Multimedia in forensics, security, and intelligence
With the proliferation of multimedia data, it has become necessary to secure this content from illegal use, efficiently detect and reconstruct illegal activities from it, and use it as a source of intelligence. Serious challenges arise from the sheer data volume, however. The multimedia research com...
Saved in:
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/99544 http://hdl.handle.net/10220/13737 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-99544 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-995442020-05-28T07:18:16Z Multimedia in forensics, security, and intelligence Battiato, Sebastiano Emmanuel, Sabu Ulges, Adrian Worring, Marcel School of Computer Engineering DRNTU::Engineering::Computer science and engineering With the proliferation of multimedia data, it has become necessary to secure this content from illegal use, efficiently detect and reconstruct illegal activities from it, and use it as a source of intelligence. Serious challenges arise from the sheer data volume, however. The multimedia research community has developed many exciting solutions for dealing with video footage, images, audio, and other multimedia content over recent years, including knowledge extraction, automatic categorization, and indexing. Although this work forms an excellent foundation for protecting and analyzing multimedia content, challenges remain in the complexity of the targeted material, the lack of structure and metadata, and other application-specific constraints. This special issue provides an overview of current research following this mission. The articles originally appeared at the ACM Multimedia 2010 Workshop on Multimedia in Forensics, Security, and Intelligence (MiFor). The six high-quality contributions cover various approaches in the field, ranging from the visual recognition of faces and tattoos to the discovery of near duplicates and content tampering. 2013-09-30T07:01:01Z 2019-12-06T20:08:33Z 2013-09-30T07:01:01Z 2019-12-06T20:08:33Z 2012 2012 Journal Article Battiato, S., Emmanuel, S., Ulges, A., & Worring, M. (2012). Multimedia in forensics, security, and intelligence. IEEE multimedia, 19(1), 17-19. https://hdl.handle.net/10356/99544 http://hdl.handle.net/10220/13737 10.1109/MMUL.2012.10 en IEEE multimedia |
institution |
Nanyang Technological University |
building |
NTU Library |
country |
Singapore |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Computer science and engineering |
spellingShingle |
DRNTU::Engineering::Computer science and engineering Battiato, Sebastiano Emmanuel, Sabu Ulges, Adrian Worring, Marcel Multimedia in forensics, security, and intelligence |
description |
With the proliferation of multimedia data, it has become necessary to secure this content from illegal use, efficiently detect and reconstruct illegal activities from it, and use it as a source of intelligence. Serious challenges arise from the sheer data volume, however. The multimedia research community has developed many exciting solutions for dealing with video footage, images, audio, and other multimedia content over recent years, including knowledge extraction, automatic categorization, and indexing. Although this work forms an excellent foundation for protecting and analyzing multimedia content, challenges remain in the complexity of the targeted material, the lack of structure and metadata, and other application-specific constraints. This special issue provides an overview of current research following this mission. The articles originally appeared at the ACM Multimedia 2010 Workshop on Multimedia in Forensics, Security, and Intelligence (MiFor). The six high-quality contributions cover various approaches in the field, ranging from the visual recognition of faces and tattoos to the discovery of near duplicates and content tampering. |
author2 |
School of Computer Engineering |
author_facet |
School of Computer Engineering Battiato, Sebastiano Emmanuel, Sabu Ulges, Adrian Worring, Marcel |
format |
Article |
author |
Battiato, Sebastiano Emmanuel, Sabu Ulges, Adrian Worring, Marcel |
author_sort |
Battiato, Sebastiano |
title |
Multimedia in forensics, security, and intelligence |
title_short |
Multimedia in forensics, security, and intelligence |
title_full |
Multimedia in forensics, security, and intelligence |
title_fullStr |
Multimedia in forensics, security, and intelligence |
title_full_unstemmed |
Multimedia in forensics, security, and intelligence |
title_sort |
multimedia in forensics, security, and intelligence |
publishDate |
2013 |
url |
https://hdl.handle.net/10356/99544 http://hdl.handle.net/10220/13737 |
_version_ |
1681056107225677824 |