Sciweavers

72 search results - page 14 / 15
» A DCT Domain Visible Watermarking Technique for Images
Sort
View
ADC
2007
Springer
170views Database» more  ADC 2007»
14 years 4 months ago
Pruning SIFT for Scalable Near-duplicate Image Matching
The detection of image versions from large image collections is a formidable task as two images are rarely identical. Geometric variations such as cropping, rotation, and slight p...
Jun Jie Foo, Ranjan Sinha
ECMAST
1998
Springer
118views Multimedia» more  ECMAST 1998»
14 years 2 months ago
Error-Robustness of Polar Contour-Coding
For communication using digital video, compression is mandatory because of the high bit-rate requiring a large bandwidth or storage capacity. Recent developments as well as upcomi...
Frank H. P. Spaan, Reginald L. Lagendijk, Jan Biem...
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
14 years 4 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
IJCV
2008
157views more  IJCV 2008»
13 years 10 months ago
A General Method for Sensor Planning in Multi-Sensor Systems: Extension to Random Occlusion
Systems utilizing multiple sensors are required in many domains. In this paper, we specifically concern ourselves with applications where dynamic objects appear randomly and the s...
Anurag Mittal, Larry S. Davis
CVPR
2012
IEEE
12 years 23 days ago
An analysis of color demosaicing in plenoptic cameras
A plenoptic camera captures the 4D radiance about a scene. Recent practical solutions mount a microlens array on top of a commodity SLR to directly acquire these rays. However, th...
Zhan Yu, Jingyi Yu, Andrew Lumsdaine, Todor Georgi...