Sciweavers

101 search results - page 18 / 21
» Extended visual cryptography schemes
Sort
View
WACV
2012
IEEE
12 years 2 months ago
Predicting human gaze using quaternion DCT image signature saliency and face detection
We combine and extend the previous work on DCT-based image signatures and face detection to determine the visual saliency. To this end, we transfer the scalar definition of image...
Boris Schauerte, Rainer Stiefelhagen
USS
2004
13 years 8 months ago
Graphical Dictionaries and the Memorable Space of Graphical Passwords
In commonplace textual password schemes, users choose passwords that are easy to recall. Since memorable passwords typically exhibit patterns, they are exploitable by brute-force ...
Julie Thorpe, Paul C. van Oorschot
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
14 years 1 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...

Publication
1169views
15 years 5 days ago
Image Enhancement for Backlight-Scaled TFT-LCD Displays
One common way to extend the battery life of a portable device is to reduce the LCD backlight intensity. In contrast to previous approaches that minimize the power consumption by a...
Pei-Shan Tsai, Chia-Kai Liang, Tai-Hsiang Huang, a...
ECCV
2000
Springer
14 years 9 months ago
Regularised Range Flow
Extending a differential total least squares method for range flow estimation we present an iterative regularisation approach to compute dense range flow fields. We demonstrate how...
Bernd Jähne, Hagen Spies, John L. Barron