Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Emerging Trends in Multimedia

  • Conference paper
  • First Online:
Emerging Technologies in Data Mining and Information Security

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 491))

  • 1019 Accesses

Abstract

The rapid development of the network and devices has made multimedia technology to spread across all the aspects of the people’s life. Multimedia can be defined as the media which interactively spread the information, combining two or more media. Multimedia technology has impacted on our daily lives in various aspects like e-learning, virtual reality, journalism, Content Streaming and many more. The evolution of multimedia has been carried out in various phases over the last decade which has been further discussed under the topic Diversity in Multimedia. In this paper, we intend to explain about the various trends emerging in multimedia and the concerns related to the transmission of the user’s personal data and their privacy. The already existing technologies which are not yet fully explored such as Virtual reality, Hologram, Advanced Journalism and feedback-based content streaming and the security issues that arise with such advancement in technology has been talked about in depth in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Yoshitaka A, Ichikawa T (1999) A survey on content-based retrieval for Multimedia databases. IEEE Trans Knowl Data Eng 11(1):81–93. https://doi.org/10.1109/69.755617

    Article  Google Scholar 

  2. Zhao N, Chen S-c, Shyu M-l, Rubin S (2006) An integrated and interactive video retrieval framework with hierarchical learning models and semantic clustering strategy. In: 2006 IEEE international conference on information reuse and integration. https://doi.org/10.1109/iri.2006.252454

  3. Dikici Ç, Işıl Bozma H (2010) Attention-based video streaming. Signal Process Image Commun 25(10):745–760. https://doi.org/10.1016/j.image.2010.08.002

    Article  Google Scholar 

  4. Singh G, Gautam S, Prachi, Verma A, Kaushal T (2021) Analysis of blockchain induced cryptocurrency: regulations and challenges of cryptocurrencies. In: Hassanien AE, Bhattacharyya S, Chakrabati S, Bhattacharya A, Dutta S (eds) Emerging technologies in data mining and information security. Advances in intelligent systems and computing, vol 1286. Springer, Singapore. https://doi.org/10.1007/978-981-15-9927-9_54

  5. Yu HH (n.d.) Multilayer data hiding for multimedia authentication. In: GLOBECOM’01. IEEE Global telecommunications conference (Cat. No. 01CH37270). https://doi.org/10.1109/glocom.2001.965934

  6. Bosi M (2006) Digital rights management systems. In: Multimedia security technologies for digital rights management, pp 23–49. https://doi.org/10.1016/b978-012369476-8/50004-x

  7. Kaushik I, Sharma N, Bhushan B, Gautam S (2021) Performance evaluation using different routing protocols in MANETs. In: Integration of WSNs into internet of things, pp 101–120. https://doi.org/10.1201/9781003107521-6

  8. Rana A, Gautam S, Mann P, Tyagi N (2020) Classification for big data tools and its challenges and issues. SSRN Electron J. https://doi.org/10.2139/ssrn.3746970

    Article  Google Scholar 

  9. Gao J, Tzanetakis G, Steenkiste P (2003) Content-based retrieval of music in scalable peer-to-peer networks. In: 2003 International conference on multimedia and expo. ICME ‘03. Proceedings (Cat. No. 03TH8698). https://doi.org/10.1109/icme.2003.1220916

  10. Eskicioglu AM (2003) Cover feature—protecting intellectual property in digital multimedia networks. Computer 36(7):39–45. https://doi.org/10.1109/mc.2003.1212689

    Article  Google Scholar 

  11. Barni M, Bartolini F, De Rosa A, Piva A (2002) Security and watermarking of multimedia contents IV. https://doi.org/10.1117/12.465299

  12. Di Crescenzo G, Graveman R, Ge R, Arce G (2005) Approximate message authentication and biometric entity authentication. In: Financial cryptography and data security, pp 240–254. https://doi.org/10.1007/11507840_22

  13. Queluz MP (n.d.) Towards robust, content based techniques for image authentication. In: 1998 IEEE second workshop on multimedia signal processing (Cat. No. 98EX175). https://doi.org/10.1109/mmsp.1998.738950

  14. Park JM, Chong EKP, Siegel HJ (n.d.) Efficient multicast packet authentication using signature amortization. In: Proceedings 2002 IEEE symposium on security and privacy. https://doi.org/10.1109/secpri.2002.1004374

  15. He D, Sun Q (2006) Multimedia authentication. In: Multimedia security technologies for digital rights management, pp 111–137. https://doi.org/10.1016/b978-012369476-8/50007-5

  16. Joshi JBD, Li ZK, Fahmi H, Shafiq B, Ghafoor A (2002) A model for secure multimedia document database system in a distributed environment. IEEE Trans Multimedia 4(2):215–234. https://doi.org/10.1109/tmm.2002.1017735

    Article  Google Scholar 

  17. Kathuria RS, Gautam S, Singh A, Singh A, Yadav N (2021) Sentiment analysis on images using convolutional neural network. In: Hassanien AE, Bhattacharyya S, Chakrabati S, Bhattacharya A, Dutta S (eds) Emerging technologies in data mining and information security. Advances in intelligent systems and computing, vol 1300. Springer, Singapore. https://doi.org/10.1007/978-981-33-4367-2_20

  18. Gurung A, Gautam S, Garg T, Bhardwaj Y, Gupta H (2021) Virtual numeric authentication system using contour detection of color-banded fingertips. In: Tavares JMRS, Chakrabarti S, Bhattacharya A, Ghatak S (eds) Emerging technologies in data mining and information security. Lecture notes in networks and systems, vol 164. Springer, Singapore. https://doi.org/10.1007/978-981-15-9774-9_32

  19. Harjani M, Grover M, Sharma N, Kaushik I (2019) Analysis of various machine learning algorithm for cardiac pulse prediction. In: 2019 international conference on computing, communication, and intelligent systems (ICCCIS). https://doi.org/10.1109/icccis48478.2019.8974519

  20. Moyer MJ, Abamad M (n.d.) Generalized role-based access control. In: Proceedings 21st international conference on distributed computing systems. https://doi.org/10.1109/icdsc.2001.918969

  21. Arora D, Gautam S, Sachdeva P, Sharma S, Sharma V (2021) Blockchain-based network architecture for accountable auctions and to overcome resource problems. In: Hassanien AE, Bhattacharyya S, Chakrabati S, Bhattacharya A, Dutta S (eds) Emerging technologies in data mining and information security. Advances in intelligent systems and computing, vol 1286. Springer, Singapore. https://doi.org/10.1007/978-981-15-9927-9_63

  22. Wu C-P, Kuo CCJ (2005) Design of integrated multimedia compression and encryption systems. IEEE Trans Multimedia 7(5):828–839. https://doi.org/10.1109/tmm.2005.854469

  23. Multimedia security handbook (2004). https://doi.org/10.1201/9781420038262

  24. Sharma N, Kaushik I, Rathi R, Kumar S (2020) Evaluation of accidental death records using hybrid genetic algorithm. SSRN Electron J. https://doi.org/10.2139/ssrn.3563084

    Article  Google Scholar 

  25. Kathuria RS, Gautam S, Singh A, Khatri S, Yadav N (2019) Real time sentiment analysis on twitter data using deep learning (Keras). In: 2019 international conference on computing, communication, and intelligent systems (ICCCIS), pp 69–73. https://doi.org/10.1109/ICCCIS48478.2019.8974557

  26. Grover M, Verma B, Sharma N, Kaushik I (2019) Traffic control using V-2-V based method using reinforcement learning. In: 2019 international conference on computing, communication, and intelligent systems (ICCCIS). https://doi.org/10.1109/icccis48478.2019.8974540

  27. Zhang R, Wang Y (2011) The construction of public computer teaching experiment platform based on the campus network. In: 2011 international conference on multimedia technology. https://doi.org/10.1109/icmt.2011.6001744

  28. Tyagi N, Gautam S, Goel A, Mann P (2021) A framework for blockchain technology including features. In: Hassanien AE, Bhattacharyya S, Chakrabati S, Bhattacharya A, Dutta S (eds) Emerging technologies in data mining and information security. Advances in intelligent systems and computing, vol 1286. Springer, Singapore. https://doi.org/10.1007/978-981-15-9927-9_62

  29. Sharma A, Sharma N, Kaushik I, Kumar S, Khatoon N (2020) Predictive analysis of type 2 diabetes using hybrid ml model and IoT. In: IoT security paradigms and applications, pp 303–320. https://doi.org/10.1201/9781003054115-14

  30. Gautam S, Malik A, Singh N, Kumar S (2019) Recent advances and countermeasures against various attacks in IoT environment. In: 2019 2nd international conference on signal processing and communication (ICSPC), pp 315–319. https://doi.org/10.1109/ICSPC46172.2019.8976527

  31. Dorai C, Venkatesh S (2003) Bridging the semantic gap with computational media aesthetics. IEEE Multimedia 10(2):15–17. https://doi.org/10.1109/mmul.2003.1195157

    Article  Google Scholar 

  32. Jaidka H, Sharma N, Singh R (2020) Evolution of IoT to IIoT: applications & challenges. SSRN Electron J. https://doi.org/10.2139/ssrn.3603739

    Article  Google Scholar 

  33. Golshani F (2004) Multimedia is correlated media. IEEE Multimedia 11(1):c2–c2. https://doi.org/10.1109/mmul.2004.1318099

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shreyas Vijay .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Vijay, S., Mann, P., Chaudhary, R., Rana, A. (2023). Emerging Trends in Multimedia. In: Dutta, P., Chakrabarti, S., Bhattacharya, A., Dutta, S., Piuri, V. (eds) Emerging Technologies in Data Mining and Information Security. Lecture Notes in Networks and Systems, vol 491. Springer, Singapore. https://doi.org/10.1007/978-981-19-4193-1_29

Download citation

Publish with us

Policies and ethics