摘要:
In accordance with an embodiment, a method of authenticating images includes electronically receiving an anchor image and a query image, performing a feature point extraction of an anchor image, and performing a feature point extraction of a query image. The method also includes clustering feature points of the anchor image and feature points of the query image, where clustering includes determining matching feature points, determining outlier feature points, and excluding outlier feature points. Whether the anchor image is similar to the query image is determined based on a distance between the feature points of the anchor image and the feature points of the query image. If the anchor image is similar to the query image, possible tampered areas of the query image based on the outlier feature points are identified.
摘要:
In accordance with an embodiment, a method of matching video content to advertising content includes electronically receiving a video content metadata from a content provider, and matching the video content metadata to advertising content metadata of a global list of advertisements. The video content metadata corresponds to video content being sent to a user device and includes at least one keyword. Furthermore, the advertising content metadata corresponds to advertising content and includes at least one keyword. Matching the video content metadata to advertising content metadata includes comparing the at least one keyword of the video content metadata to the at least one keyword of the advertising content metadata.
摘要:
System and methods for media distribution are described. In one embodiment, a method of media distribution includes rendering of a media to a user, stopping the rendering of the media, and storing remaining media not rendered to the user in a user server. The method further includes receiving a request to stream the remaining media to the user, dividing the remaining media into segments, and assigning a priority to each segment. The remaining media is streamed, leaving out segments with priority lower than a threshold priority.
摘要:
A system and method for media adaptation are provided. A method for providing media to an electronic device includes receiving a request for a media with a set of characteristics, and determining if the media with the set of characteristics resides in a media storage. The method also includes if the media with the set of characteristics resides in the media storage, retrieving the media with the set of characteristics from the media storage. The method further includes if the media with the set of characteristics does not reside in the media storage, transcoding an alternate media with an alternate set of characteristics to produce a transcoded media with the set of characteristics. The method additionally includes providing the media with the set of characteristics from the media storage or the transcoded media with the set of characteristics to the electronic device.
摘要:
In accordance with an embodiment, a method of operating a computer server includes receiving streaming media data. The streaming media data includes content fragments and a media description file, and the media description file includes metadata describing the content fragments. The method also includes storing the content fragments in a cache.
摘要:
An image processing method can be performed on a video image that includes an initial frame and a plurality of subsequent frames. An object is located within the initial frame of the video image and a histogram related to the object is generated. A foreground map that includes the object is also generated. For each subsequent frame, a mean shift iteration is performed to adjust the location of the object within the current frame. The histogram related to the object and the foreground map can then be updated.
摘要:
A system and method for image and video compression and decompression using compressive sensing is provided. A method for decompressing a compressed image, where the compressed image having a plurality of compressed image blocks, and the method is performed on a processor, includes selecting a compressed image block, entropy decoding the selected compressed image block, and recovering an image block corresponding to the decoded selected compressed image block using compressive sensing recovery.
摘要:
An apparatus comprising a first node configured to communicate with a second node, wherein the first node is configured to receive a first stream from the second node, receive a bridging stream from the second node, and receive the second stream from the second node, and wherein the bridging stream has a lower bit-rate than the second stream. Included is an apparatus comprising at least one processor configured to implement a method comprising transmitting a first stream at a first time, transmitting a bridging stream that has a bit-rate greater than the first stream and less than the second stream at a second time, and transmitting the second stream at a third time.
摘要:
The media player employs an operating system that supports a virtual machine into which auto-run playback programs may be loaded and run. The auto run playback program is stored on the media containing the program content, such as on an optical disc medium. When the medium is inserted in the player, the auto run playback program automatically launches and is thereafter used to access playback the media content. Support for legacy media is provided to allow the player to playback compact discs and DVD discs that were manufactured without the auto run playback program.
摘要:
A system and method provide for content-based authentication of binary graphs. The method includes the step of receiving an electronic file having a graphical content. An object level representation of the graphical content is then generated and authentication information is added to the electronic file based on the object level representation. The method further provides for authenticating the object level representation with a text authentication algorithm. Thus, by building a bridge from graphs to text at the character level, the present invention allows authentication of graphs using suitable text document authentication algorithms. When pixel level precision of the graph is required, a pixel level authentication can be added. This layer lets the owner detect as well as localize changes in the graph at the pixel level. Both levels of authentication are optional depending on the application.