Abstract
The rapid development of the network and devices has made multimedia technology to spread across all the aspects of the people’s life. Multimedia can be defined as the media which interactively spread the information, combining two or more media. Multimedia technology has impacted on our daily lives in various aspects like e-learning, virtual reality, journalism, Content Streaming and many more. The evolution of multimedia has been carried out in various phases over the last decade which has been further discussed under the topic Diversity in Multimedia. In this paper, we intend to explain about the various trends emerging in multimedia and the concerns related to the transmission of the user’s personal data and their privacy. The already existing technologies which are not yet fully explored such as Virtual reality, Hologram, Advanced Journalism and feedback-based content streaming and the security issues that arise with such advancement in technology has been talked about in depth in this paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Yoshitaka A, Ichikawa T (1999) A survey on content-based retrieval for Multimedia databases. IEEE Trans Knowl Data Eng 11(1):81–93. https://doi.org/10.1109/69.755617
Zhao N, Chen S-c, Shyu M-l, Rubin S (2006) An integrated and interactive video retrieval framework with hierarchical learning models and semantic clustering strategy. In: 2006 IEEE international conference on information reuse and integration. https://doi.org/10.1109/iri.2006.252454
Dikici Ç, Işıl Bozma H (2010) Attention-based video streaming. Signal Process Image Commun 25(10):745–760. https://doi.org/10.1016/j.image.2010.08.002
Singh G, Gautam S, Prachi, Verma A, Kaushal T (2021) Analysis of blockchain induced cryptocurrency: regulations and challenges of cryptocurrencies. In: Hassanien AE, Bhattacharyya S, Chakrabati S, Bhattacharya A, Dutta S (eds) Emerging technologies in data mining and information security. Advances in intelligent systems and computing, vol 1286. Springer, Singapore. https://doi.org/10.1007/978-981-15-9927-9_54
Yu HH (n.d.) Multilayer data hiding for multimedia authentication. In: GLOBECOM’01. IEEE Global telecommunications conference (Cat. No. 01CH37270). https://doi.org/10.1109/glocom.2001.965934
Bosi M (2006) Digital rights management systems. In: Multimedia security technologies for digital rights management, pp 23–49. https://doi.org/10.1016/b978-012369476-8/50004-x
Kaushik I, Sharma N, Bhushan B, Gautam S (2021) Performance evaluation using different routing protocols in MANETs. In: Integration of WSNs into internet of things, pp 101–120. https://doi.org/10.1201/9781003107521-6
Rana A, Gautam S, Mann P, Tyagi N (2020) Classification for big data tools and its challenges and issues. SSRN Electron J. https://doi.org/10.2139/ssrn.3746970
Gao J, Tzanetakis G, Steenkiste P (2003) Content-based retrieval of music in scalable peer-to-peer networks. In: 2003 International conference on multimedia and expo. ICME ‘03. Proceedings (Cat. No. 03TH8698). https://doi.org/10.1109/icme.2003.1220916
Eskicioglu AM (2003) Cover feature—protecting intellectual property in digital multimedia networks. Computer 36(7):39–45. https://doi.org/10.1109/mc.2003.1212689
Barni M, Bartolini F, De Rosa A, Piva A (2002) Security and watermarking of multimedia contents IV. https://doi.org/10.1117/12.465299
Di Crescenzo G, Graveman R, Ge R, Arce G (2005) Approximate message authentication and biometric entity authentication. In: Financial cryptography and data security, pp 240–254. https://doi.org/10.1007/11507840_22
Queluz MP (n.d.) Towards robust, content based techniques for image authentication. In: 1998 IEEE second workshop on multimedia signal processing (Cat. No. 98EX175). https://doi.org/10.1109/mmsp.1998.738950
Park JM, Chong EKP, Siegel HJ (n.d.) Efficient multicast packet authentication using signature amortization. In: Proceedings 2002 IEEE symposium on security and privacy. https://doi.org/10.1109/secpri.2002.1004374
He D, Sun Q (2006) Multimedia authentication. In: Multimedia security technologies for digital rights management, pp 111–137. https://doi.org/10.1016/b978-012369476-8/50007-5
Joshi JBD, Li ZK, Fahmi H, Shafiq B, Ghafoor A (2002) A model for secure multimedia document database system in a distributed environment. IEEE Trans Multimedia 4(2):215–234. https://doi.org/10.1109/tmm.2002.1017735
Kathuria RS, Gautam S, Singh A, Singh A, Yadav N (2021) Sentiment analysis on images using convolutional neural network. In: Hassanien AE, Bhattacharyya S, Chakrabati S, Bhattacharya A, Dutta S (eds) Emerging technologies in data mining and information security. Advances in intelligent systems and computing, vol 1300. Springer, Singapore. https://doi.org/10.1007/978-981-33-4367-2_20
Gurung A, Gautam S, Garg T, Bhardwaj Y, Gupta H (2021) Virtual numeric authentication system using contour detection of color-banded fingertips. In: Tavares JMRS, Chakrabarti S, Bhattacharya A, Ghatak S (eds) Emerging technologies in data mining and information security. Lecture notes in networks and systems, vol 164. Springer, Singapore. https://doi.org/10.1007/978-981-15-9774-9_32
Harjani M, Grover M, Sharma N, Kaushik I (2019) Analysis of various machine learning algorithm for cardiac pulse prediction. In: 2019 international conference on computing, communication, and intelligent systems (ICCCIS). https://doi.org/10.1109/icccis48478.2019.8974519
Moyer MJ, Abamad M (n.d.) Generalized role-based access control. In: Proceedings 21st international conference on distributed computing systems. https://doi.org/10.1109/icdsc.2001.918969
Arora D, Gautam S, Sachdeva P, Sharma S, Sharma V (2021) Blockchain-based network architecture for accountable auctions and to overcome resource problems. In: Hassanien AE, Bhattacharyya S, Chakrabati S, Bhattacharya A, Dutta S (eds) Emerging technologies in data mining and information security. Advances in intelligent systems and computing, vol 1286. Springer, Singapore. https://doi.org/10.1007/978-981-15-9927-9_63
Wu C-P, Kuo CCJ (2005) Design of integrated multimedia compression and encryption systems. IEEE Trans Multimedia 7(5):828–839. https://doi.org/10.1109/tmm.2005.854469
Multimedia security handbook (2004). https://doi.org/10.1201/9781420038262
Sharma N, Kaushik I, Rathi R, Kumar S (2020) Evaluation of accidental death records using hybrid genetic algorithm. SSRN Electron J. https://doi.org/10.2139/ssrn.3563084
Kathuria RS, Gautam S, Singh A, Khatri S, Yadav N (2019) Real time sentiment analysis on twitter data using deep learning (Keras). In: 2019 international conference on computing, communication, and intelligent systems (ICCCIS), pp 69–73. https://doi.org/10.1109/ICCCIS48478.2019.8974557
Grover M, Verma B, Sharma N, Kaushik I (2019) Traffic control using V-2-V based method using reinforcement learning. In: 2019 international conference on computing, communication, and intelligent systems (ICCCIS). https://doi.org/10.1109/icccis48478.2019.8974540
Zhang R, Wang Y (2011) The construction of public computer teaching experiment platform based on the campus network. In: 2011 international conference on multimedia technology. https://doi.org/10.1109/icmt.2011.6001744
Tyagi N, Gautam S, Goel A, Mann P (2021) A framework for blockchain technology including features. In: Hassanien AE, Bhattacharyya S, Chakrabati S, Bhattacharya A, Dutta S (eds) Emerging technologies in data mining and information security. Advances in intelligent systems and computing, vol 1286. Springer, Singapore. https://doi.org/10.1007/978-981-15-9927-9_62
Sharma A, Sharma N, Kaushik I, Kumar S, Khatoon N (2020) Predictive analysis of type 2 diabetes using hybrid ml model and IoT. In: IoT security paradigms and applications, pp 303–320. https://doi.org/10.1201/9781003054115-14
Gautam S, Malik A, Singh N, Kumar S (2019) Recent advances and countermeasures against various attacks in IoT environment. In: 2019 2nd international conference on signal processing and communication (ICSPC), pp 315–319. https://doi.org/10.1109/ICSPC46172.2019.8976527
Dorai C, Venkatesh S (2003) Bridging the semantic gap with computational media aesthetics. IEEE Multimedia 10(2):15–17. https://doi.org/10.1109/mmul.2003.1195157
Jaidka H, Sharma N, Singh R (2020) Evolution of IoT to IIoT: applications & challenges. SSRN Electron J. https://doi.org/10.2139/ssrn.3603739
Golshani F (2004) Multimedia is correlated media. IEEE Multimedia 11(1):c2–c2. https://doi.org/10.1109/mmul.2004.1318099
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Vijay, S., Mann, P., Chaudhary, R., Rana, A. (2023). Emerging Trends in Multimedia. In: Dutta, P., Chakrabarti, S., Bhattacharya, A., Dutta, S., Piuri, V. (eds) Emerging Technologies in Data Mining and Information Security. Lecture Notes in Networks and Systems, vol 491. Springer, Singapore. https://doi.org/10.1007/978-981-19-4193-1_29
Download citation
DOI: https://doi.org/10.1007/978-981-19-4193-1_29
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-4192-4
Online ISBN: 978-981-19-4193-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)