Sciweavers

796 search results - page 77 / 160
» Spoofing prevention method
Sort
View
CVBIA
2005
Springer
14 years 3 months ago
Locally Switching Between Cost Functions in Iterative Non-rigid Registration
In non-rigid image registration problems, it can be difficult to construct a single cost function that adequately captures concepts of similarity for multiple structures, for examp...
William Mullally, Margrit Betke, Carissa Bellardin...
PKC
2004
Springer
151views Cryptology» more  PKC 2004»
14 years 3 months ago
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny
The isogeny for elliptic curve cryptosystems was initially used for the efficient improvement of order counting methods. Recently, Smart proposed the countermeasure using isogeny f...
Toru Akishita, Tsuyoshi Takagi
SMI
2003
IEEE
131views Image Analysis» more  SMI 2003»
14 years 3 months ago
Watermarking 2D Vector Maps in the Mesh-Spectral Domain
This paper proposes a digital watermarking algorithm for 2D vector digital maps. The watermark is a robust, informed-detection watermark to be used to prevent such abuses as an in...
Ryutarou Ohbuchi, Hiroo Ueda, Shuh Endoh
CIDM
2007
IEEE
14 years 2 months ago
Efficient Kernel-based Learning for Trees
Kernel methods are effective approaches to the modeling of structured objects in learning algorithms. Their major drawback is the typically high computational complexity of kernel ...
Fabio Aiolli, Giovanni Da San Martino, Alessandro ...
ICB
2007
Springer
121views Biometrics» more  ICB 2007»
14 years 1 months ago
SVDD-Based Illumination Compensation for Face Recognition
Illumination change is one of most important and difficult problems which prevent from applying face recognition to real applications. For solving this, we propose a method to comp...
Sang-Woong Lee, Seong-Whan Lee