Sciweavers

ICIAR
2010
Springer
13 years 8 months ago
Segmentation Based Noise Variance Estimation from Background MRI Data
Accurate and precise estimation of the noise variance is often of key importance as an input parameter for posterior image processing tasks. In MR images, background data is well s...
Jeny Rajan, Dirk Poot, Jaber Juntu, Jan Sijbers
ICIAR
2010
Springer
13 years 9 months ago
Entropy of Gabor Filtering for Image Quality Assessment
Abstract. A new algorithm for image quality assessment based on entropy of Gabor filtered images is proposed. A bank of Gabor filters is used to extract contours and directional ...
Esteban Vázquez-Fernández, Án...
ICIAR
2010
Springer
13 years 9 months ago
Generic Initialization for Motion Capture from 3D Shape
Abstract. Real time and markerless motion capture is an active research area, due to applications in human-computer interactions, for example. A large part of the existing markerle...
Benjamin Raynal, Michel Couprie, Vincent Nozick
ICIAR
2010
Springer
13 years 9 months ago
Can Background Baroque Music Help to Improve the Memorability of Graphical Passwords?
Graphical passwords have been proposed as an alternative to alphanumeric passwords with their advantages in usability and security. However, they still tend to follow predictable p...
Haichang Gao, Xiuling Chang, Zhongjie Ren, Uwe Aic...
ICIAR
2010
Springer
13 years 9 months ago
Adaptation of SIFT Features for Robust Face Recognition
Abstract. The Scale Invariant Feature Transform (SIFT) is an algorithm used to detect and describe scale-, translation- and rotation-invariant local features in images. The origina...
Janez Krizaj, Vitomir Struc, Nikola Pavesic
ICIAR
2010
Springer
13 years 9 months ago
Structural Similarity-Based Approximation of Signals and Images Using Orthogonal Bases
The structural similarity (SSIM) index has been shown to be an useful tool in a wide variety of applications that involve the assessment of image quality and similarity. However, i...
Dominique Brunet, Edward R. Vrscay, Zhou Wang
ICIAR
2010
Springer
13 years 9 months ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl
ICIAR
2010
Springer
13 years 9 months ago
Secure Iris Recognition Based on Local Intensity Variations
In this paper we propose a fast and efficient iris recognition algorithm which makes use of local intensity variations in iris textures. The presented system provides fully revocab...
Christian Rathgeb, Andreas Uhl
ICIAR
2010
Springer
13 years 9 months ago
Real-Time Scale Invariant 3D Range Point Cloud Registration
Abstract. Stereo cameras, laser rangers and other time-of-flight ranging devices are utilized with increasing frequency as they can provide information in the 3D plane. The abilit...
Anuj Sehgal, Daniel Cernea, Milena Makaveeva