-
4
-
-
0030125877
-
Wavelet transform-based analog speech scrambling scheme
-
F. L. Ma, J. Cheng, and Y. M. Wang, "Wavelet transform-based analog speech scrambling scheme," Electron. Lett., vol. 32, no. 8, pp. 719-721, 1996.
-
(1996)
Electron. Lett
, vol.32
, Issue.8
, pp. 719-721
-
-
Ma, F.L.1
Cheng, J.2
Wang, Y.M.3
-
5
-
-
0037936547
-
Chaotic cryptosystem with high sensitivity to parameter mismatch
-
Apr
-
K. Li, Y. C. Soh, and Z. G. Li, "Chaotic cryptosystem with high sensitivity to parameter mismatch," IEEE Trans. Circuits Syst. I, Fundam. Theory Appl., vol. 50, no. 4, pp. 579-583, Apr. 2003.
-
(2003)
IEEE Trans. Circuits Syst. I, Fundam. Theory Appl
, vol.50
, Issue.4
, pp. 579-583
-
-
Li, K.1
Soh, Y.C.2
Li, Z.G.3
-
6
-
-
0022687621
-
A general theory for asynchronous speech encryption techniques
-
L. S. Lee and G. C. Chou, "A general theory for asynchronous speech encryption techniques," IEEE J. Sele. Areas in Comm., vol. 4, no. 2, pp. 280-287, 1986.
-
(1986)
IEEE J. Sele. Areas in Comm
, vol.4
, Issue.2
, pp. 280-287
-
-
Lee, L.S.1
Chou, G.C.2
-
7
-
-
13944264545
-
Speech encryption based on fast Fourier transform permutation, in Proc
-
Shahram, "Speech encryption based on fast Fourier transform permutation," in Proc. IEEE Int. Conf. Electron. Circuits Syst., 2000, vol. 1, pp. 290-293.
-
(2000)
IEEE Int. Conf. Electron. Circuits Syst
, vol.1
, pp. 290-293
-
-
Shahram1
-
9
-
-
0037068666
-
Blind source separation applied to image cryptosystems with dual encryption
-
Q. H. Lin and F. L. Yin, "Blind source separation applied to image cryptosystems with dual encryption," Electron. Lett., vol. 38, no. 19, pp. 1092-1094, 2002.
-
(2002)
Electron. Lett
, vol.38
, Issue.19
, pp. 1092-1094
-
-
Lin, Q.H.1
Yin, F.L.2
-
11
-
-
33747044997
-
A blind source separation-based method for speech encryption
-
Q. H. Lin, F. L. Yin, T. M. Mei, and H. L. Liang, "A blind source separation-based method for speech encryption," IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 53, no. 6, pp. 1320-1328, 2006.
-
(2006)
IEEE Trans. Circuits Syst. I, Reg. Papers
, vol.53
, Issue.6
, pp. 1320-1328
-
-
Lin, Q.H.1
Yin, F.L.2
Mei, T.M.3
Liang, H.L.4
-
12
-
-
0028416938
-
Independent component analysis, A new concept?
-
P. Comon, "Independent component analysis, A new concept?," Signal Process., vol. 36, pp. 287-314, 1994.
-
(1994)
Signal Process
, vol.36
, pp. 287-314
-
-
Comon, P.1
-
13
-
-
0030107018
-
General approach to blind source separation
-
Mar
-
X. R. Cao and R. W. Liu, "General approach to blind source separation," IEEE Trans. Signal Process., vol. 44, no. 3, pp. 562-571, Mar. 1996.
-
(1996)
IEEE Trans. Signal Process
, vol.44
, Issue.3
, pp. 562-571
-
-
Cao, X.R.1
Liu, R.W.2
-
14
-
-
0032629347
-
Fast and robust fixed-point algorithms for independent component analysis
-
Jun
-
A. Hyvärinen, "Fast and robust fixed-point algorithms for independent component analysis," IEEE Trans. Neural Netw., vol. 10, no. 3, pp. 626-634, Jun. 1999.
-
(1999)
IEEE Trans. Neural Netw
, vol.10
, Issue.3
, pp. 626-634
-
-
Hyvärinen, A.1
-
15
-
-
1242286406
-
Independent component analysis based on nonparametric density estimation
-
R. Boscolo, H. Pan, and V. P. Roychowdhury, "Independent component analysis based on nonparametric density estimation," IEEE Trans. Neural Netw., vol. 15, no. 1, pp. 55-65, 2004.
-
(2004)
IEEE Trans. Neural Netw
, vol.15
, Issue.1
, pp. 55-65
-
-
Boscolo, R.1
Pan, H.2
Roychowdhury, V.P.3
-
18
-
-
0034133184
-
Learning overcomplete representations
-
S. L. Michael and J. S. Terrence, "Learning overcomplete representations," Neural Comput., vol. 12, pp. 337-365, 2000.
-
(2000)
Neural Comput
, vol.12
, pp. 337-365
-
-
Michael, S.L.1
Terrence, J.S.2
-
19
-
-
2442473143
-
Analysis of sparse representation and blind source separation
-
Y. Q. Li, A. Cichocki, and S. Amari, "Analysis of sparse representation and blind source separation," Neural Comput., vol. 16, pp. 1193-1234, 2004.
-
(2004)
Neural Comput
, vol.16
, pp. 1193-1234
-
-
Li, Y.Q.1
Cichocki, A.2
Amari, S.3
-
20
-
-
23044451368
-
Sparse component analysis and blind source separation of underdetermined mixtures
-
Jul
-
P. Georgiev, F. Theis, and A. Cichocki, "Sparse component analysis and blind source separation of underdetermined mixtures," IEEE Trans. Neural Netw., vol. 16, no. 4, pp. 992-996, Jul. 2005.
-
(2005)
IEEE Trans. Neural Netw
, vol.16
, Issue.4
, pp. 992-996
-
-
Georgiev, P.1
Theis, F.2
Cichocki, A.3
-
21
-
-
31344466301
-
Underdetermined blind source separation based on sparse representations
-
Y. Q. Li, S. Amari, A. Cichocki, W. C. H. Daniel, and S. L. Xie, "Underdetermined blind source separation based on sparse representations," IEEE Trans. Signal Process., vol. 54, no. 2, pp. 423-437, 2006.
-
(2006)
IEEE Trans. Signal Process
, vol.54
, Issue.2
, pp. 423-437
-
-
Li, Y.Q.1
Amari, S.2
Cichocki, A.3
Daniel, W.C.H.4
Xie, S.L.5
-
22
-
-
33746962345
-
Probability estimation for recoverability analysis of blind source separation based on sparse representation
-
Y. Q. Li, S. Amari, A. Cichocki, and G. Cuntai, "Probability estimation for recoverability analysis of blind source separation based on sparse representation," IEEE Trans. Inf. Theory, vol. 52, no. 7, pp. 3139-3152, 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.7
, pp. 3139-3152
-
-
Li, Y.Q.1
Amari, S.2
Cichocki, A.3
Cuntai, G.4
-
23
-
-
13244259260
-
A note on Stone's conjecture of blind separation
-
S. L. Xie, Z. S. He, and Y. L. Fu, "A note on Stone's conjecture of blind separation," Neural Comput., vol. 17, pp. 321-330, 2005.
-
(2005)
Neural Comput
, vol.17
, pp. 321-330
-
-
Xie, S.L.1
He, Z.S.2
Fu, Y.L.3
-
24
-
-
0033592606
-
Learning of the parts of objects by non-negative matrix factorization
-
D. D. Lee and H. S. Seung, "Learning of the parts of objects by non-negative matrix factorization," Nature, vol. 401, pp. 788-791, 1999.
-
(1999)
Nature
, vol.401
, pp. 788-791
-
-
Lee, D.D.1
Seung, H.S.2
-
25
-
-
84898964201
-
Algorithms for nonnegative matrix factorization
-
D. D. Lee and H. S. Seung, "Algorithms for nonnegative matrix factorization," Adv. Neural Inf. Process. Syst., vol. 13, pp. 556-562, 2001.
-
(2001)
Adv. Neural Inf. Process. Syst
, vol.13
, pp. 556-562
-
-
Lee, D.D.1
Seung, H.S.2
-
26
-
-
84900510076
-
Non-negative matrix factorization with sparseness constraints
-
P. O. Hoyer, "Non-negative matrix factorization with sparseness constraints," J. Machine Learning Res., vol. 5, pp. 1457-1469, 2004.
-
(2004)
J. Machine Learning Res
, vol.5
, pp. 1457-1469
-
-
Hoyer, P.O.1
-
27
-
-
33947675352
-
New algorithm for non-negative matrix factorization in applications to blind source separation
-
A. Cichocki, R. Zdunek, and S. Amari, "New algorithm for non-negative matrix factorization in applications to blind source separation," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., 2006, vol. 5, pp. 621-624.
-
(2006)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process
, vol.5
, pp. 621-624
-
-
Cichocki, A.1
Zdunek, R.2
Amari, S.3
-
28
-
-
34247173538
-
Nonnegative matrix factorization with constrained second-order optimization
-
R. Zdunek and A. Cichocki, "Nonnegative matrix factorization with constrained second-order optimization," Signal Process., vol. 87, pp. 1904-1916, 2007.
-
(2007)
Signal Process
, vol.87
, pp. 1904-1916
-
-
Zdunek, R.1
Cichocki, A.2
-
29
-
-
33646910575
-
Nonnegative matrix factorization and I-divergence alternating minimization
-
F. Lorenzo and S. Peter, "Nonnegative matrix factorization and I-divergence alternating minimization," Linear Algebra and its Application, vol. 416, pp. 270-287, 2006.
-
(2006)
Linear Algebra and its Application
, vol.416
, pp. 270-287
-
-
Lorenzo, F.1
Peter, S.2
-
30
-
-
8344243977
-
Generating user-based cryptographic keys and random numbers
-
M. Peyravian, S. M. Matyas, A. Roginsky, and N. Zunic, "Generating user-based cryptographic keys and random numbers," Comput. Security vol. 18, no. 7, pp. 619-626, 1999.
-
(1999)
Comput. Security
, vol.18
, Issue.7
, pp. 619-626
-
-
Peyravian, M.1
Matyas, S.M.2
Roginsky, A.3
Zunic, N.4
-
31
-
-
33748335721
-
2-distance non-Gaussianity measure
-
2-distance non-Gaussianity measure," Signal Process., vol. 86, pp. 3404-3420, 2006.
-
(2006)
Signal Process
, vol.86
, pp. 3404-3420
-
-
Caiafa, C.F.1
Proto, A.N.2
-
32
-
-
54749085735
-
-
Available: [Online, Available
-
[Online]. Available: http://csrc.nist.gov/ hash_standards_comments.pdf[Online]. Available:
-
-
-
-
33
-
-
33745711530
-
Blind signal separation on real data: Tracking and implementation
-
P. Baxter, G. Spence, and J. McWhirter, "Blind signal separation on real data: Tracking and implementation," in Proc. 6th Int. Symp. Independent Compon. Anal. Blind Signal Separ, 2006, vol. 3889, pp. 327-334.
-
(2006)
Proc. 6th Int. Symp. Independent Compon. Anal. Blind Signal Separ
, vol.3889
, pp. 327-334
-
-
Baxter, P.1
Spence, G.2
McWhirter, J.3
-
35
-
-
34147178821
-
Improved stone's complexity pursuit for hyperspectral imagery unmixing
-
S. Jia and Y. T. Qian, "Improved stone's complexity pursuit for hyperspectral imagery unmixing," in Proc. 18th Int. Conf. Pattern Recogn., 2006, vol. 4, pp. 817-820.
-
(2006)
Proc. 18th Int. Conf. Pattern Recogn
, vol.4
, pp. 817-820
-
-
Jia, S.1
Qian, Y.T.2
-
36
-
-
13844295882
-
-
Riken BSI. Saitama, Japan, Mar. 28, Online, Available
-
A. Cichocki, S. Amari, K. Siwek, and T. Tanaka, "ICALABA Toolboxes," Riken BSI. Saitama, Japan, Mar. 28, 2007 [Online]. Available: http://www.bsp.brain.riken.jp/ICALAB
-
(2007)
ICALABA Toolboxes
-
-
Cichocki, A.1
Amari, S.2
Siwek, K.3
Tanaka, T.4
-
38
-
-
0035112152
-
Nonlinear blind source separation using a radial basis function network
-
Jan
-
Y. tan, J. Wang, and J. M. Zurada, "Nonlinear blind source separation using a radial basis function network," IEEE Trans. Neural Netw., vol. 12, no. 1, pp. 124-134, Jan. 2001.
-
(2001)
IEEE Trans. Neural Netw
, vol.12
, Issue.1
, pp. 124-134
-
-
tan, Y.1
Wang, J.2
Zurada, J.M.3
-
39
-
-
0344272243
-
Post-nonlinear blind source separation using methaheuristics
-
R. Martin-Clemente, C. G. Putonet, and F. Rojas, "Post-nonlinear blind source separation using methaheuristics," Electron. Lett., vol. 39, no. 24, pp. 1765-1766, 2003.
-
(2003)
Electron. Lett
, vol.39
, Issue.24
, pp. 1765-1766
-
-
Martin-Clemente, R.1
Putonet, C.G.2
Rojas, F.3
-
40
-
-
51749112518
-
Algorithms, initializations, and convergence for the nonnegative matrix factorization
-
presented at the, Aug, unpublished
-
R. Albright, J. Cox, D. Duling, A. N. Langville, and C. D. Meyer, "Algorithms, initializations, and convergence for the nonnegative matrix factorization," presented at the 12th ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining, Aug. 2006, unpublished.
-
(2006)
12th ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining
-
-
Albright, R.1
Cox, J.2
Duling, D.3
Langville, A.N.4
Meyer, C.D.5
-
41
-
-
34548085689
-
Robust and secure image hashing via non-negative matrix factorization
-
Sep
-
V. Monga and M. K. Mihcak, "Robust and secure image hashing via non-negative matrix factorization," IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 376-390, Sep. 2007.
-
(2007)
IEEE Trans. Inf. Forensics Security
, vol.2
, Issue.3
, pp. 376-390
-
-
Monga, V.1
Mihcak, M.K.2
-
42
-
-
0030285433
-
Robust neural networks with on-line learning for blind identification and blind separation of sources
-
Nov
-
A. Cichocki and R. Unbehauen, "Robust neural networks with on-line learning for blind identification and blind separation of sources," IEEE Trans. Circuits Syst. I, Fundam. Theory Appl., vol. 43, no. 11, pp. 894-906, Nov. 1996.
-
(1996)
IEEE Trans. Circuits Syst. I, Fundam. Theory Appl
, vol.43
, Issue.11
, pp. 894-906
-
-
Cichocki, A.1
Unbehauen, R.2
-
43
-
-
41249091197
-
A Blind Source Separation-Based Method for Multiple Images Encryption
-
Q. H. Lin, F. L. Yin, T. M. Mei, and H. L. Liang, "A Blind Source Separation-Based Method for Multiple Images Encryption," Image Vis. Comput., vol. 26, no. 6, pp. 788-798, 2008.
-
(2008)
Image Vis. Comput
, vol.26
, Issue.6
, pp. 788-798
-
-
Lin, Q.H.1
Yin, F.L.2
Mei, T.M.3
Liang, H.L.4
|