Media authentication and tampering localization are important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded v...
Yao-Chung Lin, David P. Varodayan, Torsten Fink, E...
In this paper, a motion-based approach for detecting high-level semantic events in video sequences is presented. Its main characteristic is its generic nature, i.e. it can be dire...
The appearance of rendered text is a compromise between the designer's intent and the display capabilities. The ClearType rendering method is designed to enhance rendered tex...
Jiajing Xu, Joyce E. Farrell, Tanya Matskewich, Br...
We present a novel approach to the problem of detection of visual similarity between a template image, and patches in a given image. The method is based on the computation of a lo...
We present an improved statistical model of Poisson processes, with applications in photon-limited imaging. We build on previous work, adopting a multiscale representation of the ...
Stamatios Lefkimmiatis, George Papandreou, Petros ...