Sciweavers

1773 search results - page 122 / 355
» A new partitioning scheme for improvement of image computati...
Sort
View
ICIP
2008
IEEE
14 years 10 months ago
Image registration using Adaptive Polar Transform
Image registration is an essential step in many image processing applications that need visual information from multiple images for comparison, integration or analysis. Recently r...
Rittavee Matungka, Yuan F. Zheng, Robert L. Ewing
ICISC
2003
89views Cryptology» more  ICISC 2003»
13 years 10 months ago
Security Analysis of Some Proxy Signatures
Abstract. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...
CSSE
2008
IEEE
14 years 3 months ago
Embedding in Two Least Significant Bits with Wet Paper Coding
In this paper, we present three embedding schemes for extensions of least significant bit overwriting to both of the two lowest bit planes in digital images. Our approaches are in...
Xin Liao, Qiao-Yan Wen
ICIP
2005
IEEE
14 years 10 months ago
Extracting micro-structural gabor features for face recognition
Robustness and discriminability are two key issues in face recognition. In this paper, we propose a new algorithm which extracts micro-structural Gabor feature to achieve good robu...
Dian Gong, Qiong Yang, Xiaoou Tang, Jianhua Lu
ICCV
2009
IEEE
13 years 6 months ago
Image annotation using multi-label correlated Green's function
Image annotation has been an active research topic in the recent years due to its potentially large impact on both image understanding and web/database image search. In this paper...
Hua Wang, Heng Huang, Chris H. Q. Ding