We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 1,365 results
  1. Image Compression Standards

    Recent years have seen an explosion in the availability of digital images. In this chapter, we examine some current image compression standards and...
    Ze-Nian Li, Mark S. Drew, Jiangchuan Liu in Fundamentals of Multimedia
    Chapter 2021
  2. Generic SCARE: reverse engineering without knowing the algorithm nor the machine

    We introduce a novel side-channel-based reverse engineering technique capable of reconstructing a procedure solely from inputs, outputs, and traces...

    Ronan Lashermes, Hélène Le Bouder in Journal of Cryptographic Engineering
    Article 17 May 2024
  3. Achieving lossless compression of audio by encoding its constituted components (LCAEC)

    In this paper, an approach has been made to produce a compressed audio without losing any information. Separating amplitude and phase components...

    Article 18 December 2018
  4. A novel multi secret image sharing scheme for different dimension secrets

    The existing state of the art schemes deals with the same dimension secret images but less work is available in the literature for different...

    Arjun Singh Rawat, Maroti Deshmukh, Maheep Singh in Multimedia Tools and Applications
    Article 11 March 2023
  5. Optimized Table Tokenization for Table Structure Recognition

    Extracting tables from documents is a crucial task in any document conversion pipeline. Recently, transformer-based models have demonstrated that...
    Maksym Lysak, Ahmed Nassar, ... Peter Staar in Document Analysis and Recognition - ICDAR 2023
    Conference paper 2023
  6. Classical and quantum compression for edge computing: the ubiquitous data dimensionality reduction

    Edge computing aims to address the challenges associated with communicating and transferring large amounts of data generated remotely to a data...

    Maryam Bagherian, Sarah Chehade, ... Ali Passian in Computing
    Article 22 January 2023
  7. RETRACTED ARTICLE: Smart communication using tri-spectral sign recognition for hearing-impaired people

    In recent years, new technology developments have been proposed and implemented to support people with hearing impairment and speech loss. It is a...

    B. Kanisha, V. Mahalakshmi, ... P. Kalyanasundaram in The Journal of Supercomputing
    Article 05 July 2021
  8. Image processing-based protection of privacy data in cloud using NTRU algorithm

    The recent and fast improvements in communication networks and digital technologies have facilitated the easy transmission and storage of multimedia...

    K. Karthika, R. Devi Priya in Signal, Image and Video Processing
    Article 14 April 2024
  9. Entropy Coding

    As the last stage before the code stream generated by the compression system, entropy coding aims to remove the information redundancy or coding...
    Ge Li, Wei Gao, Wen Gao in Point Cloud Compression
    Chapter 2024
  10. Introduction

    In this chapter, we will introduce the background knowledge of audio signal processing, voice processing systems, and attacks on speaker verification...
    Chapter 2024
  11. Automatic Speech Recognition for Portuguese: A Comparative Study

    This paper provides some comparisons of Automatic Speech Recognition (ASR) services for Portuguese that were developed in the scope of the Safe...
    Pedro Henrique Borghi, João Paulo Teixeira, Diamantino Rui Freitas in Optimization, Learning Algorithms and Applications
    Conference paper 2024
  12. ESKVS: efficient and secure approach for keyframes-based video summarization framework

    Video security has emerged as a critical study issue in multimedia security in recent years as videos are the most effective and widely used...

    Parul Saini, Krishan Berwal in Multimedia Tools and Applications
    Article 17 February 2024
  13. File chunking towards on-chain storage: a blockchain-based data preservation framework

    The growing popularity of the most current wave of decentralized systems, powered by blockchain technology, which act as data vaults and preserve...

    Muhammed Tmeizeh, Carlos Rodríguez-Domínguez, María Visitación Hurtado-Torres in Cluster Computing
    Article Open access 29 June 2024
  14. EVFLR: Efficient Vertical Federated Logistic Regression Based on Batch Operations

    Vertical federated learning (VFL), where multiple participants with non-overlap** features for the same set of instances jointly train models,...
    Dong Chen, Zhiyuan Qiu, Guangwu Xu in Information Security and Cryptology
    Conference paper 2024
  15. Basics of Digital Audio

    Audio data has special and unique properties. E.g., while it is useful to occasionally drop a video frame from a stream, we simply cannot do the same...
    Ze-Nian Li, Mark S. Drew, Jiangchuan Liu in Fundamentals of Multimedia
    Chapter 2021
  16. Time series data encoding in Apache IoTDB: comparative analysis and recommendation

    Not only the vast applications but also the distinct features of time series data stimulate the booming growth of time series database management...

    Tianrui **a, **zhao **ao, ... Jianmin Wang in The VLDB Journal
    Article 12 February 2024
  17. Attention enabled viewport selection with graph convolution for omnidirectional visual quality assessment

    Omnidirectional images provide an immersive viewing experience in a Virtual Reality (VR) environment, surpassing the limitations of traditional 2D...

    Nandhini C, Brindha M in Multimedia Tools and Applications
    Article 06 June 2024
  18. Acumen: Analysing the Impact of Organisational Change on Users’ Access Entitlements

    Planned organisational changes are frequent occurrences in large enterprises due to the dynamicity of employees’ roles, evolution of teams, units and...
    Selasi Kwashie, Wei Kang, ... Surya Nepal in Computer Security – ESORICS 2023
    Conference paper 2024
  19. FANs: fully attentional networks for image compression

    We propose a fully attentional networks model and achieve excellent results on top of both large-scale datasets and small-scale datasets to use as a...

    Weiheng Kong, Minghui Sun, Hao Xue in Multimedia Tools and Applications
    Article 10 November 2023
  20. Ownership Guided C to Rust Translation

    Dubbed a safer C, Rust is a modern programming language that combines memory safety and low-level control. This interesting combination has made Rust...
    Hanliang Zhang, Cristina David, ... Meng Wang in Computer Aided Verification
    Conference paper Open access 2023
Did you find what you were looking for? Share feedback.