Sciweavers

853 search results - page 105 / 171
» Flexible authentication of images
Sort
View
CORR
2011
Springer
167views Education» more  CORR 2011»
13 years 20 days ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
CVPR
2004
IEEE
14 years 11 months ago
The World in an Eye
This paper provides a comprehensive analysis of exactly what visual information about the world is embedded within a single image of an eye. It turns out that the cornea of an eye...
Ko Nishino, Shree K. Nayar
ICIP
2006
IEEE
14 years 10 months ago
Generalized Histogram Equalization Based on Local Characteristics
From time to time, state-of-the-art contrast enhancement algorithms face undesired drawbacks, like loss of tiny details, enhancement of image noise, occasional overenhancement, an...
Tzu-Cheng Jen, Sheng-Jyh Wang
MICCAI
2009
Springer
14 years 10 months ago
Endoscopic Orientation Correction
Abstract. An open problem in endoscopic surgery (especially with flexible endoscopes) is the absence of a stable horizon in endoscopic images. With our "Endorientation" a...
Kurt Höller, Jochen Penne, Armin Schneider, J...
IJCNN
2007
IEEE
14 years 3 months ago
Analysis of mammogram using self-organizing neural networks based on spatial isomorphism
— The correct segmentation and measurement of mammography images is of fundamental importance for the development of automatic or computer-aided cancer detection systems. In this...
Aida A. Ferreira, Francisco Nascimento Jr., Ing Re...