Q1. Where is your currently living place?

☐New South Wales



☐South Australia

☐Western Australia



Q2: How old is your children?

☐0-4 Years ☐5-8 Years ☐9-12 Years ☐13-15 Years

Q3: Do you think your children have precaution consciousness?



Q4: Which of the following circumstances is most possible for children to get injury? (1: More likely, 3: Less likely)

1: home

2; School

3: public space


Q5. Which of the following accidental injury most likely to be happened during the children’s stage. Please arrange the orders (1: Most likely, 6:Least likely).

  1. Fall down
  2. Scald
  3. Traffic accident
  4. Animals bite
  5. Sick/ illness
  6. Medical negligence




Q6: Who do you think should bear the main responsibility for the children’s safety education in public places?

A: Parent

B: school

C: Government

D: Community

E: Specialist Agencies


Q7: Which of the following children’ safety issue would be most concern, please arrange in order (1: Most concern, 4: Less concern).

  1. Leave children alone at home
  2. Accidental injury
  3. Family violence/ School bullying
  4. Network/ Cyberbullying


Q8: In terms of chlidren’ safety, which of the following area would be mostly preferred to be strengthen? (1: Most priority, 6: Less priority)

  1. Home safety
  2. Traffic safety
  3. Toy instruction and safety requirement
  4. Clothing design
  5. Food safety
  6. Family violence


Q9: Which of the following way of education to promote children safety would be most preferred? Please arrange in order (1: Most preferred, 4: Less preferred).

  1. Video/ TV program
  2. Book
  3. School/ organization’s program
  4. Parent




Q10: How do you usually carry out safety education for children

A: Often through a variety of ways to educate children safety knowledge

B: usually verbal children to talk about attention to safety

C: Rarely mention safety knowledge


Q11: Except through the media, the life experience of children accidents

A: Often

B: Seldom

C: Never


Q12: Is there any educational book(s)/games for children safety you ever seen? Please list:



Q13: Any circumstance(s) you are most concerned? _____________________________________________________


Q14: Do you have any suggestion(s) for our designed game? Please suggest:




Intellectual Property of Distributed Media Firm

The latest watermarking (wavelet-based) scheme creates another new century.


A game developer have responsibilities to protect the copyright of the media or even the games, it connected networks allow cross-reference between databases. Whenever we generate the images, audio or video any kinds of network media, we have to make sure the author is being protected. How? By showing the authentic authors while downloading publicly, or at least hiding the author details behind the media. A video shown up on YouTube had discussed about the importance of protecting network media intellectual property, and investigated the limitation of copyright protection in related. The industry is investing to deliver audio, image and video data in electronic form to customers, which lead them by converting the content from analogue to digital form.

Regarding to the existence of the digital intellectual property, the digital data can be easily transmitted over networks, for example internet, which might improve the quality of digital signals and copies can be easily made.

Technology and service developments over 2008 were consistent with the established trend of network and service convergence (Australian Communications and Media Authority, 2015), where shows a higher data rates trends over the media networks. However, the case of reproducing digital data in the exact original form is more likely to encourage copyright violation or data misappropriation.

According to Seaman in the article, we learnt the importance of database, it combines with the human activity process and how it constructs with audio, digital and video. Writing code is one of the ways to protect the media, including its authentication. I would like to focus on the concept of digital watermarking as is kinds of coding, aim to protect the copyright of the media, various watermarking schemes have been suggested for multimedia processing manipulations such as media compression and image enhancement. Moreover, the future development of networked multimedia systems, in particular an open networks like the Internet, is conditioned by the development of efficient methods to protect data owners against unauthorized copying and redistribution of the materials on the network. Also, watermarking is designed to permanently reside in the host data, does not restricted by the data encryption. For instance, if the ownership of a media had changed, the information can be extracted to completely characterize the owner if adding a watermark on.

So, here is a critical question. How can we build an effective watermarking algorithm?

However, it is desired that watermarks survive image-processing such as rotation, scaling, image compression and enhancement, those are the advantages that using watermarks in distributed media. Depending on the desire of the user, the watermark can be either visible or invisible (Holliman & Memon, 1997). The scheme can detect any modification made to the image and indicate the specific locations that have been modified. If the correct key is specified in the watermark extraction procedure, then an output image is returned showing a proper watermark. By indicating the image is authentic and has not been changed since the insertion of the watermark, surely any modification would be reflected in a corresponding error in the watermark. Liu and Wu made an experiment in order to verify if the key is incorrect, or if the image was not watermarked, or if the watermarked image is cropped, the watermark extraction algorithm will return an image that resembles random noise (Liu & Wu, 2008). Since it requires a user key during both the insertion and the extraction procedures, it is not possible for an unauthorized user to insert a new watermark or alter the existing watermark as to build an effective watermarking algorithm.

There is another question afterwards, previous discussion are based on the general protection of distributed media, is that mean there is no original “true” image can be used, as it has not been verified?

It is well known that multimedia authentication distinguishes itself from other data security issues, because its unique content property can be defined in several different levels. Mintzer, Braudaway and Yeung (1997) studied about the digital media, and clarified the multimedia authentication have developed from signal syntax levels to semantic levels. Referring to the picture below, Dr. Gitt talked about the various levels of the information communication, the semantics levels shows how the ideas communicated and understood among the sender and recipient. The syntax level referred the role of coding, how is employed and understood while the transmission of information. By adding or coding the authentication to the distributed media, which let other users know who is the “real” author while using the “real” image.10988534_10205016991537660_6876836967893003424_n


Furthermore, I was thinking about whether receiving less attention by applying the watermarking methods to those media data, such as lower the pixels of the distributed media, which may introduce the irregularities. Just take a simple example, if I am trying to add my names as watermarks on a picture by using phone apps (eg. Line Camera), it’s always lower the resolution of the image. Or even editing the video clips such as modified with animations or insert with audio media, it’s always create noise-like signals or run down the whole file, which fail to enhance the distributed media while protecting the databases.

Reddy & Chatterji (2005) discussed the creation of new wavelet based logo-watermarking scheme, which is presented for the copyright protection of digital image. It is a more user-friendly system, reliable for extracting the watermark from distorted images. They briefly explained two broad categories of watermarking techniques, such as spatial domain methods and transform domain methods. The technique is generated by the combinations of statistics and calculations, but basically is about adding the watermarks on the image and distributed it irregularly, and then the attacker may not read or modify it easily and hence to protect the image. Moreover, another advantage of the new watermarking scheme is that security can be improved by using randomly generated filter as a major part of key, to improve the private control over the watermark (Wang et al., 2002). I think this method can be helpful for some “geometric attacks” such as cropping and rotation, the attackers may not easily change the authentication of the images, as the “original author” is “hiding” behind the filter of the images.

On the other hand, I think it may sensitively influence the actual filter of the image, maybe sharpening or blurring the images even its not easily recognise. But by converting the greyscale logos into bit planes, these methods are not exploiting the perceptual characteristics of the logos and the host data in embedding the watermark. As pointed out by Kundur and Hatzinakos (2004) use of greyscale logo as watermark facilitates the embedding of arbitrary commercial logos and increases the quality of an overall number of possible logos identifiable by human observers. And this become the most common watermarking nowadays, just like when we upload images on eBay, Yahoo! Auction or even Gumtree, the internal system will add a logo which shows our ID on the images in greyscale, and its obviously meet the characteristics of “logo” and match the criteria of “watermarking” at the same time.

In conclusion, we have discussed from the general protection of the distributed media, and how the basic watermarking works, and reveal how to multimedia authentication communicates. It helps with the authentication issue, but I believe that may lower the quality of images, users may not able to receive the fully completed media. By applying the new watermarking scheme, authors are able to create a filter to “hind” their authentications, to minimizing the pixilation. Or using greyscale watermarking which is most common and simply way to match the principal of watermarking and also to protect the authentication. I believe the new watermarking scheme is best developed for reliable extraction of watermark from distorted images and stabilized the surrounding pixels.






A. Reddy, B.N. Chatterji, Pattern Recognition Letters, Elsevier B.V. ,Vol 26, Issue 7, 15 May 2005, Pages 1019–1027, doi:10.1016

Dr. Werner Gitt, The Five Levels of the Information Concept, March 19, 2009,

Mintzer, G. W. Braudaway, M. M. Yeung: Effective and Ineffective Digital Watermarks”, ICIP, 1997

Kundur, D., Hatzinakos, D., 2004. Towards Robust logo watermarking using multiresolution image fusion. IEEE Trans. Multimedia 6 (February), 185–197.

Holliman and N. Memon,  “Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes”, IEEE Trans. Image Processing,  vol. 6,  pp.432 -441 1997

Wu and B. Liu,  “Watermarking for image authentication”, Proc. ICIP,  2008

Social Media and Intellectual Property Security Training for Employees, viewed on 12/2/2015.

Trends in Communications and Media technology, applications and Use, Australian Communications and Media Authroity, released as at Feb, 2015.…/trends_comms_media_technology_applications_and_use

Wang, Y., Doherty, J.F., Van Dyck, R.E., 2002. A waveletbased watermarking algorithm for ownership verification of digital images. IEEE Trans. Image Process. vol. 11 (February), 77–88.

What is watermarking? And how to copyright images, viewed on 18/2/2015.

21st century momentum

Regarding on the Nelson’s reading, he clarified that hypertext able to simple our computer and working lives as its bring literature, science, art and civilization to new heights of understanding. Moreover, storing of text and other computer data, which can be shared and simultaneously organized in many different ways. For instance, blogs can store the expression of the writer, and comments can store among readers’ feelings as well, this cycle of action created the relationship of connection. The reading demonstrated on the structure of hypertext as well, and shows how its work though. As working on users’ consoles, and sending the signal towards document servers, and to the network. The media network is unlimited in size, leads to unifying tissue of storage ever expanding, including from private documents to public links, and also from public documents to private links, vice versa. Nowadays, “word processing” and “teleconferencing” are regarding on the “networks”, they are all showing pop-up notes, notifications or even electronic mails, which referring to the transformation of messages to a “real” text, that’s how the hypertext works. And the reading discuss about how people think about “technologies” and general hypermedia. There are enormous market among the hypertext system, such as CD-ROM and movies; as it become a basic necessity in today’s society.

Hypostatization of hypertext – discursive prose?

Regarding to the Landow hypertext, its mainly focus on the subscription tools of blogging and the structure of hypertext. It take a form of an online journal or diary, and let the reader to put events in context and get the whole story without the diarist have to explain again, and also permit readers to comment on entries, allow me to post link back to the site of anyone who commented on them. Blogging is a personal diary and academic or professional interest expression. Paul D. Kahn’s pioneering chinese literature intermedia web (ranging from the chines text to pin-yin transcriptions and the asserted of different version of TuFu which invite similar conversion to hypertext). Hypertext contains image of video, most contain a personal statement or description of the site. The following three levels can define different kinds of subscription tools. Firstly, at the simplest level, they place a text without links into an HTML template that includes navigation links, which is the most easiest and simplest way to reflect how the hypertext works. For the second level, while the HTML can create a document with links to documents on the same as well as other websites. Which means writing the presence hence to support of contradict the argument and serve as valuable annotations as well. According to the reading, the author speculated the limitations on the hypertext in media network culture, pointed out it may mislead or limited the expression due to the different way of text structures.

Descriptive or Argumentative Blogging?

This reading is about argument blogging, it is the process of harvesting textual resources from the web and structuring them into distributed argumentative dialogues. Every users obviously love to express their opinions using web-based interaction, they want a way to structure their interactions and responses so that they can explore the arguments of others whilst making their own arguments explicit in relation. By using the world wide web (WWW), users can post insightful comments, overlays a dialogue game and make explicit the argumentative relationships between posts, comments, web sites and other online textual data. By revealing the underlying technologies such as Argument Interchange Format (AIF) and AIF Database (AIFDB), it produces a system that supports the harvesting of existing text posted on web and restructures the texts into argumentative dialogue as well. Under the argument blogging system architecture, the interface become simple and straightforward, dialogues can be reused in different contexts by referring each unique transcript page link. The argument blogging system that harvesting of existing argumentative resources form the web and their import, its becomes the first step on the path of a web argument which enhance for further research and web functionality, at the mean time, it provided a valuable resource to argumentation researchers as well.

Blogging – Literary Machines in 21st century

A blog is an online, chronological collection of personal commentary and links, this essay is going to talk about how often we use blog in the past, present or even in the future. And also discuss among its advantages or limitations by using blogs, engaged with hypertext and its accessibility. The essay would demonstrate Instagram as example of blogs, and focus on its popularity and attributions, to apply with the technical skills and link up with the ideas to other significant concepts.

Blog is easy to create and use from anywhere with an Internet connection, blogs are a form of Internet publishing that has become an established communications tool. A blog can be thought of as an online journal, and maintaining a blog is as simple as using an online e-mail program. Bloggers enter posts into a blogging application, add formatting or hyperlinks, and save the post. The application adds the entry to the blog, making the content available online and alerting users who have subscribed to that blog’s content. Entries can include text, hyperlinks, images, or multimedia. Visitors can read postings, submit comments, find blog entries by date, and search the site by keyword.

First of all, the essay would exclaim about its blogs’ advantages regarding on its connection based on the diversity and simplicity, hence to discuss its disadvantages regarding on its

For the advantages, blogs can brings the connection to others, even worldwide. By engaging people in knowledge sharing, reflection, and debate, they often attract a large and dedicated readership.


Access to diversified ideas

Blogs are becoming an important component of the Internet landscape, providing authors and readers with an avenue for unedited expression, reaction, and connection, the user can write anything they would like to say, without the censorship of mediated chat rooms or formal media outlets. Cyberspace embodies the ultimate freedom of speech. Some may be offended, others may love it, but the content of a Webpage is hard to censor. Once posted, it is available to hundreds of millions of people. This unparalleled license of expression, coupled with diminished publishing costs, makes the Web the ultimate forum of democracy; everybody’ s voice can be heard with equal opportunity. Each of us has very different interests, values, beliefs, and tastes. The links we add to our Webpages reflect this diversity, and works with the connection between each other or even worldwide.



The simplicity of creating and maintaining blogs means that open discussions can be established almost immediately, making blogs an ideal venue for far-reaching discussions among the Internet community on new or timely topics. Blogs foster the growth of communities, and the dynamics of collaborative filtering and recommending or referring may provide new ways to evaluate, vet, and critique people thinking.

Secondly, the paradox of creating blogs may dominate by some users who may consist of improper attributions, and they are highly volatile as well, which may lead

Improper attribution

Because blogs are often produced and maintained by individuals, they can include biased or inaccurate information. Users visiting a blog might see it as factual or authoritative when, in fact, it is the online equivalent of a soap box: a place to speak and to be heard. Unlike chat rooms, blogs are unmediated and therefore offer a different type of venue for individuals to express themselves and air their opinions, ideas, and attitudes. While this may be acceptable for a personal blog, it might be inappropriate for a blog hosted on an institutional server. Intellectual property is another area of concern for higher education, given the implications of hosting blogs that might include content that has been used without proper attribution, which may arise the pornographic, violence or even crime.

Highly volatile

Bloggers can edit or delete posts, and this transient nature can make blogs difficult to archive or index. For instance, users can delete those comments that are against them, or even block those users who challenged their statement. In addition, the time-limited relationship of students to institutions influences the length of time a student blog should be hosted, yet removing posts from the blogosphere once a student has graduated could confound those who linked to the post.


As the popularity of the photo-sharing app Instagram continues to grow, so does its user base. Instagram is one of the form of “online blogs” in network media, users can post their photos with captions in differentiate filters, recording videos or scenes with voices, fully reveal the usage of hypertext and hypermedia. They take the form of a set of networked documents, links a wide range of supporting evidence, readers can choose the area to investigate in greater depth, and the auxiliary materials thereby become paratexts. By demonstrating the interactive videos, graphics, sound and music, clarify and simple everyone daily lifes. Paul D. Kahn’s research on the intermedia web identified that Instagram reached the most simplest level of hypertext, by placing a text without links into an HTML template that included navigation links, which means the users can show their pictures by apps on mobile or other devices, or by browsing the websites on desktop. Furthermore, its permit followers to “like” comment on the posts, and allow followers to tag another users to view the post which promote the connection by hypertext and graphics. However, it may be misleading by the text structure as no mark up or even spaces between words are not in formal structure. Unlike the traditional blogging, the writing styles have more characteristics, such as the styles of type, point size, type fonts and colours of the link to organize and give visual meaning to the page, created the forms of texts or thoughts into hypertexts.


All in all, blogs are the collective memory which preserving and passing on human experience, which totally enhance the human capacity for social connection. It becomes more popular and we all believe majority of people in this century are approaching different kinds of blogs, besides the social connections, they can posting their feeling, thoughts or even researches via hypertext, spread the message worldwide, hence to raise the public awareness. Even though it may have some pitfalls such as highly volatile or improper attributions, it still shows an equal human opportunity to speak up anything they wish, and lead the human life approach convenience and simplicity.

How about human live without hypertext?

Douglas explains the features of hypertext and some introduction of “text”. Interactive narrative is really interesting as it roundly applauded for its intricate design, graphics and characters comprised to a “robot”. The Magic Death – Shannon Gilligan’s Multimedia Murder mysteries, the interactive narrative invited to play between detective and multiplayers in different motives in three distinct scenarios. It totally shows how the fixed texts become fluid and the rationale under the alternative scenarios. Oh the other hand, the reading has highlight the term of hypertext, describes it as a tool that lets us use the printed word as the basis for a technology that considerably extends writing’s reach and repertoire, which have a significant and potential impacts on reader and writer. Hypertext does shot into public awareness as well, because the personal perspectives presented on blogs often lead to discourse between bloggers, and many blog circles generate a strong sense of community. Even hypertext may not inspired for everyone, like the story told by Phaedrus, once a thing is committed to writing, someone may understand and make response but always should be someone is “none of their businesses”, proven a writing cannot distinguish between suitable and unsuitable readers. However, in the reality, even is not “everyone” but its no doubt that is “everywhere”, it is inevitable to live without “writing”, so does hypertext. 🙂

how to embed the videos on your blog

Hi guys, we would like to introduce how to embed the videos on your blog, first of all, you should fine a video then click on the ‘share’ button underneath the video, then select “show more”, and then click  on the blogger icon,Depending on whether or not you’re signed in to your blog, you might have to enter in your username and password in the new window that pops up.then you can choose new post and type “add media” then choose “insert embed code”, copy the code and paste, then Publish your post!