— In this paper we are proposing an improved cut detection algorithm adapted to the animation movies domain. A cut is the direct concatenation of two different shots and produces...
Bogdan Ionescu, Patrick Lambert, Didier Coquin, Va...
—Network cameras, extensively used in video surveillance, often allow pan-tilt-zoom functionality and are also subject to wind load and mount vibrations, thus causing video frame...
Steganography is the field of hiding messages in apparently innocuous media (e.g. images), and steganalysis is the field of detecting these covert messages. Almost all steganalysi...
George Berg, Ian Davidson, Ming-Yuan Duan, Goutam ...
Recently, log-polar images have been successfully used in active-vision tasks such as vergence control or target tracking. However, while the role of foveal data has been exploited...
V. Javier Traver, Alexandre Bernardino, Plinio Mor...
Design and development of novel human-computer interfaces poses a challenging problem: actions and intentions of users have to be inferred from sequences of noisy and ambiguous mu...
Vladimir Pavlovic, James M. Rehg, Ashutosh Garg, T...