Sciweavers

1313 search results - page 95 / 263
» Data Discretization Unification
Sort
View
106
Voted
ECCV
2006
Springer
16 years 4 months ago
Curvature-Preserving Regularization of Multi-valued Images Using PDE's
Abstract. We are interested in diffusion PDE's for smoothing multi-valued images in an anisotropic manner. By pointing out the pros and cons of existing tensor-driven regulari...
David Tschumperlé
121
Voted
ICIP
2008
IEEE
16 years 4 months ago
A perceptual metric for blind measurement of blocking artifacts with applications in transform-block-based image and video codin
In this paper, we analyze the formation of blocking artifacts as a result of quantization of the discrete cosine transform (DCT) coefficients. These artifacts are known to be the ...
Koohyar Minoo, Truong Q. Nguyen
127
Voted
ICIP
2008
IEEE
16 years 4 months ago
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding sche
Our recently introduced JPEG steganographic method called Yet Another Steganographic Scheme (YASS) can resist blind steganalysis by embedding data in the discrete cosine transform...
Anindya Sarkar, Lakshmanan Nataraj, B. S. Manjunat...
103
Voted
ICIP
2007
IEEE
16 years 4 months ago
Estimating Steganographic Capacity for Odd-Even Based Embedding and its Use in Individual Compensation
We present a method to compute the steganographic capacity for images, with odd-even based hiding in the quantized discrete cosine transform domain. The method has been generalize...
Anindya Sarkar, B. S. Manjunath
211
Voted
ICDE
2002
IEEE
104views Database» more  ICDE 2002»
16 years 3 months ago
Efficient Evaluation of Queries with Mining Predicates
Modern relational database systems are beginning to support ad hoc queries on mining models. In this paper, we explore novel techniques for optimizing queries that apply mining mo...
Surajit Chaudhuri, Vivek R. Narasayya, Sunita Sara...