首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 156 毫秒
1.
INTRODUCTION The objective of the China-America Digital Academic Library Project (CADAL) is to provide universal access to one million digital books and multimedia resources for teaching and research, and explore the ways of applying multimedia and virtual reality technologies to digital library. Terabyte volume of multimedia data of various types of modality, such as text, image, video, anima- tion, are available in the CADAL, which is one of the distinct characteristic of CADAL. …  相似文献   

2.
INTRODUCTIONDue to the ease of transmitting digital data and copying without loss of quality, the unauthorized distribution of digital multimedia contents has be-come easy and popular. Digital watermarking is the most promising technique to protect the copyright of digital multimedia contents (Cox et al., 2001). Most of the proposed watermarking schemes are symmetric, in which keys for watermark detecting are identical to those for watermark embedding. Therefore, symmet-ric watermarking s…  相似文献   

3.
1 Introduction1 With the rapid development of Internet, digital multimedia can be easily shared via computer networks and conveniently processed for queries in databases. At the same time, the powerful multimedia manipulation software has made it possible to edit and alter the media’s content seamlessly, which breeds the demand of a secure authentication system to verify authentication. Digital watermarking has been proposed as a possible solution for data and tamper detection. An authentica…  相似文献   

4.
In this paper, we propose a parallel computing technique for content-based image retrieval (CBIR) system. This technique is mainly used for single node with multi-core processor, which is different from those based on cluster or network computing architecture. Due to its specific applications (such as medical image processing) and the harsh terms of hardware resource requirement, the CBIR system has been prevented from being widely used. With the increasing volume of the image database, the widespread use of multi-core processors, and the requirement of the retrieval accuracy and speed, we need to achieve a retrieval strategy which is based on multi-core processor to make the retrieval faster and more convenient than before. Experimental results demonstrate that this parallel architecture can significantly improve the performance of retrieval system. In addition, we also propose an efficient parallel technique with the combinations of the cluster and the multi-core techniques, which is supposed to gear to the new trend of the cloud computing.  相似文献   

5.
Cross-media retrieval is an interesting research topic, which seeks to remove the barriers among different modalities. To enable cross-media retrieval, it is needed to find the correlation measures between heterogeneous low-level features and to judge the semantic similarity. This paper presents a novel approach to learn cross-media correlation between visual features and auditory features for image-audio retrieval. A semi-supervised correlation preserving mapping (SSCPM) method is described to construct the isomorphic SSCPM subspace where canonical correlations between the original visual and auditory features are further preserved. Subspace optimization algorithm is proposed to improve the local image cluster and audio cluster quality in an interactive way. A unique relevance feedback strategy is developed to update the knowledge of cross-media correlation by learning from user behaviors, so retrieval performance is enhanced in a progressive manner. Experimental results show that the performance of our approach is effective.  相似文献   

6.
稳健图像Hash研究进展   总被引:3,自引:0,他引:3  
The easy generation, storage, transmission and reproduction of digital images have caused serious abuse and security problems. Assurance of the rightful ownership, integrity, and authenticity is a major concern to the academia as well as the industry. On the other hand, efficient search of the huge amount of images has become a great challenge. Image hashing is a technique suitable for use in image authentication and content based image retrieval (CBIR). In this article, we review some representative image hashing techniques proposed in the recent years, with emphases on how to meet the conflicting requirements of perceptual robustness and security. Following a brief introduction to some earlier methods, we focus on a typical two-stage structure and some geometric-distortion resilient techniques. We then introduce two image hashing approaches developed in our own research, and reveal security problems in some existing methods due to the absence of secret keys in certain stage of the image feature extraction, or availability of a large quantity of images, keys, or the hash function to the adversary. More research efforts are needed in developing truly robust and secure image hashing techniques.  相似文献   

7.
A text to speech interface for Universal Digital Library   总被引:1,自引:0,他引:1  
INTRODUCTION The objective of Universal Digital Library (UDL) is to capture all books in digital format (Universal Digital Library, 2005; Digital Library of India, 2005). Most of the digital information present in the digital world is accessible to a few who can read or under- stand a particular language. Language technologies can provide solutions in the form of natural interfaces so that digital content can reach the masses and fa- cilitate the exchange of information across differe…  相似文献   

8.
INTRODUCTION Video content will be the main contributor to the future traffic in multimedia applications. Camcorders, digital cameras and lately mobile phones with video capturing capabilities have resulted in a wide spreading of multimedia to the masses. Quality of the captured/rendered videos is likely to be the major determining factor in the success of the new multi- media applications as well as product differentiation. Video processing chain includes video capturing, video pre-proce…  相似文献   

9.
With the development of information technology, people have paid more and more attention on the information security today. Information hiding research has become the focus of the information security research. Because every Web sites and network communication depend on the multimedia, such as audio, video, image and so on. Information hiding technology can embed secret information into a digital media source without impairing the perceptual quality of that source. Other people can't feel this secret information. So the secret key, the signature or the private data can transform securely in the Internet. In this paper, we mainly introduce the improving action of steganography and provide the application of the steganography in information technology.  相似文献   

10.
11.
随着多媒体技术的进步和网络技术的飞速发展,高校数字图书馆在建设中面临着深刻的管理变革,数字图书馆的网络信息资源管理成为衡量高校图书馆建设的一个硬性指标。如何规范管理,加快数字图书馆的建设是高校图书馆管理人员面临的一个新课题。  相似文献   

12.
INTRODUCTION During 1998~2002, I was privileged to serve as a member of the US President’s Information Technol- ogy Advisory Committee (PITAC), and all members were deeply involved in the drafting of several PITAC Reports to the President. The one related to digital libraries was the 2001 Report of the PITAC Digital Library Panel, entitled Digital Libraries: Universal Access to Human Knowledge (PITAC, 2001). It offers an ambitious vision: “All citizens anywhere anytime c…  相似文献   

13.
在概括了网络环境下图书馆数字参考服务的概念、涵义和形式的基础上,详细论述了国外图书馆开发运行的几种合作式数字参考服务模式,以及我国图书馆合作式数字参考服务开展的情况。通过对比分析,指出我国图书馆应寻求适应我国国情和馆情的数字参考服务合作化发展之路。  相似文献   

14.
本文主要针对近年来数字水印算法在空域方法和频域方法上的发展,演变过程及其间的一些典型算法进行综述,并分析了这些主要算法的优缺点。其中大部分算法针对的源数据是图像,但其中的很多技术对于音频及视频等其他形式的多媒体数据也同样适用。  相似文献   

15.
省级电大数字图书馆建设的实践与思考   总被引:1,自引:0,他引:1  
建设数字图书馆,是信息技术发展的必然要求,更是电大实施现代远程开放教育的必然选择。本文通过介绍省级电大数字图书馆的建设实践,进一步思考了省级电大数字图书馆的建设方向。  相似文献   

16.
谈数字图书馆平台的集成   总被引:1,自引:0,他引:1  
随着现代科学技术的飞速发展,以Internet技术为依托的校园信息网络建设已形成热点,电子化、数字化等多媒体出版物的涌现,校园图书馆必须依托现代科技的结晶,拓宽自己的服务领域,信息资源将从文字扩展到图像、声像和影像。  相似文献   

17.
数字化图书馆应用而生,这是图书馆情报领域的一种剧变。它要求图书馆重新规划自己的读者服务模式。要做好数字化背景下的读者服务工作,需全面提高馆员素质,开发特色数据库,加工网络信息资源,加强读者培训。  相似文献   

18.
将数字水印用于数字化音视频产品的版权保护,弥补了传统的数据加密方式的不足,成为数字版权管理的有效手段。传统加密技术在数字版权保护中存在的问题是,数据一旦被解密,数字内容就可以非法复制和传播。因此提倡将版权信息作为水印加入数字作品的多媒体教学资源保护策略。一  相似文献   

19.
数字水印技术及应用   总被引:2,自引:0,他引:2  
多媒体信息的数字化,提高了信息表达的效率和准确度,而数字媒体的易于存储、复制、传播和修改,使得数字多媒体版权盗用问题严重。数字水印技术作为版权保护和安全认证的有效工具,在快速发展的同时得到了广泛的应用。  相似文献   

20.
本就数字图书馆建设的几种误解,数字图书馆与传统图书馆的关系,数字图书馆建设战略的选择,表明了对建设复合图书馆的倾向性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号