Perceptual audio hashing functions

被引:0
|
作者
机构
[1] [1,2,Özer, Hamza
[2] 1,Sankur, Bülent
[3] 3,Memon, Nasir
[4] 3,7,Anarim, Emin
来源
Özer, H. (hozer@uekae.tubitak.gov.tr) | 1780年 / Hindawi Publishing Corporation卷 / 2005期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Perceptual Audio Hashing Functions
    Hamza Özer
    Bülent Sankur
    Nasir Memon
    Emin Anarım
    EURASIP Journal on Advances in Signal Processing, 2005
  • [2] Perceptual audio hashing functions
    Özer, H
    Sankur, B
    Memon, N
    Anarim, E
    EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2005, 2005 (12) : 1780 - 1793
  • [3] A Novel Perceptual Audio Hashing Functions
    Cui, Delong
    2010 SECOND ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2010, : 194 - 197
  • [4] Robust perceptual audio hashing
    Özer, H
    Sankur, B
    PROCEEDINGS OF THE IEEE 12TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, 2004, : 25 - 28
  • [5] Audio content identification by using perceptual hashing
    Lancini, R
    Mapelli, F
    Pezzano, R
    2004 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXP (ICME), VOLS 1-3, 2004, : 739 - 742
  • [6] Audio Perceptual Hashing Based on NMF and MDCT Coefficients
    Li Jinfeng
    Wang Hongxia
    Jing Yi
    CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (03) : 579 - 583
  • [7] Privacy-enhanced Perceptual Hashing of Audio Data
    Knospe, Heiko
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 549 - 554
  • [8] A robust perceptual audio hashing using balanced multiwavelets
    Ghouti, Lahouari
    Bouridane, Ahmed
    2006 IEEE International Conference on Acoustics, Speech and Signal Processing, Vols 1-13, 2006, : 5067 - 5070
  • [9] Audio Perceptual Hashing Based on NMF and MDCT Coefficients
    LI Jinfeng
    WANG Hongxia
    JING Yi
    ChineseJournalofElectronics, 2015, 24 (03) : 579 - 583
  • [10] Perceptual Audio Hashing using RT and DCT in wavelet domain
    Li, Jinfeng
    Wu, Tao
    2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 363 - 366