Sciweavers

403 search results - page 25 / 81
» Morphological Change Detection Algorithms for Surveillance A...
Sort
View
FDTC
2006
Springer
106views Cryptology» more  FDTC 2006»
13 years 11 months ago
Sign Change Fault Attacks on Elliptic Curve Cryptosystems
We present a new type of fault attacks on elliptic curve scalar multiplications: Sign Change Attacks. These attacks exploit different number representations as they are often emplo...
Johannes Blömer, Martin Otto 0002, Jean-Pierr...
AVSS
2007
IEEE
14 years 2 months ago
Midground object detection in real world video scenes
Traditional video scene analysis depends on accurate background modeling to identify salient foreground objects. However, in many important surveillance applications, saliency is ...
Brian Valentine, Senyo Apewokin, Linda M. Wills, D...
CVPR
2009
IEEE
1848views Computer Vision» more  CVPR 2009»
15 years 1 months ago
Moving Cast Shadow Detection using Physics-based Features
Cast shadows induced by moving objects often cause serious problems to many vision applications. We present in this paper an online statistical learning approach to model the backg...
Jia-Bin Huang and Chu-Song Chen
ICDS
2009
IEEE
14 years 2 months ago
Local Contrast Segmentation to Binarize Images
—In this paper, a new binarization algorithm for degraded document images is proposed. The method is based on positive and negative pixel energies using the Laplacian of an image...
Marco Block, Raúl Rojas
CVIU
2006
142views more  CVIU 2006»
13 years 7 months ago
Robust target detection and tracking through integration of motion, color, and geometry
Vision-based tracking is a basic elementary task in many computer vision-based applications such as video surveillance and monitoring, sensing and navigation in robotics, video co...
Harini Veeraraghavan, Paul R. Schrater, Nikolaos P...