In this paper, security evaluation of an important watermarking class based on quantization is given. Theoretical developments and practical simulations are used to measure the se...
Alice and Bob possess sequences xn and yn respectively and would like to compute d(xn , yn ) where d(., .) is a distortion measure. However, Alice and Bob do not trust each other ...
The throughput of Peer-to-Peer (P2P) Video-on-Demand (VoD) systems is typically capped by the users' aggregate upload bandwidth [1]. The drastic increase in the popularity of...
Suppression of ringing effect is a challenging problem. It is mainly caused by absence of effective methods of ringing artifact detection. In this paper we introduce a ringing est...
In video surveillance, the sizes of face images are very small. However, few works have been done to investigate scalerobust face recognition. Our experiments on appearancebased m...
We present a saliency-enhanced method for the classification of professional photos and snapshots. First, we extract the salient regions from an image by utilizing a visual salien...
We address the problem of robust appearance-based visual tracking. First, a set of simplified biologically inspired features (SBIF) is proposed for object representation and the B...
We have established a novel control system for combining the parallel execution of deterministic and non-deterministic medical imaging applications on a single platform, sharing t...
3D visualization and segmentation of organs in abdominal volume images are important in medical image processing for applications such as diagnosis, treatment and surgical plannin...