Sciweavers

81 search results - page 13 / 17
» Splatting Without the Blur
Sort
View
ICDE
2009
IEEE
134views Database» more  ICDE 2009»
14 years 9 months ago
Non-Exposure Location Anonymity
Location cloaking has been proposed and well studied to protect user privacy. It blurs the accurate user location (i.e., a point with coordinates) and replaces it with a well-shape...
Haibo Hu, Jianliang Xu
ICPR
2006
IEEE
14 years 8 months ago
Nonparametric Background Generation
A novel background generation method based on nonparametric background model is presented for background subtraction. We introduce a new model, named as effect components descript...
Debin Zhao, Hongxun Yao, Wen Gao, Xilin Chen, Yazh...
ACSAC
2009
IEEE
14 years 2 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
ACML
2009
Springer
14 years 2 months ago
Coupled Metric Learning for Face Recognition with Degraded Images
Real-world face recognition systems are sometimes confronted with degraded face images, e.g., low-resolution, blurred, and noisy ones. Traditional two-step methods have limited per...
Bo Li, Hong Chang, Shiguang Shan, Xilin Chen
ICMCS
2006
IEEE
130views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Directional Weighting-Based Demosaicking Algorithm for Noisy CFA Environments
Captured CFA data by image sensors like CCD/or CMOS are often corrupted by noises. To produce high quality images acquired by CCD/CMOS digital cameras, the problem of noise needs ...
Hung-Yi Lo, Tsung-Nan Lin, Chih-Lung Hsu, Cheng-hs...