Sciweavers

ICIP
2003
IEEE
16 years 2 months ago
Halftone visual cryptography
This paper considers the problem of encoding a secret binary image SI into n shares of meaningful halftone images within the scheme of visual cryptography (VC). Secret pixels enco...
Z. Zhou, Gonzalo R. Arce, Giovanni Di Crescenzo
ICIP
2003
IEEE
16 years 2 months ago
Fast Feldkamp algorithm for cone-beam computer tomography
We propose a new fast Feldkamp algorithm for 3-D cone beam tomography with a circular source trajectory. The algorithm is an extension of our recent fast native 2-D fan-beam recon...
Shu Xiao, Yoram Bresler, David C. Munson Jr.
ICIAP
2003
ACM
15 years 6 months ago
PCA vs low resolution images in face verification
Principal Components Analysis (PCA) has been one of the most applied methods for face verification using only 2D information, in fact, PCA is practically the method of choice for ...
Cristina Conde, Antonio Ruiz, Enrique Cabello
ICIP
2003
IEEE
16 years 2 months ago
Histogram intersection kernel for image classification
In this paper we address the problem of classifying images, by exploiting global features that describe color and illumination properties, and by using the statistical learning pa...
Annalisa Barla, Francesca Odone, Alessandro Verri
ICIP
2003
IEEE
16 years 2 months ago
Quaternion matrix singular value decomposition and its applications for color image processing
In this paper, we first discuss the singular value decomposition (SVD) of a quaternion matrix and propose an algorithm to calculate the SVD of a quaternion matrix using its equiva...
Soo-Chang Pei, Ja-Han Chang, Jian-Jiun Ding
Image Processing
Top of PageReset Settings