: The effectiveness of semantic applications can be increased significantly if the system does not urge the users to take care of explicit semantic annotation creation. Today, sema...
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
:Many motion object detection algorithms rely on the process of background subtraction, an important technique which is used for detecting changes from a model of the background ...
This paper presents a new approach to scene analysis, which aims at extracting structured information from a video sequence using directly low-level data. The method models the se...
Triangular Irregular Network (TIN) and Regular Square Grid (RSG) are widely used for representing 2.5 dimensional spatial data. However, these models are not defined from the topo...