Media Forensics and Security 2009
DOI: 10.1117/12.807515
|View full text |Cite
|
Sign up to set email alerts
|

Machine-assisted editing of user-generated content

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2010
2010
2014
2014

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…For example, Bryan et al use audio-fingerprinting [13] to match strongly correlating signal-pairs [14] that are iteratively merged into larger clusters until a global solution is found. Similarly, Shrestha et al [15] and Cremer et al [16] generate multiple audiofingerprints for small segments in each audio track which are then individually matched against each other. Such bottomup approaches are sensitive to the propagation of bad initial matching decisions, meaning all non-overlapping or poor candidate pairwise matches must be pruned in advance.…”
Section: Introductionmentioning
confidence: 99%
“…For example, Bryan et al use audio-fingerprinting [13] to match strongly correlating signal-pairs [14] that are iteratively merged into larger clusters until a global solution is found. Similarly, Shrestha et al [15] and Cremer et al [16] generate multiple audiofingerprints for small segments in each audio track which are then individually matched against each other. Such bottomup approaches are sensitive to the propagation of bad initial matching decisions, meaning all non-overlapping or poor candidate pairwise matches must be pruned in advance.…”
Section: Introductionmentioning
confidence: 99%