• Title/Summary/Keyword: Video manipulation

Search Result 44, Processing Time 0.021 seconds

How Chinese Online Media Users Respond to Carbon Neutrality: A Quantitative Textual Analysis of Comments on Bilibili, a Chinese Video Sharing Platform

  • Zha Yiru
    • Asian Journal for Public Opinion Research
    • /
    • v.11 no.2
    • /
    • pp.145-162
    • /
    • 2023
  • This research investigates how users of Bilibili, a video sharing website based in China have responded to carbon neutrality. By conducting quantitative textual analyses on 3,311 comments on Bilibili using LDA topic extraction and content statistics, this research discovers that: (1) Bilibili users have assigned more weight to geopolitical topics (56.3%) than energy (22.0%) and environmental topics (21.7%). (2) When assessing carbon neutrality, Bilibili users considered geopolitical (53.8%) and energy factors (15.8%) more heavily than factors related to the class (9.2%), economy (8.9%), environment (8.7%), and definition (3.6%). (3) More Bilibili users had negative (64.6%) attitudes towards carbon neutrality, with only a small portion of them expressing positive (26.8%) and neutral (8.6%) attitudes. (4) Negative attitudes towards carbon neutrality were mainly driven by geopolitical concerns about the West's approach to China, other countries' free-riding on China's efforts and the West's manipulation of rules, doubts about the feasibility of energy transition and suspicion of capitalists exploiting consumers through this concept. This research highlights the geopolitical concerns behind the environmental attitudes of Chinese people, deepening our understanding to psychological constructs and crisis sensitivity of Chinese people towards environmental issues.

Blockchain Technology for Combating Deepfake and Protect Video/Image Integrity

  • Rashid, Md Mamunur;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.8
    • /
    • pp.1044-1058
    • /
    • 2021
  • Tempered electronic contents have multiplied in last few years, thanks to the emergence of sophisticated artificial intelligence(AI) algorithms. Deepfakes (fake footage, photos, speech, and videos) can be a frightening and destructive phenomenon that has the capacity to distort the facts and hamper reputation by presenting a fake reality. Evidence of ownership or authentication of digital material is crucial for combating the fabricated content influx we are facing today. Current solutions lack the capacity to track digital media's history and provenance. Due to the rise of misrepresentation created by technologies like deepfake, detection algorithms are required to verify the integrity of digital content. Many real-world scenarios have been claimed to benefit from blockchain's authentication capabilities. Despite the scattered efforts surrounding such remedies, relatively little research has been undertaken to discover where blockchain technology can be used to tackle the deepfake problem. Latest blockchain based innovations such as Smart Contract, Hyperledger fabric can play a vital role against the manipulation of digital content. The goal of this paper is to summarize and discuss the ongoing researches related to blockchain's capabilities to protect digital content authentication. We have also suggested a blockchain (smart contract) dependent framework that can keep the data integrity of original content and thus prevent deepfake. This study also aims at discussing how blockchain technology can be used more effectively in deepfake prevention as well as highlight the current state of deepfake video detection research, including the generating process, various detection algorithms, and existing benchmarks.

Clinical Outcomes of Minimally Invasive Surgical Stabilization of Rib Fractures Using Video-Assisted Thoracoscopic Surgery

  • Chae-Min Bae;Shin-Ah Son;Yong Jik Lee;Sang Cjeol Lee
    • Journal of Chest Surgery
    • /
    • v.56 no.2
    • /
    • pp.120-125
    • /
    • 2023
  • Background: Multiple rib fractures are common in blunt chest trauma. Until recently, most surgical rib fixations for multiple rib fractures were performed via open thoracotomy. However, due to the invasive nature of tissue dissection and the resulting large wound, an alternative endoscopic approach has emerged that minimizes the postoperative complications caused by the manipulation of injured tissue and lung during an open thoracotomy. Methods: Our study concentrated on patients with multiple rib fractures who underwent surgical stabilization of rib fractures (SSRF) between June 2018 and May 2020. We found 27 patients who underwent SSRF using video-assisted thoracoscopic surgery. The study design was a retrospective review of the patients' charts and surgical records. Results: No intraoperative events or procedure-related deaths occurred. Implant-related irritation occurred in 4 patients, and 1 death resulted from concomitant trauma. The average hospital stay was 30.2±20.1 days, and ventilators were used for 12 of the 22 patients admitted to the intensive care unit. None of the patients experienced major pulmonary complications such as pneumonia or acute respiratory distress syndrome. Conclusion: Minimally invasive rib stabilization surgery with the assistance of a thoracoscope is expected to become more widely used in patients with multiple rib fractures. This method will also assist patients in a quick recovery.

Digital watermarking algorithm for authentication and detection of manipulated positions in MPEG-2 bit-stream (MPEG-2비트열에서의 인증 및 조작위치 검출을 위한 디지털 워터마킹 기법)

  • 박재연;임재혁;원치선
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.5
    • /
    • pp.378-387
    • /
    • 2003
  • Digital watermarking is the technique that embeds invisible signalsincluding owner identification information, specific code, or pattern into multimedia data such as image, video and audio. Watermarking techniques can be classified into two groups; robust watermarking and fragile(semi-fragile) watermarking. The main purpose of the robust watermarking is the protection of copyright, whereas fragile(semi-fragile) watermarking prevents image or video data from illegal modifications. To achieve this goal watermark should survive from unintentional modifications such as random noise or compression, but it should be fragile for malicious manipulations. In this paper, an invertible semi-fragile watermarkingalgorithm for authentication and detection of manipulated location in MPEG-2 bit-stream is proposed. The proposed algorithm embeds two kinds of watermarks, which are embedded into quantized DCT coefficients. So it can be applied directly to the compressed bit-stream. The first watermark is used for authentication of video data. The second one is used for detection of malicious manipulations. It can distinguish transcodingin bit-stream domain from malicious manipulation and detect the block-wise locations of manipulations in video data. Also, since the proposed algorithm has an invertible property, recovering original video data is possible if the watermarked video is authentic.

Hand Gesture based Manipulation of Meeting Data in Teleconference (핸드제스처를 이용한 원격미팅 자료 인터페이스)

  • Song, Je-Hoon;Choi, Ki-Ho;Kim, Jong-Won;Lee, Yong-Gu
    • Korean Journal of Computational Design and Engineering
    • /
    • v.12 no.2
    • /
    • pp.126-136
    • /
    • 2007
  • Teleconferences have been used in business sectors to reduce traveling costs. Traditionally, specialized telephones that enabled multiparty conversations were used. With the introduction of high speed networks, we now have high definition videos that add more realism in the presence of counterparts who could be thousands of miles away. This paper presents a new technology that adds even more realism by telecommunicating with hand gestures. This technology is part of a teleconference system named SMS (Smart Meeting Space). In SMS, a person can use hand gestures to manipulate meeting data that could be in the form of text, audio, video or 3D shapes. Fer detecting hand gestures, a machine learning algorithm called SVM (Support Vector Machine) has been used. For the prototype system, a 3D interaction environment has been implemented with $OpenGL^{TM}$, where a 3D human skull model can be grasped and moved in 6-DOF during a remote conversation between distant persons.

Haptic Media Broadcasting (촉각방송)

  • Cha, Jong-Eun;Kim, Yeong-Mi;Seo, Yong-Won;Ryu, Je-Ha
    • Broadcasting and Media Magazine
    • /
    • v.11 no.4
    • /
    • pp.118-131
    • /
    • 2006
  • With rapid development in ultra fast communication and digital multimedia, the realistic broadcasting technology, that can stimulate five human senses beyond the conventional audio-visual service is emerging as a new generation broadcasting technology. In this paper, we introduce a haptic broadcasting system and related core system and component techniques by which we can 'touch and feel' objects in an audio-visual scene. The system is composed of haptic media acquisition and creation, contents authoring, in the haptic broadcasting, the haptic media can be 3-D geometry, dynamic properties, haptic surface properties, movement, tactile information to enable active touch and manipulation and passive movement following and tactile effects. In the proposed system, active haptic exploration and manipulation of a 3-D mesh, active haptic exploration of depth video, passive kinesthetic interaction, and passive tactile interaction can be provided as potential haptic interaction scenarios and a home shopping, a movie with tactile effects, and conducting education scenarios are produced to show the feasibility of the proposed system.

Design of Vision-based Interaction Tool for 3D Interaction in Desktop Environment (데스크탑 환경에서의 3차원 상호작용을 위한 비전기반 인터랙션 도구의 설계)

  • Choi, Yoo-Joo;Rhee, Seon-Min;You, Hyo-Sun;Roh, Young-Sub
    • The KIPS Transactions:PartB
    • /
    • v.15B no.5
    • /
    • pp.421-434
    • /
    • 2008
  • As computer graphics, virtual reality and augmented reality technologies have been developed, in many application areas based on those techniques, interaction for 3D space is required such as selection and manipulation of an 3D object. In this paper, we propose a framework for a vision-based 3D interaction which enables to simulate functions of an expensive 3D mouse for a desktop environment. The proposed framework includes a specially manufactured interaction device using three-color LEDs. By recognizing position and color of the LED from video sequences, various events of the mouse and 6 DOF interactions are supported. Since the proposed device is more intuitive and easier than an existing 3D mouse which is expensive and requires skilled manipulation, it can be used without additional learning or training. In this paper, we explain methods for making a pointing device using three-color LEDs which is one of the components of the proposed framework, calculating 3D position and orientation of the pointer and analyzing color of the LED from video sequences. We verify accuracy and usefulness of the proposed device by showing a measurement result of an error of the 3D position and orientation.

Location of Ruptured Bullae in Secondary Spontaneous Pneumothorax

  • Choi, Jinseok;Ahn, Hyo Yeong;Kim, Yeong Dae;I, Hoseok;Cho, Jeong Su;Lee, Jonggeun
    • Journal of Chest Surgery
    • /
    • v.50 no.6
    • /
    • pp.424-429
    • /
    • 2017
  • Background: The surgical treatment of secondary spontaneous pneumothorax (SSP) can be complicated by fragile lung parenchyma. The preoperative prediction of air leakage could help prevent intraoperative lung injury during manipulation of the lung. Common sites of bulla development and ruptured bullae were investigated based on computed tomography (CT) and intraoperative findings. Methods: The study enrolled 208 patients with SSP who underwent air leak control through video-assisted thoracoscopic surgery (VATS). We retrospectively reviewed the sites of bulla development on preoperative CT and the rupture sites during VATS. Results: Of the 135 cases of right-sided SSP, the most common rupture site was the apical segment (31.9%), followed by the azygoesophageal recess (27.4%). Of the 75 cases on the left side, the most common rupture site was the apical segment (24.0%), followed by the anterior basal segment (17.3%). Conclusion: The azygoesophageal recess and parenchyma along the cardiac border were common sites of bulla development and rupture. Studies of respiratory lung motion to measure the pleural pressure at the lung surface could help to determine the relationship between cardiogenic and diaphragmatic movement and bulla formation or rupture.

Importance of Convenience and Consumer Rights to Information in Internet of Things Shopping: Amazon Dash Button Case Study (사물인터넷 쇼핑의 편리성과 소비자 알 권리 중요도: 아마존 대시 버튼 사례 연구)

  • Lee, Minsun;Lee, Hyun-Hwa
    • Journal of Fashion Business
    • /
    • v.24 no.4
    • /
    • pp.85-98
    • /
    • 2020
  • The Internet of Things (IoT) shopping environment can provide benefits and risks to consumers, including shopping convenience and invasion of consumer rights, respectively. We experimentally tested whether exposure to information regarding the benefits and risks of IoT shopping would elicit changes to consumer perceptions of the importance of shopping convenience and rights to information, as well as shopping intention among young online shopping consumers. The participants (N=218) were randomly assigned into one of two experimental conditions. The control group was exposed to a news article and a video emphasizing the shopping convenience of the Amazon Dash Button service, while the experimental group was exposed to the same news article and video provided to the control group, along with a news article about the judgment of the Munich court that the Dash Button violates German consumer law. We found an interaction effect of experimental condition and time on changes to the perceived importance of shopping convenience and shopping intention. The changes to the perceived relative importance of shopping convenience to consumer rights to information from pre- to post-manipulation differed significantly between the two experimental groups. The results of this study emphasize the importance of providing information on both the benefits and risks of IoT shopping. This was the first experimental study to examine the possibility of the invasion of consumer rights to information in the IoT shopping environment. This study urges researchers, marketers, and policy makers to focus more on consumer rights to information in the newly coming IoT shopping environment.

An unmanned boat capable of real-time video streaming (실시간 영상 스트리밍 무인 보트)

  • Lee, Dong-Hee;Moon, Sangook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.537-539
    • /
    • 2016
  • Recently, unmanned technologies interest increased. An unmanned boat is not directly on people and radio can be controlled by boat. Used for military unmanned boat was first developed in the United States Navy. In recent years, for hobby, for pesticide application, for water activities, expanding exploration in various ways, including for use. The role of a variety of unmanned boat above, In the case of a variety of unmanned probe of the role of unmanned boat on the boat people who don't be able to come to the vision of the advantage can not be exploring places like blind spot. In this paper, The Blind Spot are explorations of places such as streaming real-time as possible, an unmanned boat using Raspberry Pi that support implementation. Receiver input signals of an unmanned boat to the transmitter under the manipulation of, using smartphones hotspot feature Raspberry Pi and smartphones, network connection. Via Raspberry Pi motion of using real-time streaming using unmanned boat.

  • PDF