Remote navigation in image-based scene representations requires random access to parts of the compressed reference image data to compose virtual views. The degree of dependencies ...
This paper addresses modeling and inference for localized calcium release events observed in cardiac muscle tissue known as sparks, a recently discovered and little-understood phe...
In this paper a probabilistic technique for compensation of intensity loss in the confocal microscopy images is presented. Confocal microscopy images are modeled as a mixture of t...
Sowmya Gopinath, Ninad Thakoor, Jean Gao, Kate Lub...
The popularity of multimedia streaming services via wireless home networks has confronted major challenges in quality improvement for services through a set top box (STB). Even th...
Heung Ki Lee, Varrian Hall, Ki Hwan Yum, Kyoung Il...
This paper proposes a stream authentication method based on the Generalized Butterfly Graph (GBG) framework. Compared with the original Butterfly graph, the proposed GBG graph sup...
Zhishou Zhang, John G. Apostolopoulos, Qibin Sun, ...
We present here a new descriptor for depth images adapted to 2D/3D model matching and retrieving. We propose a representation of a 3D model by 20 depth images rendered from the ve...
In this paper, we propose a method for verifying whether two digital images were obtained using the same digital camera. The method uses test statistics derived from a twochannel ...
Depth recovery for active binocular vision systems is simplified if the camera geometry is known and corresponding points can be restricted to epipolar lines. Unfortunately, compu...
In this work, we solve the pose estimation problem for robot motion by placing multiple cameras on the robot. In particular, we use four cameras arranged as two back-to-back stere...
Mohammad Ehab Ragab, King Hong Wong, Jun Zhou Chen...
An image hash should be (1) robust to allowable operations and (2) sensitive to illegal manipulations (like image tampering) and distinct queries. Although existing methods try to...