resonance imaging. The implementation of these technologies in mobile devices is discussed in relation to algorithms using a depth camera based on a colour-coded aperture, the animated graphical abstract of an image, a motion photo, and approaches and methods for iris recognition on mobile platforms. The book reflects the authors’ practical experience in the development of algorithms for industrial R&D and the commercialization of technologies. Explains digital techniques for digital cameras, camcorders, TV, mobile devices; Offers essential algorithms for the processing pipeline in multimedia devices and accompanying software tools; Features advanced topics on data processing, addressing current technology challenges.




Smart Multimedia


Book Description

This book constitutes the proceedings of the First International Conference on Smart Multimedia, ICSM 2018, which was held in Toulon, France, in August 2018. The 39 papers presented were selected from about 100 submissions and are grouped in sections on social, affective and cognition analysis, person-centered smart multimedia: serving people with disabilities to the general population, haptic and robots for smart multimedia applications, MR, 3D, underwater image processing, smart signal processing meets smart sensing, visual behavior analysis: methods and applications, video analysis, learning, low-level vision, miscellaneous.




Intelligent Multimedia Signal Processing for Smart Ecosystems


Book Description

A smart ecosystem is envisioned to exchange and analyze data across systems, enabling a flexible, faster, and reliable smart ecosystem for high-quality results at reduced costs and little human intervention. This book introduces many innovative approaches and provides solutions to various problems of smart ecosystems designed by employing various techniques/models based on AI, ML, Deep Learning, and the Internet of Things (IoT). The main focus is on intelligent multimedia processing and automated decision-making for various services, real-time data analysis, data security, cost-effective solutions for multimedia applications, smart information processing systems, and smart city planning to name a few. In addition, this book presents some key insights and future directions in the various areas of technology. Throughout the book, many state-of-the-art solutions concerning various applications are proposed to solve the issues and ensure the quality of services (QoS). The authors discuss the limitations of the current techniques used to design a smart ecosystem and highlight some prospective areas of research in the future. The book comprehensively discusses multimedia processing of various forms of data comprising text, images, and audio for the implementation of various solutions. The book is aimed to open many areas of research and thus would present a comprehensive reference for the design of smart ecosystems in various applications.




Big Data and Smart Digital Environment


Book Description

This book reviews the state of the art of big data analysis and smart city. It includes issues which pertain to signal processing, probability models, machine learning, data mining, database, data engineering, pattern recognition, visualisation, predictive analytics, data warehousing, data compression, computer programming, smart city, etc. Data is becoming an increasingly decisive resource in modern societies, economies, and governmental organizations. Data science inspires novel techniques and theories drawn from mathematics, statistics, information theory, computer science, and social science. Papers in this book were the outcome of research conducted in this field of study. The latter makes use of applications and techniques related to data analysis in general and big data and smart city in particular. The book appeals to advanced undergraduate and graduate students, postdoctoral researchers, lecturers and industrial researchers, as well as anyone interested in big data analysis and smart city.




Advances in Intelligent Information Hiding and Multimedia Signal Processing


Book Description

This volume of Smart Innovation, Systems and Technologies contains accepted papers presented in IIH-MSP-2016, the 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. The conference this year was technically co-sponsored by Tainan Chapter of IEEE Signal Processing Society, Fujian University of Technology, Chaoyang University of Technology, Taiwan Association for Web Intelligence Consortium, Fujian Provincial Key Laboratory of Big Data Mining and Applications (Fujian University of Technology), and Harbin Institute of Technology Shenzhen Graduate School. IIH-MSP 2016 is held in 21-23, November, 2016 in Kaohsiung, Taiwan. The conference is an international forum for the researchers and professionals in all areas of information hiding and multimedia signal processing.




Real-Time Image and Video Processing


Book Description

This book presents an overview of the guidelines and strategies for transitioning an image or video processing algorithm from a research environment into a real-time constrained environment. Such guidelines and strategies are scattered in the literature of various disciplines including image processing, computer engineering, and software engineering, and thus have not previously appeared in one place. By bringing these strategies into one place, the book is intended to serve the greater community of researchers, practicing engineers, industrial professionals, who are interested in taking an image or video processing algorithm from a research environment to an actual real-time implementation on a resource constrained hardware platform. These strategies consist of algorithm simplifications, hardware architectures, and software methods. Throughout the book, carefully selected representative examples from the literature are presented to illustrate the discussed concepts. After reading the book, the readers are exposed to a wide variety of techniques and tools, which they can then employ to design a real-time image or video processing system.




Triangle Mesh Watermarking and Steganography


Book Description

This book provides a systematic overview of watermarking and steganography methods for triangle meshes related to computer graphics and security. The significance of this research has been well recognized by the growing body of work on watermarking, steganography and steganalysis of 3D meshes. With the evolution of the CAD industry and real-world end-user applications such as virtual reality (VR) and 3D printing, 3D meshes have attracted world-wide attention. Besides, the flexible data structure of 3D geometry provides enough space to embed secret information, making it ideal for applications such as copyright protection and covert communication. Our goal of the book is to allow readers to systematically understand 3D mesh information hiding technology and its applications as a whole. The book outlines comprehensive techniques, including handcrafted and deep learning-based techniques, digital and physical techniques in the literature and provides standard evaluation metrics for triangle meshes. The up-to-date geometrical deep learning and 3D printing-related algorithms are also covered. Offering a rich blend of ideas and algorithms, the book is up-to-date and self-contained. It is an excellent reference resource for users who are seeking 3D mesh watermarking and steganography algorithms, as well as for graduate students and researchers wanting to grasp the frontiers of triangular mesh processing on data hiding.




Handbook of Digital Forensics of Multimedia Data and Devices


Book Description

Digital forensics and multimedia forensics are rapidly growing disciplines whereby electronic information is extracted and interpreted for use in a court of law. These two fields are finding increasing importance in law enforcement and the investigation of cybercrime as the ubiquity of personal computing and the internet becomes ever-more apparent. Digital forensics involves investigating computer systems and digital artefacts in general, while multimedia forensics is a sub-topic of digital forensics focusing on evidence extracted from both normal computer systems and special multimedia devices, such as digital cameras. This book focuses on the interface between digital forensics and multimedia forensics, bringing two closely related fields of forensic expertise together to identify and understand the current state-of-the-art in digital forensic investigation. Both fields are expertly attended to by contributions from researchers and forensic practitioners specializing in diverse topics such as forensic authentication, forensic triage, forensic photogrammetry, biometric forensics, multimedia device identification, and image forgery detection among many others. Key features: Brings digital and multimedia forensics together with contributions from academia, law enforcement, and the digital forensics industry for extensive coverage of all the major aspects of digital forensics of multimedia data and devices Provides comprehensive and authoritative coverage of digital forensics of multimedia data and devices Offers not only explanations of techniques but also real-world and simulated case studies to illustrate how digital and multimedia forensics techniques work Includes a companion website hosting continually updated supplementary materials ranging from extended and updated coverage of standards to best practice guides, test datasets and more case studies




Multimedia Technology and Enhanced Learning


Book Description

This two-volume book constitutes the refereed proceedings of the Second International Conference on Multimedia Technology and Enhanced Learning, ICMTEL 2020, held in Leicester, United Kingdom, in April 2020. Due to the COVID-19 pandemic all papers were presented in YouTubeLive. The 83 revised full papers have been selected from 158 submissions. They describe new learning technologies which range from smart school, smart class and smart learning at home and which have been developed from new technologies such as machine learning, multimedia and Internet of Things.




Machine Learning for Computer and Cyber Security


Book Description

While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques. This book will be an invaluable resource to understand the importance of machine learning and data mining in establishing computer and cyber security. It emphasizes important security aspects associated with computer and cyber security along with the analysis of machine learning and data mining based solutions. The book also highlights the future research domains in which these solutions can be applied. Furthermore, it caters to the needs of IT professionals, researchers, faculty members, scientists, graduate students, research scholars and software developers who seek to carry out research and develop combating solutions in the area of cyber security using machine learning based approaches. It is an extensive source of information for the readers belonging to the field of Computer Science and Engineering, and Cyber Security professionals. Key Features: This book contains examples and illustrations to demonstrate the principles, algorithms, challenges and applications of machine learning and data mining for computer and cyber security. It showcases important security aspects and current trends in the field. It provides an insight of the future research directions in the field. Contents of this book help to prepare the students for exercising better defense in terms of understanding the motivation of the attackers and how to deal with and mitigate the situation using machine learning based approaches in better manner.