- An architecture system and a method for tracking people are presented for sports applications. The system’s input is video data from static camera and the output is the real wo...
Abstract In the analysis of any unconstrained document image it is necessary to first decide what the main area of interest is. Previous work has been done on simply removing the ...
John Bunch, Dean Curtis, Christopher Jones, Jia Ts...
- In this paper a Discrete Wavelet Transform based blind watermarking algorithm is proposed for embedding a grayscale watermark into a grayscale image. A new approach of choosing t...
Shikha Tripathi, Sai Krishnan Ramachandran, Vijay ...
Separating handwritten and typewritten text within unconstrained paper documents can provide more accurate and efficient OCR results. This paper presents a technique developed that...
Jia Tse, Dean Curtis, John Bunch, Christopher Jone...
- The shrunk dimension of electronic devices leads to more stringent requirement on process control and quality assurance of their fabrication. For instance, direct die-to-die bond...
Mei Dong, Ronald Chung, Edmund Y. Lam, Kenneth S. ...
- We propose a secure steganographic approach with a high capacity. We first use small neighborhoods of the original histogram to calculate the minimum remapping from a histogram t...
Minimum spanning tree algorithms have been proposed for the lossy compression of image sets. In these algorithms, a complete graph is constructed from the entire image set and an ...
Anthony Schmieder, Howard Cheng, Barry Gergel, Xia...
The automatic compression strategy proposed by Gergel et al. is a near-optimal lossy compression scheme for a given collection of images whose interimage relationships are unknown...
Barry Gergel, Anthony Schmieder, Xiaobo Li, Howard...