Figure 4From: Music content authentication based on beat segmentation and fuzzy classificationBeat mapping between the original and the dubious music. (a) One beat in the test music is mapped into two beats of the original music; (b) corresponding DTW representation of (a).Back to article page