Results 11 to 20 of about 276,223 (97)

Training Data Improvement for Image Forgery Detection using Comprint [PDF]

open access: yes, 2022
Manipulated images are a threat to consumers worldwide, when they are used to spread disinformation. Therefore, Comprint enables forgery detection by utilizing JPEG-compression fingerprints. This paper evaluates the impact of the training set on Comprint'
dante   +5 more
core   +2 more sources

Cryptanalysis of an Encryption Scheme Based on Blind Source Separation [PDF]

open access: yes, 2006
Recently Lin et al. proposed a method of using the underdetermined BSS (blind source separation) problem to realize image and speech encryption. In this paper, we give a cryptanalysis of this BSS-based encryption and point out that it is not secure ...
Chen, Guanrong   +3 more
core   +2 more sources

MM2RTB: bringing multimedia metrics to real-time bidding [PDF]

open access: yes, 2017
In display advertising, users' online ad experiences are important for the advertising effectiveness. However, users have not been well accommodated in real-time bidding (RTB).
Chen, Bowei   +2 more
core   +3 more sources

Robust-MSA: Understanding the Impact of Modality Noise on Multimodal Sentiment Analysis

open access: yes, 2022
Improving model robustness against potential modality noise, as an essential step for adapting multimodal models to real-world applications, has received increasing attention among researchers.
Liu, Yihe   +4 more
core   +1 more source

HOST-ATS: automatic thumbnail selection with dashboard-controlled ML pipeline and dynamic user survey [PDF]

open access: yes, 2022
We present HOST-ATS, a holistic system for the automatic selection and evaluation of soccer video thumbnails, which is composed of a dashboard-controlled machine learning (ML) pipeline, and a dynamic user survey.
Halvorsen, Pål   +4 more
core   +1 more source

Interacting with New York City Data by HoloLens through Remote Rendering

open access: yes, 2022
In the digital era, Extended Reality (XR) is considered the next frontier. However, XR systems are computationally intensive, and they must be implemented within strict latency constraints.
Dong, Haiwei   +2 more
core   +1 more source

Access-Network Association Policies for Media Streaming in Heterogeneous Environments

open access: yes, 2010
We study the design of media streaming applications in the presence of multiple heterogeneous wireless access methods with different throughputs and costs. Our objective is to analytically characterize the trade-off between the usage cost and the Quality
Medard, Muriel   +3 more
core   +1 more source

Joint Denoising / Compression of Image Contours via Shape Prior and Context Tree

open access: yes, 2017
With the advent of depth sensing technologies, the extraction of object contours in images---a common and important pre-processing step for later higher-level computer vision tasks like object detection and human action recognition---has become easier ...
Cheung, Gene   +2 more
core   +1 more source

WMFormer++: Nested Transformer for Visible Watermark Removal via Implict Joint Learning

open access: yes, 2023
Watermarking serves as a widely adopted approach to safeguard media copyright. In parallel, the research focus has extended to watermark removal techniques, offering an adversarial means to enhance watermark robustness and foster advancements in the ...
Fang, Chaowei   +5 more
core  

Encoder-Decoder-Based Intra-Frame Block Partitioning Decision

open access: yes, 2023
The recursive intra-frame block partitioning decision process, a crucial component of the next-generation video coding standards, exerts significant influence over the encoding time.
Jiang, Yucheng   +5 more
core  

Home - About - Disclaimer - Privacy