


default search action
Journal of Information Hiding and Multimedia Signal Processing, Volume 8
Volume 8, Number 1, January 2017
- Yun Wu, Hua Shi, Shaoyong Yu:

Bayesian Compressive Sensing Based on Sparsing Important Wavelet Coefficients. 1-11 - Jie Liu, Shoulin Yin, Hang Li, Lin Teng:

A Density-based Clustering Method for K-anonymity Privacy Protection. 12-18 - Jie Yang, Hua-Zhong Li, Wan Li, Xiao-Bing Liu:

Research on Task Allocation of Geographic Location Related Mobile Sensing System. 19-30 - Jingyu Du, Beiji Zou, Xiyao Liu, Fangfang Li, Huanxi Zhao:

A Lossless Fingerprinting-Watermarking Hybrid Scheme for Digital Right Management of Fundus Images. 31-41 - Hongfeng Zhu, Rui Wang:

Multi-party Password-Authenticated Key Exchange Scheme with Privacy Preserving using Chaotic Maps in Random Oracle Model. 42-53 - Chin-Feng Lee, Chi-Yao Weng, Kuan-Ting Li:

VQ-based Image Embedding Scheme Using Adaptive Codeword Grouping Strategy. 54-67 - Xiaojun Bi, Tiewen Pan, Pengfei Diao:

Multi-focus Image Fusion Based on Local Clarity of SCM. 68-75 - Mo-yi Zhang, Qiu-yu Zhang, Hong-xiang Duan, Hui-yi Wei:

View-Invariant Hand Gesture Planar Trajectory Recognition on Monocular Vision. 76-85 - Chien-Chang Chen, Lingying Chen, Yu-Jing Lin:

Block Sampled Matching with Region Growing for Detecting Copy-Move Forgery Duplicated Regions. 86-96 - Song Li, Rongrong Ni, Yao Zhao:

A 3D Mesh Watermarking Based on Improved Vertex Grouping and Piecewise Mapping Function. 97-108 - Ke Sun, Junping Zhang:

Road Extraction from High Resolution Remote Sensing Images based on Multi-features and Multi-stages. 109-119 - Chunming Wu, Shirui Fu, Tingting Li:

Research of The WSN Routing based on Artificial Bee Colony Algorithm. 120-126 - Hongxuan Duan, Yan Zhou, Miaomiao Liu:

Fault Tolerant Scheduling Algorithm in Distributed Sensor Networks. 127-137 - Shi-Jun Kang, Zi-Heng Yang, Ling-Ling Yu, Meng-Jiang Han:

Research on DQPSK Carrier Synchronization based on FPGA. 138-147 - Chun-Ming Wu, Tao Yang:

An Improved DV-HOP Algorithm was Applied for The Farmland Wireless Sensor Network. 148-155 - Dora M. Ballesteros L., Diego Renza, Steven Camacho:

Security Analysis of The Speech Scrambling Method Based on Imitation of A Super-Gaussian Signal. 156-167 - Fatiha Djebbar, Beghdad Ayad:

Energy and Entropy Based Features for WAV Audio Steganalysis. 168-181 - Shucheng Xiao, Haijia Wu, Shan Qiu, Zhendong Yang, Jinlan Qiao:

Contrastive Divergence Constrained by Reconstruction Error. 182-190 - Linlin Tang, Kaiqiang Ma, Zuohua Li:

A New Scheduling Algorithm Based on Ant Colony Algorithm and Cloud Load Balancing. 191-199 - Jingxuan Hou, Yao Zhao, Chunyu Lin, Huihui Bai, Meiqin Liu:

Quality Enhancement of Compressed Video via CNNs. 200-207 - Hoshang Kolivand, Mohd Shahrizal Sunar, Amjad Rehman, Abdulaziz S. Almazyad, Tanzila Saba:

Outdoor 3D Illumination in Real Time Environments: A Novel Approach. 208-217 - Hang Li, Shoulin Yin, Chu Zhao, Lin Teng:

A Proxy Re-Encryption Scheme Based on Elliptic Curve Group. 218-227 - Dongping Tian:

Semantic Image Annotation based on Robust Probabilistic Latent Semantic Analysis. 228-237 - Yanpeng Wu, Xiaoqi Peng, Qian Jiang, Kai Ruan:

An Improved Method of Flotation Froth Image Segmentation Based on Watershed Transformation. 238-247 - Yu Bai, Dongmin Jiang:

A Novel One-round Scheme against Off-line Password Guessing Attacks for Three-party Instance. 248-260
Volume 8, Number 2, March 2017
- Mohd Ali Moustafa Yousif Alsayyh, Dzulkifli Mohamad, Tanzila Saba, Amjad Rehman, Jarallah S. Al-Ghamdi:

A Novel Fused Image Compression Technique Using DFT, DWT, and DCT. 261-271 - Chao Dong, Zhe-Ming Lu:

A Tree-Structured Deterministic Self-Similar Network. 272-277 - Yu Liu, Yichi Zhang, Cheng Fang, Junjuan Li:

DCT Based Fast INTRA Mode Decision Method for HEVC Coding. 278-289 - Shuyi Lin, Xiaosheng Huang:

Power Loss Analysis of AC Contactor at Steady Closed State with Electromagnetic-Thermal Coupling Method. 290-299 - Di Yang, Huamin Yang, Peng Wang, Songjiang Li:

Design and Implement of Large-scale Social Network Analysis Platform Based on Hadoop. 300-309 - Ahd Aljarf, Saad Ali Amin, John Filippas, James Shuttelworth:

Detection System for Grey and Colour Images Based on Extracting Features of Difference Image and Renormalized Histogram. 310-325 - Yanfei Jia, Xiaodong Yang:

A Fast Convergence Adaptive Complex-Valued Blind Source Separation Method. 326-337 - Hui Wang, Zhe Wang, Fuwang Chen:

Behavior Analysis Research of Attackers Based on Path Revenue Calculation. 338-347 - Zhigao Zeng, Lianghua Guan, Yanhui Zhu, Qiang Liu:

A Novel Image Segmentation Method Based on An Improved Bacterial Foraging Optimization Algorithm. 348-357 - Shuihua Sun, Degen Huang, Jing Zhang:

Research on Entity Relation Extraction in TCM Acupuncture and Moxibustion Field. 358-367 - Qingzhou Ye, Ping Wu, Maolin Zhang:

Research on Automatic Highway Extraction Technology Based on Spectral Information of Remote Sensing Images. 368-380 - Xixiang Zhang, Huan Zhao:

A Long-Term Feature Selection Based on Heuristic Strategy for Speaker Diarization. 381-391 - Qiu-Yu Zhang, Qi-Yan Dou, Rui-Hong Dong, Yan Yan:

Robust Reversible Data Hiding Algorithm for Color Image Based on 2D-DCT. 392-403 - Raniyah Wazirali, Zenon Chaczko:

Anticipatory Quality Assessment Metric for Measuring Data Hiding Imperceptibility. 404-412 - Haiyun Li, Haifeng Li, Kaibin Wei, Shoulin Yin, Chu Zhao:

A Multi-keyword Search Algorithm Based on Polynomial Function and Safety Inner-product Method in Secure Cloud Environment. 413-422 - Fuquan Zhang, Zijing Mao, Gangyi Ding, Lin Xu:

Design of Chinese Natural Language in Fuzzy Boundary Determination Algorithm Based on Big Data. 423-434 - Hsiang-Cheh Huang, Feng-Cheng Chang, Yuh-Yih Lu:

Multi-Bit Reversible Data Hiding with Prediction and Difference Alteration. 435-444 - Pengfei Xue, Jing-Song Hu, Hanlin Liu, RongGui Hu:

A New Network Steganographic Method Based on the Transverse Multi-Protocol Collaboration. 445-459 - Linlin Tang, Zuohua Li, Jeng-Shyang Pan, Zhifang Wang, Kaiqiang Ma, Hongnan Zhao:

Novel Artificial Bee Colony Algorithm Based Load Balance Method In Cloud Computing. 460-467 - Qingzhu Wang, Xiao-Ming Chen, Yi-Hai Zhu:

Simultaneous Compression and Encryption of Video Sequences Based on 3D Compressive Sensing and 3D Discrete Fractional Random Transform. 468-477 - Lili Meng, Jingxiu Zong, Guina Sun, Jie Cheng, Jia Zhang, Mengchen Zhao:

Bayesian Multi-Hypothesis Wyner-Ziv Video Coding. 478-485 - Jeng-Shyang Pan, Thi-Kien Dao, Tien-Szu Pan, Trong-The Nguyen, Shu-Chuan Chu, John F. Roddick:

An Improvement of Flower Pollination Algorithm for Node Localization Optimization in WSN. 486-499 - Jianpo Li, Ziqi Dong:

Uneven Clustering and Data Transmission Strategy for Energy Hole Problem in Wireless Sensor Networks. 500-509 - Ren-Kui Wang, Zhe-Ming Lu:

Video Moving Object Detection Based on Block Truncation Coding. 510-516
Volume 8, Number 3, May 2017
- Xiaodan Jiang, Zhe-Ming Lu, Hui Li:

Edge and Contrast Classified K-means Algorithm for Image Vector Quantizer Design. 517-524 - Qiu-Yu Zhang, Qi-Yan Dou, Zi Yang, Yan Yan:

Perceptual Hashing of Color Images Using Interpolation Mapping and Non-negative Matrix Factorization. 525-535 - Haiyun Ma, Zhonglin Zhang, Haifeng Li, Shoulin Yin, Chu Zhao:

A Provable Private Data Aggregation Scheme Based on Digital Signatures and Homomorphic Encryption for Wireless Sensor Networks. 536-543 - Wen-Hua Ren, Xiang Li, Zhe-Ming Lu:

Reversible Data Hiding Scheme based on Fractal Image Coding. 544-550 - Xingsi Xue, Zhengyi Tang:

An Evolutionary Algorithm based Ontology Matching System. 551-556 - Hui Wang, Zhe Wang, Fuwang Chen:

A Generation Algorithm INAG for Attack Graph Based on NST Model. 557-567 - Jiaqi Zhen, Zhifang Wang:

DOA Estimation Method for Two-Dimensional Wideband Signals by Sparse Recovery in Frequency Domain. 568-577 - Jianhua Song, Wang Cong, Jin Li:

A Fuzzy C-means Clustering Algorithm for Image Segmentation Using Nonlinear Weighted Local Information. 578-588 - Lijian Zhou, Chen Zhang, Zhe-Ming Lu, Kun Zhao, Tingyuan Nie:

Palmprint Feature Extraction based on Multi-wavelet and Complex network. 589-598 - Wanchang Jiang, Jiadong Ren, Yuan Huang:

Using Fault Infection and Propagation Mining Top Important Function Nodes in Software Execution Complex Network. 599-610 - Ping Li, Jianping Gou, Hebiao Yang:

The Distance-Weighted K-nearest Centroid Neighbor Classification. 611-622 - Zhenhua Gan, Baoping Xiong, Fumin Zou, Lyuchao Liao, Min Du:

Image Reconstruction Algorithm of Compressed Sensing based on Neural Dynamics. 623-631 - Wencui Chang, Haifeng Li, Shoulin Yin:

Mixed Symmetric Key and Elliptic Curve Encryption Scheme Used for Password Authentication and Update Under Unstable Network Environment. 632-639 - Hua Jiang, Fumin Zou, Rongde Lin, Lingxiang Li:

Path £s-automaton. 640-648 - Xingquan Cai, Shiyu Li, Xin Wu, Hao Lu:

Efficient Path Finding Method Based Evaluation Function in Large Scene Online Games and Its Application. 649-659 - San-Ding Luo, Zheng Zou, Guang-Ya Tian, Jeng-Shyang Pan, Shi-Jian Liu:

An Automatic Colonies Counting Based on Piecewise Circle Fitting. 660-669 - Shaowei Chen, Shujuan Yu, Zhimin Zhang, Yun Zhang:

A Novel Blind Detection Algorithm Based on Adjustable Parameters Activation Function Hopfield Neural Network. 670-675 - Zahra Shokrollahi, Mehran Yazdi:

A Robust Blind Watermarking Scheme Based On Stationary Wavelet Transform. 676-687 - Xin-Yi Li, San-Yang Liu, Zhaohui Zhang:

Energy-efficient Acquisition and High-fidelity Reconstruction of Compressed Signal in Wireless Sensor Networks. 688-701 - Mahmoud Y. Shams, S. H. Sarhan, Ahmed S. Tolba:

Adaptive Deep Learning Vector Quantisation for Multimodal Authentication. 702-722 - Liquan Zhao, Nan Chen:

An Effective Clustering Routing Protocol for Heterogeneous Wireless Sensor Networks. 723-733 - Ying Cui, Jiaqi Wang, Guojiao Song, Shubin Liu:

Improved Endmember Extraction Algorithms Based on Endmember Independence and Thinning Technology. 734-743 - Xin Liu, Shen Wang, Xuehu Yan, Weizhe Zhang:

Homomorphic Visual Cryptography. 744-756
Volume 8, Number 4, July 2017
- He Li, Zhi-Hong Liu, Chui-Jie Yi, Zhe-Ming Lu:

An Improved Genetic Algorithm for Thinning Acoustic Array. 757-765 - Yao He, Xingsi Xue, Shunmiao Zhang:

Using Artificial Bee Colony Algorithm for Optimizing Ontology Alignment. 766-773 - Zheng Zou, San-Ding Luo, Jeng-Shyang Pan, Shi-Jian Liu, Shenghui Liao:

A Semi-automatic Segmentation for Tooth on Cone Beam CT Volume Following the Anatomic Guidance. 774-783 - Chin-Chen Chang, Pei-Yan Pai, Meng-Hsiun Tsai, Yung-Kuan Chan:

Vessel Detection in Chicken Chorioallantoic Membrane Image. 784-797 - Hongfeng Zhu, Shuai Geng:

Simple and Universal Construction for Round-Optimal Password Authenticated Key Exchange towards Quantum-Resistant. 798-807 - Liquan Zhao, Yan Long, Lin Wang:

The Classification of Multiple Power Quality Disturbances based on Preliminary Classification and Improved Support Vector Machine. 808-817 - Dongning Zhao, Ting Wang:

Re-expression of Face Images with Help of Samples from Other Face Datasets. 818-822 - Zhimin Zhang, Yun Zhang, Shaowei Chen, Shujuan Yu:

UAV Motion-Blurred Image Restoration Using Improved Continuous Hopfield Network Image Restoration Algorithm. 823-830 - Miaomiao Liu, Jingfeng Guo, Jing Chen:

Link Prediction in Signed Networks based on The Similarity and Structural Balance Theory. 831-846 - Liang-min Wang, Qing-Qing Xie, Tao Jiang, Chin-Chen Chang:

ShortHC: Self-Regenerated Short Hash Chain for Resource-Constrained System. 847-860 - Danyang Qin, Songxiang Yang, Jingya Ma, Yan Zhang, Qun Ding:

A Lifetime Maximization Algorithm Based on Heuristic Strategy for Wireless Sensor Network. 861-868 - Chia-Jung Lee, Chao-Kai Chiang, Mu-En Wu:

Online Learning Problems against Dynamic Strategies in Gradually Evolving Worlds. 869-879 - Ying-Hsuan Huang, Ching-Chun Chang:

A Multiple Image Based Reversible Data Hiding Scheme with High Embedding Capacity. 880-887 - Fuquan Zhang, Gangyi Ding, Zijing Mao, Lin Xu, Xiaoyan Zheng:

Bayesian Network for Motivation Classification in Creative Computation. 888-902 - Dongping Tian:

Extended Probabilistic Latent Semantic Analysis for Automatic Image Annotation. 903-915 - Hong Ma, Tsu-Yang Wu, Min Chen, Rong-Hua Yang, Jeng-Shyang Pan:

A Parse Tree-Based NoSQL Injection Attacks Detection Mechanism. 916-928 - Xintao Ding, Yonglong Luo, Guorong Cai, Xiaobo Zhang:

Multi-scale Application of Camera Calibration in Tourism Service Platforms. 929-936 - Zhi-jun Teng, Li Zhang, Ke Li, Yue Xian:

A Graph Theory Based Improved Spectrum Allocation Algorithm. 937-944 - Liang Ding, Lei Xu:

Dual Splitting Method For Sparsity Signal Restoration With Impulsive Noise. 945-956 - Chi-Kien Tran, Chin-Dar Tseng, Chin-Shiuh Shieh, Tsair-Fwu Lee:

Face Recognition under Varying Illumination Conditions: Improving the Recognition Accuracy for Local Ternary Patterns based on Illumination Normalization Methods and Singular Value Decomposition. 957-966
Volume 8, Number 5, September 2017
- Chin-Chen Chang, Thai-Son Nguyen, Tzu-Yi Chien:

An Efficient Steganography Scheme Based on Edge Detection for High Payload. 967-979 - Jin Si, Zhen Wu, Zhe-Ming Lu, Wen-Hua Ren:

Mining Critical Links in Complex Networks based on Entropy Weights and Grey Relational Analysis. 980-986 - Dongning Zhao, Da-Jie Guo, Zhe-Ming Lu, Hao Luo:

Tracking Multiple Moving Objects in Video Based on Multi-channel Adaptive Mixture Background Model. 987-995 - Chuanfu Wang, Jia Liu, Xingyu Tian, Ziheng Yang:

A Fast Image Encryption System based on AES and Chaos. 996-1009 - Chi-Kien Tran, Chin-Dar Tseng, Pei-Ju Chao, Chin-Shiuh Shieh, Liyun Chang, Tsair-Fwu Lee:

Face Recognition under Varying Lighting Conditions: A Combination of Weber-face and Local Directional Pattern for Feature Extraction and Support Vector Machines for Classification. 1010-1020 - Xingsi Xue, Pei-Wei Tsai, Guirong Feng:

Efficient Ontology Meta-Matching Based on Metamodel-assisted Compact MOEA/D. 1021-1028 - Qiu-Yu Zhang, Zi Yang, Qi-Yan Dou, Yan Yan:

Robust Hashing for Color Image Authentication Using Non-Subsampled Contourlet Transform Features and Salient Features. 1029-1042 - Kazuhiro Kondo, Joji Yamada:

A Frame Synchronization Method for Audio Watermarks Robust Against Analog Aerial Transmission. 1043-1053 - Bin Zhao, Hao Li:

A Novel Descending Dimension CKF Algorithm for A Class of Nonlinear System. 1054-1061 - Xingsi Xue:

Efficient Ontology Meta-Matching Using Alignment Prescreening Approach and Gaussian Random Field Model assisted NSGA-II. 1062-1068 - Takuma Okamoto:

Horizontal Local Sound Field Propagation Based on Sound Source Dimension Mismatch. 1069-1081 - Xiaoling Lan, Jia Cui, Shutuan Zhang:

Research on the Video Advertising Detection Based on PNN and Text Detection Method. 1082-1091 - Masaaki Ito, Kenji Ozawa, Masanori Morise, Yuichiro Kinoshita:

Expanded Estimation Model for Instantaneous Presence in Audio-visual Content Incorporating Binaural Information. 1092-1102 - Meng Yu, Zhifan Du, Xin Liu, Ding Qun, Hong Chen:

The Method of Obtaining Best Unary Polynomial for the Chaotic Sequence of Image Encryption. 1103-1110 - Guotao Wang, Xin Qian, Shujuan Wang, Qiang Wang, Xiang-kai Bai, Chao Li:

A De-noising Algorithm for PIND Signals Based on Kalman Filter. 1111-1118 - Yunbing Wu, Jeng-Shyang Pan, Ping Lu, Kaibiao Lin, Xiaoyan Yu:

Knowledge Graph Embedding Translation Based on Constraints. 1119-1131 - Shi-Jian Liu, Jing Zhang, Jeng-Shyang Pan, Cai-Jie Weng:

SVQR : A Novel Secure Visual Quick Response Code and Its Anti-counterfeiting Solution. 1132-1140 - Hong Chen, Zhifan Du, Xin Liu, Yu Meng:

A New Method for Observing the Bifurcation of a Nonlinear System Based on CPLD. 1141-1148 - Hao Chen, Tengye Su, Ye Zhang:

An Efficiently Adaptive Probability Estimation Method in CABAC of HEVC Using Stochastic Learning Weak Estimator. 1149-1164 - Guishu Liang, Wei-hua Niu, Peng Zhao:

A Method of Contourlet Transform Image Denoising Based on Improved Contraction Function. 1165-1172 - Jianpo Li, Baochun Mu:

Dynamic Node Localization Algorithm based on Cooperated Prediction for Wireless Sensor Networks. 1173-1182 - Limin Zhao, Qing Liu, Haifeng Li:

A High-Efficiency 3D-DOA Estimation Algorithm for Unknown Sources Number. 1183-1193 - Aiwan Fan, Zhaofeng Yang, Haifeng Li:

A New Authenticated Key Agreement Protocol based on Extended Chebyshev Maps. 1194-1202
Volume 8, Number 6, November 2017
- Dongping Tian:

Exploiting Semantic Context Relationships for Automatic Image Annotation. 1203-1217 - Shuhong Cheng, Yonglai Guan, Shijun Zhang, Shuchun Cheng:

Wheel Model Recognition Based on Minimum Distance. 1218-1227 - Renjie Song, Ziqi Zhang, Haiyang Liu:

Edge Connection based Canny Edge Detection Algorithm. 1228-1236 - Chun-Ming Wu, Ji-Hong Yang:

An Improved Hypersphere Support Vector Machine Method for Vibration Fault Diagnosis of Wind Turbine Gearbox. 1237-1245 - Jeng-Shyang Pan, Shu-Xia Dong, Chun-Sheng Yang:

Low-Space Complexity Digit-Serial Multiplier Based on Modified Polynomial Basis Over GF(2m). 1246-1256 - Quan-You Yu, Jing-Rui Pei:

A Two-way Parallel Query Correction Approach Based on Semantic Analysis and Reverse Hidden Markov Model in Chinese Information Processing System. 1257-1266 - Yunfeng Xing, Mingxiang Guan, Zhe-Ming Lu:

Feature-Guided K-Means Algorithm for Optimal Image Vector Quantizer Design. 1267-1272 - Na Lin, Hongfeng Zhu:

Enhancing The Security of Chaotic Maps-based Password-Authenticated Key agreement Using Smart Card. 1273-1282 - Shuihua Sun, Degen Huang, Jing Zhang:

Construction of the Recognition Model for Trigger Words of Chinese Acupuncture and Moxibustion Events. 1283-1293 - Diego Renza, Camilo Lemus, Dora M. Ballesteros L.:

Audio Authenticity and Tampering Detection based on Information Hiding and Collatz p-bit Code. 1294-1304 - Angger Abdul Razak, Mitsuhiro Yokota:

Numerical Examination on Transmission Properties of FBG by FDTD Method. 1305-1312 - Zhen-Dong Yang, Chao-Gang Xiang, Tao Wang, Haiyang Fang, Qiang Liu, Fu-Xing Zong:

Intelligent Mobile Monitoring and Control Network of Oil Pipeline Based on Internet of Things. 1313-1322 - Yôiti Suzuki, Akinori Ito, Kazuhiro Kondo:

Guest Editorial: Introduction to the Special Issue on the Enrichment of Sound, Speech and Music Media. 1323-1324 - Akinori Ito:

Enrichment of Audio Signal using Side Information. 1325-1334 - Takuma Okamoto:

Localized Sound Zone Generation Based on External Radiation Canceller. 1335-1351 - Ryouichi Nishimura, Shuichi Sakamoto, Yoshifumi Chisaki, Zhenglie Cui:

Method for Updating Microphone Configuration in Audio Super-Resolution. 1352-1361 - Masayuki Nishiguchi, Ayumu Morikawa, Yuya Ishii, Kanji Watanabe, Koji Abe, Shouichi Takane:

Sound Source Separation and Synthesis for Audio Enhancement based on Spectral Amplitudes of Stereo Signals. 1362-1371 - Akinori Ito, Yuto Sasaki:

Manipulating Vocal Signal in Mixed Music Sounds using Side Information based on the Fundamental Frequency. 1372-1381 - Zhenglie Cui, Shuichi Sakamoto, Jiro Gyoba, Yôiti Suzuki:

Influence of Visual Depth and Vibration on the High-level Perception of Reality in 3D Contents. 1382-1391 - César D. Salvador, Shuichi Sakamoto, Jorge Treviño, Yôiti Suzuki:

Enhancement of Spatial Sound Recordings by Adding Virtual Microphones to Spherical Microphone Arrays. 1392-1404 - Shouichi Takane:

Estimation of Individual Head-Related Impulse Responses from Impulse Responses Acquired in Ordinary Rooms based on the Spatial Principal Components Analysis. 1405-1419 - Daisuke Morikawa:

Relationship between Localization of Spatially Segregated Sound and Variation in Interaural Level and Time Differences due to Head Rotation. 1420-1429 - Masashi Unoki, Akikazu Miyazaki, Shota Morita, Masato Akagi:

Method of Blindly Estimating Speech Transmission Index in Noisy Reverberant Environments. 1430-1445 - Shota Morita, Xugang Lu, Masashi Unoki, Masato Akagi:

Method of Estimating Signal-to-Noise Ratio Based on Optimal Design for Sub-band Voice Activity Detection. 1446-1459 - Yosuke Kobayashi, Kazuhiro Kondo:

A Case Study of Bootstrap Masker Quality Assessment for Speech-Privacy Protection. 1460-1469

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














