Sciweavers

ICIP
2006
IEEE
15 years 1 months ago
Parity-Object Embedded Streaming for Synthetic Graphics
This paper proposes an object-oriented approach for streaming synthetic graphic contents over a packet-erasure channel. Graphic objects such as geometric meshes and texture images...
Dihong Tian, Ghassan Alregib
ICIP
2006
IEEE
15 years 1 months ago
Practical Wyner-Ziv Switching Scheme for Multiple Bit-Rate Video Streaming
In this paper, we propose a novel bit-stream switching scheme for the multiple bit-rate (MBR) video streaming, in which a Wyner-Ziv coded frame is used to overcome the mismatch be...
Mei Guo, Yan Lu, Feng Wu, Debin Zhao, Wen Gao
ICIP
2006
IEEE
15 years 1 months ago
Semi-Automatic Lymph Node Segmentation in LN-MRI
Accurate staging of nodal cancer still relies on surgical exploration because many primary malignancies spread via lymphatic dissemination. The purpose of this study was to utiliz...
Gozde B. Unal, Gregory G. Slabaugh, Andreas Ess, A...
ICIP
2006
IEEE
15 years 1 months ago
Wavelet Principal Component Analysis and its Application to Hyperspectral Images
We investigate reducing the dimensionality of image sets by using principal component analysis on wavelet coefficients to maximize edge energy in the reduced dimension images. Lar...
Maya R. Gupta, Nathaniel P. Jacobson
ICIP
2006
IEEE
15 years 1 months ago
Joint Dimensionality Reduction, Classification and Segmentation of Hyperspectral Images
Dimensionality reduction, spectral classification and segmentation are the three main problems in hyperspectral image analysis. In this paper we propose a Bayesian estimation appr...
Nadia Bali, Ali Mohammad-Djafari, Adel Mohammadpou...
ICIP
2006
IEEE
15 years 1 months ago
Robust Signature-Based Geometric Invariant Copyright Protection
The most significant bit (MSB)-plane of an image is least likely to change by the most signal processing operations. Watermarking techniques are, however, unable to exploit the MS...
Mohammad Awrangjeb, M. Manzur Murshed
ICIP
2006
IEEE
15 years 1 months ago
Behavior Forensics in Traitors within Traitors for Scalable Multimedia
A cost effective attack against multimedia forensics is the multiuser collusion attack, in which several attackers mount attacks collectively to remove traces of the identifying f...
K. J. Ray Liu, H. Vicky Zhao
ICIP
2006
IEEE
15 years 1 months ago
Selfish Colluder Detection and Identification in Traitors within Traitors
During collusion attacks against multimedia forensics, an important issue that colluders need to address is the fairness of the attack, i.e., whether all colluders take the same r...
H. Vicky Zhao, K. J. Ray Liu
ICIP
2006
IEEE
15 years 1 months ago
Fast Separation of Reflection Components using a Specularity-Invariant Image Representation
In this paper, we propose a fast method for separating reflection components using a single color image. We first propose a specular-free two-band image that is a specularity-inva...
Kuk-Jin Yoon, Yoojin Choi, In-So Kweon
ICIP
2006
IEEE
15 years 1 months ago
Region Based Segmentation Using the Tree of Shapes
The tree of shapes is a powerful tool for image representation which holds many interesting properties. There are many works in the literature that use it for image segmentation, ...
Gregory Randall, Juan Cardelino, Marcelo Bertalm&i...