In this work, we solve the pose estimation problem for robot motion by placing multiple cameras on the robot. In particular, we use four cameras arranged as two back-to-back stere...
Mohammad Ehab Ragab, King Hong Wong, Jun Zhou Chen...
An image hash should be (1) robust to allowable operations and (2) sensitive to illegal manipulations (like image tampering) and distinct queries. Although existing methods try to...
In this paper we propose a locally adaptive image threshold technique via variational energy minimization. The novelty of the proposed method is that from an image it automaticall...
Vehicle tracking in video sequences is typically carried out by matching 2-d views (images or features) of the vehicle from one frame to the next. These views are adapted by gradu...
In this paper, we give a probabilistic model for automatic change detection on airborne images taken with moving cameras. To ensure robustness, we adopt an unsupervised coarse mat...
Csaba Benedek, Tamas Sziranyi, Zoltan Kato, and Jo...
3D reconstruction of urban environments is a widely studied subject since several years, as it can lead to many useful applications: virtual navigation, augmented reality, archite...
In this paper, we extend our proposed FGA-FEC coding scheme, a generalized MD-FEC method, to wireless networks. To protect the encoded scalable video bitstream over a lossy channe...
Yufeng Shan, John W. Woods, Shivkumar Kalyanaraman
Multi-user collusion is an cost-effective attack against digital fingerprinting, in which a group of attackers collectively undermine the traitor tracing capability of digital fin...
Unlike familiar macroblock-based in-loop deblocking filter in H.264, the filters of VC-1 perform all horizontal edges (for in-loop deblocking filtering) or vertical edges (for ove...