Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (377)

Search Parameters:
Keywords = multimedia networking

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
23 pages, 16115 KiB  
Article
Image Privacy Protection Communication Scheme by Fibonacci Interleaved Diffusion and Non-Degenerate Discrete Chaos
by Zhiyu Xie, Weihong Xie, Xiyuan Cheng, Zhengqin Yuan, Wenbin Cheng and Yiting Lin
Entropy 2025, 27(8), 790; https://doi.org/10.3390/e27080790 - 25 Jul 2025
Viewed by 135
Abstract
The rapid development of network communication technology has led to an increased focus on the security of image storage and transmission in multimedia information. This paper proposes an enhanced image security communication scheme based on Fibonacci interleaved diffusion and non-degenerate chaotic system to [...] Read more.
The rapid development of network communication technology has led to an increased focus on the security of image storage and transmission in multimedia information. This paper proposes an enhanced image security communication scheme based on Fibonacci interleaved diffusion and non-degenerate chaotic system to address the inadequacy of current image encryption technology. The scheme utilizes a hash function to extract the hash characteristic values of the plaintext image, generating initial perturbation keys to drive the chaotic system to generate initial pseudo-random sequences. Subsequently, the input image is subjected to a light scrambling process at the bit level. The Q matrix generated by the Fibonacci sequence is then employed to diffuse the obtained intermediate cipher image. The final ciphertext image is then generated by random direction confusion. Throughout the encryption process, plaintext correlation mechanisms are employed. Consequently, due to the feedback loop of the plaintext, this algorithm is capable of resisting known-plaintext attacks and chosen-plaintext attacks. Theoretical analysis and empirical results demonstrate that the algorithm fulfils the cryptographic requirements of confusion, diffusion, and avalanche effects, while also exhibiting a robust password space and excellent numerical statistical properties. Consequently, the security enhancement mechanism based on Fibonacci interleaved diffusion and non-degenerate chaotic system proposed in this paper effectively enhances the algorithm’s resistance to cryptographic attacks. Full article
Show Figures

Figure 1

30 pages, 9606 KiB  
Article
A Visualized Analysis of Research Hotspots and Trends on the Ecological Impact of Volatile Organic Compounds
by Xuxu Guo, Qiurong Lei, Xingzhou Li, Jing Chen and Chuanjian Yi
Atmosphere 2025, 16(8), 900; https://doi.org/10.3390/atmos16080900 - 24 Jul 2025
Viewed by 331
Abstract
With the ongoing advancement of industrialization and rapid urbanization, the emission of volatile organic compounds (VOCs) has increased significantly. As key precursors of PM2.5 and ozone formation, VOCs pose a growing threat to the health of ecosystems. Due to their complex and [...] Read more.
With the ongoing advancement of industrialization and rapid urbanization, the emission of volatile organic compounds (VOCs) has increased significantly. As key precursors of PM2.5 and ozone formation, VOCs pose a growing threat to the health of ecosystems. Due to their complex and dynamic transformation processes across air, water, and soil media, the ecological risks associated with VOCs have attracted increasing attention from both the scientific community and policy-makers. This study systematically reviews the core literature on the ecological impacts of VOCs published between 2005 and 2024, based on data from the Web of Science and Google Scholar databases. Utilizing three bibliometric tools (CiteSpace, VOSviewer, and Bibliometrix), we conducted a comprehensive visual analysis, constructing knowledge maps from multiple perspectives, including research trends, international collaboration, keyword evolution, and author–institution co-occurrence networks. The results reveal a rapid growth in the ecological impact of VOCs (EIVOCs), with an average annual increase exceeding 11% since 2013. Key research themes include source apportionment of air pollutants, ecotoxicological effects, biological response mechanisms, and health risk assessment. China, the United States, and Germany have emerged as leading contributors in this field, with China showing a remarkable surge in research activity in recent years. Keyword co-occurrence and burst analyses highlight “air pollution”, “exposure”, “health”, and “source apportionment” as major research hotspots. However, challenges remain in areas such as ecosystem functional responses, the integration of multimedia pollution pathways, and interdisciplinary coordination mechanisms. There is an urgent need to enhance monitoring technology integration, develop robust ecological risk assessment frameworks, and improve predictive modeling capabilities under climate change scenarios. This study provides scientific insights and theoretical support for the development of future environmental protection policies and comprehensive VOCs management strategies. Full article
Show Figures

Figure 1

17 pages, 7292 KiB  
Article
QP-Adaptive Dual-Path Residual Integrated Frequency Transformer for Data-Driven In-Loop Filter in VVC
by Cheng-Hsuan Yeh, Chi-Ting Ni, Kuan-Yu Huang, Zheng-Wei Wu, Cheng-Pin Peng and Pei-Yin Chen
Sensors 2025, 25(13), 4234; https://doi.org/10.3390/s25134234 - 7 Jul 2025
Viewed by 359
Abstract
As AI-enabled embedded systems such as smart TVs and edge devices demand efficient video processing, Versatile Video Coding (VVC/H.266) becomes essential for bandwidth-constrained Multimedia Internet of Things (M-IoT) applications. However, its block-based coding often introduces compression artifacts. While CNN-based methods effectively reduce these [...] Read more.
As AI-enabled embedded systems such as smart TVs and edge devices demand efficient video processing, Versatile Video Coding (VVC/H.266) becomes essential for bandwidth-constrained Multimedia Internet of Things (M-IoT) applications. However, its block-based coding often introduces compression artifacts. While CNN-based methods effectively reduce these artifacts, maintaining robust performance across varying quantization parameters (QPs) remains challenging. Recent QP-adaptive designs like QA-Filter show promise but are still limited. This paper proposes DRIFT, a QP-adaptive in-loop filtering network for VVC. DRIFT combines a lightweight frequency fusion CNN (LFFCNN) for local enhancement and a Swin Transformer-based global skip connection for capturing long-range dependencies. LFFCNN leverages octave convolution and introduces a novel residual block (FFRB) that integrates multiscale extraction, QP adaptivity, frequency fusion, and spatial-channel attention. A QP estimator (QPE) is further introduced to mitigate double enhancement in inter-coded frames. Experimental results demonstrate that DRIFT achieves BD rate reductions of 6.56% (intra) and 4.83% (inter), with an up to 10.90% gain on the BasketballDrill sequence. Additionally, LFFCNN reduces the model size by 32% while slightly improving the coding performance over QA-Filter. Full article
(This article belongs to the Special Issue Multimodal Sensing Technologies for IoT and AI-Enabled Systems)
Show Figures

Figure 1

20 pages, 1009 KiB  
Article
Digitalization of Higher Education: Students’ Perspectives
by Vojko Potocan, Zlatko Nedelko and Maja Rosi
Educ. Sci. 2025, 15(7), 847; https://doi.org/10.3390/educsci15070847 - 2 Jul 2025
Viewed by 321
Abstract
This study examines the use of digitalized educational solutions among students in higher education institutions (HEIs). Drawing upon theories of technology, digitalization, and education, we analyze the suitability of different digitalization solutions for students in HEIs. Educational organizations that apply different digitalized technologies [...] Read more.
This study examines the use of digitalized educational solutions among students in higher education institutions (HEIs). Drawing upon theories of technology, digitalization, and education, we analyze the suitability of different digitalization solutions for students in HEIs. Educational organizations that apply different digitalized technologies provide customizable platforms for authoring and disseminating multimedia-rich e-education and smart education. However, pedagogical practices indicate several gaps between the level of HEI digitalization achieved and its suitability for HEI participants. Thus, we analyze the state of various digitalized technologies in HEIs and their suitability for meeting students’ expectations. The results of our research show that students most highly rate modern educational methods such as practical learning supported by access to digitized materials via websites, social networks, and smartphones while assigning a lower rating to the use of classic education, supported by digital textbooks and traditional technologies such as Skype, Zoom, podcasts, and online videos. This study has several theoretical implications, among which is the need to further develop highly digitized materials and purpose-designed digitized solutions for individual areas and specific educational purposes. The practical implications indicate the need to expand the use of website networks, smartphones, and smart table solutions in modern educational practices in HEIs. Full article
(This article belongs to the Special Issue Unleashing the Potential of E-learning in Higher Education)
Show Figures

Figure 1

24 pages, 19576 KiB  
Article
Evaluating HAS and Low-Latency Streaming Algorithms for Enhanced QoE
by Syed Uddin, Michał Grega, Mikołaj Leszczuk and Waqas ur Rahman
Electronics 2025, 14(13), 2587; https://doi.org/10.3390/electronics14132587 - 26 Jun 2025
Viewed by 970
Abstract
The demand for multimedia traffic over the Internet is exponentially growing. HTTP adaptive streaming (HAS) is the leading video delivery system that delivers high-quality video to the end user. The adaptive bitrate (ABR) algorithms running on the HTTP client select the highest feasible [...] Read more.
The demand for multimedia traffic over the Internet is exponentially growing. HTTP adaptive streaming (HAS) is the leading video delivery system that delivers high-quality video to the end user. The adaptive bitrate (ABR) algorithms running on the HTTP client select the highest feasible video quality by adjusting the quality according to the fluctuating network conditions. Recently, low-latency ABR algorithms have been introduced to reduce the end-to-end latency commonly experienced in HAS. However, a comprehensive study of the low-latency algorithms remains limited. This paper investigates the effectiveness of low-latency streaming algorithms in maintaining a high quality of experience (QoE) while minimizing playback delay. We evaluate these algorithms in the context of both Dynamic Adaptive Streaming over HTTP (DASH) and the Common Media Application Format (CMAF), with a particular focus on the impact of chunked encoding and transfer mechanisms on the QoE. We perform both objective as well as subjective evaluations of low-latency algorithms and compare their performance with traditional DASH-based ABR algorithms across multiple QoE metrics, various network conditions, and diverse content types. The results demonstrate that low-latency algorithms consistently deliver high video quality across various content types and network conditions, whereas the performance of the traditional adaptive bitrate (ABR) algorithms exhibit performance variability under fluctuating network conditions and diverse content characteristics. Although traditional ABR algorithms download higher-quality segments in stable network environments, their effectiveness significantly declines under unstable conditions. Furthermore, the low-latency algorithms maintained high user experience regardless of segment duration. In contrast, the performance of traditional algorithms varied significantly with changes in segment duration. In summary, the results underscore that no single algorithm consistently achieves optimal performance across all experimental conditions. Performance varies depending on network stability, content characteristics, and segment duration, highlighting the need for adaptive strategies that can dynamically respond to varying streaming environments. Full article
(This article belongs to the Special Issue Video Streaming Service Solutions)
Show Figures

Figure 1

29 pages, 2746 KiB  
Article
Explainable AI-Integrated and GAN-Enabled Dynamic Knowledge Component Prediction System (DKPS) Using Hybrid ML Model
by Swathieswari Mohanraj and Shanmugavadivu Pichai
Appl. Syst. Innov. 2025, 8(3), 82; https://doi.org/10.3390/asi8030082 - 16 Jun 2025
Viewed by 717
Abstract
The progressive advancements in education due to the advent of transformative technologies has led to the emergence of customized/personalized learning systems that dynamically adapts to an individual learner’s preferences in real-time mode. The learning route and style of every learner is unique and [...] Read more.
The progressive advancements in education due to the advent of transformative technologies has led to the emergence of customized/personalized learning systems that dynamically adapts to an individual learner’s preferences in real-time mode. The learning route and style of every learner is unique and their understanding varies with the complexity of core components. This paper presents a hybrid approach that integrates generative adversarial networks (GANs), feedback-driven personalization, explainable artificial intelligence (XAI) to enhance knowledge component (KC) prediction and to improve learner outcomes as well as to attain progress in learning. By using these technologies, this proposed system addresses the challenges, namely, adapting educational content to an individual’s requirements, creating high-quality content based on a learner’s profile, and implementing transparency in decision-making. The proposed framework starts with a powerful feedback mechanism to capture both explicit and implicit signals from learners, including performance parameters viz., time spent on tasks, and satisfaction ratings. By analysing these signals, the system vigorously adapts to each learner’s needs and preferences, ensuring personalized and efficient learning. This hybrid model dynamic knowledge component prediction system (DKPS) exhibits a 35% refinement in content relevance and learner engagement, compared to the conventional methods. Using generative adversarial networks (GANs) for content creation, the time required to produce high-quality learning materials is reduced by 40%. The proposed technique has further scope for enhancement by incorporating multimedia content, such as videos and concept-based infographics, to give learners a more extensive understanding of concepts. Full article
(This article belongs to the Topic Social Sciences and Intelligence Management, 2nd Volume)
Show Figures

Figure 1

28 pages, 3384 KiB  
Article
Evaluating Features and Variations in Deepfake Videos Using the CoAtNet Model
by Eman Alattas, John Clark, Arwa Al-Aama and Salma Kammoun Jarraya
J. Imaging 2025, 11(6), 194; https://doi.org/10.3390/jimaging11060194 - 12 Jun 2025
Viewed by 1526
Abstract
Deepfake video detection has emerged as a critical challenge in the realm of artificial intelligence, given its implications for misinformation and digital security. This study evaluates the generalisation capabilities of the CoAtNet model—a hybrid convolution–transformer architecture—for deepfake detection across diverse datasets. Although CoAtNet [...] Read more.
Deepfake video detection has emerged as a critical challenge in the realm of artificial intelligence, given its implications for misinformation and digital security. This study evaluates the generalisation capabilities of the CoAtNet model—a hybrid convolution–transformer architecture—for deepfake detection across diverse datasets. Although CoAtNet has shown exceptional performance in several computer vision tasks, its potential for generalisation in cross-dataset scenarios remains underexplored. Thus, in this study, we explore CoAtNet’s generalisation ability by conducting an extensive series of experiments with a focus on discovering features and variations in deepfake videos. These experiments involve training the model using various input and processing configurations, followed by evaluating its performance on widely recognised public datasets. To the best of our knowledge, our proposed approach outperforms state-of-the-art models in terms of intra-dataset performance, with an AUC between 81.4% and 99.9%. Our model also achieves outstanding results in cross-dataset evaluations, with an AUC equal to 78%. This study demonstrates that CoAtNet achieves the best AUC for both intra-dataset and cross-dataset deepfake video detection, particularly on Celeb-DF, while also showing strong performance on DFDC. Full article
Show Figures

Figure 1

16 pages, 1093 KiB  
Article
A Lightweight Framework for Audio-Visual Segmentation with an Audio-Guided Space–Time Memory Network
by Yunpeng Zuo and Yunwei Zhang
Appl. Sci. 2025, 15(12), 6585; https://doi.org/10.3390/app15126585 - 11 Jun 2025
Viewed by 501
Abstract
As a multimodal fusion task, audio-visual segmentation (AVS) aims to locate sounding objects at the pixel level within a given image. This capability holds significant importance and practical value in applications such as intelligent surveillance, multimedia content analysis, and human–robot interaction. However, existing [...] Read more.
As a multimodal fusion task, audio-visual segmentation (AVS) aims to locate sounding objects at the pixel level within a given image. This capability holds significant importance and practical value in applications such as intelligent surveillance, multimedia content analysis, and human–robot interaction. However, existing AVS models typically feature complex architectures, require a large number of parameters, and are challenging to deploy on embedded platforms. Furthermore, these models often lack integration with object tracking mechanisms and fail to address the issue of the mis-segmentation of unvoiced objects caused by environmental noise in real-world scenarios. To address these challenges, this research proposes a lightweight audio-visual segmentation framework incorporating an audio-guided space–time memory network (AG-STMNet). First, a mask generator with a scoring mechanism was developed to identify sounding objects from generated masks. This component integrates Fastsam, a lightweight, pre-trained, object-aware segmentation model, with WAV2CLIP, a parameter-efficient audio-visual alignment model. Subsequently, AG-STMNet, an audio-guided video object segmentation network, was introduced to track sounding objects using video object segmentation techniques while mitigating environmental noise. Finally, the mask generator and AG-STMNet were combined to form the complete framework. The experimental results demonstrate that the framework achieves a mean Intersection over Union (mIoU) score of 41.5, indicating its potential as a viable lightweight solution for practical applications. Full article
(This article belongs to the Special Issue Artificial Intelligence and Its Application in Robotics)
Show Figures

Figure 1

17 pages, 2418 KiB  
Review
Bibliometric Analysis of Digital Watermarking Based on CiteSpace
by Maofeng Weng, Wei Qu, Eryong Ma, Mingkang Wu, Yuxin Dong and Xu Xi
Symmetry 2025, 17(6), 871; https://doi.org/10.3390/sym17060871 - 3 Jun 2025
Viewed by 455
Abstract
Symmetries and symmetry-breaking play significant roles in data security. Digital watermarking is widely employed in information security fields such as copyright protection and traceability. With the continuous advancement of technology, the research into and application of digital watermarking face numerous challenges. To gain [...] Read more.
Symmetries and symmetry-breaking play significant roles in data security. Digital watermarking is widely employed in information security fields such as copyright protection and traceability. With the continuous advancement of technology, the research into and application of digital watermarking face numerous challenges. To gain a comprehensive understanding of the current research status and trends in the development of digital watermarking, this paper conducts a bibliometric analysis using the CiteSpace software, focusing on 8621 publications related to digital watermarking (watermark/watermarking) from the Web of Science (WOS) Core Collection database, spanning from 2004 to 2024. This study explores the research landscape and future trends in digital watermarking from various perspectives, including annual publication volume, keyword co-occurrence and burst detection, leading authors, research institutions, and publishing countries or regions. The results reveal a regional concentration of research efforts, with early research being primarily dominated by the United States, Taiwan, and South Korea, while recent years have seen a rapid rise in research from China and India. However, global academic collaboration remains relatively fragmented and lacks a well-integrated international research network. Keyword analysis indicates that research hotspots have expanded from traditional copyright protection to data integrity verification, multimedia watermarking, and the incorporation of intelligent technologies. Notably, the introduction of deep learning has propelled watermarking algorithms toward greater sophistication and intelligence. Using CiteSpace, this study is the first to systematically illustrate the dynamic evolution of digital watermarking research over the past 20 years, focusing on thematic trends and regional distributions. Unlike previous reviews that rely mainly on qualitative analyses, this study offers a quantitative and visualized perspective. These findings provide concrete references for the future development of more targeted research efforts. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

29 pages, 6716 KiB  
Article
Mitigating Transmission Errors: A Forward Error Correction-Based Framework for Enhancing Objective Video Quality
by Muhammad Babar Imtiaz and Rabia Kamran
Sensors 2025, 25(11), 3503; https://doi.org/10.3390/s25113503 - 1 Jun 2025
Viewed by 751
Abstract
In video transmission, maintaining high visual quality under variable network conditions, including bandwidth and efficiency, is essential for optimal viewer experience. Channel errors or malicious attacks during transmission can cause degradation in video quality, affecting its secure transmission and putting its confidentiality and [...] Read more.
In video transmission, maintaining high visual quality under variable network conditions, including bandwidth and efficiency, is essential for optimal viewer experience. Channel errors or malicious attacks during transmission can cause degradation in video quality, affecting its secure transmission and putting its confidentiality and integrity at risk. This paper presents a novel approach to enhancing objective video quality by integrating an energy-efficient forward error correction (FEC) technique into video encoding and transmission processes. Moreover, it ensures that the video contents remain secure and unintelligible to unauthorized parties. This is achieved by combining H.264/AVC syntax-based encryption and decryption algorithms with error correction during the video coding process to provide end-to-end confidentiality. Unlike traditional error correction strategies, our approach dynamically adjusts redundancy levels based on real-time network conditions, optimizing bandwidth utilization without compromising quality. The proposed framework is evaluated across full reference objective video quality metrics, demonstrating significant improvements in the peak signal-to-noise ratio (PSNR) and PSNR611 of the recovered videos. Experiments are carried out on multiple test video sequences with different video resolutions having various characteristics, i.e., colors, motions, and structures, and confirm that the FEC-based solution effectively detects and corrects packet loss and transmission errors without the need for retransmission, reducing the impact of channel noise and accidental disruptions on visual quality in challenging network environments. This study contributes to the development of resilient video transmission systems with reduced computational complexity of the codec and provides insights into the role of FEC in addressing quality degradation in modern multimedia applications where low latency is crucial. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

19 pages, 2392 KiB  
Article
Intelligent Resource Allocation for Immersive VoD Multimedia in NG-EPON and B5G Converged Access Networks
by Razat Kharga, AliAkbar Nikoukar and I-Shyan Hwang
Photonics 2025, 12(6), 528; https://doi.org/10.3390/photonics12060528 - 22 May 2025
Viewed by 591
Abstract
Immersive content streaming services are becoming increasingly popular on video on demand (VoD) platforms due to the growing interest in extended reality (XR) and spatial experiences. Unlike traditional VoD, immersive VoD (IVoD) offers more engaging and interactive content beyond conventional 2D video. IVoD [...] Read more.
Immersive content streaming services are becoming increasingly popular on video on demand (VoD) platforms due to the growing interest in extended reality (XR) and spatial experiences. Unlike traditional VoD, immersive VoD (IVoD) offers more engaging and interactive content beyond conventional 2D video. IVoD requires substantial bandwidth and minimal latency to deliver its interactive XR experiences. This research examines intelligent resource allocation for IVoD services across NG-EPON and B5G X-haul converged networks. A proposed software-defined networking (SDN) framework employs artificial neural networks (ANN) with a backpropagation technique to predict bandwidth control based on traffic patterns and network conditions. The new immersive video storage, field-programmable gate array (FPGA), Queue Manager, and logical layer components are added to the existing OLT and ONU hardware architecture to implement the SDN framework. The SDN framework manages the entire network, predicts bandwidth requirements, and operates the immersive media dynamic bandwidth allocation (IMS-DBA) algorithm to efficiently allocate bandwidth to IVoD network traffic, ensuring that QoS metrics are met for IM services. Simulation results demonstrate that the proposed framework significantly enhances mean packet delay by up to 3% and improves packet drop probability by up to 4% as the traffic load varies from light to high across different scenarios, leading to enhanced overall QoS performance. Full article
(This article belongs to the Section Optical Communication and Network)
Show Figures

Figure 1

20 pages, 4919 KiB  
Article
Application of Optimized Adaptive Neuro-Fuzzy Inference for High Frame Rate Video Quality Assessment
by Marko Matulin, Štefica Mrvelj, Marko Periša and Ivan Grgurević
Appl. Sci. 2025, 15(9), 5018; https://doi.org/10.3390/app15095018 - 30 Apr 2025
Viewed by 385
Abstract
Video content and streaming services have become integral to modern networks, driving increases in data traffic and necessitating effective methods for evaluating Quality of Experience (QoE). Accurately measuring QoE is critical for ensuring user satisfaction in multimedia applications. In this study, an optimized [...] Read more.
Video content and streaming services have become integral to modern networks, driving increases in data traffic and necessitating effective methods for evaluating Quality of Experience (QoE). Accurately measuring QoE is critical for ensuring user satisfaction in multimedia applications. In this study, an optimized adaptive neuro-fuzzy inference model that leverages subtractive clustering for high frame rate video quality assessment is presented. The model was developed and validated using the publicly available LIVE-YT-HFR dataset, which comprises 480 high-frame-rate video sequences and quality ratings provided by 85 subjects. The subtractive clustering parameters were optimized to strike a balance between model complexity and predictive accuracy. A targeted evaluation against the LIVE-YT-HFR subjective ratings yielded a root mean squared error of 2.9091, a Pearson correlation of 0.9174, and a Spearman rank-order correlation of 0.9048, underscoring the model’s superior accuracy compared to existing methods. Full article
(This article belongs to the Section Electrical, Electronics and Communications Engineering)
Show Figures

Figure 1

21 pages, 9110 KiB  
Article
SwinTCS: A Swin Transformer Approach to Compressive Sensing with Non-Local Denoising
by Xiuying Li, Haoze Li, Hongwei Liao, Zhufeng Suo, Xuesong Chen and Jiameng Han
J. Imaging 2025, 11(5), 139; https://doi.org/10.3390/jimaging11050139 - 29 Apr 2025
Viewed by 484
Abstract
In the era of the Internet of Things (IoT), the rapid growth of interconnected devices has intensified the demand for efficient data acquisition and processing techniques. Compressive Sensing (CS) has emerged as a promising approach for simultaneous signal acquisition and dimensionality reduction, particularly [...] Read more.
In the era of the Internet of Things (IoT), the rapid growth of interconnected devices has intensified the demand for efficient data acquisition and processing techniques. Compressive Sensing (CS) has emerged as a promising approach for simultaneous signal acquisition and dimensionality reduction, particularly in multimedia applications. In response to the challenges presented by traditional CS reconstruction methods, such as boundary artifacts and limited robustness, we propose a novel hierarchical deep learning framework, SwinTCS, for CS-aware image reconstruction. Leveraging the Swin Transformer architecture, SwinTCS integrates a hierarchical feature representation strategy to enhance global contextual modeling while maintaining computational efficiency. Moreover, to better capture local features of images, we introduce an auxiliary convolutional neural network (CNN). Additionally, for suppressing noise and improving reconstruction quality in high-compression scenarios, we incorporate a Non-Local Means Denoising module. The experimental results on multiple public benchmark datasets indicate that SwinTCS surpasses State-of-the-Art (SOTA) methods across various evaluation metrics, thereby confirming its superior performance. Full article
(This article belongs to the Topic Intelligent Image Processing Technology)
Show Figures

Figure 1

24 pages, 3496 KiB  
Article
What Is the Best Solution for Smart Buildings? A Case Study of Fog, Edge Computing and Smart IoT Devices
by Mauro Chiozzotto and Miguel Arjona Ramírez
Appl. Sci. 2025, 15(7), 3805; https://doi.org/10.3390/app15073805 - 31 Mar 2025
Viewed by 1141
Abstract
This paper presents a case study of Fog Computing, Edge Computing (EC) and Intelligent EC applied to Smart Buildings, focusing on the deployment of innovative services and smart IoT devices, discussing new architecture as Software-Defined Network (SDN). Specifically, a comprehensive solution of a [...] Read more.
This paper presents a case study of Fog Computing, Edge Computing (EC) and Intelligent EC applied to Smart Buildings, focusing on the deployment of innovative services and smart IoT devices, discussing new architecture as Software-Defined Network (SDN). Specifically, a comprehensive solution of a Smart Building case is proposed to validate main statements and conclusions are drawn, providing a general guideline to address the problems of choosing between Edge or Fog Computing and the specific category of IoT devices. The methodology employed in this study is based on field research conducted in buildings within the metropolitan region of São Paulo, Brazil, that aim to enable their transformation into Smart Buildings (SBs). Moreover, principles of Electronic Systems Engineering and Cloud Computing such as reliability, scalability and security are applied. In that way, this study integrates advanced multimedia technical services to enhancing security and communication within the SBs through centralized control. The method focuses on identifying and analyzing the most common problems observed in field research within SBs in early stages of development, prior to the intensive implementation of IoT devices and Fog or Edge Computing technologies on the state of the art. The research adopts a comparative approach, investigating the best solutions for each application category. The results are consolidated in a main table within the article, correlating solutions to the four main problems identified in the field research, such as impairments in voice over IP and video communication using IoT devices; latency and delays in communication between SBs and the Cloud center; access security issues; and the Quality of Experience of video over IP communication, both in live transmissions and recordings between SBs. Regarding applications, this study considers the use of specific IoT devices and Cloud Computing architectures, such as Fog or IEC. Furthermore, it explores the implementation of new open network and communication models, such as SDN and NFV, to optimize communication between the various SBs and the SB’s connection to the control center of a Smart City. Full article
(This article belongs to the Section Electrical, Electronics and Communications Engineering)
Show Figures

Figure 1

19 pages, 2729 KiB  
Article
Social Image Security with Encryption and Watermarking in Hybrid Domains
by Conghuan Ye, Shenglong Tan, Jun Wang, Li Shi, Qiankun Zuo and Wei Feng
Entropy 2025, 27(3), 276; https://doi.org/10.3390/e27030276 - 6 Mar 2025
Cited by 6 | Viewed by 950
Abstract
In this digital era, social images are the most vital information carrier on multimedia social platforms. More and more users are interested in sharing social images with mobile terminals on multimedia social platforms. Social image sharing also faces potential risks from malicious use, [...] Read more.
In this digital era, social images are the most vital information carrier on multimedia social platforms. More and more users are interested in sharing social images with mobile terminals on multimedia social platforms. Social image sharing also faces potential risks from malicious use, such as illegal sharing, piracy, and misappropriation. This paper mainly concentrates on secure social image sharing. To address how to share social images in a safe way, a social image security scheme is proposed. The technology addresses the social image security problem and the active tracing problem. First, discrete wavelet transform (DWT) is performed directly from the JPEG image. Then, the high-bit planes of the LL, LH, and HL are permuted with cellular automation (CA), bit-XOR, and singular value decomposition (SVD) computing, and their low-bit planes are chosen to embed a watermark. In the end, the encrypted and watermarked image is again permuted with cellular automation in the discrete cosine transform (DCT) domain. Experimental results and security analysis show that the social image security method not only has good performance in robustness, security, and time complexity but can also actively trace the illegal distribution of social images. The proposed social image security method can provide double-level security for multimedia social platforms. Full article
(This article belongs to the Section Multidisciplinary Applications)
Show Figures

Figure 1

Back to TopTop