• Title/Summary/Keyword: multimedia storage

Search Result 344, Processing Time 0.025 seconds

User Privacy management model using multiple group factor based on Block chain (블록 체인 기반의 다중 그룹 요소를 이용한 사용자 프라이버시 관리 모델)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.107-113
    • /
    • 2018
  • With the rapid development of big data and Internet technologies among IT technologies, it is being changed into an environment where data stored in the cloud environment can be used wherever the Internet is connected, without storing important data in an external storage device such as USB. However, protection of users' privacy information is becoming increasingly important as the data being processed in the cloud environment is changed into an environment that can be easily handled. In this paper, we propose a user-reserving management model that can improve the user 's service quality without exposing the information used in the cloud environment to a third party. In the proposed model, user group is grouped into virtual environment so that third party can not handle user's privacy information among data processed in various cloud environments, and then identity property and access control policy are processed by block chain.

Spatial and Temporal Resolution Selection for Bit Stream Extraction in H.264 Scalable Video Coding (H.264 SVC에서 비트 스트림 추출을 위한 공간과 시간 해상도 선택 기법)

  • Kim, Nam-Yun;Hwang, Ho-Young
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.1
    • /
    • pp.102-110
    • /
    • 2010
  • H.264 SVC(Scalable Video Coding) provides the advantages of low disk storage requirement and high scalability. However, a streaming server or a user terminal has to extract a bit stream from SVC file. This paper proposes a bit stream extraction method which can get the maximum PSNR value while date bit rate does not exceed the available network bandwidth. To do this, this paper obtains the information about extraction points which can get the maximum PSNR value offline and decides the spatial/temporal resolution of a bit stream at run-time. This resolution information along with available network bandwidth is used as the parameters to a bit stream extractor. Through experiment with JSVM reference software, we proved that proposed bit stream extraction method can get a higher PSNR value.

GNUnet improvement for anonymity supporting is large multimedia file (대형 멀티미디어 파일의 익명성 지원을 위한 수정 GNUnet)

  • Lee, Myeong-Hun;Jo, In-Jun
    • The Journal of Engineering Research
    • /
    • v.7 no.1
    • /
    • pp.89-97
    • /
    • 2005
  • The GNUnet proposed a file encoding method by 1KB block size to support anonimity of file and decentralizes encoded block to peers through unstructed model. but, the encoding and block decentralizing method with 600~700MB large multimedia file appered two problems. First problem, it need addition R block and I block, which make about 4% of storage resource. Second problem, unstructed model added network load by broadcasting decentralizing method. The paper suggest variable encoding block size and structured model by block decentralizing solution. Suggested encoding method reduced block request supplementary block generation from 4% to 1%. and network load by proposal structured model sending answer through dedicated peer to decentralize block.

  • PDF

GNUnet improvenemt for anonymity supporing in large multimedia file (대형 멀티미디어 파일의 익명성 지원을 위한 수정 GNUnet)

  • Lee Myoung-Hoon;Park Byung-Yeon;Jo In-June
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.81-90
    • /
    • 2006
  • The GNUnet proposed a file encoding method by 1KB block size to support anonimity of files, decentralizes encoded block to peers through unstructed mode and original data decoding method a block searching or encoded blocks. but, the encoding and block decentralizing method with $600\sim700MB$ large multimedia file appered two problems. First problem, it need addition R block and I block, which make about 4% of storage resource. Second problem, unstructured model added network load by broadcasting decentralizing method. Third problem, The critical point of keyword search function. This paper suggest variable encoding block size and structured model by block decentralizing solution. Suggested encoding method reduced block request supplementary block generation from 4% to 1%, network load by proposal structured model sending answer through dedicated peer to decentralize block and we defined content-based keyword and identifier of sharing file.

  • PDF

A Secure Key Distribution Scheme on Wireless Sensor Networks Using Dynamic Clustering Algorithms (동적 클러스터 알고리즘을 이용한 무선 센서 네트워크에서 안전한 키 분배 방법)

  • Cho, Dong-Min;Lee, Yeo-Jin;Chung, Il-Yong
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.2
    • /
    • pp.236-245
    • /
    • 2007
  • Wireless sensor networks consist of numerous nodes equipped with small-sized and limited calculation capacities and storage space as well as low-capacity batteries. Therefore, the key issue is to reduce energy consumption of sensor nodes in sensor network environment. To reduce energy consumption of sensor nodes, consideration must be given to decreasing frequency of messages transmitted by nodes. Also, considering network application, security of sensor networks is also considered important. Therefore, this study proposes a key distribution scheme in dynamic clustering model. The dynamic clustering model used for this scheme is very effective in extending life span of wireless sensor networks. The proposed scheme provides improved security compared to the existing key distribution scheme by applying grid-based key distribution scheme and allocating polynomial s hare to the nodes forming a cluster. Also, comparison was made with the previously proposed grid-based, location-based and cluster-based key distribution schemes to illustrate the advantages of the proposed scheme.

  • PDF

Design of Security Method for Network Rendering of Augmented Reality Object (홀로그램 용 증강현실 객체의 네트워크 랜더링을 위한 보안 기법 설계)

  • Kim, Seoksoo;Kim, Donghyun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.1
    • /
    • pp.92-98
    • /
    • 2019
  • Due to the development of hologram display technology, various studies are being conducted to provide realistic contents for augmented reality. In the case of the HMD for hologram, since augmented reality objects must be rendered by a small processor, it is necessary to use a low-capacity content. To solve this problem, there is a need for a technique of rendering resources by providing resources through a network. In the case of the existing augmented reality system, there is no problem of contents modulation because the resources are loaded and rendered in the internal storage space. However, when providing resources through the network, security problems such as content tampering and malicious code insertion should be considered. Therefore, in this paper, we propose a network rendering technique applying security techniques to provide augmented reality contents in a holographic HMD device.

A Parallel Streaming Server for the Realtime 3D Internet Broadcasting (병렬 스트리밍 서버 기반 실시간 3D 인터넷 방송 서비스)

  • Kang, Mi-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.7
    • /
    • pp.879-884
    • /
    • 2020
  • In the conventional video file system, videos are stored in a high performance server which has mass storage hard disks or disk arrays. For 3D internet broadcasting, real time operations are required to transmit video files to many clients. This paper describes the design of the 3D internet broadcasting system which can provide realtime streaming service to many users in the 5G environment. In reality, unicast is used to transmit multimedia contents over the internet rather than IP multicast since IP multicast has its own drawbacks in deployment, security, maintenance and so on. In addition, multimedia broadcasting service system like VoD has difficulties in applying to 3D internet broadcasting system since it requires a large amount of system and network resources. In this work, we develop a 3D internet broadcasting system which can construct effective data delivery by minimizing performance-degrading factors.

An Embedded Text Index System for Mass Flash Memory (대용량 플래시 메모리를 위한 임베디드 텍스트 인덱스 시스템)

  • Yun, Sang-Hun;Cho, Haeng-Rae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.6
    • /
    • pp.1-10
    • /
    • 2009
  • Flash memory has the advantages of nonvolatile, low power consumption, light weight, and high endurance. This enables the flash memory to be utilized as a storage of mobile computing device such as PMP(Portable Multimedia Player). Potable device with a mass flash memory can store various multimedia data such as video, audio, or image. Typical index systems for mobile computer are inefficient to search a form of text like lyric or title. In this paper, we propose a new text index system, named EMTEX(Embedded Text Index). EMTEX has the following salient features. First, it uses a compression algorithm for embedded system. Second, if a new insert or delete operation is executed on the base table. EMTEX updates the text index immediately. Third, EMTEX considers the characteristics of flash memory to design insert, delete, and rebuild operations on the text index. Finally, EMTEX is executed as an upper layer of DBMS. Therefore, it is independent of the underlying DBMS. We evaluate the performance of EMTEX. The Experiment results show that EMTEX can outperform th conventional index systems such as Oracle Text and FT3.

A Study on Utilization Method of Information Visualization in the Humanities and Area Studies (인문·지역연구에서의 정보시각화 활용 방안 연구)

  • Kang, Ji-Hoon;Lee, Dong-Yul;Moon, Sang-Ho
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.5 no.5
    • /
    • pp.59-68
    • /
    • 2015
  • Since interdisciplinary convergence could beyond the borders of each disciplines, it is able to create new and meaningful knowledge through collaborative research between different study areas. Especially, in recent years, the Digital Humanities has attracted the attention as the convergence form of the Humanities and ICT. From a research methodology perspective, the Digital Humanities is a tool that can be used as a convergence system for various information utilization such as storage, retrieve, share, and spread. In view of Information system, Digital Humanities has been constructed and used in a variety of systems. Among them, studies related to information visualization for the Digital Humanities have been actively conducted. To visualize data or information, various types such as images, multimedia, interface, and etc could be applied. In this paper, we analyze the cases of various information visualization in digital humanities systems, and propose a method to utilize them in the Humanities and Area Studies.

Case study in application of DVR system for field data collection and analysis (DVR(Digital Video Recorder)을 활용한 현장정보 수집 및 분석에 관한 사례연구)

  • Shin Bong-Soo;Kim Chang-Duk
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.486-489
    • /
    • 2002
  • Construction management has been a target of the result and the index which were decided by whether the resourecs(time, cost and progress...etc) were used. but this has been serious problems in time and cost because of the shortage of storage space, the incident, lowering of efficiency for works, working impossible of between work categories and the demage of finished products. Therefore I noticed that more correct and more objective establish of data collecting system was necessary. it was through the diversification of information for exchange and communication between the construction site and participants. DVR(Digital Video Recorder) and internet technology were suggested for a solution to this problem. the collected information by DVR was divided to 3 steps as how long it used and how much it processed for improving efficiency of using and storage of information. and then it was verified through applying to cases at construction site.

  • PDF