Sciweavers

1259 search results - page 165 / 252
» In search of the memoryless property
Sort
View
ICIP
2003
IEEE
14 years 9 months ago
Halftone visual cryptography
This paper considers the problem of encoding a secret binary image SI into n shares of meaningful halftone images within the scheme of visual cryptography (VC). Secret pixels enco...
Z. Zhou, Gonzalo R. Arce, Giovanni Di Crescenzo
ICIP
2002
IEEE
14 years 9 months ago
Fast and effective characterization of 3D region data
We consider the problem of characterization of spatial region data such as the regions of interest (ROIs) in medical images. We propose a method that efficiently extracts a k-dime...
Vasileios Megalooikonomou, Haimonti Dutta, Despina...
ICIP
2001
IEEE
14 years 9 months ago
A hierarchical image authentication watermark with improved localization and security
Several fragile watermarking schemes presented in the literature are either vulnerable to vector quantization (VQ) counterfeiting attacks or sacrifice localization accuracy to imp...
Mehmet Utku Celik, Gaurav Sharma, Eli Saber, A. Mu...
ICDE
2006
IEEE
222views Database» more  ICDE 2006»
14 years 9 months ago
CLAN: An Algorithm for Mining Closed Cliques from Large Dense Graph Databases
Most previously proposed frequent graph mining algorithms are intended to find the complete set of all frequent, closed subgraphs. However, in many cases only a subset of the freq...
Jianyong Wang, Zhiping Zeng, Lizhu Zhou
ICPR
2004
IEEE
14 years 9 months ago
Inter-Stage Feature Propagation in Cascade Building with AdaBoost
A modification of the cascaded detector with the AdaBoost trained stage classifiers is proposed and brought to bear on the face detection problem. The cascaded detector is a seque...
Jan Sochman, Jiri Matas