Sciweavers

910 search results - page 105 / 182
» Fractal-Based Techniques for a Generalized Image Coding Meth...
Sort
View
159
Voted
TIFS
2008
152views more  TIFS 2008»
15 years 3 months ago
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works to a more general scenario. The se...
Luis Pérez-Freire, Fernando Pérez-Go...
ICPR
2002
IEEE
15 years 8 months ago
Self-Calibration of a Camera from Video of a Walking Human
Analysis of human activity from a video camera is simplified by the knowledge of the camera’s intrinsic and extrinsic parameters. We describe a technique to estimate such param...
Fengjun Lv, Tao Zhao, Ramakant Nevatia
117
Voted
ISBI
2006
IEEE
16 years 4 months ago
An efficient locally affine framework for the registration of anatomical structures
Non-Rigid image registration has been widely developed over the last years. However, many registration techniques do not take into account any a priori information on the structur...
Olivier Commowick, Vincent Arsigny, María J...
102
Voted
ICMCS
2006
IEEE
134views Multimedia» more  ICMCS 2006»
15 years 9 months ago
Modeling Blocking Visual Sensitivity Profile
Blocking artifact is the most prevailing degradation caused by block-based DCT coding techniques under low bit-rate conditions. To alleviate blockings perceptually, it is desirabl...
Guangtao Zhai, Wenjun Zhang, Xiaokang Yang, Yi Xu
114
Voted
ICIP
2003
IEEE
16 years 5 months ago
Random access using isolated regions
Random access is a desirable feature in many video communication systems. Intra pictures have been conventionally used as random access points, but correct picture content can als...
Miska M. Hannuksela, Ye-Kui Wang, Moncef Gabbouj