Speakers: James D. Johnston (AT&T Laboratories, Research), Shashi Shekhar (Minnesota), Sameh Sowelam ( Cognicity Corp.)
Among the issues to be addressed in the tutorial are:
Databases: security, privacy, probablistic learning, search
Encryption: Security, privacy, anonymity,watermarking, e-law
Perceptual Coding - A tutorial on methods and problems
James D. Johnston, AT&T
Data Modeling for Digital Libraries
Shashi Shekhar, University of Minnesota Slides
Data modeling and representation is a critical, and possibly the most difficult, step in constructing any kind of datastore, including digital libraries, datawarehouses and databases. Errors in data models may lead to irrelevant or incorrect answers to user queries, as well as poor reliability and performance. The objective of data modeling is to complete a rigorous design with quality checks before the physical implementation of the digital library. A common approach to data modeling and representation of multimedia content in digital libraries is via the design of relevant Abstract Data Types, e.g. audio, video, images, spatial, temporal, etc., which can be integrated into popular modeling languages using their extensible type systems. Data models and representations of multimedia data should capture relevant aspects of domain semantics while providing support for efficient storage (e.g. compression), retrieval (e.g. querying), transmission and rendering (display).
Sameh Sowelam, Cognicity Corp.
Watermarking refers to the process of embedding data in an audio, image, video or text file. Watermarking is currently in use in copyright and copy protection systems, one-to-one marketing and smart media files. In this tutorial, We will us examples from currently fielded watermarking based systems to review the different forms of watermarking and data embedding techniques. We will focus on the capabilities and limitations of watermarking in each of the broad application areas where the technology has been deployed. We will also provide a quick introduction to the processing, communications, cryptography and human perception theories that underlie all watermarking approaches.