Logstash is not the best system at letting one know what is wrong or why it is giving you errors. In my case, I have set a Elasticsearch index template to be pushed during the creation process and Logstash was giving me this error at initialization. Continue…
It was saturday afternoon and I was bored! I had just upgraded the family notebook with a new SSD hard drive and a more memory. It makes a great difference and I recommend you to do it as well, if you have a slow Intel I3 notebook around. While I was setting it up the idea of a calculating one´s crazyness hit me. Here it is.
In my research I wanted to process each frame of a given video individually and also know some details about it. Here is the code I created to achieve it. The code in python will extract all the frames of the video and store it in a folder given as parameter. Im using OpenCV to get the video details and extract the frames and threads to do it quickly.
While writing for my master I wrote a series of codes in python to achieve what I wanted, such asslicing the video in small frames, generate the hash for each image and compare the hamming distance of each hach. Here is the piece where I compare the two values and generate the hamming distance of it. Continue…
Author: Torres,A.; Demanboro A.C.
With the event of the Internet, video and image files are widely shared and consumed by users from all over the world. Recent studies point out that one out of two internet users have engaged in activities classified as illicit. Unauthorized copy, distribution or publishing of digital content without the proper rights holder consent is what is commonly called piracy. Those that profit from digital piracy ignore the intellectual property laws and copyrights from the owners, programmers, distributors and many others that live and depend on the economic value of these assets. Methods to identify these files have emerged to preserve intellectual and commercial rights such as content-based identification techniques also known as perceptual hashing. With said techniques a unique identifier is generated making possible to compare two images or videos and decide if they are equal, similar or different. This article has as objective to discuss the application of content-based identification technologies as a method to fight piracy, presenting a framework where perceptual hashing can be used to prevent publishing and/or distribution of video content. The methodology proposed is to combine four types of perceptual hash (ahash, dhash, phash, whash) to make it possible to identify illegal videos with more accuracy. The results are encouraging, considering the most common forms of attacks.
Index Terms: Content-Based Identification, Piracy, Security, Intellectual Property
Im working in a project where I have to simulate traffic to certain website sites. The solution had to be simple and while python would be the obvious choice bash was right there with wget to be used with less lines and libs than python.
Was trying to read some Sflow in logstash and noticed that the plugin does not come installed by default. It brings netflow in its plugins but no Sflow.. on to install it.
The phrase “Choose your love and Love your choice” was said in 2011 by Thomas S.Monson, it has to do with marriage and love and fidelity but it made much more sense to me this last days when I decided to move away from Iphone\iOS and go to Android. Then I paraphrased Thomas with the following: Choose your Ecosystem and love your choice.
Some of you might remember the Christmas Challenge 2018 right? It is about to become a tradition!!
This time I had an encounter with a rather unusual Santa Claus and he sent me a curious message along with a set corrupted files that I can’t open. He said that I had to read carefully the message below to be able to crack it… ingenious Santa!
The message goes like this:
“I come with many colors, so beautiful and bright, I turn so many houses into a beautiful sight. What am I?”
The files Santa sent:
Have fun a excellent Christmas!