Sciweavers

375 search results - page 70 / 75
» On the security of an image encryption method
Sort
View
CVPR
2008
IEEE
14 years 9 months ago
Estimating age, gender, and identity using first name priors
Recognizing people in images is one of the foremost challenges in computer vision. It is important to remember that consumer photography has a highly social aspect. The photograph...
Andrew C. Gallagher, Tsuhan Chen
JMM2
2006
151views more  JMM2 2006»
13 years 7 months ago
On the Use of External Face Features for Identity Verification
Abstract-- In general automatic face classification applications images are captured in natural environments. In these cases, the performance is affected by variations in facial im...
Àgata Lapedriza, David Masip, Jordi Vitri&a...
ICIP
2008
IEEE
14 years 9 months ago
Principal Component Analysis of spectral coefficients for mesh watermarking
This paper proposes a new robust 3-D object blind watermarking method using constraints in the spectral domain. Mesh watermarking in spectral domain has the property of spreading ...
Ming Luo, Adrian G. Bors
ICASSP
2009
IEEE
14 years 2 months ago
Wildfire detection using LMS based active learning
A computer vision based algorithm for wildfire detection is developed. The main detection algorithm is composed of four sub-algorithms detecting (i) slow moving objects, (ii) gra...
B. Ugur Töreyin, A. Enis Çetin
CSSE
2008
IEEE
14 years 1 months ago
Embedding in Two Least Significant Bits with Wet Paper Coding
In this paper, we present three embedding schemes for extensions of least significant bit overwriting to both of the two lowest bit planes in digital images. Our approaches are in...
Xin Liao, Qiao-Yan Wen