Due to the popularity and low cost of rapid mobile internet connection, live-streaming service is now booming. Some of these users who provide live video shows to the public are famous and known as ...vloggers or YouTube celebrities. The content of the live show is diverse. Some YouTubers broadcast video of their computer screen when playing an online game; others cook, work out, or put on makeup on camera. Nearly anything from one’s daily life is fair game. The abundant live video streaming content attracts youngsters as well as adults. To understand the viewers’ motivation for watching live video streaming, this study used a self-reporting online questionnaire survey. A total of 374 responses were received and analyzed to ascertain the motives of viewing live video streaming. Based on the empirical survey results, we propose a motivation of YouTuber model composed of four motive categories: leisure, celebrity worship, social connection, and voyeurism. These four categories can be divided into eight motives, in
The article considers topical issues of application of modern technologies and methods of object detection and recognition. The article is devoted to the analysis of the peculiarities of the ...application of different types of neural networks in the process of step - by - step processing of video data obtained from the systems of technical vision of robots, video monitoring systems, intelligent security systems. A review of modern literature, which describes the method of forming a space of features of the description of objects and methods of their recognition. The review shows that the process of intelligent processing of video data consists of many stages of image processing, one of which is processing using neural networks as intelligent components. The validity of the stages of processing in real time requires justification for the use of different types of neural networks in different processing processes in order to improve the quality and optimize the processing time of such data. The structure of the video image processing model is given. The article also defines the types of neural network at different stages of data processing (such as identification of parameters and characteristics of the group, finding group objects, sector-by-sector image processing, object classification, object recognition, creating a contour model of the object, detection object in the sector, evaluation of sector parameters, definition of information sectors, division of frames into sectors, processing of information frames) according to the proposed hierarchical model, with subsequent use of the obtained results for multiagent system of distributed intelligent processing of video monitoring objects and examples of further application the results obtained. Ref. 13, tabl. 1.
The increasing research interest in global climate change and the rise of the public awareness have generated a significant demand for new tools to support effective visualization of big climate data ...in a cyber environment such that anyone from any location with an Internet connection and a web browser can easily view and comprehend the data. In response to the demand, this paper introduces a new web-based platform for visualizing multidimensional, time-varying climate data on a virtual globe. The web-based platform is built upon a virtual globe system Cesium, which is open-source, highly extendable and capable of being easily integrated into a web environment. The emerging WebGL technique is adapted to support interactive rendering of 3D graphics with hardware graphics acceleration. To address the challenges of transmitting and visualizing voluminous, complex climate data over the Internet to support real-time visualization, we develop a stream encoding and transmission strategy based on video-compression techniques. This strategy allows dynamic provision of scientific data in different precisions to balance the needs for scientific analysis and visualization cost. Approaches to represent, encode and decode processed data are also introduced in detail to show the operational workflow. Finally, we conduct several experiments to demonstrate the performance of the proposed strategy under different network conditions. A prototype, PolarGlobe, has been developed to visualize climate data in the Arctic regions from multiple angles.
A common practice in scenarios of remote collaboration is to provide a representation from distributed team members, aiming to positively influence the level of social presence and in turn the work ...effort. Nevertheless, these stimuli can lead to fractured learning experiences, since collaborators need to split attention among the task, the shared information, and the counterpart representation. This paper explored how the last affects social presence, and other dimensions of collaboration, as well as task resolution in scenarios of remote guidance. A user study was conducted, comparing two distinct conditions: traditional video chat (team members representation always visible) and Augmented Reality (AR) annotations (collaborators representation never available). These were selected due to ongoing research with partners from the industry sector, following the insights of a participatory design process. A real-life use-case was considered, i.e., synchronous maintenance task with 4 completion stages that required a remote expert using a computer to guide 37 on-site participants wielding a handheld device. The results of the study are described and discussed based on data analysis, showing that the majority of participants preferred the AR-based condition, despite the absence of the expert representation.
In criminal investigations, the digital evidence extracted from social media may provide exceptional support. Reviewing the history or cache of the web browser may provide a valuable insight into the ...activity of the suspect. The growing popularity of Internet video streaming creates a risk of this technology misuse. There are a few published research on video reconstruction forensics on the Chrome browser. There is a difference in the methods applied to reconstruct cached video on Chrome from the methods applied to Firefox or any browser. Our primary focus in this research is to examine the forensic procedures required to reconstruct cached video stream data using Twitter and YouTube on the Firefox browser. Some work has been done to reconstruct a cached video on the Chrome browser, but we need more work on the rest of the browsers, most notably the Firefox browser used in this research. Both examination strategies and contemplations displayed are approved and suitable for the forensic study of various streaming platforms as well as the web browser caches.
•Device-edge-cloud collaboration architecture.•Keyframe extraction of video streams, remove non-keyframes.•Graphics compression and reconstruction algorithms.•Extract the region of interest of the ...face.
The driver's emotional state directly affects safe driving. Under the "vehicle-human-road-cloud" integrated control framework, we propose an end-edge-cloud collaborative emotion perception network model (EEC-Net). The end side extracts the key frames of the driver's face video stream and performs batch compression; the edge side extracts the region of interest (ROI) of the reconstructed images as the input of the emotion recognition model (tiny_Xception) for classification; the cloud control terminal receives abnormal ROI image data and performs online training to dynamically adjust the operating parameters of the edge model. Finally, we test on open and self-built datasets, and the results show tiny_Xception has a significant improvement in accuracy of 2.45% compared to mini_Xception; the EEC-Net model can reliably perceive the negative emotion period, and the overall system memory consumption is reduced by about 5%, and the network transmission data volume and the computation time of emotion recognition are reduced by 95%, 60% respectively.
Display omitted
•Adversary model for iOS app DRM protection for video contents.•Circumvent or bypass DRM control for iOS apps.•Vulnerabilities in popular Video-on-Demand (VOD) apps.•Need for hardening of iOS device ...security to avoid device jailbreaking.
Due to the increasing use of mobile devices and apps to view copyright protected content (e.g. movies) on the go, digital rights management (DRM) protections have primarily been used to protect the digital intellectual property and control their distribution and usage on mobile devices. Unsurprisingly, attackers have sought to circumvent or bypass DRM control in order to obtain unauthorised access to copyrighted content. Given the ongoing and rapidly changing nature of mobile device technologies, it is essential for DRM protection designer to have an in-depth understanding of an attacker's capabilities and the potential attack vectors (e.g. vulnerabilities that can be exploited to bypass DRM protection). In this paper, we propose an adversary model that formalizes the real world capabilities of a DRM attacker targeting Apple iOS devices. We then demonstrate its utility using four Video-on-Demand (VoD) apps, one live TV app, and a security DRM protection module. To avoid similar structural mistakes in future designs, we outline two recommendations.
Watermarking is widely used in multimedia preservation and communication, which comprises, and is therefore not limited to, data security and validation. Security, readability, imperceptibility, and ...resilience are some of the key advantages of this technology. However, there are still certain issues that need to be addressed, such as the ability to withstand a variety of assaults without substantially affecting the quality and value of embedded data. Based on its operational domain, the watermarking technology may be divided into two groups: spatial and frequency watermarking. An index mapping-based watermarking approach for copyright protection of multi-media color videos is presented in this paper. We offer a hybrid discrete wavelet transform and discrete cosine transform (DCT) watermarking algorithm for digital video watermarking of a color video watermark. Peak signal to noise ratio (PSNR), similarity structure index measure (SSIM), have been used to analyze the distortion produced by watermarking. It is suggested that the proposed video watermarking method provides greater imperceptibility in conjunction with each other with the human visual system and it offers higher robustness against different attacks.
The paper describes the problem of stopping the text field recognition process in a video stream, which is a novel problem, particularly relevant to real-time mobile document recognition systems. A ...decision-theoretic framework for this problem is provided, and similarities with existing stopping rule problems are explored. Following the theoretical works on monotone stopping rule problems, a strategy is proposed based on thresholding the estimation of the expected difference between consequent recognition results. The efficiency of this strategy is evaluated on an openly accessible dataset. The results show that this method outperforms the previously published methods based on identical results cluster size thresholding. Notes on future work include incorporation of recognition result confidence estimations in the proposed model and more precise evaluation of the observation cost.