Multimedia Content Analysis and Mining: International Workshop, MCAM 2007, Weihai, China, June 30-July 1, 2007, Proceedings

Front Cover
Nicu Sebe, Yuncai Liu, Yueting Zhuang, Thomas S. Huang
Springer, 2007 M07 10 - 513 pages
Welcome to the International Workshop on Multimedia Content Analysis and Mining, MCAM 2007. Our workshop gives a snapshot of the current wor- wide research in multimedia analysis. Through recent advances in computing, networking, and data storage, multimedia will create new interesting technical possibilities in a wide range of ?elds, such as entertainment, commerce, science, medicine, and public safety. To bene?t from this potential, developers need - liable techniques for the analysis, search, and management of multimedia data, as well as distributed system architectures in which these techniques can be embedded to e?ectively help the users. Recently, there have been many workshops and meetings dedicated to M- timedia, but most of them followed the standard pattern consisting mainly of oral and poster presentations. We all feel that there is a need for a meeting that really is a workshop, i.e., one that provides a lot of opportunities for discussions and dissemination. Consequently, the format of the workshop consists of 4 p- els on hot topics in multimedia followedby discussions and poster presentations. The topics of the panels are: Multimedia Analysis and Applications, Multi- dia Search and Mining, P2P Streaming, and Security. This volume contains a number of invited contributions from experts in the area as well as the selected regular contributions. This year 139 submissions from 13 countries were submitted and 46 were accepted for presentation at the conference after being reviewed by the Program Committee members.

From inside the book

Contents

Fingerprinting Codes for Live PayTelevision Broadcast Via Internet
252
A New Type of Proxy Ring Signature Scheme with Revocable Anonymity and No Info Leaked
262
The Research of an Embedded Processor Element for Multimedia Domain
267
Speeding Up Scalar Multiplication Using a New Signed Binary Representation for Integers
277
ColorTexture Image Segmentation by Combining Region and Photometric Invariant Edge Information
286
Multimedia Authoring Tool for RealTime Facial Animation
295
Object Redetection Using SIFT and MPEG7 Color Descriptors
305
Interactive Boosting for Image Classification
315

Challenges in Decoding Adaptation and Browsing
42
FixedMobile Convergence Streaming Multimedia Services and PeertoPeer Communication
52
Motivation and Opportunity
57
Security Models of Digital Watermarking
60
From Encryption to Interoperability and Monitoring
65
Shape Retrieval Based on the Relativity of Chain Codes
76
3D Motion Segmentation from StraightLine Optical Flow
85
A Fast Adaptive ME Algorithm Based on H264
95
Shared Latent Dynamical Model for Human Tracking from Videos
102
Panoramic Video Coding Using Affine Motion Compensated Prediction
112
Robust Bootstrapping of Speaker Models for Unsupervised Speaker Indexing
122
Reversible Data Embedding Technique for Palette Images Using Declustering
130
The PT2 Caching Algorithm in the Transcoding Proxy Cluster to Facilitate Adaptive Content Delivery
140
Constructing and Application of Multimedia TV News Archives
151
A ThreeLevel Scheme for RealTime Ball Tracking
161
Video Object Mining with Local Region Tracking
172
Automatic Extraction of Semantic Relationships from Images Using Ontologies and SVM Classifiers
184
A Robust Caption Detecting Algorithm on MPEG Compressed Video
195
A Hybrid Approach for Authenticating MPEG2 Streaming Data
203
HOSBased Image SuperResolution Reconstruction
213
Story Unit Segmentation with Friendly Acoustic Perception
223
Decomposition in Hidden Markov Models for Activity Recognition
232
Image Inpainting with Improved ExemplarBased Approach
242
A Selfadjustable Multisource Data Scheduling Algorithm for P2P Media Streaming
325
An Optimized Topology Maintenance Framework for P2P Media Streaming
334
Building Large Scale 3D Face Database for Face Analysis
343
Senary Huffman Compression A Reversible Data Hiding Scheme for Binary Images
351
Managing and Searching Distributed Multidimensional Annotations with Large Scale Image Data
361
A ClosedForm Solution of Reconstruction from Nonparallel Stereo Geometry Used in Image Guided System for Surgery
371
SIEVESearch Images Effectively Through Visual Elimination
381
Virtual Community Based Secure Service Discovery and Access for 3D Video Steaming Applications
391
QoS Adaptive Data Organizing and Delivery Framework for P2P Media Streaming
398
Adaptive Interpolation for Error Concealment in H264 Using Directional Histograms
408
Players and Ball Detection in Soccer Videos Based on Color Segmentation and Shape Analysis
416
Efficient Image Retrieval Using Conceptualization of Annotated Images
426
3D Camera Modeling and Its Applications in Sports Broadcast Video Analysis
434
Face Recognition by Matching 2D and 3D Geodesic Distances
444
A Blind Watermarking Scheme Based on Visual Model for Copyright Security
454
Fast Mode Decision by Exploiting Spatiotemporal Correlation in H264
464
SVM ased Audio Classification for Content ased Multimedia Retrieval
474
Moving Object Tracking in H264AVC Bitstream
483
A Prediction Error Compression Method with Tensor PCA in Video Coding
493
On the Robustness of Parametric Watermarking of Speech
501
Author Index
511
Copyright

Common terms and phrases

Popular passages

Page 65 - A TALE OF TWO CITIES. IN THREE BOOKS. BOOK THE FIRST. RECALLED TO LIFE. CHAPTER I. THE PERIOD. rwas the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishness, it was the epoch of belief, it was the epoch of incredulity, it was the season of Light, it was the season of Darkness, it was the spring of hope, it was the winter of despair, we had everything before us, we had nothing before us, we were all going direct to Heaven, we were all going direct the other...
Page 415 - Draft ITU-T recommendation and final draft international standard of joint video specification (ITU-T Rec. H.264/ISO/IEC 14 496-10 AVC)," Joint Video Team (JVT) of ISO/IEC MPEG and ITU-T VCEG, JVT-G050, March 2003.
Page 63 - Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications," IEEE Journal on Selected Areas in Communications, vol.
Page 427 - The organization of the paper is as follows. In the next section, we present an overview of genetic algorithms.
Page 22 - Meng, H. Sundaram and D. Zhong, "VideoQ: An automated content based video search system using visual cues,
Page 415 - Concealment of Damaged Block Transform Coded Images Using Projections onto Convex Sets", IEEE Trans, on Image Processing, vol.
Page 304 - Thalmann, D.: Simulation of facial muscle actions based on rational free form deformations.
Page 324 - Water-.lling algorithm: a novel way for image feature extraction based on edge maps. In: Proceedings of IEEE International Conference on Image Processing, Kobe, Japan (1999) 12.
Page 22 - In IEEE International Workshop on Content-based Access of Image and Video Databases, India, pp.42-102, Jan 1998.
Page 64 - Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights," Journal of Visual Communication and Image Representation, Vol. 9 No. 3, pp.

Bibliographic information