148
click to vote
ICIP
16 years 2 months ago
2003 IEEE
This paper considers the problem of encoding a secret binary image SI into n shares of meaningful halftone images within the scheme of visual cryptography (VC). Secret pixels enco...
104
click to vote
ICIP
16 years 2 months ago
2003 IEEE
We propose a new fast Feldkamp algorithm for 3-D cone beam tomography with a circular source trajectory. The algorithm is an extension of our recent fast native 2-D fan-beam recon...
152
click to vote
ICIAP
15 years 6 months ago
2003 ACM
Principal Components Analysis (PCA) has been one of the most applied methods for face verification using only 2D information, in fact, PCA is practically the method of choice for ...
102
click to vote
ICIP
16 years 2 months ago
2003 IEEE
In this paper we address the problem of classifying images, by exploiting global features that describe color and illumination properties, and by using the statistical learning pa...
108
click to vote
ICIP
16 years 2 months ago
2003 IEEE
In this paper, we first discuss the singular value decomposition (SVD) of a quaternion matrix and propose an algorithm to calculate the SVD of a quaternion matrix using its equiva...
|