This paper presents a novel probabilistic approach to speech enhancement. Instead of a deterministic logarithmic relationship, we assume a probabilistic relationship between the fr...
This paper proposes a watermarking algorithm based on correlation to authenticate image content. The original image is converted to YIQ space first, then subdivided into 8
—Embedded zero-tree coding in wavelet domain has drawn a lot of attention to the image compression applications. Among noteworthy zero-tree algorithms is the SPIHT algorithm. For...
Media forensics tries to determine the originating device of a signal. We apply this paradigm to microphone forensics, determining the microphone model used to record a given audio...