We address two-dimensional shape-based classification, considering shapes described by arbitrary sets of unlabeled points, or landmarks. This is relevant in practice because, in m...
Compression of encrypted data can be achieved by employing Slepian-Wolf coding (SWC). However, how to efficiently exploit the source dependency in an encrypted colored signal such...
The appearance of rendered text is a compromise between the designer's intent and the display capabilities. The ClearType rendering method is designed to enhance rendered tex...
Jiajing Xu, Joyce E. Farrell, Tanya Matskewich, Br...
In this paper, a motion-based approach for detecting high-level semantic events in video sequences is presented. Its main characteristic is its generic nature, i.e. it can be dire...
Media authentication and tampering localization are important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded v...
Yao-Chung Lin, David P. Varodayan, Torsten Fink, E...