Sciweavers

1313 search results - page 95 / 263
» Data Discretization Unification
Sort
View
ECCV
2006
Springer
15 years 17 hour ago
Curvature-Preserving Regularization of Multi-valued Images Using PDE's
Abstract. We are interested in diffusion PDE's for smoothing multi-valued images in an anisotropic manner. By pointing out the pros and cons of existing tensor-driven regulari...
David Tschumperlé
ICIP
2008
IEEE
14 years 12 months ago
A perceptual metric for blind measurement of blocking artifacts with applications in transform-block-based image and video codin
In this paper, we analyze the formation of blocking artifacts as a result of quantization of the discrete cosine transform (DCT) coefficients. These artifacts are known to be the ...
Koohyar Minoo, Truong Q. Nguyen
ICIP
2008
IEEE
14 years 12 months ago
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding sche
Our recently introduced JPEG steganographic method called Yet Another Steganographic Scheme (YASS) can resist blind steganalysis by embedding data in the discrete cosine transform...
Anindya Sarkar, Lakshmanan Nataraj, B. S. Manjunat...
ICIP
2007
IEEE
14 years 11 months ago
Estimating Steganographic Capacity for Odd-Even Based Embedding and its Use in Individual Compensation
We present a method to compute the steganographic capacity for images, with odd-even based hiding in the quantized discrete cosine transform domain. The method has been generalize...
Anindya Sarkar, B. S. Manjunath
ICDE
2002
IEEE
104views Database» more  ICDE 2002»
14 years 11 months ago
Efficient Evaluation of Queries with Mining Predicates
Modern relational database systems are beginning to support ad hoc queries on mining models. In this paper, we explore novel techniques for optimizing queries that apply mining mo...
Surajit Chaudhuri, Vivek R. Narasayya, Sunita Sara...