Sciweavers

910 search results - page 105 / 182
» Fractal-Based Techniques for a Generalized Image Coding Meth...
Sort
View
TIFS
2008
152views more  TIFS 2008»
13 years 10 months ago
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works to a more general scenario. The se...
Luis Pérez-Freire, Fernando Pérez-Go...
ICPR
2002
IEEE
14 years 3 months ago
Self-Calibration of a Camera from Video of a Walking Human
Analysis of human activity from a video camera is simplified by the knowledge of the camera’s intrinsic and extrinsic parameters. We describe a technique to estimate such param...
Fengjun Lv, Tao Zhao, Ramakant Nevatia
ISBI
2006
IEEE
14 years 11 months ago
An efficient locally affine framework for the registration of anatomical structures
Non-Rigid image registration has been widely developed over the last years. However, many registration techniques do not take into account any a priori information on the structur...
Olivier Commowick, Vincent Arsigny, María J...
ICMCS
2006
IEEE
134views Multimedia» more  ICMCS 2006»
14 years 4 months ago
Modeling Blocking Visual Sensitivity Profile
Blocking artifact is the most prevailing degradation caused by block-based DCT coding techniques under low bit-rate conditions. To alleviate blockings perceptually, it is desirabl...
Guangtao Zhai, Wenjun Zhang, Xiaokang Yang, Yi Xu
ICIP
2003
IEEE
14 years 12 months ago
Random access using isolated regions
Random access is a desirable feature in many video communication systems. Intra pictures have been conventionally used as random access points, but correct picture content can als...
Miska M. Hannuksela, Ye-Kui Wang, Moncef Gabbouj