REVVIND REVerse engineering of audio-visual content Data

Size: px
Start display at page:

Download "REVVIND REVerse engineering of audio-visual content Data"

Transcription

1 REVVIND REVerse engineering of Newsletter Issue n.1, October 2012 REWIND Page 1 of 12

2 1.1 The REWIND is a FET (Future and Emerging Technology) research project funded by the European Commission within the ICT area of the Seventh Framework Program (FP7). The project is devoted to the analysis of multimedia content in order to trace back its processing history with potential impact in several areas ranging from forensics and law enforcement to quality assessment. This newsletter is addressed to subjects that might be potentially interested in the outcomes of the project, including companies, public and private research institutions or individual researchers working this field. 1.2 Project context and objectives With the rapid proliferation of inexpensive hardware devices that enable the acquisition of audio-visual data, new types of multimedia digital objects (audio, images and videos) can be readily created, stored, transmitted, modified and tampered with. The need of methods and tools that enable REVerse engineering of is therefore becoming more and more of an urgent necessity. The REWIND project is aimed at synergistically combining principles of signal processing, machine learning and information theory to answer relevant questions on the past history of such objects. As an example, Figure 1 illustrates a simple processing chain that corresponds to a video clip originally acquired with a webcam and then downloaded from a video sharing web application such as YouTube. First, the original content is acquired in a digital format and subsequently compressed, typically using a lossy coding algorithm. The user might use off-the-shelf commercial software to alter either the audio or the video track, or both, before re-encoding the content in order to be transmitted and stored on a remote server. Upon a download request, the video clip is transmitted over a noisy network, decoded and finally played out by the receiver device. Figure 1. Example of a simple processing chain of multimedia content. The REWIND project relies on the fact that each one of these processing steps is bound to leave a characteristic footprint that can be detected and analyzed to trace back the past history of the considered multimedia object. This operation, in principle, can be done in a blind fashion, i.e. without needing to access the content at any earlier point of the processing chain. Notice that these processing steps often introduce undesired and irreversible distortions in the original multimedia object, e.g. due to insufficient sampling rate in the acquisition phase, coding artifacts in lossy compression, or imperfect error concealment strategies. Conventionally, these footprints are deemed as misprints of the multimedia processing chain, as they indicate that something went wrong during one of the processing steps of Figure October 30, 2012 Page 2 of 12

3 1. As a consequence, considerable effort in multimedia processing research has been directed towards preventing these artifacts through, for instance, sophisticated sampling and interpolation methods, errorresilience mechanisms or techniques to avoid undesired or unauthorized modifications of the content streams. In the REWIND project, this perspective is completely reversed: footprints are here considered as an asset, i.e., as a precious source of information on the history of the multimedia object, which can be leveraged to reconstruct the processing chain. 1.3 Potential impact and use Content production and access technologies for the multimedia market have undergone a radical transformation over the past decade. Indeed, a wide range of novel networked services have brought a formidable amount of multimedia content at the user s reach. We have also witnessed a radical change in the role of the Citizen, who has been elevated from that of a mere end-user to that of a contributor, thanks to the multitude of powerful audio-visual authoring tools that are today at hand. This, in fact, has promoted the production of an enormous amount of user-generated content (UGC), whose dissemination is greatly favored by a wide variety of novel and effective distribution channels, such as social networks or media sharing websites (e.g. YouTube, Google Videos). In this context the REWIND project intends to play a key role by providing tools and methodologies for assessing and understanding the processing chains that account for the history of multimedia objects. The impact of these methodologies and tools will be significant on a wide range of application areas. If the tracing of the history can be done with a high degree of reliability, relevant applications can be envisioned in fields where stakes are high, such as forensics and law enforcement. Here the information extracted can be used, for example, for authenticating content without the need of prior modifications of the considered content; for tracing content (associating it with the devices used for acquiring/editing it); or for detecting a malicious concealment of footprints. There is, however, a wide range of low-risk applications where the tracing process is narrowed down to a decision on whether or not to trust or to accept the digital object. These include, for example: the evaluation of the face validity of a digital object (i.e. the assessment of its trustworthiness at face value, an essential ingredient for the emerging paradigms of information gathering, such as Citizen Journalism); the quality assessment of a multimedia experience, in all cases in which the reference content is not available; the detection of pirated (or illegally distributed) content. As such evaluations are needed on a regular basis, it is important to perform them automatically and with little or no interaction at all. October 30, 2012 Page 3 of 12

4 1.4 List of the project partners, project public website, project contact point Partner # Partner Name Acronym Country P1 Politecnico di Milano (Coordinator) PoliMi Italy P2 CNIT (Consorzio Interuniversitario per le Telecomunicazioni) CNIT Italy P3 Imperial College of Science, Technology & Medicine Imperial UK P4 University of Vigo UVigo Spain P5 Fraunhofer - Institute for Digital Media Technology IDMT Fraunhofer Germany Project Public WebSite Project Contact Point Prof. Stefano Tubaro Dipartimento di Elettronica e Informazione Politecnico di Milano Piazza Leonardo da Vinci Milano Italy Tel/Fax: / stefano.tubaro@polimi.it 1.5 Some facts about REWIND The REWIND project started on May 1, 2011 and will end on April 30, 2014, for a total duration of 36 months. As of October 2012, the date of this first issue of the REWIND newsletter a series of significant results have been obtained, which were published on top-ranked scientific journals and on international conferences (see the project websiste, for the complete list, including references to publicly available papers). In addition, the project has also realized a set of prototypes demonstrating on real data what can be obtained by using the developed techniques, thus indicating the potential impact in practical applications. In the following, a selection of these prototypes is briefly illustrated. October 30, 2012 Page 4 of 12

5 1.5.1 Image integrity verification The advent of technologies easily enables modification and manipulation of digital visual data, so that we are no longer confident that what we are seeing in a photo is a true representation of what really happened: the value of photography as a record of events must be carefully evaluated. This interactive demonstrator turns the user into a Forensic Analyst (FA), and allows him to analyze the integrity of images. This is done exploiting some of the state-of-the-art results obtained in the Image Forensic research field [1-3]. The demo provides a friendly graphical interface (Figure 2) that helps the FA in viewing the image and its metadata (EXIF), selecting arbitrarily shaped suspect regions or performing fullyautomatic forgery localization, and viewing the output of forensic tools in a friendly way. In particular, the demo embeds a decision fusion framework tailored to the Image Forensic scenario (presented at WIFS11 [4]), that allows the user to have a unique final decision (as fusion of different algorithm outputs) on the integrity of the analysed image region. This software will run on a laptop, it is fully interactive and several realistic splicings (see Figure 2) can be demonstrated, so that users may play with the demo. Figure 2. Outline of the GUI for the image integrity verification tool, during the selection of suspect regions. October 30, 2012 Page 5 of 12

6 1.5.2 Multiple JPEG compression detector The analysis of double-compressed images is a problem largely studied by the multimedia forensics community, as it might be exploited, e.g., for tampering localization or source device identification. In many practical scenarios, e.g., photos uploaded on blogs or sharing web sites, images might be compressed several times. However, the identification of the number of compression stages applied to an image remains an open issue, as many authors address only the problem of double compression. With this demo we show that we are able to estimate the number of JPEG compression steps applied to an image, if it has been compressed up to three times. This is a valuable hint in determining the image authenticity. The algorithm we use is based on the work in [5] and it relies on the analysis of the distribution of the first significant digits of DCT coefficients, which is modeled according to Benford s law. At this purpose, the software we present (see Figure 2) allows a user to load an uncompressed image, compress it from one to three times with random quality factors within a range, and run the detector. The detector output is the estimated number of compression steps. This software can be shown on a laptop, and no other equipment is required. Figure 2. Outline of the GUI for the multiple JPEG compression detector, that shows the estimated number of IPEG compressions applied to the considered image. October 30, 2012 Page 6 of 12

7 1.5.3 Music Plagiarism Analyzer Music plagiarism, i.e., the use of another work while presenting it as one s own original music, has always been a topic of public interest. Typically, if music plagiarism cases are brought to court, independent music experts, often musicologists, are asked to analyze the similarities between two songs, and the judges rely on their opinion. With this demo we show that we are able to help music experts to inspect cases of suspected samplingplagiarism (see Figure 3). The software Music Plagiarism Analyzer facilitates retrieval of samples of one song in another song and thus helps to prove or disprove suspected sampling-plagiarism. The original sample thereby may have undergone manipulations such as time-stretching and pitch-shifting. Commonly it is also superimposed with additional music sources, such as drums or bass inside the new song. The algorithm we use is based on [6] and it relies on spectrogram decomposition of both the original and suspected plagiarism by means of Non-Negative Matrix Factorization. For the suspected plagiarism, the basis vectors of the original spectrogram are used as priors and retained during decomposition. The software enables the user to select an excerpt of a song and have the software erase this part from the suspected plagiarism. Further details can be found in [7]. Figure 3. Outline of the GUI for the music plagiarism analyzer. October 30, 2012 Page 7 of 12

8 1.5.4 Automatic video recapture detection With the increasing availability of small, inexpensive video recording devices, casual movie making is now within everyone's reach. This represents a great leap forward for budding directors; however it poses a significant threat in terms of copyrighted video material that can be covertly recorded and distributed. Moreover, illegitimate video material circulating on the net may not be limited to the case of recaptured copyrighted footage; another possibility is to recapture a fraudulent or otherwise doctored video in order to conceal traces of forgery, claiming its authenticity. Automatic detection of recaptured videos has not been thoroughly examined in the literature, and constitutes a useful tool to automatically flag media for potential copyright infringement or tampering concealment. Our technique [8] uses scene jitter as a cue for classification. During recapture, jitter is introduced due to either physiological hand tremor, or environmental factors such as projector flicker or floor vibrations. When recapturing planar surfaces approximately parallel to the imaging plane (such as a cinema screen captured by a handheld camera), any added motion due to jitter will result in approximately uniform high-frequency 2D motion fields. In our work the high-frequency motion components are analyzed through stages of feature tracking, wavelet decomposition and normalized cross correlation in order to obtain a distribution of the correlation coefficients between the high frequency motion components. The obtained distributions are then used directly for classification. To show the validity of our approach, our demo allows the user to either load a video from our dataset (either original or recaptured) or to load a video and synthetically add recapture jitter. An outline of the user interface is shown in Figure 1. Visual features are then tracked and shown in real time to the user, together with their trajectory before and after the wavelet decomposition. Finally, both the motion correlation matrix and the correlation distribution are shown together with the classification result, in order for the user to visually appreciate the strong influence of even very modest jitter on the correlation coefficients. Figure 4. Outline of the GUI for the video recapture detection software October 30, 2012 Page 8 of 12

9 1.5.5 Automatic video recapture detection The spectacular growth of Internet Protocol (IP) networks in the last decade, as well as the generalization of their use, have changed our way of interacting with people and learning, our consumption habits, and even our entertainment preferences. Concerning the latter, probably the first example are the widespread online games, although in the last years the online consumption of multimedia contents has also experienced a quantum leap. Due to its bandwidth characteristics and its added value, special attention is deserved by the IP distribution of video contents. Typically, two ways of video distribution can be found: Video on Demand (VoD): the user asks for the content to be delivered. Multicast: the content is scheduled for delivering and the user applies for being included in the destination list. Generally VoD streams contents (videos or TV shows) which are stored at the streaming server (a.k.a. delayed or time-shifted playing), as movies or TV shows, while multicast deals with the streaming of live events, typically sports. These new video distribution models have advantages from the point of view of the user: ease of use, possibility of choosing the screened contents among a huge selection, pause, play, rewind and forward features, paying just for those contents which are really consumed (unlike most of the previously used cable/satellite systems), enjoy their favorite programs/movies even when the users are not at home, and open a number of possibilities to the content distributor: almost unlimited potential market, cheap infrastructures, well-known distribution technology, leading to a new video distribution business model. Nevertheless, new technological and legal problems must be also faced, probably being the most important of them the streaming of contents by providers not owning the corresponding rights. This misuse of the contents causes huge losses to the legitimate content right owners, who indeed are interested in tracing back the distribution channel undergone by the content for arriving to the server of the unauthorized provider. October 30, 2012 Page 9 of 12

10 Since terrestrial and satellital channels are two of the most important ways of broadcasting video programs, this demo illustrates the possibility of classifying the origin of one streamed program between terrestrial and satellital, both for time-shifted and live streaming. In the considered framework, the streamed video will have high quality (specifically, no video or audio transcoding will be performed) and it will be streamed according to the Internet Protocol Television (IPTV) standard. Figure 5 contains a screenshot of the developed application; the current interface allows the user to watch on real-time the video in the considered stream, as well as the instant rate variability. The length of the considered video sequence can be determined by the used, although a minimum length around 30 seconds should be considered in order to provide reliable results. Figure 5. Screenshot of ClasifIPTV October 30, 2012 Page 10 of 12

11 1.5.6 References [1] Bianchi, T.; Piva, A.; "Detection of non-aligned double JPEG compression with estimation of primary compression parameters", IEEE International Conference on Image Processing (ICIP), 2011, pp , 2011 [2] Bianchi, T.; De Rosa, A.; Piva, A.; "Improved DCT coefficient analysis for forgery localization in JPEG images," IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp , 2011 [3] Farid, H.; "Exposing Digital Forgeries From JPEG Ghosts", IEEE Transactions on Information Forensics and Security, vol.4, no.1, pp , 2009 [4] Fontani, M.; Bianchi, T.; De Rosa, A.; Piva, A.; Barni, M.;, "A Dempster-Shafer framework for decision fusion in image forensics" IEEE International Workshop on Information Forensics and Security (WIFS), pp.1-6, 2011 [5] Milani S., Tagliasacchi M., Tubaro S., Discriminating multiple JPEG compression using first digit features, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Kyoto, Japan, March 2012 [6] P. Smaragdis, From learning music to learning to separate, Invited paper at Forum Acusticum, Budapest, Hungary, 2005 [7] C. Dittmar et al. Audio Forensics meets Music Information Retrieval A Toolbox for Inspection of Music Plagiarism to appear in Proceedings of the 20 th European Signal Processing Conference (EUSIPCO), Bucharest, Romania, 2012 [1] M. Visentini-Scarzanella, P. L. Dragotti, Video Jitter Analysis for Automatic Bootleg Detection, to appear in Proceedings of IEEE International Workshop on Multimedia Signal Processing (MMSP), Banff (Canada), 2012 October 30, 2012 Page 11 of 12

12 1.6 Upcoming events REWIND supports a series of events in which it will disseminate its outcomes, in the form of effective methods for performing reverse engineering of multimedia content. These are the upcoming events: IEEE International Workshop on Information Forensics and Security (WIFS 2012), Tenerife, Spain, December 2-5, REWIND is a sponsor of the workshop and supports a Best Paper Awards on Multimedia Forensics and Security. Moreover REWIND will organize a tutorial on Uncovering the processing history of video content and a set of REWIND demonstrators will be presented during the workshop. IEEE International Workshop on Multimedia Signal Processing (MMSP 2013), Pula (Sardinia), Italy, September 30 - October 2, REWIND will be one of the workshop sponsors and a series of activities will be organized during the events to showcase the results of the project. REWIND Workshop, Milan November The event will be specifically organized to present the results of the projects to companies, organizations and people potentially interested in using tools for discovering the past history of multimedia objects. The exact date of the event will be fixed soon. October 30, 2012 Page 12 of 12

Deliverable D6.3 Release of publicly available datasets and software tools

Deliverable D6.3 Release of publicly available datasets and software tools Grant Agreement No. 268478 Deliverable D6.3 Release of publicly available datasets and software tools Lead partner for this deliverable: PoliMI Version: 1.0 Dissemination level: Public April 29, 2013 Contents

More information

REVVIND REVerse engineering of audio VIsual content Data

REVVIND REVerse engineering of audio VIsual content Data REVVIND REVerse engineering of Newsletter Issue n.3, November 2013 REWIND Page 1 of 12 1.1 The REWIND is a FET (Future and Emerging Technology) research project funded by the European Commission within

More information

The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge

The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge WIFS 13 The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge Marco Fontani #, Enrique Argones-Rúa*, Carmela Troncoso*, Mauro Barni # # University of Siena (IT) * GRADIANT:

More information

REVVIND. FP7-ICT-2007-C GA No REVerse engineering of audio-visual content Data. D6.4 REWIND project workshop

REVVIND. FP7-ICT-2007-C GA No REVerse engineering of audio-visual content Data. D6.4 REWIND project workshop FP7-ICT-2007-C GA No. 268478 D6.4 REWIND project workshop LAST MODIFICATION: 5.12.2013 REPORTING ORGANIZATION: POLITECNICO DI MILANO AUTHORS: MARCO TAGLIASACCHI, STEFANO TUBARO (POLITECNICO DI MILANO)

More information

Local tampering detection in video sequences

Local tampering detection in video sequences Local tampering detection in video sequences Paolo Bestagini, Simone Milani, Marco Tagliasacchi, Stefano Tubaro Dipartimento di Elettronica, Informazione e Bioingegneria, Politecnico di Milano piazza Leonardo

More information

REVVIND REVerse engineering of audio-visual content Data

REVVIND REVerse engineering of audio-visual content Data FP7-ICT-2007-C GA No. 268478 footprint detectors LAST MODIFICATION: 30.04.2014 REPORTING ORGANIZATION: FRAUNHOFER (INSTITUTE FOR DIGITAL MEDIA TECHNOLOGY) AUTHORS: LUCA CUCCOVILLO, PATRICK AICHROTH, DANIEL

More information

REVVIND REVerse engineering of audio-visual content Data

REVVIND REVerse engineering of audio-visual content Data FP7-ICT-2007-C GA No. 268478 D5.5-2 Final report on content sets and flows, m36 Update LAST MODIFICATION: 30.04.2014 REPORTING ORGANIZATION: FRAUNHOFER (INSTITUTE FOR DIGITAL MEDIA TECHNOLOGY) AUTHORS:

More information

Multimedia Security: So What s the Big Deal?

Multimedia Security: So What s the Big Deal? Multimedia Security: So What s the Big Deal? Edward J. Delp Purdue University School of Electrical and Computer Engineering Video and Image Processing Laboratory (VIPER) West Lafayette, Indiana email:

More information

Detecting malicious tampering in digital images

Detecting malicious tampering in digital images Detecting malicious tampering in digital images Markos Zampoglou - markzampoglou@iti.gr Information Technologies Institute (ITI) Centre for Research and Technology Hellas (CERTH) Workshop on Tools for

More information

REVVIND REVerse engineering of audio-visual content Data

REVVIND REVerse engineering of audio-visual content Data FP7-ICT-2007-C GA No. 268478 D5.4 Initial report on evaluation of footprint detectors LAST MODIFICATION: 30.04.2013 REPORTING ORGANIZATION: FRAUNHOFER (INSTITUTE FOR DIGITAL MEDIA TECHNOLOGY) GERMANY AUTHORS:

More information

AN OVERVIEW ON VIDEO FORENSICS

AN OVERVIEW ON VIDEO FORENSICS AN OVERVIEW ON VIDEO FORENSICS P. Bestagini,M. Fontani,, S. Milani, M. Barni,, A.Piva,,M. Tagliasacchi, S.Tubaro Politecnico di Milano, Dipartimento di Elettronica e Informazione, Milano, Italy University

More information

An overview on video forensics

An overview on video forensics An overview on video forensics 1 S. Milani 1, M. Fontani 2,4, P. Bestagini 1, M. Barni 2,4, A. Piva 3,4, M. Tagliasacchi 1, S. Tubaro 1 1 Politecnico di Milano, Dipartimento di Elettronica e Informazione,

More information

CHAPTER 1: INTRODUCTION

CHAPTER 1: INTRODUCTION CHAPTER 1: INTRODUCTION In the modern age, digital images and videos have become the main information carriers to disseminate knowledge and establish the bridge among several sources. Visual information

More information

IMAGE PHYLOGENY THROUGH DISSIMILARITY METRICS FUSION

IMAGE PHYLOGENY THROUGH DISSIMILARITY METRICS FUSION IMAGE PHYLOGENY THROUGH DISSIMILARITY METRICS FUSION A. Melloni, P. Bestagini, S. Milani, M. Tagliasacchi, A. Rocha, S. Tubaro Dipartimento di Elettronica, Informazione e Bioingegneria Politecnico di Milano,

More information

(JBE Vol. 23, No. 6, November 2018) Detection of Frame Deletion Using Convolutional Neural Network. Abstract

(JBE Vol. 23, No. 6, November 2018) Detection of Frame Deletion Using Convolutional Neural Network. Abstract (JBE Vol. 23, No. 6, November 2018) (Regular Paper) 23 6, 2018 11 (JBE Vol. 23, No. 6, November 2018) https://doi.org/10.5909/jbe.2018.23.6.886 ISSN 2287-9137 (Online) ISSN 1226-7953 (Print) CNN a), a),

More information

Modelling Radial Distortion Chains for Video Recapture Detection

Modelling Radial Distortion Chains for Video Recapture Detection Modelling Radial Distortion Chains for Video Recapture Detection Marco Visentini-Scarzanella 1, Pier Luigi Dragotti 2 Communications and Signal Processing Group Department of Electrical and Electronic

More information

VIDEO CODEC IDENTIFICATION EXTENDING THE IDEMPOTENCY PROPERTY. P. Bestagini, S. Milani, M. Tagliasacchi, S. Tubaro

VIDEO CODEC IDENTIFICATION EXTENDING THE IDEMPOTENCY PROPERTY. P. Bestagini, S. Milani, M. Tagliasacchi, S. Tubaro VIDEO CODEC IDENTIFICATION EXTENDING THE IDEMPOTENCY PROPERTY P. Bestagini, S. Milani, M. Tagliasacchi, S. Tubaro Dipartimento di Elettronica ed Informazione, Politecnico di Milano piazza Leonardo da Vinci

More information

IRMOS Newsletter. Issue N 5 / January Editorial. In this issue... Dear Reader, Editorial p.1

IRMOS Newsletter. Issue N 5 / January Editorial. In this issue... Dear Reader, Editorial p.1 IRMOS Newsletter Issue N 5 / January 2011 In this issue... Editorial Editorial p.1 Highlights p.2 Special topic: The IRMOS Repository p.5 Recent project outcomes p.6 Keep in touch with IRMOS p.8 Dear Reader,

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico di Torino Porto Institutional Repository [Proceeding] Detection and classification of double compressed MP3 audio tracks Original Citation: Tiziano Bianchi;Alessia De Rosa;Marco Fontani;Giovanni

More information

Forensic analysis of JPEG image compression

Forensic analysis of JPEG image compression Forensic analysis of JPEG image compression Visual Information Privacy and Protection (VIPP Group) Course on Multimedia Security 2015/2016 Introduction Summary Introduction The JPEG (Joint Photographic

More information

RiskSense Attack Surface Validation for IoT Systems

RiskSense Attack Surface Validation for IoT Systems RiskSense Attack Surface Validation for IoT Systems 2018 RiskSense, Inc. Surfacing Double Exposure Risks Changing Times and Assessment Focus Our view of security assessments has changed. There is diminishing

More information

Preemptive PREventivE Methodology and Tools to protect utilities

Preemptive PREventivE Methodology and Tools to protect utilities Preemptive PREventivE Methodology and Tools to protect utilities 2014 2017 With the financial support of FP7 Seventh Framework Programme Grant agreement no: 607093 1 Preemptive description Project objectives

More information

FRAGILE WATERMARKING USING SUBBAND CODING

FRAGILE WATERMARKING USING SUBBAND CODING ICCVG 2002 Zakopane, 25-29 Sept. 2002 Roger ŚWIERCZYŃSKI Institute of Electronics and Telecommunication Poznań University of Technology roger@et.put.poznan.pl FRAGILE WATERMARKING USING SUBBAND CODING

More information

Version 11

Version 11 The Big Challenges Networked and Electronic Media European Technology Platform The birth of a new sector www.nem-initiative.org Version 11 1. NEM IN THE WORLD The main objective of the Networked and Electronic

More information

Value of YouTube to the music industry Paper V Direct value to the industry

Value of YouTube to the music industry Paper V Direct value to the industry Value of YouTube to the music industry Paper V Direct value to the industry June 2017 RBB Economics 1 1 Introduction The music industry has undergone significant change over the past few years, with declining

More information

Internet Television. Chapter Internet Television vs. IPTV. Internet Television

Internet Television. Chapter Internet Television vs. IPTV. Internet Television Chapter 8 Internet Television In concluding this book, we will examine what we can consider to represent an evolving industry television delivered via the Internet. Although television delivered via the

More information

1. Publishable Summary

1. Publishable Summary 1. Publishable Summary 1.1Project objectives and context Identity management (IdM) has emerged as a promising technology to distribute identity information across security domains. In e-business scenarios,

More information

Total Variation Based Forensics for JPEG Compression

Total Variation Based Forensics for JPEG Compression International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 6, September 2014, PP 8-13 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) Total Variation Based Forensics

More information

!!!!!! Portfolio Summary!! for more information July, C o n c e r t T e c h n o l o g y

!!!!!! Portfolio Summary!! for more information  July, C o n c e r t T e c h n o l o g y Portfolio Summary July, 2014 for more information www.concerttechnology.com bizdev@concerttechnology.com C o n c e r t T e c h n o l o g y Overview The screenplay project covers emerging trends in social

More information

Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud

Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud Ezz El-Din Hemdan 1, Manjaiah D.H 2 Research Scholar, Department of Computer Science, Mangalore University,

More information

D7.6 Project video. Project ref. no. H2020-ICT GA No BINCI Binaural tools for the creative industries

D7.6 Project video. Project ref. no. H2020-ICT GA No BINCI Binaural tools for the creative industries D7.6 Project video Project ref. no. H2020-ICT-21-2016 GA No. 732130 Project title BINCI Binaural tools for the creative industries Duration of the project 1 January 2017-30 June 2018 (18 months) WP/Task:

More information

D.9.1 Web Portal Creation and Launch

D.9.1 Web Portal Creation and Launch HERMES Cognitive Care and Guidance for Active Aging FP7-ICT 216709 Specific Targeted Research or Innovation Project Start date of project: January 1, 2008 Duration: 36 months D.9.1 Web Portal Creation

More information

Rate-distortion Optimized Streaming of Compressed Light Fields with Multiple Representations

Rate-distortion Optimized Streaming of Compressed Light Fields with Multiple Representations Rate-distortion Optimized Streaming of Compressed Light Fields with Multiple Representations Prashant Ramanathan and Bernd Girod Department of Electrical Engineering Stanford University Stanford CA 945

More information

Lau Zuydervelt. Product Marketing Director (Watermarking) 2018 Irdeto. All Rights Reserved.

Lau Zuydervelt. Product Marketing Director (Watermarking) 2018 Irdeto. All Rights Reserved. Watermarking is much more than just an anti-piracy tool Lau Zuydervelt Product Marketing Director (Watermarking) +5 BILLION DEVICES AND APPLICATIONS SECURED IRDETO IS THE WORLD LEADER IN DIGITAL PLATFORM

More information

Multiple Classifier Systems for Image Forgery Detection

Multiple Classifier Systems for Image Forgery Detection Multiple Classifier Systems for Image Forgery Detection Davide Cozzolino, Francesco Gargiulo, Carlo Sansone, and Luisa Verdoliva DIETI, University of Naples Federico II {davide.cozzolino,francesco.grg,carlosan,verdoliv}@unina.it

More information

A Forensic Tool for Investigating Image Forgeries

A Forensic Tool for Investigating Image Forgeries A Forensic Tool for Investigating Image Forgeries Marco Fontani, University of Siena, Via Roma 56, 53100, Siena, Italy Tiziano Bianchi, Politecnico di Torino, Corso Duca degli Abruzzi 24, 10129, Torino,

More information

Detecting Digital Image Forgeries By Multi-illuminant Estimators

Detecting Digital Image Forgeries By Multi-illuminant Estimators Research Paper Volume 2 Issue 8 April 2015 International Journal of Informative & Futuristic Research ISSN (Online): 2347-1697 Detecting Digital Image Forgeries By Multi-illuminant Estimators Paper ID

More information

Rate-distortion Optimized Streaming of Compressed Light Fields with Multiple Representations

Rate-distortion Optimized Streaming of Compressed Light Fields with Multiple Representations Rate-distortion Optimized Streaming of Compressed Light Fields with Multiple Representations Prashant Ramanathan and Bernd Girod Department of Electrical Engineering Stanford University Stanford CA 945

More information

Outline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami

Outline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami to MPEG Prof. Pratikgiri Goswami Electronics & Communication Department, Shree Swami Atmanand Saraswati Institute of Technology, Surat. Outline of Topics 1 2 Coding 3 Video Object Representation Outline

More information

KEY BENEFITS OF A TIKILIVE NETWORK

KEY BENEFITS OF A TIKILIVE NETWORK EXTEND YOUR BRAND AND GENERATE REVENUE WITH TIKILIVE HD STREAMING COMMUNITY TIKILIVE.COM KEY BENEFITS OF A TIKILIVE NETWORK Easily brand connect, manage and monetize your HD content Realize immediate viewer

More information

Effective Threat Modeling using TAM

Effective Threat Modeling using TAM Effective Threat Modeling using TAM In my blog entry regarding Threat Analysis and Modeling (TAM) tool developed by (Application Consulting and Engineering) ACE, I have watched many more Threat Models

More information

Project Periodic Report Summary

Project Periodic Report Summary Project Periodic Report Summary Month 12 Date: 24.7.2014 Grant Agreement number: EU 323567 Project acronym: HARVEST4D Project title: Harvesting Dynamic 3D Worlds from Commodity Sensor Clouds TABLE OF CONTENTS

More information

Digital Image Processing

Digital Image Processing Digital Image Processing Fundamentals of Image Compression DR TANIA STATHAKI READER (ASSOCIATE PROFFESOR) IN SIGNAL PROCESSING IMPERIAL COLLEGE LONDON Compression New techniques have led to the development

More information

Opinion 02/2012 on facial recognition in online and mobile services

Opinion 02/2012 on facial recognition in online and mobile services ARTICLE 29 DATA PROTECTION WORKING PARTY 00727/12/EN WP 192 Opinion 02/2012 on facial recognition in online and mobile services Adopted on 22 March 2012 This Working Party was set up under Article 29 of

More information

A study of Video Response Spam Detection on YouTube

A study of Video Response Spam Detection on YouTube A study of Video Response Spam Detection on YouTube Suman 1 and Vipin Arora 2 1 Research Scholar, Department of CSE, BITS, Bhiwani, Haryana (India) 2 Asst. Prof., Department of CSE, BITS, Bhiwani, Haryana

More information

Cloud Movie: Cloud Based Dynamic Resources Allocation And Parallel Execution On Vod Loading Virtualization

Cloud Movie: Cloud Based Dynamic Resources Allocation And Parallel Execution On Vod Loading Virtualization Cloud Movie: Cloud Based Dynamic Resources Allocation And Parallel Execution On Vod Loading Virtualization Akshatha K T #1 #1 M.Tech 4 th sem (CSE), VTU East West Institute of Technology India. Prasad

More information

Reverse engineering of double compressed images in the presence of contrast enhancement

Reverse engineering of double compressed images in the presence of contrast enhancement Reverse engineering of double compressed images in the presence of contrast enhancement P. Ferrara #, T. Bianchi, A. De Rosa, A. Piva # National Institute of Optics (INO), Firenze, Italy pasquale.ferrara@ino.it

More information

Incident Response Services

Incident Response Services Services Enhanced with Supervised Machine Learning and Human Intelligence Empowering clients to stay one step ahead of the adversary. Secureworks helps clients enable intelligent actions to outsmart and

More information

Standardization Activities in ITU-T

Standardization Activities in ITU-T Standardization Activities in ITU-T Nozomu NISHINAGA and Suyong Eum Standardization activities for Future Networks in ITU-T have produced 19 Recommendations since it was initiated in 2009. The brief history

More information

Seminar Day HH&RA. Buk 23rd November 2016 Helena Egan, Global Director Industry Relations

Seminar Day HH&RA. Buk 23rd November 2016 Helena Egan, Global Director Industry Relations Seminar Day HH&RA Buk 23rd November 2016 Helena Egan, Global Director Industry Relations MISSION HELP TRAVELERS PLAN AND BOOK THE BEST TRIP TripAdvisor Today o v e r 6.8 MILLION businesses listed o v e

More information

Phishing Activity Trends Report August, 2006

Phishing Activity Trends Report August, 2006 Phishing Activity Trends Report, 26 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account

More information

Practical methods for digital video forensic authentication

Practical methods for digital video forensic authentication Practical methods for digital video forensic authentication Jinhua Zeng, * Shaopei Shi, Yan Li, Qimeng Lu, Xiulian Qiu Institute of Forensic Science, Ministry of Justice, Shanghai 200063, China *Corresponding

More information

Massive Data Analysis

Massive Data Analysis Professor, Department of Electrical and Computer Engineering Tennessee Technological University February 25, 2015 Big Data This talk is based on the report [1]. The growth of big data is changing that

More information

Revealing the Traces of JPEG Compression Anti-Forensics

Revealing the Traces of JPEG Compression Anti-Forensics IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 2, FEBRUARY 2013 335 Revealing the Traces of JPEG Compression Anti-Forensics Giuseppe Valenzise, Member, IEEE, Marco Tagliasacchi, Member,

More information

Key Learning in Computing: Years 5 and 6 Information Technology

Key Learning in Computing: Years 5 and 6 Information Technology Information Technology Programme of Study Select, use and combine a variety of software (including internet services) on a range of digital devices to design and creat e a range of programs, systems and

More information

IoT privacy risk management in ANASTACIA project

IoT privacy risk management in ANASTACIA project ANASTACIA has received funding from the European Union s Horizon 2020 Research and Innovation Programme under Grant Agreement N 731558 and from the Swiss State Secretariat for Education, Research and Innovation.

More information

Forensic Image Recognition using a Novel Image Fingerprinting and Hashing Technique

Forensic Image Recognition using a Novel Image Fingerprinting and Hashing Technique Forensic Image Recognition using a Novel Image Fingerprinting and Hashing Technique R D Neal, R J Shaw and A S Atkins Faculty of Computing, Engineering and Technology, Staffordshire University, Stafford

More information

Image and video processing

Image and video processing Image and video processing Digital video Dr. Pengwei Hao Agenda Digital video Video compression Video formats and codecs MPEG Other codecs Web video - 2 - Digital Video Until the arrival of the Pentium

More information

Live Broadcast: Video Services from AT&T

Live Broadcast: Video Services from AT&T Delivering your content through the power of the cloud Live Broadcast: Video Services from AT&T Getting your content to your audience is becoming increasingly diverse and complex. Today, people want to

More information

Enhanced Performance of Search Engine with Multitype Feature Co-Selection of Db-scan Clustering Algorithm

Enhanced Performance of Search Engine with Multitype Feature Co-Selection of Db-scan Clustering Algorithm Enhanced Performance of Search Engine with Multitype Feature Co-Selection of Db-scan Clustering Algorithm K.Parimala, Assistant Professor, MCA Department, NMS.S.Vellaichamy Nadar College, Madurai, Dr.V.Palanisamy,

More information

Data Hiding in Video

Data Hiding in Video Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract

More information

A Study on Transmission System for Realistic Media Effect Representation

A Study on Transmission System for Realistic Media Effect Representation Indian Journal of Science and Technology, Vol 8(S5), 28 32, March 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI : 10.17485/ijst/2015/v8iS5/61461 A Study on Transmission System for Realistic

More information

Binju Bentex *1, Shandry K. K 2. PG Student, Department of Computer Science, College Of Engineering, Kidangoor, Kottayam, Kerala, India

Binju Bentex *1, Shandry K. K 2. PG Student, Department of Computer Science, College Of Engineering, Kidangoor, Kottayam, Kerala, India International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018 IJSRCSEIT Volume 3 Issue 3 ISSN : 2456-3307 Survey on Summarization of Multiple User-Generated

More information

Embarking on the next stage of hosted desktop delivery for international events management company

Embarking on the next stage of hosted desktop delivery for international events management company Embarking on the next stage of hosted desktop delivery for international events management company Richmond Events is an international events management company, delivering a diverse range of forums and

More information

Archive Legislation: archiving in the United Kingdom. The key laws that affect your business

Archive Legislation:  archiving in the United Kingdom. The key laws that affect your business Archive Legislation: Email archiving in the United Kingdom The key laws that affect your business Contents Laws regulating archiving, who they apply to and the penalties 3 Who is affected? 3 All private

More information

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation , 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

More information

National Data Sharing and Accessibility Policy-2012 (NDSAP-2012)

National Data Sharing and Accessibility Policy-2012 (NDSAP-2012) National Data Sharing and Accessibility Policy-2012 (NDSAP-2012) Department of Science & Technology Ministry of science & Technology Government of India Government of India Ministry of Science & Technology

More information

Searching User-generated Video Content based on Link Relationships between Videos and Blogs

Searching User-generated Video Content based on Link Relationships between Videos and Blogs Searching User-generated Video Content based on Relationships between Videos and Blogs User-generated Video Blogs Video Search Searching User-generated Video Content based on Relationships between Videos

More information

Countering Anti-Forensics by Means of Data Fusion

Countering Anti-Forensics by Means of Data Fusion Countering Anti-Forensics by Means of Data Fusion Marco Fontani a, Alessandro Bonchi b, Alessandro Piva b and Mauro Barni c a CNIT, University of Siena, 53100 Siena, Italy; b University of Florence, 50139

More information

Compressive Sensing for Multimedia. Communications in Wireless Sensor Networks

Compressive Sensing for Multimedia. Communications in Wireless Sensor Networks Compressive Sensing for Multimedia 1 Communications in Wireless Sensor Networks Wael Barakat & Rabih Saliba MDDSP Project Final Report Prof. Brian L. Evans May 9, 2008 Abstract Compressive Sensing is an

More information

ESKIAV3 (SQA Unit Code - F9AM 04) Audio and Video Software

ESKIAV3 (SQA Unit Code - F9AM 04) Audio and Video Software Overview This is the ability to use a software application designed to record and edit audio and video sequences. ESKIAV3 (SQA Unit Code - F9AM 04) 1 Performance criteria You must be able to: You must

More information

In focus: Broadcasting. Challenges within the broadcasting industry

In focus: Broadcasting. Challenges within the broadcasting industry In focus: Broadcasting Challenges within the broadcasting industry Contents A new world 3 The issues broadcasters are facing 4 ICT challenges for the media sector 5 The focus has changed 6 Where we re

More information

TRIBHUVAN UNIVERSITY Institute of Engineering Pulchowk Campus Department of Electronics and Computer Engineering

TRIBHUVAN UNIVERSITY Institute of Engineering Pulchowk Campus Department of Electronics and Computer Engineering TRIBHUVAN UNIVERSITY Institute of Engineering Pulchowk Campus Department of Electronics and Computer Engineering A Final project Report ON Minor Project Java Media Player Submitted By Bisharjan Pokharel(061bct512)

More information

LINEAR VIDEO DELIVERY FROM THE CLOUD. A New Paradigm for 24/7 Broadcasting WHITE PAPER

LINEAR VIDEO DELIVERY FROM THE CLOUD. A New Paradigm for 24/7 Broadcasting WHITE PAPER WHITE PAPER LINEAR VIDEO DELIVERY FROM THE CLOUD A New Paradigm for 24/7 Broadcasting Copyright 2016 Elemental Technologies. Linear Video Delivery from the Cloud 1 CONTENTS Introduction... 3 A New Way

More information

Phishing Activity Trends Report August, 2005

Phishing Activity Trends Report August, 2005 Phishing Activity Trends Report August, 25 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial

More information

Novel Lossy Compression Algorithms with Stacked Autoencoders

Novel Lossy Compression Algorithms with Stacked Autoencoders Novel Lossy Compression Algorithms with Stacked Autoencoders Anand Atreya and Daniel O Shea {aatreya, djoshea}@stanford.edu 11 December 2009 1. Introduction 1.1. Lossy compression Lossy compression is

More information

Security Assurance Framework for Networked Vehicular Technology

Security Assurance Framework for Networked Vehicular Technology D7.2 SAFERtec Website Security Assurance Framework for Networked Vehicular Technology Abstract SAFERtec proposes a flexible and efficient assurance framework for security and trustworthiness of Connected

More information

The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge

The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge Marco Fontani #, Enrique Argones-Rúa 2, Carmela Troncoso 3, Mauro Barni #4 # Dept. of Information Engineering and

More information

WorldScreen. Layered Scheme Compression for the Digital Cinema Chain. Mike Christmann.

WorldScreen. Layered Scheme Compression for the Digital Cinema Chain. Mike Christmann. WorldScreen Layered Scheme Compression for the Digital Cinema Chain Mike Christmann http://www.worldscreen.org Project Overview Acronym: WorldScreen Duration: 09/2004 04/2007 Partners: 8 + 2 associated

More information

Report from the Ad Hoc Committee for Task Force Maximization and Knowledge Sharing

Report from the Ad Hoc Committee for Task Force Maximization and Knowledge Sharing Report from the Ad Hoc Committee for Task Force Maximization and Knowledge Sharing Presented by: Sallie Greenberg CSLF Technical Group Meeting Melbourne, Australia - 17 October 2018 2017 PIRT Abu Dhabi

More information

Georgios Tziritas Computer Science Department

Georgios Tziritas Computer Science Department New Video Coding standards MPEG-4, HEVC Georgios Tziritas Computer Science Department http://www.csd.uoc.gr/~tziritas 1 MPEG-4 : introduction Motion Picture Expert Group Publication 1998 (Intern. Standardization

More information

15412/16 RR/dk 1 DGD 1C

15412/16 RR/dk 1 DGD 1C Council of the European Union Brussels, 12 December 2016 (OR. en) 15412/16 ENFOPOL 484 ENV 791 ENFOCUSTOM 235 OUTCOME OF PROCEEDINGS From: General Secretariat of the Council On: 8 December 2016 To: Delegations

More information

Privacy Policy. 1. Information may collected by Feelingtouch

Privacy Policy. 1. Information may collected by Feelingtouch Privacy Policy When you use Feelingtouch game software or accept Feelingtouch game services, Feelingtouch may collect and use your relevant information. Feelingtouch promises to strictly protect your privacy.

More information

Detection and localization of double compression in MP3 audio tracks

Detection and localization of double compression in MP3 audio tracks Bianchi et al. EURASIP Journal on Information Security 214, 214:1 http://jis.eurasipjournals.com/content/214/1/1 RESEARCH Detection and localization of double compression in MP3 audio tracks Tiziano Bianchi

More information

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List

More information

Multimodal Information Spaces for Content-based Image Retrieval

Multimodal Information Spaces for Content-based Image Retrieval Research Proposal Multimodal Information Spaces for Content-based Image Retrieval Abstract Currently, image retrieval by content is a research problem of great interest in academia and the industry, due

More information

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

Tech Note - 05 Surveillance Systems that Work! Calculating Recorded Volume Disk Space

Tech Note - 05 Surveillance Systems that Work! Calculating Recorded Volume Disk Space Tech Note - 05 Surveillance Systems that Work! Surveillance Systems Calculating required storage drive (disk space) capacity is sometimes be a rather tricky business. This Tech Note is written to inform

More information

D2.2 Web Platform development

D2.2 Web Platform development EUBrazilCC EU-Brazil Cloud infrastructure Connecting federated resources for Scientific Advancement D2.2 Web Platform development Contract number: FP7-614048 / Start Date of Project: 1 October 2013 Duration

More information

IPTV Explained. Part 1 in a BSF Series.

IPTV Explained. Part 1 in a BSF Series. IPTV Explained Part 1 in a BSF Series www.aucklandsatellitetv.co.nz I N T R O D U C T I O N As a result of broadband service providers moving from offering connectivity to services, the discussion surrounding

More information

GDPR: An Opportunity to Transform Your Security Operations

GDPR: An Opportunity to Transform Your Security Operations GDPR: An Opportunity to Transform Your Security Operations McAfee SIEM solutions improve breach detection and response Is your security operations GDPR ready? General Data Protection Regulation (GDPR)

More information

RiskSense Attack Surface Validation for Web Applications

RiskSense Attack Surface Validation for Web Applications RiskSense Attack Surface Validation for Web Applications 2018 RiskSense, Inc. Keeping Pace with Digital Business No Excuses for Not Finding Risk Exposure We needed a faster way of getting a risk assessment

More information

Multimedia Databases. Wolf-Tilo Balke Younès Ghammad Institut für Informationssysteme Technische Universität Braunschweig

Multimedia Databases. Wolf-Tilo Balke Younès Ghammad Institut für Informationssysteme Technische Universität Braunschweig Multimedia Databases Wolf-Tilo Balke Younès Ghammad Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de Previous Lecture Audio Retrieval - Query by Humming

More information

DIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING

DIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING 17.09.24 DIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING FORENSICS FRAMEWORK FOR CLOUD COMPUTING OUTLINE Abstract Introduction Challenges in cloud forensics Proposed solution Conclusion Opinion

More information

Tips on DVD Authoring and DVD Duplication M A X E L L P R O F E S S I O N A L M E D I A

Tips on DVD Authoring and DVD Duplication M A X E L L P R O F E S S I O N A L M E D I A Tips on DVD Authoring and DVD Duplication DVD Authoring - Introduction The postproduction business has certainly come a long way in the past decade or so. This includes the duplication/authoring aspect

More information

Issues of Operating Systems Security

Issues of Operating Systems Security ECAI 2007 - International Conference Second Edition Electronics, Computers and Artificial Intelligence 29 th 30 th June, 2007, Piteşti, ROMÂNIA Issues of Operating Systems Security Academy of Economic

More information

Optimal Video Adaptation and Skimming Using a Utility-Based Framework

Optimal Video Adaptation and Skimming Using a Utility-Based Framework Optimal Video Adaptation and Skimming Using a Utility-Based Framework Shih-Fu Chang Digital Video and Multimedia Lab ADVENT University-Industry Consortium Columbia University Sept. 9th 2002 http://www.ee.columbia.edu/dvmm

More information

Metadata, Chief technicolor

Metadata, Chief technicolor Metadata, the future of home entertainment Christophe Diot Christophe Diot Chief Scientist @ technicolor 2 2011-09-26 What is a metadata? Metadata taxonomy Usage metadata Consumption (number of views,

More information

MESH. Multimedia Semantic Syndication for Enhanced News Services. Project Overview

MESH. Multimedia Semantic Syndication for Enhanced News Services. Project Overview MESH Multimedia Semantic Syndication for Enhanced News Services Project Overview Presentation Structure 2 Project Summary Project Motivation Problem Description Work Description Expected Result The MESH

More information

WATERMARKING FOR LIGHT FIELD RENDERING 1

WATERMARKING FOR LIGHT FIELD RENDERING 1 ATERMARKING FOR LIGHT FIELD RENDERING 1 Alper Koz, Cevahir Çığla and A. Aydın Alatan Department of Electrical and Electronics Engineering, METU Balgat, 06531, Ankara, TURKEY. e-mail: koz@metu.edu.tr, cevahir@eee.metu.edu.tr,

More information