Sciweavers

112 search results - page 20 / 23
» Analysis of Patch Substructuring Methods
Sort
View
FGR
2008
IEEE
184views Biometrics» more  FGR 2008»
14 years 2 months ago
Multi-attribute robust facial feature localization
In this paper, we focus on the reliable detection of facial fiducial points, such as eye, eyebrow and mouth corners. The proposed algorithm aims to improve automatic landmarking ...
Oya Çeliktutan, Hatice Cinar Akakin, Bü...
IWDW
2005
Springer
14 years 1 months ago
Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images
Abstract. In this paper, the security of Dither Modulation Quantization Index Modulation schemes for digital images is analyzed. Both pixel and DCT coefficient quantization schemes...
Patrick Bas, Jarmo Hurri
ICPR
2010
IEEE
13 years 5 months ago
Identifying Gender from Unaligned Facial Images by Set Classification
Abstract--Rough face alignments lead to suboptimal performance of face identification systems. In this study, we present a novel approach for identifying genders from facial images...
Wen-Sheng Chu, Chun-Rong Huang, Chu-Song Chen
SIAMIS
2010
156views more  SIAMIS 2010»
13 years 2 months ago
Learning the Morphological Diversity
This article proposes a new method for image separation into a linear combination of morphological components. Sparsity in fixed dictionaries is used to extract the cartoon and osc...
Gabriel Peyré, Jalal Fadili, Jean-Luc Starc...
CSFW
2009
IEEE
14 years 2 months ago
Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities
—As networked systems grow in complexity, they are increasingly vulnerable to denial-of-service (DoS) attacks involving resource exhaustion. A single malicious input of coma can ...
Richard M. Chang, Guofei Jiang, Franjo Ivancic, Sr...