Sciweavers

853 search results - page 59 / 171
» Flexible authentication of images
Sort
View
JDCTA
2008
535views more  JDCTA 2008»
13 years 7 months ago
Steganography: DCT Coefficients Reparation Technique in JPEG Image
Due to the ever-growing usage of the computer, it has led to a rapid increment in the data that is being exchanged, published and stored in an assortment of digital form. This phe...
Chiew Kang Leng, Jane Labadin, Sarah Flora Samson ...
MEDIAFORENSICS
2010
13 years 9 months ago
Image forensic analyses that elude the human visual system
While historically we may have been overly trusting of photographs, in recent years there has been a backlash of sorts and the authenticity of photographs is now routinely questio...
Hany Farid, Mary J. Bravo
CVPR
1996
IEEE
14 years 9 months ago
Skin and Bones: Multi-layer, Locally Affine, Optical Flow and Regularization with Transparency
This paper describes a new method for estimating optical flow that strikes a balance between the flexibility of local dense computations and the robustness and accuracy of global ...
Shanon X. Ju, Michael J. Black, Allan D. Jepson
SIGGRAPH
1998
ACM
13 years 12 months ago
Multiple-center-of-projection Images
In image-based rendering, images acquired from a scene are used to represent the scene itself. A number of reference images are required to fully represent even the simplest scene...
Paul Rademacher, Gary Bishop
ECCV
2008
Springer
14 years 9 months ago
Signature-Based Document Image Retrieval
As the most pervasive method of individual identification and document authentication, signatures present convincing evidence and provide an important form of indexing for effectiv...
Guangyu Zhu, Yefeng Zheng, David S. Doermann