Supplementary video file

Aorta ◽  
2014 ◽  
2019 ◽  
Vol 2 (2) ◽  
pp. 79-83
Author(s):  
Felix Behan

This ‘How to do it’ lists a range of cases, demonstrated by supplementary video discussion, that explain the refinements of the keystone perforator island flap (KPIF) technique applied to specific sites of the head and neck, with a focus on the elderly. When the P A C E acronym is applied (pain-free, aesthetic outcome, minimal complications, economical) the KPIF technique is a respectable alternative to microvascular surgery, particularly in the elderly, with minimal returns to theatre for vascular impedance problems which are not infrequent in microvascular reconstructions.  


2014 ◽  
Vol 11 ◽  
pp. S68-S76 ◽  
Author(s):  
Thomas Gloe ◽  
André Fischer ◽  
Matthias Kirchner

2014 ◽  
Vol 533 ◽  
pp. 218-225 ◽  
Author(s):  
Rapee Krerngkamjornkit ◽  
Milan Simic

This paper describes computer vision algorithms for detection, identification, and tracking of moving objects in a video file. The problem of multiple object tracking can be divided into two parts; detecting moving objects in each frame and associating the detections corresponding to the same object over time. The detection of moving objects uses a background subtraction algorithm based on Gaussian mixture models. The motion of each track is estimated by a Kalman filter. The video tracking algorithm was successfully tested using the BIWI walking pedestrians datasets [. The experimental results show that system can operate in real time and successfully detect, track and identify multiple targets in the presence of partial occlusion.


2010 ◽  
Vol 50 (1) ◽  
pp. 45
Author(s):  
Z. Geradts ◽  
FIDIS
Keyword(s):  

2020 ◽  
Vol 8 (5) ◽  
pp. 3978-3983

Identification of a person’s speech by his lip movement is a challenging task. Even though many software tools available for recognition of speech to text and vice versa, some of the words uttered may not be accurate as spoken and may vary from person to person because of their pronunciation. In addition, in the noisy environment speech uttered may not perceive effectively hence there lip movement for a given speech varies. Lip reading has added advantages when it augmented with speech recognition, thus increasing the perceived information. In this paper, the video file of a individual person are converted to frames and extraction of only the lip contour for vowels is done by calculating its area and other geometrical aspects. Once this is done as a part of testing it is compared with three to four people’s lip contour for vowels for first 20 frames. The parameters such as mean, centroid will remain approximately same for all people irrespective of their lip movement but there is change in major and minor axis and hence area changes considerably. In audio domain vowel detection is carried out by extracting unique features of English vowel utterance using Mel Frequency Cepstrum Coefficients (MFCC) and the feature vectors that are orthonormalized to compare the normalized vectors with standard database and results are obtained with approximation.


Author(s):  
Pinky Saikia Dutta ◽  
Sauvik Chakraborty

Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-secure method in which to protect data. Steganography techniques can be applied to images, a video file or an audio file. Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages, no matter how unbreakable they are, arouse interest and may in themselves be incriminating in countries in which encryption is illegal. Whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned both with concealing the fact that a secret message is being sent and its contents. Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol.


2019 ◽  
Vol 14 (6) ◽  
pp. 1999-2006
Author(s):  
Wessam Lahmod Nados ◽  
Nada A. Rasheed

Sign in / Sign up

Export Citation Format

Share Document