A fingerprinting design extracts discriminating features, called fingerprints. The extracted features are unique and specific to each image/video. The visual hash is usually a glo...
A common way of resisting protocol attacks is to employ cryptographic techniques so that provable security can be retained. However, some desired requirements of watermarking such...
In this paper, we propose a novel framework for contour based object detection. Compared to previous work, our contribution is three-fold. 1) A novel shape matching scheme suitabl...
A robust modelling method for detecting and measuring isotropic, linear features and bifurcations is described and applied to analysing 2d eletrophoresis and retinal images. Featu...
In this paper a new content-based copy identification method for video sequences is presented. It is robust to a number of image transformations and particulary robust to compress...
Ehsan Maani, Sotirios A. Tsaftaris, Aggelos K. Kat...