In the integrity checking context of multimedia contents, a malicious user aims at devising a forged content in order to fool a watermarker by making him use as a genuine content....
Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc...
New technological developments offer new collaborative design environments to designers. There is a great interest in these new tools however it is clear that we know very little ...
Visual analysis of human behavior has generated considerable interest in the field of computer vision because of the wide spectrum of potential applications. In this paper, we pre...
Yu-Ming Liang, Sheng-Wen Shih, Arthur Chun-Chieh S...
During day-to-day activities, a user refers to various data items on a PC, such as documents, images, and audio clips. However, when the number of items in the history increases, ...
With a large number of surveillance cameras, it is not an easy task to determine which camera should be monitored and which region of the camera images should be checked so that al...