Sciweavers

419 search results - page 37 / 84
» Is a detector only good for detection
Sort
View
IWDW
2007
Springer
14 years 1 months ago
A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack
Abstract. In this paper, we propose a practical real-time video watermarking scheme for downscaling attack. We embed watermark into an arbitrary size of a host video and extract it...
Kyung-Su Kim, Dong-Hyuck Im, Young-Ho Suh, Heung-K...
FGR
2006
IEEE
117views Biometrics» more  FGR 2006»
14 years 1 months ago
A Landmark Paper in Face Recognition
Good registration (alignment to a reference) is essential for accurate face recognition. The effects of the number of landmarks on the mean localization error and the recognition ...
G. M. Beumer, Qian Tao, Asker M. Bazen, Raymond N....
DIMVA
2008
13 years 9 months ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
ECCV
2010
Springer
13 years 11 months ago
Recursive Coarse-to-Fine Localization for fast Object Detection
Cascading techniques are commonly used to speed-up the scan of an image for object detection. However, cascades of detectors are slow to train due to the high number of detectors a...
Marco Pedersoli, Jordi Gonzàlez, Andrew D. Bagdan...
IWDW
2004
Springer
14 years 1 months ago
Informed Detection Revisited
Abstract. Watermarking systems can employ either informed detection, where the original cover work is required, or blind detection, where it is not required. While early systems us...
Jeffrey A. Bloom, Matthew L. Miller