Sciweavers

853 search results - page 53 / 171
» Flexible authentication of images
Sort
View
ICASSP
2007
IEEE
13 years 9 months ago
A Flexible Video Transmission System Based on JPEG 2000 Conditional Replenishment with Multiple References
The image compression standard JPEG 2000 offers a high compression ef ciency as well as a great exibility in the way it accesses the content in terms of spatial location, quality ...
François-Olivier Devaux, Jérôm...
CORR
2000
Springer
104views Education» more  CORR 2000»
13 years 7 months ago
ATLAS: A flexible and extensible architecture for linguistic annotation
We describe a formal model for annotating linguistic artifacts, from which we derive an application programming interface (API) to a tools for manipulating these annotations. The ...
Steven Bird, David Day, John S. Garofolo, John Hen...
ICASSP
2010
IEEE
13 years 6 months ago
Flexible complex ICA of fMRI data
Data-driven analysis methods, in particular independent component analysis (ICA) has proven quite useful for the analysis of functional magnetic imaging (fMRI) data. In addition, ...
Hualiang Li, Tülay Adali, Nicolle M. Correa, ...
CORR
2010
Springer
191views Education» more  CORR 2010»
13 years 7 months ago
Dual Watermarking Scheme with Encryption
-- Digital Watermarking is used for copyright protection and authentication. In the proposed system, a Dual Watermarking Scheme based on DWT-SVD with chaos encryption algorithm, wi...
R. Dhanalakshmi, K. Thaiyalnayaki
ICIP
1999
IEEE
14 years 9 months ago
Deformable Matching of Hand Shapes for User Verification
Wepresent a method for personal authentication based on deformable matching of hand shapes. Authentication systems are already employed in domains that require some sort of user v...
Anil K. Jain, Nicolae Duta