There are various traditional video watermarking schemes robust to geometrical transformations. Most of them use synchronizing techniques or invariant transforms to resist geometr...
Tae-Woo Oh, Min-Jeong Lee, Kyung-Su Kim, Young-Suk...
A "botnet" consists of a network of compromised computers controlled by an attacker ("botmaster"). Recently botnets have become the root cause of many Internet ...
We present an algorithm for calibrated camera relative pose estimation from lines. Given three lines with two of the lines parallel and orthogonal to the third we can compute the ...
In this paper we present a new method of signal processing for robust speech recognition using two microphones. The method, loosely based on the human binaural hearing system, con...
Features generated by Non-Negative Matrix Factorization (NMF) have successfully been introduced into robust speech processing, including noise-robust speech recognition and detect...