Research on Multimedia Systems

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: closed (29 July 2022) | Viewed by 39469

Special Issue Editor

Special Issue Information

Today, general users can enjoy a variety of multimedia content for free and for a fee, based on the development of the Internet, personal computers, smart devices, and small IoT devices, and the growth of social media platforms. Most people subscribe to social media platforms and share their content every day, and accordingly, large-capacity multimedia contents are growing exponentially. For the growth of multimedia in the future, advances in hardware and software technologies including the fields mentioned above and database and multimedia security technologies must be identified. In addition, there may be various issues related to multimedia, such as a problem of appropriately recommending content for personalization services according to personal interests. Another example of technical issues is how to bring the power of well-developed IoT networks to home networks to support multimedia applications. In this Special Issue, researchers and practitioners aim to share various developed ideas related to those. We request creative contributions related to multimedia, including but not limited to the following topics:

  • Data systems management
  • Multimedia streaming, interchange, and transmission
  • Multimedia security, privacy, and right management
  • Multimedia search and recommendations
  • Multimedia retrieval and classification
  • Multimedia home entertainment
  • Social media computing
  • Multimedia application
  • Multimedia communications networks
  • Network design and configuration for multimedia applications

Prof. Dr. Cheonshik Kim
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Data systems management
  • Multimedia streaming, interchange, and transmission
  • Multimedia security, privacy, and right management
  • Multimedia search and recommendations
  • Multimedia retrieval and classification
  • Multimedia home entertainment
  • Social media computing
  • Multimedia application
  • Multimedia communications networks
  • Network design and configuration for multimedia applications

Published Papers (15 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review, Other

18 pages, 3172 KiB  
Article
HTTP Adaptive Streaming Framework with Online Reinforcement Learning
by Jeongho Kang and Kwangsue Chung
Appl. Sci. 2022, 12(15), 7423; https://doi.org/10.3390/app12157423 - 24 Jul 2022
Cited by 2 | Viewed by 1541
Abstract
Dynamic adaptive streaming over HTTP (DASH) is an effective method for improving video streaming’s quality of experience (QoE). However, the majority of existing schemes rely on heuristic algorithms, and the learning-based schemes that have recently emerged also have a problem in that their [...] Read more.
Dynamic adaptive streaming over HTTP (DASH) is an effective method for improving video streaming’s quality of experience (QoE). However, the majority of existing schemes rely on heuristic algorithms, and the learning-based schemes that have recently emerged also have a problem in that their performance deteriorates in a specific environment. In this study, we propose an adaptive streaming scheme that applies online reinforcement learning. When QoE degradation is confirmed, the proposed scheme adapts to changes in the client’s environment by upgrading the ABR model while performing video streaming. In order to adapt the adaptive bitrate (ABR) model to a changing network environment while performing video streaming, the neural network model is trained with a state-of-the-art reinforcement learning algorithm. The proposed scheme’s performance was evaluated using simulation-based experiments under various network conditions. The experimental results confirmed that the proposed scheme performed better than the existing schemes. Full article
(This article belongs to the Special Issue Research on Multimedia Systems)
Show Figures

Figure 1

17 pages, 11669 KiB  
Article
Mapping Server Collaboration Architecture Design with OpenVSLAM for Mobile Devices
by Jooeun Song and Joongjin Kook
Appl. Sci. 2022, 12(7), 3653; https://doi.org/10.3390/app12073653 - 05 Apr 2022
Cited by 4 | Viewed by 2536
Abstract
SLAM technology, which is used for spatial recognition in autonomous driving and robotics, has recently emerged as an important technology to provide high-quality AR contents on mobile devices due to the spread of XR and metaverse technologies. In this paper, we designed, implemented, [...] Read more.
SLAM technology, which is used for spatial recognition in autonomous driving and robotics, has recently emerged as an important technology to provide high-quality AR contents on mobile devices due to the spread of XR and metaverse technologies. In this paper, we designed, implemented, and verified the SLAM system that can be used on mobile devices. Mobile SLAM is composed of a stand-alone type that directly performs SLAM operation on a mobile device and a mapping server type that additionally configures a mapping server based on FastAPI to perform SLAM operation on the server and transmits data for map visualization to a mobile device. The mobile SLAM system proposed in this paper mixes the two types in order to make SLAM operation and map generation more efficient. The stand-alone type of SLAM system was configured as an Android app by porting the OpenVSLAM library to the Unity engine, and the map generation and performance were evaluated on desktop PCs and mobile devices. The mobile SLAM system in this paper is an open-source project, so it is expected to help develop AR contents based on SLAM in a mobile environment. Full article
(This article belongs to the Special Issue Research on Multimedia Systems)
Show Figures

Figure 1

25 pages, 7070 KiB  
Article
Adaptive Decision Support System for On-Line Multi-Class Learning and Object Detection
by Guo-Jhang Hong, Dong-Lin Li, Shreya Pare, Amit Saxena, Mukesh Prasad and Chin-Teng Lin
Appl. Sci. 2021, 11(23), 11268; https://doi.org/10.3390/app112311268 - 28 Nov 2021
Cited by 2 | Viewed by 1396
Abstract
A new online multi-class learning algorithm is proposed with three main characteristics. First, in order to make the feature pool fitter for the pattern pool, the adaptive feature pool is proposed to dynamically combine the three general features, Haar-like, Histogram of Oriented Gradient [...] Read more.
A new online multi-class learning algorithm is proposed with three main characteristics. First, in order to make the feature pool fitter for the pattern pool, the adaptive feature pool is proposed to dynamically combine the three general features, Haar-like, Histogram of Oriented Gradient (HOG), and Local Binary Patterns (LBP). Second, the external model is integrated into the proposed model without re-training to enhance the efficacy of the model. Third, a new multi-class learning and updating mechanism are proposed that help to find unsuitable decisions and adjust them automatically. The performance of the proposed model is validated with multi-class detection and online learning system. The proposed model achieves a better score than other non-deep learning algorithms used in public pedestrian and multi-class databases. The multi-class databases contain data for pedestrians, faces, vehicles, motorcycles, bicycles, and aircraft. Full article
(This article belongs to the Special Issue Research on Multimedia Systems)
Show Figures

Figure 1

11 pages, 1573 KiB  
Article
Non-Contact Heart Rate Detection Based on Hand Vein Transillumination Imaging
by Shuqiang Yang, Deqiang Cheng, Jun Wang, Huafeng Qin and Yike Liu
Appl. Sci. 2021, 11(18), 8470; https://doi.org/10.3390/app11188470 - 13 Sep 2021
Cited by 1 | Viewed by 1707
Abstract
Vein recognition technology identifies human vein characteristics under near-infrared light and compares it with stored vein information for personal identification. Although this has high anti-counterfeiting performance, it is possible to fabricate artificial hands that simulate vein characteristics to deceive the identity authentication system. [...] Read more.
Vein recognition technology identifies human vein characteristics under near-infrared light and compares it with stored vein information for personal identification. Although this has high anti-counterfeiting performance, it is possible to fabricate artificial hands that simulate vein characteristics to deceive the identity authentication system. In view of this potential deficiency, we introduced heart rate information to vein authentication, a means of living body detection, which can further improve the anti-counterfeiting effect of vein authentication. A hand vein transillumination imaging experiment was designed to prove its effectiveness. In the proposed method, a near-infrared light source is used to transilluminate the hand, and the transillumination images are collected by a common camera. Then, the region of interest is selected for gray-scale image processing, the feature value of each frame is extracted by superimposing and averaging the images, and then the one-dimensional pulse wave is drawn. Furthermore, the baseline drift phenomenon is filtered by morphological methods, and the maximum percentage frequency is determined by Fast Fourier Transform, that is, the pulse wave frequency. The heart rate value is then calculated, and finally, the stability of the heart rate detection result is evaluated. The experiment shows that the method produces accurate and stable results, demonstrating that it can provide living information (heart rate value) for vein authentication, which has great application prospects and development opportunities in security systems. Full article
(This article belongs to the Special Issue Research on Multimedia Systems)
Show Figures

Figure 1

10 pages, 1853 KiB  
Article
Wireless Power Transfer Using Harvested Radio Frequency Energy with Magnetic Resonance Coupling to Charge Mobile Device Batteries
by Neetu Ramsaroop and Oludayo O. Olugbara
Appl. Sci. 2021, 11(16), 7707; https://doi.org/10.3390/app11167707 - 21 Aug 2021
Cited by 5 | Viewed by 4767
Abstract
This research paper presents the design of a wireless power transfer (WPT) circuit integrated with magnetic resonance coupling (MRC) and harvested radio frequency (RF) energy to wirelessly charge the battery of a mobile device. A capacitor (100 µF, 16 V) in the RF [...] Read more.
This research paper presents the design of a wireless power transfer (WPT) circuit integrated with magnetic resonance coupling (MRC) and harvested radio frequency (RF) energy to wirelessly charge the battery of a mobile device. A capacitor (100 µF, 16 V) in the RF energy harvesting circuit stored the converted power, and the accumulated voltage stored in the capacitor was 9.46 V. The foundation of the proposed WPT prototype circuit included two coils (28 AWG)—a transmitter coil, and a receiver coil. The transmitter coil was energized by the alternating current (AC), which produced a magnetic field, which in turn induced a current in the receiver coil. The harvested RF energy (9.46 V) was converted into AC, which energized the transmitter coil and generated a magnetic field. The electronics in the receiver coil then converted the AC into direct current (DC), which became usable power to charge the battery of a mobile device. The experimental setup based on mathematical modeling and simulation displayed successful charging capabilities of MRC, with the alternate power source being the harvested RF energy. Mathematical formulae were applied to calculate the amount of power generated from the prototype circuit. LTSpice simulation software was applied to demonstrate the behavior of the different components in the circuit layout for effective WPT transfer. Full article
(This article belongs to the Special Issue Research on Multimedia Systems)
Show Figures

Figure 1

30 pages, 30696 KiB  
Article
Perceptual Quality of Audio-Visual Content with Common Video and Audio Degradations
by Helard Becerra Martinez, Andrew Hines and Mylène C. Q. Farias
Appl. Sci. 2021, 11(13), 5813; https://doi.org/10.3390/app11135813 - 23 Jun 2021
Cited by 9 | Viewed by 5190
Abstract
Audio-visual quality assessment remains as a complex research field. A great effort is being made to understand how visual and auditory domains are integrated and processed by humans. In this work, we analyzed and compared the results of three psychophisical experiments that collected [...] Read more.
Audio-visual quality assessment remains as a complex research field. A great effort is being made to understand how visual and auditory domains are integrated and processed by humans. In this work, we analyzed and compared the results of three psychophisical experiments that collected quality and content scores given by a pool of subjects. The experiments include diverse content audio-visual material, e.g., Sports, TV Commercials, Interviews, Music, Documentaries and Cartoons, impaired with several visual (bitrate compression, packet-loss, and frame-freezing) and auditory (background noise, echo, clip, chop) distortions. Each experiment explores a particular domain. In Experiment 1, the video component was degraded with visual artifacts, meanwhile, the audio component did not suffer any type of degradation. In Experiment 2, the audio component was degraded while the video component remained untouched. Finally, in Experiment 3 both audio and video components were degraded. As expected, results confirmed a dominance of the visual component in the overall audio-visual quality. However, a detailed analysis showed that, for certain types of audio distortions, the audio component played a more important role in the construction of the overall perceived quality. Full article
(This article belongs to the Special Issue Research on Multimedia Systems)
Show Figures

Figure 1

21 pages, 13563 KiB  
Article
A Watermarking Scheme for Color Image Using Quaternion Discrete Fourier Transform and Tensor Decomposition
by Li Li, Rui Bai, Jianfeng Lu, Shanqing Zhang and Ching-Chun Chang
Appl. Sci. 2021, 11(11), 5006; https://doi.org/10.3390/app11115006 - 28 May 2021
Cited by 11 | Viewed by 2585
Abstract
To protect the copyright of the color image, a color image watermarking scheme based on quaternion discrete Fourier transform (QDFT) and tensor decomposition (TD) is presented. Specifically, the cover image is partitioned into non-overlapping blocks, and then QDFT is performed on each image [...] Read more.
To protect the copyright of the color image, a color image watermarking scheme based on quaternion discrete Fourier transform (QDFT) and tensor decomposition (TD) is presented. Specifically, the cover image is partitioned into non-overlapping blocks, and then QDFT is performed on each image block. Then, the three imaginary frequency components of QDFT are used to construct a third-order tensor. The third-order tensor is decomposed by Tucker decomposition and generates a core tensor. Finally, an improved odd–even quantization technique is employed to embed a watermark in the core tensor. Moreover, pseudo-Zernike moments and multiple output least squares support vector regression (MLS–SVR) network model are used for geometric distortion correction in the watermark extraction stage. The scheme utilizes the inherent correlations among the three RGB channels of a color image, and spreads the watermark into the three channels. The experimental results indicate that the proposed scheme has better fidelity and stronger robustness for common image-processing and geometric attacks, can effectively resist each color channel exchange attack. Compared with the existing schemes, the presented scheme achieves better performance. Full article
(This article belongs to the Special Issue Research on Multimedia Systems)
Show Figures

Figure 1

17 pages, 2542 KiB  
Article
Data Hiding Method for Color AMBTC Compressed Images Using Color Difference
by Cheonshik Kim, Dongkyoo Shin, Chingnung Yang and Lu Leng
Appl. Sci. 2021, 11(8), 3418; https://doi.org/10.3390/app11083418 - 11 Apr 2021
Cited by 6 | Viewed by 2248
Abstract
Image compression technology and copyright protection are certainly the important technologies for free exchange of multimedia. For compression of an image, we propose a color Absolute Moment Block Trucation Coding (AMBTC) method using a common bit-plane created by k-means. In addition, a data [...] Read more.
Image compression technology and copyright protection are certainly the important technologies for free exchange of multimedia. For compression of an image, we propose a color Absolute Moment Block Trucation Coding (AMBTC) method using a common bit-plane created by k-means. In addition, a data hiding method based on a color AMBTC using Optimal Pixel Adjustment Process (OPAP) was proposed for copyright protection and confidential secret communication. The number of quantization levels of the proposed color AMBTC is nine per block. Therefore, the edge of the compressed color image can be expressed more delicately. As a result of the simulation, it can be seen that the edge of the image of the color AMBTC is close to the original image. Moreover, the data hiding performance of the proposed method also obtained excellent results. For the experiment, we measured the quality of the image using the Color Difference (CD) we proposed, and the measurement result was very satisfactory. Full article
(This article belongs to the Special Issue Research on Multimedia Systems)
Show Figures

Figure 1

17 pages, 8090 KiB  
Article
Physically Based Soap Bubble Synthesis for VR
by Sangwook Yoo, Cheongho Lee and Seongah Chin
Appl. Sci. 2021, 11(7), 3090; https://doi.org/10.3390/app11073090 - 31 Mar 2021
Cited by 1 | Viewed by 2829
Abstract
To experience a real soap bubble show, materials and tools are required, as are skilled performers who produce the show. However, in a virtual space where spatial and temporal constraints do not exist, bubble art can be performed without real materials and tools [...] Read more.
To experience a real soap bubble show, materials and tools are required, as are skilled performers who produce the show. However, in a virtual space where spatial and temporal constraints do not exist, bubble art can be performed without real materials and tools to give a sense of immersion. For this, the realistic expression of soap bubbles is an interesting topic for virtual reality (VR). However, the current performance of VR soap bubbles is not satisfying the high expectations of users. Therefore, in this study, we propose a physically based approach for reproducing the shape of the bubble by calculating the measured parameters required for bubble modeling and the physical motion of bubbles. In addition, we applied the change in the flow of the surface of the soap bubble measured in practice to the VR rendering. To improve users’ VR experience, we propose that they should experience a bubble show in a VR HMD (Head Mounted Display) environment. Full article
(This article belongs to the Special Issue Research on Multimedia Systems)
Show Figures

Figure 1

10 pages, 1232 KiB  
Article
UFMC-Based Underwater Voice Transmission Scheme with LDPC Codes
by Chin-Feng Lin
Appl. Sci. 2021, 11(4), 1818; https://doi.org/10.3390/app11041818 - 18 Feb 2021
Cited by 2 | Viewed by 1396
Abstract
An underwater universal filtered multicarrier (UFMC)-based voice transmission scheme is proposed using a 512-point inverse discrete Fourier transform, utilizing 10 sub-bands, and that each had 20 subcarriers. In this proposed UFMC method, the adaptive modulation technologies with 4 quadrature amplitude modulation (QAM), 16-QAM, [...] Read more.
An underwater universal filtered multicarrier (UFMC)-based voice transmission scheme is proposed using a 512-point inverse discrete Fourier transform, utilizing 10 sub-bands, and that each had 20 subcarriers. In this proposed UFMC method, the adaptive modulation technologies with 4 quadrature amplitude modulation (QAM), 16-QAM, and low-density parity-check (LDPC) channel coding were integrated. Additionally, the bit error rate (BER), transmission power weighting, the ratios of power-saving, and underwater voice transmission performance with perfect channel estimation (PCE), and 5% and 10% channel estimation errors (CEEs) were investigated. The underwater voice transmission had a BER quality of service 103. Simulation results showed that the PCE outperformed 5% and 10% CEEs, under 4-QAM, with gains of 0.5 and 0.9 dB, respectively, and a BER of 4×104. The PCE outperformed 5% and 10% CEEs, under 16-QAM, with gains of 0.5 and 2.4 dB, respectively, and a BER of 8.5×104. The proposed UFMC scheme can be applied to underwater voice transmission with a BER below 103 The proposed system showed a superior capability to contend with additive white Gaussian noise, underwater multipath channel fading, and CEEs. Full article
(This article belongs to the Special Issue Research on Multimedia Systems)
Show Figures

Figure 1

16 pages, 5147 KiB  
Article
Palmprint False Acceptance Attack with a Generative Adversarial Network (GAN)
by Fei Wang, Lu Leng, Andrew Beng Jin Teoh and Jun Chu
Appl. Sci. 2020, 10(23), 8547; https://doi.org/10.3390/app10238547 - 29 Nov 2020
Cited by 16 | Viewed by 2341
Abstract
Biometric-based authentication is widely deployed on multimedia systems currently; however, biometric systems are vulnerable to image-level attacks for impersonation. Reconstruction attack (RA) and presentation attack (PA) are two typical instances for image-level attacks. In RA, the reconstructed images often have insufficient naturalness due [...] Read more.
Biometric-based authentication is widely deployed on multimedia systems currently; however, biometric systems are vulnerable to image-level attacks for impersonation. Reconstruction attack (RA) and presentation attack (PA) are two typical instances for image-level attacks. In RA, the reconstructed images often have insufficient naturalness due to the presence of remarkable counterfeit appearance, thus their forgeries can be easily detected by machine or human. The PA requires genuine users’ original images, which are difficult to acquire in practice and to counterfeit fake biometric images on spoofing carriers. In this paper, we develop false acceptance attack (FAA) for a palmprint biometric, which overcomes the aforementioned problems of RA and PA. FAA does not require genuine users’ images, and it can be launched simply with the synthetic images with high naturalness, which are generated by the generative adversarial networks. As a case study, we demonstrate the feasibility of FAA against coding-based palmprint biometric systems. To further improve the efficiency of FAA, we employ a clustering method to select diverse fake images in order to enhance the diversity of the fake images used, so the number of attack times is reduced. Our experimental results show the success rate and effectiveness of the FAA. Full article
(This article belongs to the Special Issue Research on Multimedia Systems)
Show Figures

Figure 1

18 pages, 5207 KiB  
Article
An Audio Distortion Dynamic Range Index for Evaluating the Performance of Audio Systems
by Desheng Wang, Yangjie Wei, Yi Wang and Jing Wang
Appl. Sci. 2020, 10(22), 8022; https://doi.org/10.3390/app10228022 - 12 Nov 2020
Cited by 2 | Viewed by 1664
Abstract
The dynamic range (DR) index lacking of an official definition leads to ambiguities in performance evaluation. The existing measurement methods of DR do not always match with the various actual application conditions, and some detailed distortion behavior of the device under test (DUT) [...] Read more.
The dynamic range (DR) index lacking of an official definition leads to ambiguities in performance evaluation. The existing measurement methods of DR do not always match with the various actual application conditions, and some detailed distortion behavior of the device under test (DUT) is not extracted. In this paper, a new index for evaluating the DR performance of audio systems is proposed and validated, herein referred to as the audio distortion dynamic range (ADDR). It reduces the uncertainty of measurement conditions by an explicit definition and unifies the signal-to-noise ratio (SNR) and the signal-to-noise-and-distortion ratio (SINAD) indexes if under the same measurement condition. Moreover, to comprehensively reflect the impact of harmonic, spurious, and noise components on the DUT, the definitions of the traditional indexes based on classification of distorted components are replaced by the variable thresholds in the ADDR definition. Subsequently, the detailed steps of ADDR and the critical factors influencing its accuracy, are analyzed and then the optimized measurement conditions are given. Experiments based on simulated DUTs show the ADDR index can distinguish performance difference that the traditional indexes cannot distinguish, which proves it is an effective supplementary to the existing indexes in some real applications. Full article
(This article belongs to the Special Issue Research on Multimedia Systems)
Show Figures

Figure 1

15 pages, 1642 KiB  
Article
An Enhanced Adaptive Block Truncation Coding with Edge Quantization Scheme
by Ching-Nung Yang, Yung-Chien Chou, Tao-Ku Chang and Cheonshik Kim
Appl. Sci. 2020, 10(20), 7340; https://doi.org/10.3390/app10207340 - 20 Oct 2020
Cited by 3 | Viewed by 1878
Abstract
Recently, image compression using adaptive block truncation coding based on edge quantization (ABTC-EQ) was proposed by Mathews and Nair. Their approach deals with an image for two types of blocks, edge blocks and non-edge blocks. Different from using the bi-clustering approach on all [...] Read more.
Recently, image compression using adaptive block truncation coding based on edge quantization (ABTC-EQ) was proposed by Mathews and Nair. Their approach deals with an image for two types of blocks, edge blocks and non-edge blocks. Different from using the bi-clustering approach on all blocks in previous block truncation coding (BTC)-like schemes, ABTC-EQ adopts tri-clustering to tackle edge blocks. The compression ratio of ABTC-EQ is reduced, but the visual quality of the reconstructed image is significantly improved. However, it is observed that ABTC-EQ uses 2 bits to represent the index of three clusters in a block. We can only use an average of 5/3 bits by variable-length code to represent the index of each cluster. On the other hand, there are two observations on the quantization levels in a block. The first observation is that the difference between the two quantization values is often smaller than the quantization values themselves. The second observation is that more clusters may enhance the visual quality of the reconstructed image. Based on variable-length coding and the above observations, we design variants of ABTC-EQ to enhance the visual quality of the reconstructed image and compression ratio. Full article
(This article belongs to the Special Issue Research on Multimedia Systems)
Show Figures

Figure 1

Review

Jump to: Research, Other

17 pages, 1297 KiB  
Review
Survey on Data Hiding Based on Block Truncation Coding
by Cheonshik Kim, Ching-Nung Yang, Jinsuk Baek and Lu Leng
Appl. Sci. 2021, 11(19), 9209; https://doi.org/10.3390/app11199209 - 03 Oct 2021
Cited by 6 | Viewed by 1554
Abstract
Data hiding technology has achieved many technological developments through continuous research over the past 20 years along with the development of Internet technology and is one of the research fields that are still receiving attention. In the beginning, there were an intensive amount [...] Read more.
Data hiding technology has achieved many technological developments through continuous research over the past 20 years along with the development of Internet technology and is one of the research fields that are still receiving attention. In the beginning, there were an intensive amount of studies on digital copyright issues, and since then, interest in the field of secret communications has been increasing. In addition, research on various security issues using this technology is being actively conducted. Research on data hiding is mainly based on images and videos, and there are many studies using JPEG and BMP in particular. This may be due to the use of redundant bits that are characteristic of data hiding techniques. On the other hand, block truncation coding-based images are relatively lacking in redundant bits useful for data hiding. For this reason, researchers began to pay more attention to data hiding based on block-cutting coding. As a result, many related papers have been published in recent years. Therefore, in this paper, the existing research on data hiding technology of images compressed by block-cut coding among compressed images is summarized to introduce the contents of research so far in this field. We simulate a representative methodology among existing studies to find out which methods are effective through experiments and present opinions on future research directions. In the future, it is expected that various data hiding techniques and practical applications based on modified forms of absolute moment block truncation coding will continue to develop. Full article
(This article belongs to the Special Issue Research on Multimedia Systems)
Show Figures

Figure 1

Other

Jump to: Research, Review

16 pages, 1054 KiB  
Technical Note
A Secure Internet of Things Smart Home Network: Design and Configuration
by Jinsuk Baek, Munene W. Kanampiu and Cheonshik Kim
Appl. Sci. 2021, 11(14), 6280; https://doi.org/10.3390/app11146280 - 07 Jul 2021
Cited by 2 | Viewed by 3653
Abstract
Many home IoT devices are joining IoT networks by gaining access to some home gateway that configures smart, multimedia, and home networks. To enable secure IoT-based home networking services, (1) an IoT network should be effectively designed and configured with a IoT server, [...] Read more.
Many home IoT devices are joining IoT networks by gaining access to some home gateway that configures smart, multimedia, and home networks. To enable secure IoT-based home networking services, (1) an IoT network should be effectively designed and configured with a IoT server, (2) a messaging protocol is required to exchange information between the IoT server and IoT devices, and (3) the home gateway should monitor all safety aspects in both inbound and outbound traffic of the home network. However, not all home network users put in consideration the need for an adequate security posture. Instead, many users still rely on the minimum home network security by setting an easiest-to-guess password to restrict unauthorized access to their home gateway. In this paper, we propose a network design and configuration that enables secure IoT services with MQTT messaging protocol for home networks. With the proposed network design, a home network is interconnected to external networks through a home gateway. To separate the IoT-subnet from other parts of home network, the home gateway subdivides a home network into an inside-subnet and an IoT-subnet with a private IP address using subnet masking. The IoT server, located in the IoT-subnet can be implemented with either a general HTTP server or a security server that acts as an MQTT broker. The secure communications among network entities are governed by a home gateway operating a well-configured extended access control. The effectiveness of the proposed design and configuration is verified through a simulation by showing that it does not impose any significant performance degradation for reinforced security. We expect the proposed configuration to help facilitate interconnection among heterogeneous network entities. Full article
(This article belongs to the Special Issue Research on Multimedia Systems)
Show Figures

Figure 1

Back to TopTop