Relevance Newest First Oldest First
Page of 1,727
and
  1. No Access

    Article

    An improved multimodal signal-image compression scheme with application to natural images and biomedical data

    In this paper, a new multimodal compression scheme is proposed with the aim of compressing jointly an image and a signal via a single codec. The key idea behind our approach is to insert a wavelet-decomposed s...

    Tahar Brahimi, Larbi Boubchir, Régis Fournier in Multimedia Tools and Applications (2017)

  2. No Access

    Article

    Process color watermarking: the use of visual masking and dot gain correction

    Subtractive-Color-Reproduction is the fundamental mechanism in 4-color process printing, which employs CMYK (cyan, magenta, yellow and black) dots for color reproduction. Watermarks embedded in RGB images are ...

    Wang Cai-yin, Kong Xiang-wei, Li Chao in Multimedia Tools and Applications (2017)

  3. No Access

    Article

    Automatic boundary detection based on entropy measures for text-independent syllable segmentation

    In this paper, we study the boundary detection in syllable segmentation field. We describe an algorithm proposed for text-independent syllable segmentation. This algorithm provides a performance comparison bet...

    Fréjus A. A. Laleye, Eugène C. Ezin, Cina Motamed in Multimedia Tools and Applications (2017)

  4. No Access

    Article

    On subjective quality assessment of adaptive video streaming via crowdsourcing and laboratory based experiments

    Video streaming services are offered over the Internet and since the service providers do not have full control over the network conditions all the way to the end user, streaming technologies have been develop...

    Jacob Søgaard, Muhammad Shahid, Jeevan Pokhrel in Multimedia Tools and Applications (2017)

  5. No Access

    Article

    Formal concept analysis based user model for distributed systems

    User profile has contributed to customize user access and adjusts applications to its needs. In this respect, automatically building of user profiles issue is an important research area. Nevertheless, standard...

    Khedija Arour, Taoufik Yeferny in Multimedia Tools and Applications (2017)

  6. No Access

    Article

    Color and texture applied to a signature-based bag of visual words method for image retrieval

    This article addresses the problem of representation, indexing and retrieval of images through the signature-based bag of visual words (S-BoVW) paradigm, which maps features extracted from image blocks into a set...

    Joyce Miranda dos Santos, Edleno Silva de Moura in Multimedia Tools and Applications (2017)

  7. No Access

    Article

    3D text segmentation and recognition using leap motion

    In this paper, we present a method of Human-Computer-Interaction (HCI) through 3D air-writing. Our proposed method includes a natural way of interaction without pen and paper. The online texts are drawn on air...

    Pradeep Kumar, Rajkumar Saini, Partha Pratim Roy in Multimedia Tools and Applications (2017)

  8. No Access

    Article

    Ego-motion estimation concepts, algorithms and challenges: an overview

    Ego-motion technology holds great significance for computer vision applications, robotics, augmented reality and visual simultaneous localization and mapping. This paper is a study of ego-motion estimation bas...

    Naila Habib Khan, Awais Adnan in Multimedia Tools and Applications (2017)

  9. No Access

    Article

    Optimized learning instance-based image retrieval

    Image retrieval is a recognition technique in the field of computer vision. In most cases, high-quality retrieval is often supported by adequate learning instances. However, in the process of learning instance...

    Yueli Li, Rongfang Bie, Chenyun Zhang, Zhenjiang Miao in Multimedia Tools and Applications (2017)

  10. No Access

    Article

    A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme

    The security for Telecare Medicine Information Systems (TMIS) has been crucial for reliable dispensing of the medical services to patients at distant locations. Security and privacy element needs to be there f...

    Azeem Irshad, Muhammad Sher, Omer Nawaz in Multimedia Tools and Applications (2017)

  11. No Access

    Article

    Optimized H.264 compression of sign language video

    In TV broadcasting deaf people are not able to get information from the audio content. In public television, some programs may be accompanied by a sign language interpreter as a part of the broadcasted signal....

    Petr Zatloukal, Martin Bernas in Multimedia Tools and Applications (2017)

  12. No Access

    Article

    A robust face hallucination technique based on adaptive learning method

    Position-patch based approaches have been proposed for single-image face hallucination. This paper models the face hallucination problem as a coefficient recovery problem with respect to an adaptive training s...

    Rohit U., Abdu Rahiman V., Sudhish N. George in Multimedia Tools and Applications (2017)

  13. No Access

    Article

    Context-aware HDR video distribution for mobile devices

    HDR video on mobile devices is in its infancy and there are no solutions yet that can achieve full HDR video reproduction due to computational power limitations. In this paper we present a novel and versatile ...

    Miguel Melo, Luís Barbosa, Maximino Bessa in Multimedia Tools and Applications (2017)

  14. No Access

    Article

    Users’ viewpoint of usability and user experience testing procedure - gaining methodological insights in a case of an interactive HbbTV application

    We present a novel meta-methodological approach for the user experience and usability methodology procedure evaluation, shown in an example of the user experience and usability study of an interactive HbbTV ap...

    Jože Guna, Emilija Stojmenova-Duh, Matevž Pogačnik in Multimedia Tools and Applications (2017)

  15. No Access

    Article

    An improved method for digital image fragile watermarking based on chaotic maps

    In this paper, the digital image fragile watermarking method based on chaotic maps is proposed. Our method has some significant advantageous in comparison with other available methods. Firstly, we reduce water...

    Mahboubeh Nazari, Amir Sharif, Majid Mollaeefar in Multimedia Tools and Applications (2017)

  16. No Access

    Article

    Local and global approaches for unsupervised image annotation

    Image annotation is the task of assigning keywords to images with the goal of facilitating their organization and accessibility options (e.g., searching by keywords). Traditional annotation methods are based o...

    Luis Pellegrin, Hugo Jair Escalante in Multimedia Tools and Applications (2017)

  17. No Access

    Article

    An efficient (t,n)–threshold secret image sharing scheme

    We propose a novel (t,n)–threshold secret image sharing scheme based on Shamir’s polynomial interpolation paradigm. The proposed scheme is a derivative of Thien and Lin’s (Computers & Graphics 26(5):765–770, [13]...

    Ali Kanso, Mohammad Ghebleh in Multimedia Tools and Applications (2017)

  18. No Access

    Article

    Learning two-pathway convolutional neural networks for categorizing scene images

    Scenes are closely related to the kinds of objects that may appear in them. Objects are widely used as features for scene categorization. On the other hand, landscapes with more spatial structures of scenes ar...

    Shuang Bai, Zhaohong Li, Jianjun Hou in Multimedia Tools and Applications (2017)

  19. No Access

    Article

    Anomaly detection in crowded scenes using motion energy model

    We present a new method for detection of abnormal behaviors in crowded scenes. Based on statistics of low-level feature—optical flow, which describes human movement efficiently, the motion energy model is prop...

    Tianyu Chen, Chunping Hou, Zhipeng Wang, Hua Chen in Multimedia Tools and Applications (2017)

  20. No Access

    Article

    ZLBM: zero level binary mapping technique for video security

    In recent days, providing security to data is a crucial and critical task in many image processing applications. Specifically, video security is an important and demanding concept. For this purpose, some of th...

    K. Rajalakshmi, K. Mahesh in Multimedia Tools and Applications (2017)

Page of 1,727