Sciweavers

724 search results - page 97 / 145
» Robust Image Registration Using Log-Polar Transform
Sort
View
CVPR
1996
IEEE
14 years 10 months ago
Combining greyvalue invariants with local constraints for object recognition
This paper addresses the problem of recognizing objects in large image databases. The method is based on local characteristics which are invariant to simzlarity transformations in...
Cordelia Schmid, Roger Mohr
MMSEC
2005
ACM
210views Multimedia» more  MMSEC 2005»
14 years 2 months ago
Composite signature based watermarking for fingerprint authentication
Digital watermarking is a technology to hide information in digital media. We extend the digital watermarking technique Phasemark™, originally developed solely for image authent...
Farid Ahmed, Ira S. Moskowitz
ICMCS
2005
IEEE
107views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Evaluating keypoint methods for content-based copyright protection of digital images
This paper evaluates the effectiveness of keypoint methods for content-based protection of digital images. These methods identify a set of “distinctive” regions (termed keypoi...
Larry Huston, Rahul Sukthankar, Yan Ke
ICIP
2001
IEEE
14 years 10 months ago
Geometric hashing techniques for watermarking
In this paper we introduce the idea of using Computer Vision techniques for improving and enhancing watermarking capabilities. Specifically, we incorporate Geometric Hashing techn...
Hagit Zabrodsky Hel-Or, Y. Yitzhaki, Yacov Hel-Or
ICRA
2010
IEEE
147views Robotics» more  ICRA 2010»
13 years 7 months ago
Feature detection and matching in images with radial distortion
— Image keypoints are broadly used in robotics for different purposes, ranging from recognition to 3D reconstruction, passing by SLAM and visual servoing. Robust keypoint matchin...
Miguel Lourenço, João P. Barreto, Ab...