Sciweavers

71 search results - page 7 / 15
» MyFinder: near-duplicate detection for large image collectio...
Sort
View
MM
2006
ACM
124views Multimedia» more  MM 2006»
14 years 4 months ago
Blazingly fast image copyright enforcement
Many photo agencies use the web to sell access to their image collections. Despite significant security measures, images may be stolen and distributed, making it necessary to det...
Herwig Lejsek, Friðrik Heiðar Ásmun...
CISS
2007
IEEE
14 years 5 months ago
Collector Receiver Design for Data Collection and Localization in Sensor-driven Networks
— We consider a sensor network in which the sensors communicate at will when they have something to report, without prior coordination with other sensors or with data collection ...
Bharath Ananthasubramaniam, Upamanyu Madhow
ECCV
2000
Springer
14 years 3 months ago
Anti-Faces for Detection
This paper offers a novel detection method, which works well even in the case of a complicated image collection – for instance, a frontal face under a large class of linear tran...
Daniel Keren, Margarita Osadchy, Craig Gotsman
ADMA
2009
Springer
246views Data Mining» more  ADMA 2009»
14 years 5 months ago
Semi Supervised Image Spam Hunter: A Regularized Discriminant EM Approach
Image spam is a new trend in the family of email spams. The new image spams employ a variety of image processing technologies to create random noises. In this paper, we propose a s...
Yan Gao, Ming Yang, Alok N. Choudhary
MM
2010
ACM
146views Multimedia» more  MM 2010»
13 years 11 months ago
Understanding the security and robustness of SIFT
Many content-based retrieval systems (CBIRS) describe images using the SIFT local features because of their very robust recognition capabilities. While SIFT features proved to cop...
Thanh-Toan Do, Ewa Kijak, Teddy Furon, Laurent Ams...