Found: 55
Select item for more details and to access through your institution.
Vision-based robotic grasping from object localization, object pose estimation to grasp estimation for parallel grippers: a review.
- Published in:
- Artificial Intelligence Review, 2021, v. 54, n. 3, p. 1677, doi. 10.1007/s10462-020-09888-5
- By:
- Publication type:
- Article
Wearable Travel Aid for Environment Perception and Navigation of Visually Impaired People.
- Published in:
- Electronics (2079-9292), 2019, v. 8, n. 6, p. 697, doi. 10.3390/electronics8060697
- By:
- Publication type:
- Article
Commutative watermarking and encryption for media data.
- Published in:
- Optical Engineering, 2006, v. 45, n. 8, p. 080510-1, doi. 10.1117/1.2333510
- By:
- Publication type:
- Article
Unsupervised mining of visually consistent shots for sports genre categorization over large-scale database.
- Published in:
- Telecommunication Systems, 2015, v. 59, n. 3, p. 381, doi. 10.1007/s11235-014-9943-y
- By:
- Publication type:
- Article
A novel feature fusion based framework for efficient shot indexing to massive web videos.
- Published in:
- Telecommunication Systems, 2015, v. 59, n. 3, p. 401, doi. 10.1007/s11235-014-9945-9
- By:
- Publication type:
- Article
Innovations in emerging multimedia communication systems.
- Published in:
- Telecommunication Systems, 2015, v. 59, n. 3, p. 289, doi. 10.1007/s11235-014-9935-y
- By:
- Publication type:
- Article
Advanced news video parsing via visual characteristics of anchorperson scenes.
- Published in:
- Telecommunication Systems, 2013, v. 54, n. 3, p. 247, doi. 10.1007/s11235-013-9731-0
- By:
- Publication type:
- Article
Hybrid additive watermarking and its decoders.
- Published in:
- Telecommunication Systems, 2013, v. 54, n. 3, p. 305, doi. 10.1007/s11235-013-9735-9
- By:
- Publication type:
- Article
Innovative multimedia communication and services.
- Published in:
- Telecommunication Systems, 2013, v. 54, n. 3, p. 201, doi. 10.1007/s11235-013-9727-9
- By:
- Publication type:
- Article
Lightweight secure multimedia distribution based on homomorphic operations.
- Published in:
- Telecommunication Systems, 2012, v. 49, n. 2, p. 187, doi. 10.1007/s11235-010-9367-2
- By:
- Publication type:
- Article
Efficient information hiding in H.264/AVC video coding.
- Published in:
- Telecommunication Systems, 2012, v. 49, n. 2, p. 261, doi. 10.1007/s11235-010-9372-5
- By:
- Publication type:
- Article
Secure service convergence based on scalable media coding.
- Published in:
- Telecommunication Systems, 2010, v. 45, n. 1, p. 21, doi. 10.1007/s11235-009-9233-2
- By:
- Publication type:
- Article
Introduction to special issue on secure multimedia services.
- Published in:
- Telecommunication Systems, 2010, v. 45, n. 1, p. 1, doi. 10.1007/s11235-009-9230-5
- By:
- Publication type:
- Article
Special issue on ubiquitous multimedia services.
- Published in:
- 2012
- By:
- Publication type:
- Editorial
Automatic and fast temporal segmentation for personalized news consuming.
- Published in:
- Information Systems Frontiers, 2012, v. 14, n. 3, p. 517, doi. 10.1007/s10796-010-9256-y
- By:
- Publication type:
- Article
A survey on face data augmentation for the training of deep neural networks.
- Published in:
- Neural Computing & Applications, 2020, v. 32, n. 19, p. 15503, doi. 10.1007/s00521-020-04748-3
- By:
- Publication type:
- Article
Recent Advances in Multimedia Information System Security.
- Published in:
- Informatica (03505596), 2009, v. 33, n. 1, p. 3
- By:
- Publication type:
- Article
Special issue on soft computing for digital information forensics.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2011, v. 15, n. 3, p. 413, doi. 10.1007/s00500-009-0531-0
- By:
- Publication type:
- Article
Automatic video temporal segmentation based on multiple features.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2011, v. 15, n. 3, p. 469, doi. 10.1007/s00500-009-0527-9
- By:
- Publication type:
- Article
Image authentication based on perceptual hash using Gabor filters.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2011, v. 15, n. 3, p. 493, doi. 10.1007/s00500-009-0529-7
- By:
- Publication type:
- Article
Editorial: special issue on Service-Based Electronic Commerce Systems.
- Published in:
- 2013
- By:
- Publication type:
- Editorial
Editorial: special issue on ubiquitous electronic commerce systems.
- Published in:
- 2011
- By:
- Publication type:
- Editorial
Innovative Internet video consuming based on media analysis techniques.
- Published in:
- Electronic Commerce Research, 2011, v. 11, n. 1, p. 75, doi. 10.1007/s10660-010-9066-9
- By:
- Publication type:
- Article
Service and P2P based secure media sharing in mobile commerce environments.
- Published in:
- Electronic Commerce Research, 2011, v. 11, n. 1, p. 91, doi. 10.1007/s10660-010-9069-6
- By:
- Publication type:
- Article
Secure video distribution scheme based on partial encryption.
- Published in:
- International Journal of Imaging Systems & Technology, 2009, v. 19, n. 3, p. 227, doi. 10.1002/ima.20199
- By:
- Publication type:
- Article
Weighted Stego-Image Steganalysis of Messages Hidden into Each Bit Plane.
- Published in:
- Computer Journal, 2012, v. 55, n. 6, p. 717, doi. 10.1093/comjnl/bxr112
- By:
- Publication type:
- Article
On F5 Steganography in Images.
- Published in:
- Computer Journal, 2012, v. 55, n. 4, p. 447, doi. 10.1093/comjnl/bxr092
- By:
- Publication type:
- Article
Tournament-based congestion control protocol for multimedia streaming in ubiquitous sensor networks.
- Published in:
- International Journal of Communication Systems, 2011, v. 24, n. 10, p. 1246, doi. 10.1002/dac.1179
- By:
- Publication type:
- Article
Multi-secret image sharing based on elementary cellular automata with steganography.
- Published in:
- Multimedia Tools & Applications, 2020, v. 79, n. 29/30, p. 21241, doi. 10.1007/s11042-020-08823-8
- By:
- Publication type:
- Article
Special Issue on Multimedia Computing and Management in Cloud Environment.
- Published in:
- Concurrency & Computation: Practice & Experience, 2012, v. 24, n. 17, p. 2081, doi. 10.1002/cpe.1884
- By:
- Publication type:
- Article
On multiwatermarking in cloud environment.
- Published in:
- Concurrency & Computation: Practice & Experience, 2012, v. 24, n. 17, p. 2151, doi. 10.1002/cpe.1820
- By:
- Publication type:
- Article
Multimedia Applications and Security in MapReduce: Opportunities and Challenges.
- Published in:
- Concurrency & Computation: Practice & Experience, 2012, v. 24, n. 17, p. 2083, doi. 10.1002/cpe.1846
- By:
- Publication type:
- Article
Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 22, p. 23721, doi. 10.1007/s11042-016-4153-0
- By:
- Publication type:
- Article
Advanced partial encryption using watermarking and scrambling in MP3.
- Published in:
- Multimedia Tools & Applications, 2012, v. 59, n. 3, p. 885, doi. 10.1007/s11042-011-0771-8
- By:
- Publication type:
- Article
Tracking video objects with feature points based particle filtering.
- Published in:
- Multimedia Tools & Applications, 2012, v. 58, n. 1, p. 1, doi. 10.1007/s11042-010-0676-y
- By:
- Publication type:
- Article
Steganalysis of adaptive image steganography in multiple gray code bit-planes.
- Published in:
- Multimedia Tools & Applications, 2012, v. 57, n. 3, p. 651, doi. 10.1007/s11042-010-0663-3
- By:
- Publication type:
- Article
Special issue on multimedia analysis and security.
- Published in:
- 2012
- By:
- Publication type:
- Editorial
Content distribution and copyright authentication based on combined indexing and watermarking.
- Published in:
- Multimedia Tools & Applications, 2012, v. 57, n. 1, p. 49, doi. 10.1007/s11042-010-0521-3
- By:
- Publication type:
- Article
Efficient video encryption scheme based on advanced video coding.
- Published in:
- Multimedia Tools & Applications, 2008, v. 38, n. 1, p. 75, doi. 10.1007/s11042-007-0150-7
- By:
- Publication type:
- Article
On the Collusion-Resistance of the Fingerprinting Algorithm Based on Additive Watermarking.
- Published in:
- Journal of Multimedia, 2011, v. 6, n. 4, p. 369, doi. 10.4304/jmm.6.4.369-375
- By:
- Publication type:
- Article
Guest Editorial.
- Published in:
- Journal of Multimedia, 2011, v. 6, n. 4, p. 317, doi. 10.4304/jmm.6.4.317-319
- By:
- Publication type:
- Article
Hybrid additive multi-watermarking and decoding.
- Published in:
- Multimedia Systems, 2015, v. 21, n. 4, p. 345, doi. 10.1007/s00530-013-0338-9
- By:
- Publication type:
- Article
Adaptive steganography based on block complexity and matrix embedding.
- Published in:
- Multimedia Systems, 2014, v. 20, n. 2, p. 227, doi. 10.1007/s00530-013-0313-5
- By:
- Publication type:
- Article
Digital video watermarking based on intra prediction modes for audio video coding standard.
- Published in:
- Multimedia Systems, 2014, v. 20, n. 2, p. 195, doi. 10.1007/s00530-012-0301-1
- By:
- Publication type:
- Article
Real-time video streaming over multipath in multi-hop wireless networks.
- Published in:
- Multimedia Systems, 2011, v. 17, n. 4, p. 287, doi. 10.1007/s00530-010-0210-0
- By:
- Publication type:
- Article
Content and Service Protection for the Ubiquitous TV Based on Network Convergence.
- Published in:
- Wireless Personal Communications, 2010, v. 55, n. 1, p. 19, doi. 10.1007/s11277-009-9783-3
- By:
- Publication type:
- Article
A NOVEL FAST IMAGE ENCRYPTION SCHEME BASED ON 3D CHAOTIC BAKER MAPS.
- Published in:
- International Journal of Bifurcation & Chaos in Applied Sciences & Engineering, 2004, v. 14, n. 10, p. 3613, doi. 10.1142/S021812740401151X
- By:
- Publication type:
- Article
Hybrid multiplicative multi-watermarking in DWT domain.
- Published in:
- Multidimensional Systems & Signal Processing, 2017, v. 28, n. 2, p. 617, doi. 10.1007/s11045-015-0363-2
- By:
- Publication type:
- Article
SECURE FRACTAL IMAGE CODING BASED ON FRACTAL PARAMETER ENCRYPTION.
- Published in:
- Fractals, 2009, v. 17, n. 2, p. 149, doi. 10.1142/S0218348X09004405
- By:
- Publication type:
- Article
IMAGE AUTHENTICATION BASED ON FRACTAL FEATURES.
- Published in:
- Fractals, 2008, v. 16, n. 4, p. 287, doi. 10.1142/S0218348X08004034
- By:
- Publication type:
- Article