applsci-logo

Journal Browser

Journal Browser

Trends and Prospects in Multimedia

A topical collection in Applied Sciences (ISSN 2076-3417). This collection belongs to the section "Computing and Artificial Intelligence".

Viewed by 4479

Editors


E-Mail Website
Collection Editor
School of Electrical and Electronic Engineering, College of Engineering, Yonsei University, Seoul 120749, Korea
Interests: biometrics; biometric security; machine learning
Special Issues, Collections and Topics in MDPI journals

Topical Collection Information

Dear Colleagues,

This topical collection aims to introduce the latest research on multimedia signals, including digital contents and the various devices supporting them, in the open access journal Applied Sciences. We are currently open for manuscripts from authors interested in this topical collection. We look forward to the submission of creative research papers and review papers on related topics in this field of research that will enhance the quality of this collection and advance the knowledge base of this subject.

Prof. Dr. Cheonshik Kim
Prof. Dr. Andrew Teoh Beng Jin
Collection Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the collection website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • multimedia systems
  • multimedia processing
  • multimedia applications
  • multimedia security
  • system software for multimedia
  • system hardware for multimedia
  • network for multimedia
  • signal processing for multimedia
  • AI technology for multimedia
  • every topic related multimedia

Published Papers (2 papers)

2022

19 pages, 2555 KiB  
Article
Few-Shot Continuous Authentication for Mobile-Based Biometrics
by Kensuke Wagata and Andrew Beng Jin Teoh
Appl. Sci. 2022, 12(20), 10365; https://doi.org/10.3390/app122010365 - 14 Oct 2022
Cited by 7 | Viewed by 1978
Abstract
The rapid growth of smartphone financial services raises the need for secure mobile authentication. Continuous authentication is a user-friendly way to strengthen the security of smartphones by implicitly monitoring a user’s identity through sessions. Mobile continuous authentication can be viewed as an anomaly [...] Read more.
The rapid growth of smartphone financial services raises the need for secure mobile authentication. Continuous authentication is a user-friendly way to strengthen the security of smartphones by implicitly monitoring a user’s identity through sessions. Mobile continuous authentication can be viewed as an anomaly detection problem in which models discriminate between one genuine user and the rest of the impostors (anomalies). In practice, complete impostor profiles are hardly available due to the time and monetary cost, while leveraging genuine data alone yields poorly generalized models due to the lack of knowledge about impostors. To address this challenge, we recast continuous mobile authentication as a few-shot anomaly detection problem, aiming to enhance the inference robustness of unseen impostors by using partial knowledge of available impostor profiles. Specifically, we propose a novel deep learning-based model, namely a local feature pooling-based temporal convolution network (LFP-TCN), which directly models raw sequential mobile data, aggregating global and local feature information. In addition, we introduce a random pattern mixing augmentation to generate class-unconstrained impostor data for the training. The augmented pool enables characterizing various impostor patterns from limited impostor data. Finally, we demonstrate practical continuous authentication using score-level fusion, which prevents long-term dependency or increased model complexity due to extended re-authentication time. Experiments on two public benchmark datasets show the effectiveness of our method and its state-of-the-art performance. Full article
Show Figures

Figure 1

16 pages, 5308 KiB  
Article
Separable Reversible Data Hiding in Encrypted AMBTC Images Using Hamming Code
by Cheonshik Kim
Appl. Sci. 2022, 12(16), 8225; https://doi.org/10.3390/app12168225 - 17 Aug 2022
Cited by 4 | Viewed by 1617
Abstract
Data hiding is a field widely used in copyright, annotation, and secret communication for digital content, and has been continuously studied for more than 20 years. In general, data hiding uses the original image as a cover image to hide data, but recently, [...] Read more.
Data hiding is a field widely used in copyright, annotation, and secret communication for digital content, and has been continuously studied for more than 20 years. In general, data hiding uses the original image as a cover image to hide data, but recently, the research area has expanded to research on improving the security and privacy protection of image contents by encrypting the image. This research is called separable reversible data hiding in an encrypted image (SRDH-EI). In this paper, we proposed a more efficient SRDH-EI method based on AMBTC. AMBTC can guarantee very good network transmission efficiency for applications that do not require a particularly high image quality because the compression time is short and calculation is simple compared to other existing compression methods. The SRDH-EI method presented here divides AMBTC into non-overlapping 4×4 blocks and then performs image encryption on them. Thereafter, data can be hidden using a Hamming code for each block. The proposed method has an advantage in that the quality of the cover image and the hiding capacity can be adjusted by appropriately using the value T of the difference between the two quantization levels. The experimental results proved the efficiency and superiority of our proposed model. Full article
Show Figures

Figure 1

Back to TopTop