Sciweavers

JOT
2008
72views more  JOT 2008»
13 years 11 months ago
Fixing Apples' Broken Clipboard, with Java
The Mac OS X clipboard is infamous for changing the format of bit-mapped images that are pasted to it. These images are typically encoded using a QuickTime Tiff compressor that re...
Douglas A. Lyon
JMM2
2008
228views more  JMM2 2008»
13 years 11 months ago
Adaptive AC-Coefficient Prediction for Image Compression and Blind Watermarking
In this work, an adaptive image compression algorithm is proposed based on the prediction of AC coefficients in Discrete Cosine Transform (DCT) block during reconstruction of image...
Kilari Veera Swamy, S. Srinivas Kumar
JMM2
2008
130views more  JMM2 2008»
13 years 11 months ago
A Robust Image Watermarking Scheme using Singular Value Decomposition
This paper presents a robust image watermarking scheme for multimedia copyright protection. In this work, host image is partitioned into four sub images. Watermark image such as `l...
B. Chandra Mohan, S. Srinivas Kumar
JMM2
2008
82views more  JMM2 2008»
13 years 11 months ago
Typhoon Locating and Reconstruction from the Infrared Satellite Cloud Image
Typhoon inflicts terrible damage due to thunderstorms, violent winds, torrential rain, flooding and extreme high tides. Improving the early typhoon forecast capability is important...
Tsang-Long Pao, Jun-Heng Yeh
JMIV
2008
214views more  JMIV 2008»
13 years 11 months ago
A Network Flow Algorithm for Reconstructing Binary Images from Continuous X-rays
Tomography is a powerful technique to obtain accurate images of the interior of an object in a nondestructive way. Conventional reconstruction algorithms, such as filtered backproj...
Kees Joost Batenburg
IVC
2006
105views more  IVC 2006»
13 years 11 months ago
A partition approach for the restoration of camera images of planar and curled document
As camera resolution increases, high-speed non-contact text capture through a digital camera is opening up a new channel for text capture and understanding. Unfortunately, the cap...
Shijian Lu, Ben M. Chen, Chi Chung Ko
JMIV
2008
121views more  JMIV 2008»
13 years 11 months ago
Extension of Moment Features' Invariance to Blur
Moment invariants are features calculated on an image, which do not change their values after a transformation of the image. This paper focuses on the so called combined invariants...
Jirí Boldys, Jan Flusser
IVC
2006
161views more  IVC 2006»
13 years 11 months ago
Applications of moving windows technique to autonomous vehicle navigation
A `Moving Window' scheme for detecting lanes, obstacles and corridor environments from the images captured by a CCD camera in an automobile or mobile robot is proposed. Proce...
Sung Yug Choi, Jang Myung Lee
JISE
2008
143views more  JISE 2008»
13 years 11 months ago
A Geometry-Based Secret Image Sharing Approach
This paper solves the visual cryptography problem by the Blakley scheme that is a geometry-based secret sharing strategy. We first partition the protected image into non-overlappi...
Chien-Chang Chen, Wen-Yin Fu
JGTOOLS
2008
101views more  JGTOOLS 2008»
13 years 11 months ago
Versatile Decorative Halftoning
Abstract. This paper describes a flexible tool for decorative halftoning. Decorative halftoning produces a picture that can be seen simultaneously on two levels: either as an over-...
Alejo Hausner