Advertisement

Introduction to Multimedia Tools and Applications

  • Abdul Rahaman Wahab Sait
  • J. Uthayakumar
  • K. Shankar
  • K. Sathesh Kumar
Chapter

Abstract

In recent days, there is an increasing demand in the transmission of multimedia data in several computer vision based applications. A noteworthy part required in multimedia applications is a computer with high processing rate and extensive stockpiling limit. In this chapter, we made an attempt to summarize the overview of multimedia, its application in various domain, etc. In addition, a detailed explanation of the issues present in the multimedia tools and applications is also discussed. Over the entire domain like transportation of huge volumes of media produced data, data management, synchronization, retrieval are the novel issues that are rising nowadays with the enhanced ease of access and availability to electronic multimedia data.

Keywords

Multimedia Images Audio Video 

References

  1. 1.
    Becvar, L. A. (2007). Social impacts of a video blogging system for clinical instruction. CHI 2007, ACM Student Research Competition, San Jose, CA, USA.Google Scholar
  2. 2.
    Furht, B. ed., 2012. Multimedia tools and applications (Vol. 359). Springer Science & Business Media.Google Scholar
  3. 3.
    Datta, R., Li, J., & Wang, J. Z. (2005). Multimedia information retrieval: Challenges and real-world applications: Content-based image retrieval: approaches and trends of the new age. Proceedings of the 7th ACM SIGMM International Workshop on Multimedia Information Retrieval MIR’05.Google Scholar
  4. 4.
    Nang, J., & Park, J. (2007). Database theory, technology, and applications. An efficient indexing structure for content based multimedia retrieval with relevance feedback. Proceedings of the 2007 ACM Symposium on Applied Computing SAC’07.Google Scholar
  5. 5.
    Rowe, L. A., & Jain, R. (2005). ACM SIGMM retreat report on future directions in multimedia research. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP), 1(1).Google Scholar
  6. 6.
    Sebe, N., & Tian, Q. (2007). Personalized multimedia information retrieval: Personalized multimedia retrieval: the new trend? Proceedings of the International Workshop on Workshop on Multimedia Information Retrieval MIR ’07.Google Scholar
  7. 7.
    Yang, J., Li, Q., & Zhuang, Y. (2002). Multimedia: OCTOPUS: Aggressive search of multi-modality data using multifaceted knowledge base. Proceedings of the 11th International Conference on World Wide Web WWW ‘02.Google Scholar
  8. 8.
    Cai, L. X., Cai, L., Shen, X., & Mark, J. W. (2006). Multimedia capacity of UWB networks supporting multimedia services. Proceedings of the 3rd International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks QShine ‘06.Google Scholar
  9. 9.
    Farnham, T., Sooriyabandara, M., & Efthymiou, C. (2007). Enhancing multimedia streaming over existing wireless LAN technology using the unified link layer API. International Journal of Network Management, 17(5).Google Scholar
  10. 10.
    Fernando, X. (2006). Radio over fiber in multimedia access networks. Proceedings of the 1st International Conference on Access Networks AccessNets ‘06.Google Scholar
  11. 11.
    Koutsakis, P. (2007). Mobile computing symposium: Movement prediction and planning: Integrating latest technology multimedia traffic over high-speed cellular networks. Proceedings of the 2007 International Conference on Wireless Communications and Mobile Computing IWCMC ‘07.Google Scholar
  12. 12.
    Pham, B., & Wong, O. (2004). Computer human interface: Handheld devices for applications using dynamic multimedia data. Proceedings of the 2nd International Conference on Computer Graphics and Interactive Techniques in Australasia and South East Asia GRAPHITE.Google Scholar
  13. 13.
    Thwaites, H. (2006). Human computer interaction: Cyberanthropology of mobility. Proceedings of the 3rd International Conference on Mobile Technology, Applications & Systems Mobility ‘06.Google Scholar
  14. 14.
    Verkasalo, H. (2006). Empirical observations on the emergence of mobile multimedia services and applications in the U.S. and Europe. Proceedings of the 5th International Conference on Mobile and Ubiquitous Multimedia MUM ‘06.Google Scholar
  15. 15.
    Hua, S., Qu, G., & Bhattacharyya, S. S. (2007). Probabilistic design of multimedia embedded systems. ACM Transactions on Embedded Computing Systems (TECS), 6(3).Google Scholar
  16. 16.
    Lanuzza, M., Margala, M., & Corsonello, P. (2005). Special purpose processing: Cost-effective lowpower processor-in-memory-based reconfigurable datapath for multimedia applications. Proceedings of the 2005 International Symposium on Low Power Electronics and Design ISLPED ’05.Google Scholar
  17. 17.
    Dimitrova, N. (2004). Context and memory in multimedia context analysis. IEEE Multimedia, 11(3), 7-11.CrossRefGoogle Scholar
  18. 18.
    Rowe, L., & Jain, R. (2005). ACM SIGMM Retreat Report. ACM Trans. Multimedia Computing, Communications, and Applications, 1(1), 3-13.Google Scholar
  19. 19.
    El-Bendary, M. A., & El-Azm, A. A. (2018). Complexity considerations: efficient image transmission over mobile communications channels. Multimedia Tools and Applications, 1-32.Google Scholar
  20. 20.
    Shi, J., Yang, Z., & Zhu, J. (2018). An auction-based rescue task allocation approach for heterogeneous multi-robot system. Multimedia Tools and Applications, 1-10.Google Scholar
  21. 21.
    Fernández, D. G., Botella, G., Del Barrio, A. A., García, C., Prieto-Matías, M., & Grecos, C. (2018). HEVC optimization based on human perception for real-time environments. Multimedia Tools and Applications, 1-33.Google Scholar
  22. 22.
    K. Shankar, SK. Lakshmanaprabu, Deepak Gupta, Ashish Khanna, Victor Hugo C. de Albuquerque, “Adaptive Optimal Multi Key Based Encryption for Digital Image Security”, Concurrency and Computation: Practice and Experience, December 2018.  https://doi.org/10.1002/cpe.5122
  23. 23.
    K. Shankar, Mohamed Elhoseny, R. Satheesh Kumar, S. K. Lakshmanaprabu, Xiaohui Yuan, Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique, Journal of Ambient Intelligence and Humanized Computing, December 2018.  https://doi.org/10.1007/s12652-018-1161-0
  24. 24.
    Deepak Gupta, Ashish Khanna, Lakshmanaprabu SK, Shankar K, Vasco Furtado, Joel J. P. C. Rodrigues, Efficient Artificial Fish Swarm Based Clustering Approach on Mobility Aware Energy-Efficient for MANET, Transactions on Emerging Telecommunications Technologies, November 2018.  https://doi.org/10.1002/ett.3524
  25. 25.
    K. Shankar, Mohamed Elhoseny, E. Dhiravida chelvi, SK. Lakshmanaprabu, Wanqing Wu, An Efficient Optimal Key Based Chaos Function for Medical Image Security, IEEE Access, Vol.6, Issue.1, page(s): 77145-77154, December 2018.  https://doi.org/10.1109/ACCESS.2018.2874026 CrossRefGoogle Scholar
  26. 26.
    Mohamed Elhoseny, K. Shankar, S. K. Lakshmanaprabu, Andino Maseleno, N. Arunkumar, Hybrid optimization with cryptography encryption for medical image security in Internet of Things, Neural Computing and Applications, October 2018.  https://doi.org/10.1007/s00521-018-3801-x
  27. 27.
    T. Avudaiappan, R. Balasubramanian, S. Sundara Pandiyan, M. Saravanan, S. K. Lakshmanaprabu, K. Shankar, Medical Image Security Using Dual Encryption with Oppositional Based Optimization Algorithm, Journal of Medical Systems, Volume 42, Issue 11, pp.1-11, November 2018.Google Scholar
  28. 28.
    K.Shankar and P.Eswaran. “RGB Based Multiple Share Creation in Visual Cryptography with Aid of Elliptic Curve Cryptography”, China Communications, Volume. 14, Issue. 2, page(s): 118-130, February 2017.Google Scholar
  29. 29.
    Lakshmanaprabu SK, K. Shankar, Ashish Khanna, Deepak Gupta, Joel J. P. C. Rodrigues, Plácido R. Pinheiro, Victor Hugo C. de Albuquerque, “Effective Features to Classify Big Data using Social Internet of Things”, IEEE Access, Volume.6, page(s):24196-24204, April 2018.CrossRefGoogle Scholar
  30. 30.
    K.Shankar and P.Eswaran. “RGB Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique”, Journal of Circuits, Systems, and Computers, Volume. 25, No. 11, page(s): 1650138-1 to 23, November 2016.Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Abdul Rahaman Wahab Sait
    • 1
  • J. Uthayakumar
    • 2
  • K. Shankar
    • 3
  • K. Sathesh Kumar
    • 3
  1. 1.Center of Documents, Archives and CommunicationKing Faisal UniversityHofufSaudi Arabia
  2. 2.Department of Computer SciencePondicherry UniversityPuducherryIndia
  3. 3.School of Computing, Kalasalingam Academy of Research and EducationKrishnankoilIndia

Personalised recommendations