Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (179)
  • Open Access

    ARTICLE

    Adaptive Video Dual Domain Watermarking Scheme Based on PHT Moment and Optimized Spread Transform Dither Modulation

    Yucheng Liang1,2,*, Ke Niu1,2,*, Yingnan Zhang1,2, Yifei Meng1,2, Fangmeng Hu1,2

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2457-2492, 2024, DOI:10.32604/cmc.2024.056438 - 18 November 2024

    Abstract To address the challenges of video copyright protection and ensure the perfect recovery of original video, we propose a dual-domain watermarking scheme for digital video, inspired by Robust Reversible Watermarking (RRW) technology used in digital images. Our approach introduces a parameter optimization strategy that incrementally adjusts scheme parameters through attack simulation fitting, allowing for adaptive tuning of experimental parameters. In this scheme, the low-frequency Polar Harmonic Transform (PHT) moment is utilized as the embedding domain for robust watermarking, enhancing stability against simulation attacks while implementing the parameter optimization strategy. Through extensive attack simulations across various… More >

  • Open Access

    ARTICLE

    Practical Privacy-Preserving ROI Encryption System for Surveillance Videos Supporting Selective Decryption

    Chan Hyeong Cho, Hyun Min Song*, Taek-Young Youn*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.3, pp. 1911-1931, 2024, DOI:10.32604/cmes.2024.053430 - 31 October 2024

    Abstract With the advancement of video recording devices and network infrastructure, we use surveillance cameras to protect our valuable assets. This paper proposes a novel system for encrypting personal information within recorded surveillance videos to enhance efficiency and security. The proposed method leverages Dlib’s CNN-based facial recognition technology to identify Regions of Interest (ROIs) within the video, linking these ROIs to generate unique IDs. These IDs are then combined with a master key to create entity-specific keys, which are used to encrypt the ROIs within the video. This system supports selective decryption, effectively protecting personal information More >

  • Open Access

    ARTICLE

    The Relationships between the Short Video Addiction, Self-Regulated Learning, and Learning Well-Being of Chinese Undergraduate Students

    Jian-Hong Ye1,2, Yuting Cui3,*, Li Wang4, Jhen-Ni Ye5

    International Journal of Mental Health Promotion, Vol.26, No.10, pp. 805-815, 2024, DOI:10.32604/ijmhp.2024.055814 - 31 October 2024

    Abstract Background: With the global popularity of short videos, particularly among young people, short video addiction has become a worrying phenomenon that poses significant risks to individual health and adaptability. Self-regulated learning (SRL) strategies are key factors in predicting learning outcomes. This study, based on the SRL theory, uses short video addiction as the independent variable, SRL strategies as the mediating variable, and learning well-being as the outcome variable, aiming to reveal the relationships among short video addiction, self-regulated learning, and learning well-being among Chinese college students. Methods: Using a cross-sectional study design and applying the… More >

  • Open Access

    ARTICLE

    Human Interaction Recognition in Surveillance Videos Using Hybrid Deep Learning and Machine Learning Models

    Vesal Khean1, Chomyong Kim2, Sunjoo Ryu2, Awais Khan1, Min Kyung Hong3, Eun Young Kim4, Joungmin Kim5, Yunyoung Nam3,*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 773-787, 2024, DOI:10.32604/cmc.2024.056767 - 15 October 2024

    Abstract Human Interaction Recognition (HIR) was one of the challenging issues in computer vision research due to the involvement of multiple individuals and their mutual interactions within video frames generated from their movements. HIR requires more sophisticated analysis than Human Action Recognition (HAR) since HAR focuses solely on individual activities like walking or running, while HIR involves the interactions between people. This research aims to develop a robust system for recognizing five common human interactions, such as hugging, kicking, pushing, pointing, and no interaction, from video sequences using multiple cameras. In this study, a hybrid Deep… More >

  • Open Access

    REVIEW

    Exploring Frontier Technologies in Video-Based Person Re-Identification: A Survey on Deep Learning Approach

    Jiahe Wang1, Xizhan Gao1,*, Fa Zhu2, Xingchi Chen3

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 25-51, 2024, DOI:10.32604/cmc.2024.054895 - 15 October 2024

    Abstract Video-based person re-identification (Re-ID), a subset of retrieval tasks, faces challenges like uncoordinated sample capturing, viewpoint variations, occlusions, cluttered backgrounds, and sequence uncertainties. Recent advancements in deep learning have significantly improved video-based person Re-ID, laying a solid foundation for further progress in the field. In order to enrich researchers’ insights into the latest research findings and prospective developments, we offer an extensive overview and meticulous analysis of contemporary video-based person Re-ID methodologies, with a specific emphasis on network architecture design and loss function design. Firstly, we introduce methods based on network architecture design and loss… More >

  • Open Access

    ARTICLE

    Building a Smart Management System for the Field Training Course at the Faculty of Specific Education-Mansoura University

    Soha A. Shaban*, Amira A. Atta, Dalia L. Elsheweikh

    Computer Systems Science and Engineering, Vol.48, No.5, pp. 1213-1250, 2024, DOI:10.32604/csse.2024.052603 - 13 September 2024

    Abstract Field training is the backbone of the teacher-preparation process. Its importance stems from the goals that colleges of education aim to achieve, which include bridging the gap between theory and practice and aligning with contemporary educational trends during teacher training. Currently, trainee students attendance in field training is recorded manually through signatures on attendance sheets. However, this method is prone to impersonation, time wastage, and misplacement. Additionally, traditional methods of evaluating trainee students are often susceptible to human errors during the evaluation and scoring processes. Field training also lacks modern technology that the supervisor can… More >

  • Open Access

    REVIEW

    Survey on Video Security: Examining Threats, Challenges, and Future Trends

    Ali Asghar1,#, Amna Shifa2,#, Mamoona Naveed Asghar2,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3591-3635, 2024, DOI:10.32604/cmc.2024.054654 - 12 September 2024

    Abstract Videos represent the most prevailing form of digital media for communication, information dissemination, and monitoring. However, their widespread use has increased the risks of unauthorised access and manipulation, posing significant challenges. In response, various protection approaches have been developed to secure, authenticate, and ensure the integrity of digital videos. This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality, integrity, and availability of video content, and examining how it can be manipulated. It then investigates current developments in the field of video security by exploring two critical research questions. First, it… More >

  • Open Access

    ARTICLE

    MarkINeRV: A Robust Watermarking Scheme for Neural Representation for Videos Based on Invertible Neural Networks

    Wenquan Sun1,2, Jia Liu1,2,*, Lifeng Chen1,2, Weina Dong1,2, Fuqiang Di1,2

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4031-4046, 2024, DOI:10.32604/cmc.2024.052745 - 12 September 2024

    Abstract Recent research advances in implicit neural representation have shown that a wide range of video data distributions are achieved by sharing model weights for Neural Representation for Videos (NeRV). While explicit methods exist for accurately embedding ownership or copyright information in video data, the nascent NeRV framework has yet to address this issue comprehensively. In response, this paper introduces MarkINeRV, a scheme designed to embed watermarking information into video frames using an invertible neural network watermarking approach to protect the copyright of NeRV, which models the embedding and extraction of watermarks as a pair of… More >

  • Open Access

    ARTICLE

    Adaptive Graph Convolutional Adjacency Matrix Network for Video Summarization

    Jing Zhang*, Guangli Wu, Shanshan Song

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 1947-1965, 2024, DOI:10.32604/cmc.2024.051781 - 15 August 2024

    Abstract Video summarization aims to select key frames or key shots to create summaries for fast retrieval, compression, and efficient browsing of videos. Graph neural networks efficiently capture information about graph nodes and their neighbors, but ignore the dynamic dependencies between nodes. To address this challenge, we propose an innovative Adaptive Graph Convolutional Adjacency Matrix Network (TAMGCN), leveraging the attention mechanism to dynamically adjust dependencies between graph nodes. Specifically, we first segment shots and extract features of each frame, then compute the representative features of each shot. Subsequently, we utilize the attention mechanism to dynamically adjust More >

  • Open Access

    REVIEW

    A Comprehensive Survey of Recent Transformers in Image, Video and Diffusion Models

    Dinh Phu Cuong Le1,2, Dong Wang1, Viet-Tuan Le3,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 37-60, 2024, DOI:10.32604/cmc.2024.050790 - 18 July 2024

    Abstract Transformer models have emerged as dominant networks for various tasks in computer vision compared to Convolutional Neural Networks (CNNs). The transformers demonstrate the ability to model long-range dependencies by utilizing a self-attention mechanism. This study aims to provide a comprehensive survey of recent transformer-based approaches in image and video applications, as well as diffusion models. We begin by discussing existing surveys of vision transformers and comparing them to this work. Then, we review the main components of a vanilla transformer network, including the self-attention mechanism, feed-forward network, position encoding, etc. In the main part of More >

Displaying 1-10 on page 1 of 179. Per Page