Sciweavers

603 search results - page 104 / 121
» Embedded Formulas Extraction
Sort
View
CORR
2008
Springer
61views Education» more  CORR 2008»
13 years 7 months ago
Science mapping with asymmetrical paradigmatic proximity
We propose a series of methods to represent the evolution of a field of science at different levels: namely micro, meso and macro levels. We use a previously introduced asymmetric...
Jean-Philippe Cointet, David Chavalarias
CVIU
2008
180views more  CVIU 2008»
13 years 7 months ago
Topology cuts: A novel min-cut/max-flow algorithm for topology preserving segmentation in N-D images
Topology is an important prior in many image segmentation tasks. In this paper, we design and implement a novel graph-based min-cut/max-flow algorithm that incorporates topology p...
Yun Zeng, Dimitris Samaras, Wei Chen, Qunsheng Pen...
JEI
2006
113views more  JEI 2006»
13 years 7 months ago
Transparent robust information hiding for ownership verification
For copyright protection, the robustness of a watermarking scheme against various attacks is an essential requirement. Many proposed robust watermarking schemes may achieve good r...
Dan Yu, Farook Sattar, Sirajudeen Gulam Razul
PR
2008
87views more  PR 2008»
13 years 7 months ago
Two-dimensional Laplacianfaces method for face recognition
In this paper we propose a two-dimensional (2D) Laplacianfaces method for face recognition. The new algorithm is developed based on two techniques, i.e., locality preserved embedd...
Ben Niu, Qiang Yang, Simon Chi-Keung Shiu, Sankar ...
IJNSEC
2007
121views more  IJNSEC 2007»
13 years 7 months ago
Data Hiding in a Kind of PDF Texts for Secret Communication
In this paper, we present a novel steganographic technique for hiding data in a kind of PDF texts. We first point out the secret channels in a kind of PDF English texts, which ar...
Shangping Zhong, Xueqi Cheng, Tierui Chen