Plus d’un million de livres à portée de main !
Bookbot

Milan Petković

    Security, privacy and trust in modern data management
    Content-Based Video Retrieval
    • Content-Based Video Retrieval

      A Database Perspective

      • 168pages
      • 6 heures de lecture
      4,0(1)Évaluer

      Focusing on content-based video retrieval, this book explores innovative techniques to bridge the semantic gap between low-level video features and higher-level semantics. Dr. Milan Petković and Prof. Dr. Willem Jonker present three main techniques: a spatio-temporal extension of the Cobra framework, hidden Markov models, and Bayesian belief networks. They evaluate these methods through experiments with real video data and discuss the adaptability of their solutions across multiple domains. Additionally, a prototype video database management system is described, showcasing their proposed techniques.

      Content-Based Video Retrieval
    • Advances in information and communication technologies continue to p- vide new means of conducting remote transactions. Services facilitated by these technologies are spreading increasingly into our commercial and private spheres. For many people, these services have changed the way they work, communicate, shop, arrange travel, etc. Remote transactions, however, may also open possibilities for fraud and other types of misuse. Hence, the requi- ment to authorize transactions may arise. Authorization may in turn call for some kind of user authentication. When users have to provide personal inf- mation to access services, they literally leave a part of their life on record. As the number of sites where such records are left increases, so does the d- ger of misuse. So-called identity theft has become a pervasive problem, and a general feeling of unease and lack of trust may dissuade people from using the services on o? er. This, inanutshell, isoneofthemajorchallengesinsecurityengineering- day. How to provide servicesto individuals securelywithout making undue - cursions into their privacy at the same time. Decisions on the limits of privacy intrusions – or privacy protection, for that matter – are ultimately political decisions. Research can de? ne the design space in which service providers and regulators may try to ? nd acceptable tradeo? s between security and privacy.

      Security, privacy and trust in modern data management