We consider methods for answering reliably the question of whether an image contains hidden data; the focus is on grayscale bitmap images and simple LSB steganography. Using a dist...
: Invertible authentication techniques have been used in some special applications (such as medical or military) where original data can be recovered after authenticated. In this p...
Due to the ‘semantic gap’ between low-level visual features and the rich semantics in user’s mind, performance of traditional contentbased image retrieval systems is far from...
In this paper, we introduce the concept of SelfQuotient Image (SQI) for robust face recognition under varying lighting conditions. It is based on the Quotient Image method [4][5] ...
Abstract. In this paper, we propose a particle filtering approach for tracking applications in image sequences. The system we propose combines a measurement equation and a dynamic ...