Advances in Multimedia http://www.hindawi.com The latest articles from Hindawi Publishing Corporation © 2015 , Hindawi Publishing Corporation . All rights reserved. Advanced Issues on Topic Detection, Tracking, and Trend Analysis for Social Multimedia Tue, 04 Aug 2015 13:57:06 +0000 http://www.hindawi.com/journals/am/2015/709646/ Seungmin Rho, Wenny Rahayu, and Uyen Trang Nguyen Copyright © 2015 Seungmin Rho et al. All rights reserved. Supporting Image Search with Tag Clouds: A Preliminary Approach Tue, 04 Aug 2015 11:33:11 +0000 http://www.hindawi.com/journals/am/2015/439020/ Algorithms and techniques for searching in collections of data address a challenging task, since they have to bridge the gap between the ways in which users express their interests, through natural language expressions or keywords, and the ways in which data is represented and indexed. When the collections of data include images, the task becomes harder, mainly for two reasons. From one side the user expresses his needs through one medium (text) and he will obtain results via another medium (some images). From the other side, it can be difficult for a user to understand the results retrieved; that is why a particular image is part of the result set. In this case, some techniques for analyzing the query results and giving to the users some insight into the content retrieved are needed. In this paper, we propose to address this problem by coupling the image result set with a tag cloud of words describing it. Some techniques for building the tag cloud are introduced and two application scenarios are discussed. Francesco Guerra, Giovanni Simonini, and Maurizio Vincini Copyright © 2015 Francesco Guerra et al. All rights reserved. An Empirical Analysis of Technology Transfer of National R&D Projects in South Korea Tue, 04 Aug 2015 11:10:35 +0000 http://www.hindawi.com/journals/am/2015/498408/ This study is aimed at seeking policy implications for the policy makers of South Korean government and finding a direction to support R&D institutions in performing R&D activities more efficiently, by analyzing the factors influencing technology transfer of the national R&D projects. The data retrieved from NTIS (National Science & Technology Information Service) was used in analyzing the results of 575 projects with 1,903 cases of technology transfer, performed by the Ministry of Science, ICT and Future Planning, between 2002 and 2012. We found that there were significant differences between the government funded institutions and the universities and between basic R&D and applied ones. We also discovered that the government funded institutions did not necessarily take a better position than the universities in terms of the quantity of technology transfer. Lastly, the applied R&D of the universities was very vulnerable in terms of technology transfer. Mi-Sun Kim, Dong-Ho Shin, Jae-Soo Kim, and Byeong-Hee Lee Copyright © 2015 Mi-Sun Kim et al. All rights reserved. Development of Ontology and 3D Software for the Diseases of Spine Tue, 04 Aug 2015 11:04:16 +0000 http://www.hindawi.com/journals/am/2015/420848/ KISTI is carrying out an e-Spine project for spinal diseases to prepare for the aged society, so-called NAP. The purpose of the study is to build a spine ontology that represents the anatomical structure and disease information which is compatible with simulation model of KISTI. The final use of the ontology includes diagnosis of diseases and setting treatment directions by the clinicians. The ontology was represented using 3D software. Twenty diseases were selected to be represented after discussions with a spine specialist. Several ontology studies were reviewed, reference books were selected for each disease and were organized in MS Excel. All the contents were then reviewed by the specialists. Altova SemanticWorks and Protégé were used to code spine ontology with OWL Full model. Links to the images from KISTI and sample images of diseases were included in the ontology. The OWL ontology was also reviewed by the specialists again with Protégé. We represented unidirectional ontology from anatomical structure to disease, images, and treatment. The ontology was human understandable. It would be useful for the education of medical students or residents studying diseases of spine. But in order for the computer to understand the ontology, a new model with OWL DL or Lite is needed. Seungbock Lee, Sangho Lee, Dongmin Seo, Kwan-Hee Yoo, and Sukil Kim Copyright © 2015 Seungbock Lee et al. All rights reserved. Performance Comparison of OpenMP, MPI, and MapReduce in Practical Problems Tue, 04 Aug 2015 06:40:03 +0000 http://www.hindawi.com/journals/am/2015/575687/ With problem size and complexity increasing, several parallel and distributed programming models and frameworks have been developed to efficiently handle such problems. This paper briefly reviews the parallel computing models and describes three widely recognized parallel programming frameworks: OpenMP, MPI, and MapReduce. OpenMP is the de facto standard for parallel programming on shared memory systems. MPI is the de facto industry standard for distributed memory systems. MapReduce framework has become the de facto standard for large scale data-intensive applications. Qualitative pros and cons of each framework are known, but quantitative performance indexes help get a good picture of which framework to use for the applications. As benchmark problems to compare those frameworks, two problems are chosen: all-pairs-shortest-path problem and data join problem. This paper presents the parallel programs for the problems implemented on the three frameworks, respectively. It shows the experiment results on a cluster of computers. It also discusses which is the right tool for the jobs by analyzing the characteristics and performance of the paradigms. Sol Ji Kang, Sang Yeon Lee, and Keon Myung Lee Copyright © 2015 Sol Ji Kang et al. All rights reserved. Coevolution of Artificial Agents Using Evolutionary Computation in Bargaining Game Mon, 03 Aug 2015 14:19:11 +0000 http://www.hindawi.com/journals/am/2015/468128/ Analysis of bargaining game using evolutionary computation is essential issue in the field of game theory. This paper investigates the interaction and coevolutionary process among heterogeneous artificial agents using evolutionary computation (EC) in the bargaining game. In particular, the game performance with regard to payoff through the interaction and coevolution of agents is studied. We present three kinds of EC based agents (EC-agent) participating in the bargaining game: genetic algorithm (GA), particle swarm optimization (PSO), and differential evolution (DE). The agents’ performance with regard to changing condition is compared. From the simulation results it is found that the PSO-agent is superior to the other agents. Sangwook Lee Copyright © 2015 Sangwook Lee. All rights reserved. Preprocessing Techniques for High-Efficiency Data Compression in Wireless Multimedia Sensor Networks Mon, 03 Aug 2015 14:03:19 +0000 http://www.hindawi.com/journals/am/2015/380849/ We have proposed preprocessing techniques for high-efficiency data compression in wireless multimedia sensor networks. To do this, we analyzed the characteristics of multimedia data under the environment of wireless multimedia sensor networks. The proposed preprocessing techniques consider the characteristics of sensed multimedia data to perform the first stage preprocessing by deleting the low priority bits that do not affect the image quality. The second stage preprocessing is also performed for the undeleted high priority bits. By performing these two-stage preprocessing techniques, it is possible to reduce the multimedia data size in large. To show the superiority of our techniques, we simulated the existing multimedia data compression scheme with/without our preprocessing techniques. Our experimental results show that our proposed techniques increase compression ratio while reducing compression operations compared to the existing compression scheme without preprocessing techniques. Junho Park and Jaesoo Yoo Copyright © 2015 Junho Park and Jaesoo Yoo. All rights reserved. Security Requirements for Multimedia Archives Mon, 03 Aug 2015 13:32:11 +0000 http://www.hindawi.com/journals/am/2015/956416/ With the explosive growth of various multimedia contents, digital archives are used to store those contents accordingly. In contrast to the traditional storage systems in which data lifetime is measured in months or years, data lifetime in the archive is measured in decades. This longevity of contents causes new security issues that threat the archive systems. In this paper, we discuss these new security issues in perspective. And we suggest some security requirements for digital archives. Sang Bae Park Copyright © 2015 Sang Bae Park. All rights reserved. Discovering Congested Routes Using Vehicle Trajectories in Road Networks Mon, 03 Aug 2015 13:29:55 +0000 http://www.hindawi.com/journals/am/2015/420689/ The popular route recommendation and traffic monitoring over the road networks have become important in the location-based services. The schemes to find out the congested routes were proposed by considering the number of vehicles in a road segment. However, the existing schemes do not consider the features of each road segment such as width, length, and direction in a road network. Furthermore, the existing schemes fail to consider the average moving speed of vehicles. Therefore, they can detect the incorrect density routes. To overcome such problems, we propose a new discovering scheme of congested routes through the analysis of vehicle trajectories in a road network. The proposed scheme divides each road into segments with different width and length in a road network. And then, the congested road segment is detected through the saturation degree of the road segment and the average moving speed of vehicles in the road segment. Finally, we compute the final congested routes by using a clustering scheme. The experimental results have shown that the proposed scheme can efficiently discover the congested routes in the different directions of the roads. Kyoung Soo Bok, He Li, Jong Tae Lim, and Jae Soo Yoo Copyright © 2015 Kyoung Soo Bok et al. All rights reserved. Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication Mon, 03 Aug 2015 12:52:45 +0000 http://www.hindawi.com/journals/am/2015/960416/ Recently, as the utilization of CCTV (closed circuit television) is emerging as an issue, the studies on CCTV are receiving much attention. Accordingly, due to the development of CCTV, CCTV has IP addresses and is connected to network; it is exposed to many threats on the existing web environment. In this paper, steganography is utilized to confirm the Data Masquerading and Data Modification and, in addition, to strengthen the security; the user information is protected based on PKI (public key infrastructure), SN (serial number), and R value (random number) attributed at the time of login and the user authentication protocol to block nonauthorized access of malicious user in network CCTV environment was proposed. This paper should be appropriate for utilization of user infringement-related CCTV where user information protection-related technology is not applied for CCTV in the future. Jung-oh Park and Sanggeun Kim Copyright © 2015 Jung-oh Park and Sanggeun Kim. All rights reserved. High-Level Codewords Based on Granger Causality for Video Event Detection Tue, 23 Jun 2015 06:20:45 +0000 http://www.hindawi.com/journals/am/2015/698316/ Video event detection is a challenging problem in many applications, such as video surveillance and video content analysis. In this paper, we propose a new framework to perceive high-level codewords by analyzing temporal relationship between different channels of video features. The low-level vocabulary words are firstly generated after different audio and visual feature extraction. A weighted undirected graph is constructed by exploring the Granger Causality between low-level words. Then, a greedy agglomerative graph-partitioning method is used to discover low-level word groups which have similar temporal pattern. The high-level codebooks representation is obtained by quantification of low-level words groups. Finally, multiple kernel learning, combined with our high-level codewords, is used to detect the video event. Extensive experimental results show that the proposed method achieves preferable results in video event detection. Shao-nian Huang, Dong-jun Huang, and Mansoor Ahmed Khuhro Copyright © 2015 Shao-nian Huang et al. All rights reserved. A New Information Hiding Method Based on Improved BPCS Steganography Thu, 26 Mar 2015 07:31:30 +0000 http://www.hindawi.com/journals/am/2015/698492/ Bit-plane complexity segmentation (BPCS) steganography is advantageous in its capacity and imperceptibility. The important step of BPCS steganography is how to locate noisy regions in a cover image exactly. The regular method, black-and-white border complexity, is a simple and easy way, but it is not always useful, especially for periodical patterns. Run-length irregularity and border noisiness are introduced in this paper to work out this problem. Canonical Cray coding (CGC) is also used to replace pure binary coding (PBC), because CGC makes use of characteristic of human vision system. Conjugation operation is applied to convert simple blocks into complex ones. In order to contradict BPCS steganalysis, improved BPCS steganography algorithm adopted different bit-planes with different complexity. The higher the bit-plane is, the smaller the complexity is. It is proven that the improved BPCS steganography is superior to BPCS steganography by experiment. Shuliang Sun Copyright © 2015 Shuliang Sun. All rights reserved. Video Superresolution Reconstruction Using Iterative Back Projection with Critical-Point Filters Based Image Matching Thu, 12 Mar 2015 06:22:33 +0000 http://www.hindawi.com/journals/am/2015/285969/ To improve the spatial resolution of reconstructed images/videos, this paper proposes a Superresolution (SR) reconstruction algorithm based on iterative back projection. In the proposed algorithm, image matching using critical-point filters (CPF) is employed to improve the accuracy of image registration. First, a sliding window is used to segment the video sequence. CPF based image matching is then performed between frames in the window to obtain pixel-level motion fields. Finally, high-resolution (HR) frames are reconstructed based on the motion fields using iterative back projection (IBP) algorithm. The CPF based registration algorithm can adapt to various types of motions in real video scenes. Experimental results demonstrate that, compared to optical flow based image matching with IBP algorithm, subjective quality improvement and an average PSNR score of 0.53 dB improvement are obtained by the proposed algorithm, when applied to video sequence. Yixiong Zhang, Mingliang Tao, Kewei Yang, and Zhenmiao Deng Copyright © 2015 Yixiong Zhang et al. All rights reserved. An Improved Saliency Detection Approach for Flying Apsaras in the Dunhuang Grotto Murals, China Tue, 24 Feb 2015 06:40:29 +0000 http://www.hindawi.com/journals/am/2015/625915/ Saliency can be described as the ability of an item to be detected from its background in any particular scene, and it aims to estimate the probable location of the salient objects. Due to the salient map that computed by local contrast features can extract and highlight the edge parts including painting lines of Flying Apsaras, in this paper, we proposed an improved approach based on a frequency-tuned method for visual saliency detection of Flying Apsaras in the Dunhuang Grotto Murals, China. This improved saliency detection approach comprises three important steps: (1) image color and gray channel decomposition; (2) gray feature value computation and color channel convolution; (3) visual saliency definition based on normalization of previous visual saliency and spatial attention function. Unlike existing approaches that rely on many complex image features, this proposed approach only used local contrast and spatial attention information to simulate human’s visual attention stimuli. This improved approach resulted in a much more efficient salient map in the aspect of computing performance. Furthermore, experimental results on the dataset of Flying Apsaras in the Dunhuang Grotto Murals showed that the proposed visual saliency detection approach is very effective when compared with five other state-of-the-art approaches. Zhong Chen, Shengwu Xiong, Qingzhou Mao, Zhixiang Fang, and Xiaohan Yu Copyright © 2015 Zhong Chen et al. All rights reserved. Improving Shape Retrieval by Integrating AIR and Modified Mutual NN Graph Wed, 28 Jan 2015 11:54:45 +0000 http://www.hindawi.com/journals/am/2015/372172/ In computer vision, image retrieval remained a significant problem and recent resurgent of image retrieval also relies on other postprocessing methods to improve the accuracy instead of solely relying on good feature representation. Our method addressed the shape retrieval of binary images. This paper proposes a new integration scheme to best utilize feature representation along with contextual information. For feature representation we used articulation invariant representation; dynamic programming is then utilized for better shape matching followed by manifold learning based postprocessing modified mutual NN graph to further improve the similarity score. We conducted extensive experiments on widely used MPEG-7 database of shape images by so-called bulls-eye score with and without normalization of modified mutual NN graph which clearly indicates the importance of normalization. Finally, our method demonstrated better results compared to other methods. We also computed the computational time with another graph transduction method which clearly shows that our method is computationally very fast. Furthermore, to show consistency of postprocessing method, we also performed experiments on challenging ORL and YALE face datasets and improved baseline results. Nouman Qadeer, Dongting Hu, Xiabi Liu, Shahzad Anwar, and Malik Saad Sultan Copyright © 2015 Nouman Qadeer et al. All rights reserved. A Rate-Distortion Optimized Coding Method for Region of Interest in Scalable Video Coding Mon, 12 Jan 2015 06:45:49 +0000 http://www.hindawi.com/journals/am/2015/489089/ The support for region of interest (ROI) browsing, which allows dropping background part of video bitstreams, is a desirable feature for video applications. With the help of the slice group technique provided by H.264/SVC, rectangular ROI areas can be encoded into separate ROI slices. Additionally, by imposing certain constraints on motion estimation, ROI part of the bitstream can be decoded without background slices of the same layer. However, due to the additional spatial and temporal constraints applied to the encoder, overall coding efficiency would be significantly decreased. In this paper, a rate-distortion optimized (RDO) encoding scheme is proposed to improve the coding efficiency of ROI slices. When background slices are discarded, the proposed method uses base layer information to generate the prediction signal of the enhancement layer. Thus, the temporal constraints can be loosened during the encoding process. To do it in this way, the possible mismatch between generated reference frames and original ones is also considered during rate-distortion optimization so that a reasonable trade-off between coding efficiency and decoding drift can be made. Besides, a new Lagrange multiplier derivation method is developed for further coding performance improvement. Experimental results demonstrate that the proposed method achieves significant bitrate saving compared to existing methods. Hongtao Wang, Dong Zhang, and Houqiang Li Copyright © 2015 Hongtao Wang et al. All rights reserved. A Simple and Robust Gray Image Encryption Scheme Using Chaotic Logistic Map and Artificial Neural Network Wed, 31 Dec 2014 00:10:35 +0000 http://www.hindawi.com/journals/am/2014/602921/ A robust gray image encryption scheme using chaotic logistic map and artificial neural network (ANN) is introduced. In the proposed method, an external secret key is used to derive the initial conditions for the logistic chaotic maps which are employed to generate weights and biases matrices of the multilayer perceptron (MLP). During the learning process with the backpropagation algorithm, ANN determines the weight matrix of the connections. The plain image is divided into four subimages which are used for the first diffusion stage. The subimages obtained previously are divided into the square subimage blocks. In the next stage, different initial conditions are employed to generate a key stream which will be used for permutation and diffusion of the subimage blocks. Some security analyses such as entropy analysis, statistical analysis, and key sensitivity analysis are given to demonstrate the key space of the proposed algorithm which is large enough to make brute force attacks infeasible. Computing validation using experimental data with several gray images has been carried out with detailed numerical analysis, in order to validate the high security of the proposed encryption scheme. Adelaïde Nicole Kengnou Telem, Colince Meli Segning, Godpromesse Kenne, and Hilaire Bertrand Fotsin Copyright © 2014 Adelaïde Nicole Kengnou Telem et al. All rights reserved. A Natural Image Pointillism with Controlled Ellipse Dots Wed, 24 Dec 2014 00:10:04 +0000 http://www.hindawi.com/journals/am/2014/567846/ This paper presents an image-based artistic rendering algorithm for the automatic Pointillism style. At first, ellipse dot locations are randomly generated based on a source image; then dot orientations are precalculated with help of a direction map; a saliency map of the source image decides long and short radius of the ellipse dot. At last, the rendering runs layer-by-layer from large size dots to small size dots so as to reserve the detailed parts of the image. Although only ellipse dot shape is adopted, the final Pointillism style performs well because of variable characteristics of the dot. Dongxiang Chi Copyright © 2014 Dongxiang Chi. All rights reserved. Automatic Image Tagging Model Based on Multigrid Image Segmentation and Object Recognition Mon, 22 Dec 2014 09:21:03 +0000 http://www.hindawi.com/journals/am/2014/857682/ Since rapid growth of Internet technologies and mobile devices, multimedia data such as images and videos are explosively growing on the Internet. Managing large scale multimedia data with correct tags and annotations is very important task. Incorrect tags and annotations make it hard to manage multimedia data. Accurate tags and annotation ease management of multimedia data and give high quality retrieve results. Fully manual image tagging which is tagged by user will be most accurate tags when the user tags correct information. Nevertheless, most of users do not make effort on task of tagging. Therefore, we suffer from lots of noisy tags. Best solution for accurate image tagging is to tag image automatically. Robust automatic image tagging models are proposed by many researchers and it is still most interesting research field these days. Since there are still lots of limitations in automatic image tagging models, we propose efficient automatic image tagging model using multigrid based image segmentation and feature extraction method. Our model can improve the object descriptions of images and image regions. Our method is tested with Corel dataset and the result showed that our model performance is efficient and effective compared to other models. Woogyoung Jun, Yillbyung Lee, and Byoung-Min Jun Copyright © 2014 Woogyoung Jun et al. All rights reserved. Deblurring by Solving a TVp-Regularized Optimization Problem Using Split Bregman Method Tue, 16 Dec 2014 09:19:50 +0000 http://www.hindawi.com/journals/am/2014/906464/ Image deblurring is formulated as an unconstrained minimization problem, and its penalty function is the sum of the error term and TVp-regularizers with . Although TVp-regularizer is a powerful tool that can significantly promote the sparseness of image gradients, it is neither convex nor smooth, thus making the presented optimization problem more difficult to deal with. To solve this minimization problem efficiently, such problem is first reformulated as an equivalent constrained minimization problem by introducing new variables and new constraints. Thereafter, the split Bregman method, as a solver, splits the new constrained minimization problem into subproblems. For each subproblem, the corresponding efficient method is applied to ensure the existence of closed-form solutions. In simulated experiments, the proposed algorithm and some state-of-the-art algorithms are applied to restore three types of blurred-noisy images. The restored results show that the proposed algorithm is valid for image deblurring and is found to outperform other algorithms in experiments. Su Xiao Copyright © 2014 Su Xiao. All rights reserved. No-Reference Video Quality Assessment Model for Distortion Caused by Packet Loss in the Real-Time Mobile Video Services Thu, 11 Dec 2014 06:35:54 +0000 http://www.hindawi.com/journals/am/2014/606493/ Packet loss will make severe errors due to the corruption of related video data. For most video streams, because the predictive coding structures are employed, the transmission errors in one frame will not only cause decoding failure of itself at the receiver side, but also propagate to its subsequent frames along the motion prediction path, which will bring a significant degradation of end-to-end video quality. To quantify the effects of packet loss on video quality, a no-reference objective quality assessment model is presented in this paper. Considering the fact that the degradation of video quality significantly relies on the video content, the temporal complexity is estimated to reflect the varying characteristic of video content, using the macroblocks with different motion activities in each frame. Then, the quality of the frame affected by the reference frame loss, by error propagation, or by both of them is evaluated, respectively. Utilizing a two-level temporal pooling scheme, the video quality is finally obtained. Extensive experimental results show that the video quality estimated by the proposed method matches well with the subjective quality. Jiarun Song and Fuzheng Yang Copyright © 2014 Jiarun Song and Fuzheng Yang. All rights reserved. Reliability Model Construction for Complex System Based on Common Cause Failure Network Wed, 10 Dec 2014 11:21:10 +0000 http://www.hindawi.com/journals/am/2014/318028/ A new construction method of system reliability was proposed in this paper based on network and relevant failure. Taking the component units as the nodes and the interaction relationships between the nodes as the side lines, a new directional network reliability model with certain network topology characteristics was constructed. It can indicate the complex topology relationship, interaction mechanism, and the transmission mechanism of failure affect between mechanical integration and electrical integration of system components. Compared with the traditional research methods, the relevant failure was considered during this process. Through the application of the fault data in the bogie system of high-speed train, it was shown that a new network reliability model which considered the relevant failure can be constructed by the method proposed in this paper and the result can be more accurate, especially for the complex mechanical and electrical integration systems. Lijie Li, Limin Jia, and Yanhui Wang Copyright © 2014 Lijie Li et al. All rights reserved. Augmented Reality Experience: From High-Resolution Acquisition to Real Time Augmented Contents Wed, 10 Dec 2014 08:02:04 +0000 http://www.hindawi.com/journals/am/2014/597476/ This paper presents results of a research project “dUcale” that experiments ICT solutions for the museum of Palazzo Ducale (Urbino). In this project, the famed painting the “Città Ideale” becomes a case to exemplify a specific approach to the digital mediation of cultural heritage. An augmented reality (AR) mobile application, able to enhance the museum visit experience, is presented. The computing technologies involved in the project (websites, desktop and social applications, mobile software, and AR) constitute a persuasive environment for the artwork knowledge. The overall goal of our research is to provide to cultural institutions best practices efficiently on low budgets. Therefore, we present a low cost method for high-resolution acquisition of paintings; the image is used as a base in AR approach. The proposed methodology consists of an improved SIFT extractor for real time image. The other novelty of this work is the multipoint probabilistic layer. Experimental results demonstrated the robustness of the proposed approach with extensive use of the AR application in front of the “Città Ideale” painting. To prove the usability of the application and to ensure a good user experience, we also carried out several users tests in the real scenario. Paolo Clini, Emanuele Frontoni, Ramona Quattrini, and Roberto Pierdicca Copyright © 2014 Paolo Clini et al. All rights reserved. Top-Down and Bottom-Up Cues Based Moving Object Detection for Varied Background Video Sequences Sun, 16 Nov 2014 11:48:45 +0000 http://www.hindawi.com/journals/am/2014/879070/ Moving object detection is a crucial and critical task for any surveillance system. Conventionally, a moving object detection task is performed on the basis of consecutive frame difference or background models which are based on some mathematical aspects or probabilistic approaches. But, these approaches are based on some initial conditions and short amount of time is needed to learn all these models. Also, the bottleneck in all these previous approaches is that they require neat and clean background or need to create a background first by using some approaches and that it is essential to update them regularly to cope with the illuminating changes. In this paper, moving object detection is executed using visual attention where there is no need for background formulation and updates as it is background independent. Many bottom-up approaches and one combination of bottom-up and top-down approaches are proposed in the present paper. The proposed approaches seem more efficient due to inessential requirement of learning background model and due to being independent of previous video frames. Results indicate that the proposed approach works even against slight movements in the background and in various outdoor conditions. Chirag I. Patel, Sanjay Garg, Tanish Zaveri, and Asim Banerjee Copyright © 2014 Chirag I. Patel et al. All rights reserved. Chaos Based Joint Compression and Encryption Framework for End-to-End Communication Systems Sun, 09 Nov 2014 07:19:22 +0000 http://www.hindawi.com/journals/am/2014/910106/ Augmentation in communication and coding technology has made encryption an integral part of secure multimedia communication systems. Security solution for end-to-end image transmission requires content adaptation at intermediate nodes, which consumes significant resources to decrypt, process, and reencrypt the secured data. To save the computational resources, this paper proposes a network-friendly encryption technique, which can be implemented in transparency to content adaptation techniques. The proposed encryption technique maintains the compression efficiency of underlying entropy coder, and enables the processing of encrypted data. Thorough analysis of the technique, as regards various standard evaluation parameters and attack scenarios, demonstrates its ability to withstand known-plaintext, ciphertext-only, and approximation attacks. This justifies its implementation for secure image transmission for end-to-end communication systems. Nidhi Goel, Balasubramanian Raman, and Indra Gupta Copyright © 2014 Nidhi Goel et al. All rights reserved. A Novel Approach for Optimal Multimedia Data Distribution in Mobile Cloud Computing Thu, 23 Oct 2014 11:21:33 +0000 http://www.hindawi.com/journals/am/2014/137296/ With the integration of mobile computing and cloud computing, more diverse services can be provided to the users, supporting the mobility feature of mobile computing along with the power of cloud computing. This new paradigm still faces challenges, especially in terms of performance. When it comes to multimedia data communication, thin clients (such as smart phones and tablets) suffer because of performance and power constraints. Previously done studies have trivially addressed this problem. Therefore, in our paper, we present a framework in which thick clients (laptop or desktop computers) are incorporated into mobile cloud paradigm with attention paid to user mobility. Its objective is to optimize the distribution of multimedia content between the cloud and the thin clients. Our work comes up with both numerical analysis and simulation to justify the validity and the effectiveness of the proposal approach. Pham Phuoc Hung, Mohammad Aazam, Tien-Dung Nguyen, and Eui-Nam Huh Copyright © 2014 Pham Phuoc Hung et al. All rights reserved. Execution Behavior Modeling Methodology for Large Scale Surveillance System Design and Evaluation Tue, 14 Oct 2014 00:00:00 +0000 http://www.hindawi.com/journals/am/2014/962015/ This paper presents a performance and evaluation environment for complex surveillance system design. The system consists of environment model, execution model, and application and evaluation model. The environment model interprets the script and creates objects in a surveillance environment so that various situations can be evaluated. The execution model modifies generated data with the perspective of each sensor and reflects algorithm execution behavior. The application model allows building large scale collaborative operations. The system behavior is parameterized for simple representations. The feasibility of the proposed method is illustrated through the case studies for improving the prototype surveillance system. Jung-Min Oh, Kyung Hoon Kim, Sangjin Hong, and Nammee Moon Copyright © 2014 Jung-Min Oh et al. All rights reserved. Text Extraction from Historical Document Images by the Combination of Several Thresholding Techniques Mon, 29 Sep 2014 00:00:00 +0000 http://www.hindawi.com/journals/am/2014/934656/ This paper presents a new technique for the binarization of historical document images characterized by deteriorations and damages making their automatic processing difficult at several levels. The proposed method is based on hybrid thresholding combining the advantages of global and local methods and on the mixture of several binarization techniques. Two stages have been included. In the first stage, global thresholding is applied on the entire image and two different thresholds are determined from which the most of image pixels are classified into foreground or background. In the second stage, the remaining pixels are assigned to foreground or background classes based on local analysis. In this stage, several local thresholding methods are combined and the final binary value of each remaining pixel is chosen as the most probable one. The proposed technique has been tested on a large collection of standard and synthetic documents and compared with well-known methods using standard measures and was shown to be more powerful. Toufik Sari, Abderrahmane Kefali, and Halima Bahi Copyright © 2014 Toufik Sari et al. All rights reserved. Object Tracking with Adaptive Multicue Incremental Visual Tracker Tue, 23 Sep 2014 00:00:00 +0000 http://www.hindawi.com/journals/am/2014/343860/ Generally, subspace learning based methods such as the Incremental Visual Tracker (IVT) have been shown to be quite effective for visual tracking problem. However, it may fail to follow the target when it undergoes drastic pose or illumination changes. In this work, we present a novel tracker to enhance the IVT algorithm by employing a multicue based adaptive appearance model. First, we carry out the integration of cues both in feature space and in geometric space. Second, the integration directly depends on the dynamically-changing reliabilities of visual cues. These two aspects of our method allow the tracker to easily adapt itself to the changes in the context and accordingly improve the tracking accuracy by resolving the ambiguities. Experimental results demonstrate that subspace-based tracking is strongly improved by exploiting the multiple cues through the proposed algorithm. Jiang-tao Wang, De-bao Chen, Jing-ai Zhang, Su-wen Li, and Xing-jun Wang Copyright © 2014 Jiang-tao Wang et al. All rights reserved. Adaptive Media Streaming to Mobile Devices: Challenges, Enhancements, and Recommendations Wed, 10 Sep 2014 09:52:36 +0000 http://www.hindawi.com/journals/am/2014/805852/ Video streaming is predicted to become the dominating traffic in mobile broadband networks. At the same time, adaptive HTTP streaming is developing into the preferred way of streaming media over the Internet. In this paper, we evaluate how different components of a streaming system can be optimized when serving content to mobile devices in particular. We first analyze the media traffic from a Norwegian network and media provider. Based on our findings, we outline benefits and challenges for HTTP streaming, on the sender and the receiver side, and we investigate how HTTP-based streaming affects server performance. Furthermore, we discuss various aspects of efficient coding of the video segments from both performance and user perception point of view. The final part of the paper studies efficient adaptation and delivery to mobile devices over wireless networks. We experimentally evaluate and improve adaptation strategies, multilink solutions, and bandwidth prediction techniques. Based on the results from our evaluations, we make recommendations for how an adaptive streaming system should handle mobile devices. Small changes, or simple awareness of how users perceive quality, can often have large effects. Kristian Evensen, Tomas Kupka, Haakon Riiser, Pengpeng Ni, Ragnhild Eg, Carsten Griwodz, and Pål Halvorsen Copyright © 2014 Kristian Evensen et al. All rights reserved.