• Title/Summary/Keyword: Video communication

Search Result 2,051, Processing Time 0.028 seconds

A Study on the Flow Control Based Estimated Receiving Capacity on the Video Conference System (화상회의 시스템에서 수신능력 예측을 이용한 흐름제어에 관한 연구)

  • 김상진;남지승
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.3
    • /
    • pp.488-495
    • /
    • 2003
  • With the development of networks, multimedia communication has expanded its application field. From the remote control for household electric appliances to medicine, games, video conferencing and multimedia chatting, multimedia communication is being used in all parts of our lives. This multimedia communication requires the transmission of a lot of data at high speed. But if the transmission rate of the communication network exceeds the processing speed of being used in the high speed network environment, a bottleneck occurs in each node and deteriorates the performance of the network. This is the main reason for the slow speed of data transmission and packet loss. In this paper, considering the client's processing performance, reception performance was predicted and the way of flow control was shown. The computing performance of relevant Processor and its performance was estimated through the actual implementation.

  • PDF

A New Copyright Protection Scheme for Depth Map in 3D Video

  • Li, Zhaotian;Zhu, Yuesheng;Luo, Guibo;Guo, Biao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3558-3577
    • /
    • 2017
  • In 2D-to-3D video conversion process, the virtual left and right view can be generated from 2D video and its corresponding depth map by depth image based rendering (DIBR). The depth map plays an important role in conversion system, so the copyright protection for depth map is necessary. However, the provided virtual views may be distributed illegally and the depth map does not directly expose to viewers. In previous works, the copyright information embedded into the depth map cannot be extracted from virtual views after the DIBR process. In this paper, a new copyright protection scheme for the depth map is proposed, in which the copyright information can be detected from the virtual views even without the depth map. The experimental results have shown that the proposed method has a good robustness against JPEG attacks, filtering and noise.

Research on Intelligent Anomaly Detection System Based on Real-Time Unstructured Object Recognition Technique (실시간 비정형객체 인식 기법 기반 지능형 이상 탐지 시스템에 관한 연구)

  • Lee, Seok Chang;Kim, Young Hyun;Kang, Soo Kyung;Park, Myung Hye
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.3
    • /
    • pp.546-557
    • /
    • 2022
  • Recently, the demand to interpret image data with artificial intelligence in various fields is rapidly increasing. Object recognition and detection techniques using deep learning are mainly used, and video integration analysis to determine unstructured object recognition is a particularly important problem. In the case of natural disasters or social disasters, there is a limit to the object recognition structure alone because it has an unstructured shape. In this paper, we propose intelligent video integration analysis system that can recognize unstructured objects based on video turning point and object detection. We also introduce a method to apply and evaluate object recognition using virtual augmented images from 2D to 3D through GAN.

Data Augmentation Scheme for Semi-Supervised Video Object Segmentation (준지도 비디오 객체 분할 기술을 위한 데이터 증강 기법)

  • Kim, Hojin;Kim, Dongheyon;Kim, Jeonghoon;Im, Sunghoon
    • Journal of Broadcast Engineering
    • /
    • v.27 no.1
    • /
    • pp.13-19
    • /
    • 2022
  • Video Object Segmentation (VOS) task requires an amount of labeled sequence data, which limits the performance of the current VOS methods trained with public datasets. In this paper, we propose two effective data augmentation schemes for VOS. The first augmentation method is to swap the background segment to the background from another image, and the other method is to play the sequence in reverse. The two augmentation schemes for VOS enable the current VOS methods to robustly predict the segmentation labels and improve the performance of VOS.

Influencer Attachment and Consumer Response to Product Links in Native Video Ads: An Empirical Study on Bilibili's Platform

  • Hu, Jiayu;Chen, Mingyuan;Yoo, Seungchul
    • International journal of advanced smart convergence
    • /
    • v.13 no.1
    • /
    • pp.140-151
    • /
    • 2024
  • This study explores an innovative advertising technique on Bilibili, where product links are embedded as bullet comments visible only to mobile app users. The research involved 140 participants, divided equally between followers and non-followers of a popular influencer, 'Gourmet WanggangR.' These groups were further split, with half viewing a video containing the product link on the app and the other half via PC. The study revealed that influencer attachment significantly increased viewer immersion (transportation) and positively influenced attitudes towards the content, which in turn elevated purchase intentions. Importantly, the influencer's followers showed a stronger attachment and more favorable attitudes towards the content, alongside a heightened likelihood to purchase the advertised product. The presence of the product link further accentuated these effects among the influencer's followers. Conversely, in the absence of the link, the correlation between influencer attachment and content attitude was less pronounced. These findings highlight the effectiveness of embedding product links in video content as a marketing strategy, particularly when targeting an influencer's followers through mobile platforms.

Digital Watermarking Technique of Compressed Multi-view Video with Layered Depth Image (계층적 깊이 영상으로 압축된 다시점 비디오에 대한 디지털 워터마크 기술)

  • Lim, Joong-Hee;Shin, Jong-Hong;Jee, Inn-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.1
    • /
    • pp.1-9
    • /
    • 2009
  • In this paper, proposed digital image watermarking technique with lifting wavelet transformation. This watermark technique can be easily extended in video content fields. Therefore, we apply this watermark technique to layered depth image structure that is efficient compression method of multi-view video with depth images. This application steps are very simple, because watermark is inserted only reference image. And watermarks of the other view images borrow from reference image. Each view image of multi-view video may be guaranteed authentication and copyright.

  • PDF

H.264 Encoding Technique of Multi-view Video expressed by Layered Depth Image (계층적 깊이 영상으로 표현된 다시점 비디오에 대한 H.264 부호화 기술)

  • Shin, Jong-Hong;Jee, Inn-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.43-51
    • /
    • 2014
  • Multi-view video including depth image is necessary to develop a new compression encoding technique for storage and transmission, because of a huge amount of data. Layered depth image is an efficient representation method of multi-view video data. This method makes a data structure that is synthesis of multi-view color and depth image. This efficient method to compress new contents is suggested to use layered depth image representation and to apply for video compression encoding by using 3D warping. This paper proposed enhanced compression method using layered depth image representation and H.264/AVC video coding technology. In experimental results, we confirmed high compression performance and good quality of reconstructed image.

Video Contents Security Streaming (동영상 콘텐츠 보안 스트리밍)

  • Kim, Minseh;An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.5
    • /
    • pp.67-74
    • /
    • 2012
  • Since current paid video contents have a security vulnerability, anyone can obtain the information of video contents. In this paper, we analyze current video encryption methods which are used commercially to prevent illegal downloading movies. And we propose an address encryption method which can encrypt and decrypt video contents in program itself. In the performance evaluation, we compare the proposed method with the conventional method to show the improvement of security with the reduced delay for encoding and decoding through encryption.

Proposed Open Source Model for Video Offline Distribution using Cinema DRM for Home Users

  • Pardeshi, Sunil;Kwon, Soon Chul;Lee, Seung Hyun;Hamacher, Alaric
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.1
    • /
    • pp.10-14
    • /
    • 2015
  • Video Content owners seek to squeeze the maximum amount of revenue from their assets via distribution into more territories. Digital Cinema Package(DCP), trusted solution to distribute protected content to theaters, caters to relatively small user base, which limits revenue. With the growth of the Internet & other digital media, the economics of media content has changed dramatically. Security remains main concern to deliver content to millions of consumers using intelligent digital display devices like Tablets, Smartphones, Smart TVs, Desktop & Laptop. By making the video content available to this segment securely, content owners will benefit from increased revenue. Through this paper we propose Open Source HomeDCP model to distribute the content to home users for offline viewing. We propose to include other open source CODEC than JPEG2000/MPEG2, which are specifically designed for theatrical performance. Final image size will be further reduced considering the display device resolution where video will be finally played. Key Delivery Message(KDM) system to be altered to suit new devices. This will be a big boost to Content Economy as content owners would be able to distribute the content securely to the wider audience & ensure more revenue.

A Failover Method in CCTV Network Video Recording Environment (CCTV 네트워크 영상 녹화 환경에서 장애 조치 기법)

  • Yang, Sun-Jin;Park, Jae-Pyo;Yang, Seung-Min
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.4
    • /
    • pp.1-6
    • /
    • 2019
  • CCTV video recording system is recognized as evidence value of video data, and is widely used in real life for the purpose of security of facilities or security control, and it is developing in order to process high-resolution and high-capacity data in real time through network. However, there is no description of redundancy to prevent the loss of image data due to defects of unexpected equipment or external attack, and even if the redundancy is implemented, a high-capacity video stream is transmitted through the network, network overload can not avoided. In this paper, we propose and verify a failover method based on rules that can operate the redundancy scheme without inducing network overload in CCTV network video recording environment.