Sciweavers

282 search results - page 8 / 57
» Robust Hash for Detecting and Localizing Image Tampering
Sort
View
CIVR
2007
Springer
273views Image Analysis» more  CIVR 2007»
14 years 1 months ago
Scalable near identical image and shot detection
This paper proposes and compares two novel schemes for near duplicate image and video-shot detection. The first approach is based on global hierarchical colour histograms, using ...
Ondrej Chum, James Philbin, Michael Isard, Andrew ...
ICIP
2007
IEEE
14 years 9 months ago
Image Authentication Based on Distributed Source Coding
Image authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of the original imag...
Yao-Chung Lin, David P. Varodayan, Bernd Girod
PAMI
1998
143views more  PAMI 1998»
13 years 7 months ago
Robust Image Corner Detection Through Curvature Scale Space
—This paper describes a novel method for image corner detection based on the curvature scale-space (CSS) representation. The first step is to extract edges from the original imag...
Farzin Mokhtarian, Riku Suomela
ICPR
2004
IEEE
14 years 8 months ago
Robust Local Max-Min Filters by Normalized Power-Weighted Filtering
A normalized, power-weighted averaging filter (NPF) is a very good approximation to the well-know local maximum and minimum filters along the object edges and offers noise reducti...
Lucas J. van Vliet
CVPR
1996
IEEE
14 years 9 months ago
Combining greyvalue invariants with local constraints for object recognition
This paper addresses the problem of recognizing objects in large image databases. The method is based on local characteristics which are invariant to simzlarity transformations in...
Cordelia Schmid, Roger Mohr