In this paper we suggest viewing images (as well as attacks on them) as a sequence of linear operators and propose novel hashing algorithms employing transforms that are based on ...
We present methods to obtain computationally efficient proposal distributions for Bayesian reversible jump Markov chain Monte Carlo (RJMCMC) based image segmentation. The slow con...
Modelling textured images as AM-FM functions has been applied during the last years to texture analysis and segmentation tasks. In this paper we present some advances in two direc...
In this paper we incorporate recent results from AM-FM models for texture analysis into the variational model of image segmentation and examine the potential benefits of using the...
There is a rapidly growing demand for using smart cameras for various biometric applications in surveillance. Although having a small form-factor, most of these applications deman...
A fast mode decision method for Intra prediction in H.264 is proposed in this work to reduce the encoder complexity. The proposed algorithm adopts a multi-stage sequential mode de...
The modified Differential Pulse Coded Modulation (DPCM) codec with multi-rate processing has been shown to able to code source with monotonically decreasing spectrum efficiently a...
Authentication watermarking is the process that inserts hidden data into an object (image) in order to detect any fraudulent alteration perpetrated by a malicious hacker. In the l...
An objective no-reference measure is presented to assess fine-structure image/video quality. It was designed to measure image/video quality for video surveillance applications, es...
We present a new fast algorithm for background modeling and subtraction. Sample background values at each pixel are quantized into codebooks which represent a compressed form of b...
Kyungnam Kim, Thanarat H. Chalidabhongse, David Ha...