Sciweavers

944 search results - page 187 / 189
» An evaluation of image based steganography methods
Sort
View
MIR
2010
ACM
191views Multimedia» more  MIR 2010»
14 years 10 days ago
Video retargeting with multi-scale trajectory optimization
Mobile devices are increasingly powerful in media storage and rendering. The prevalent request of decent video browsing on mobile devices is demanding. However, one limitation com...
Yuanning Li, YongHong Tian, Jingjing Yang, Ling-Yu...
SIGIR
2011
ACM
12 years 11 months ago
Mining tags using social endorsement networks
Entities on social systems, such as users on Twitter, and images on Flickr, are at the core of many interesting applications: they can be ranked in search results, recommended to ...
Theodoros Lappas, Kunal Punera, Tamás Sarlo...
CVPR
2006
IEEE
14 years 10 months ago
BoostMotion: Boosting a Discriminative Similarity Function for Motion Estimation
Motion estimation for applications where appearance undergoes complex changes is challenging due to lack of an appropriate similarity function. In this paper, we propose to learn ...
Shaohua Kevin Zhou, Bogdan Georgescu, Dorin Comani...
ECCV
2004
Springer
14 years 10 months ago
A Robust Algorithm for Characterizing Anisotropic Local Structures
This paper proposes a robust estimation and validation framework for characterizing local structures in a positive multi-variate continuous function approximated by a Gaussian-base...
Kazunori Okada, Dorin Comaniciu, Navneet Dalal, Ar...
TCSV
2010
13 years 3 months ago
No-Reference Quality Assessment of H.264/AVC Encoded Video
Abstract--This paper proposes a no-reference quality assessment metric for digital video subject to H.264/AVC encoding. The proposed metric comprises two main steps: coding error e...
Tomás Brandão, Tiago Rosa Maria Paul...