We evaluate the performance of MPEG-7 image signatures, Compressed Histogram of Gradients descriptor (CHoG) and Scale Invariant Feature Transform (SIFT) descriptors for mobile vis...
Vijay Chandrasekhar, David M. Chen, Andy Lin, Gabr...
It is widely believed that content-signature-based intrusion detection systems (IDSes) are easily evaded by polymorphic worms, which vary their payload on every infection attempt....
The joint invariants of the projective group PSL(3, R) on RP2 , the five-point volume cross-ratios, are studied to address the problem of correspondence in a camera network. The ...
This paper reports a statistical script identification technique that determines the script of document images, especially camera-based images which suffer from perspective distor...
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...