—The Operational Complexity Model (OCM) has been used to derive the complexities of the five most prevalent cyber-crimes occurring in southeast Asia, namely peer-to-peer (P2P) mu...
The computational power and sensory capabilities of mobile devices are increasing dramatically these days, rendering them suitable for real-time sound synthesis and various musica...
Yinsheng Zhou, Zhonghua Li, Dillion Tan, Graham Pe...
This paper studies joint security and robustness enhancement of quantization based data embedding for multimedia authentication applications. We present analysis showing that thro...
In this paper we focus on a novel issue in the field of video retrieval stemming from film analysis, namely the investigation of film montage patterns. For this purpose it is ...
Maia Zaharieva, Matthias Zeppelzauer, Christian Br...
This paper presents a novel key estimation method of sound sources based on the music theory known as "circle of fifths". We firstly overview music theory and formulate t...