Sciweavers

102 search results - page 11 / 21
» An Image Authentication Scheme Based on Correlation
Sort
View
PCM
2001
Springer
110views Multimedia» more  PCM 2001»
14 years 7 days ago
A Synchronous Fragile Watermarking Scheme for Erroneous Q-DCT Coefficients Detection
In video communications over error introducing channels, error concealment techniques are widely applied in video decoder for good subjective images output. However, a damaged MB ...
Minghua Chen, Yun He
CVPR
2004
IEEE
14 years 9 months ago
Automatic Method for Correlating Horizons across Faults in 3D Seismic Data
Horizons are visible boundaries between certain sediment layers in seismic data, and a fault is a crack of horizons and it is recognized in seismic data by the discontinuities of ...
Fitsum Admasu, Klaus D. Tönnies
PRL
2007
160views more  PRL 2007»
13 years 7 months ago
A 3D face and hand biometric system for robust user-friendly authentication
A complete authentication system based on fusion of 3D face and hand biometrics is presented and evaluated in this paper. The system relies on a low cost real-time sensor, which c...
Filareti Tsalakanidou, Sotiris Malassiotis, Michae...
ICPR
2000
IEEE
14 years 6 days ago
Locale-Based Visual Object Retrieval under Illumination Change
Providing a user with an effective image search engine has been a very active research area. A search by an object model is considered to be one of the most desirable and yet difï...
Zinovi Tauber, Ze-Nian Li, Mark S. Drew
ICMCS
2006
IEEE
147views Multimedia» more  ICMCS 2006»
14 years 1 months ago
A Secret Key Based Multiscale Fragile Watermark in the Wavelet Domain
The distribution of the wavelet coefficients in 2-D discrete wavelet transform (DWT) subspaces can be well described by a Gaussian mixture statistical model. In this paper, a secr...
Hua Yuan, Xiao-Ping Zhang