Sciweavers

1957 search results - page 202 / 392
» Multimedia Analysis and Synthesis
Sort
View
ARESEC
2011
76views more  ARESEC 2011»
13 years 12 months ago
A Complexity Based Forensic Analysis of the Trojan Horse Defence
—The Operational Complexity Model (OCM) has been used to derive the complexities of the five most prevalent cyber-crimes occurring in southeast Asia, namely peer-to-peer (P2P) mu...
Richard E. Overill, Jantje A. M. Silomon
MM
2009
ACM
126views Multimedia» more  MM 2009»
15 years 6 months ago
MOGFUN: musical mObile group for FUN
The computational power and sensory capabilities of mobile devices are increasing dramatically these days, rendering them suitable for real-time sound synthesis and various musica...
Yinsheng Zhou, Zhonghua Li, Dillion Tan, Graham Pe...
ICIP
2003
IEEE
16 years 1 months ago
Joint security & robustness enhancement for quantization embedding
This paper studies joint security and robustness enhancement of quantization based data embedding for multimedia authentication applications. We present analysis showing that thro...
M. Wu
MMM
2010
Springer
149views Multimedia» more  MMM 2010»
15 years 8 months ago
Camera Take Reconstruction
In this paper we focus on a novel issue in the field of video retrieval stemming from film analysis, namely the investigation of film montage patterns. For this purpose it is ...
Maia Zaharieva, Matthias Zeppelzauer, Christian Br...
MMM
2009
Springer
161views Multimedia» more  MMM 2009»
15 years 8 months ago
Key Estimation Using Circle of Fifths
This paper presents a novel key estimation method of sound sources based on the music theory known as "circle of fifths". We firstly overview music theory and formulate t...
Takahito Inoshita, Jiro Katto