Abstract. Scaling attacks are well-known to be some of the most harmful strategies against quantization-based watermarking methods, as they desynchronize the decoder, completely ru...
This paper proposes an extension of compressed sensing that allows to express the sparsity prior in a dictionary of bases. This enables the use of the random sampling strategy of c...
In this paper a new approach for face clustering is developed. Mutual information and joint entropy are exploited in order to create a metric for the clustering process. The way t...
Nicholas Vretos, Vassilios Solachidis, Ioannis Pit...
This paper discusses the application of speech alignment, image processing, and language understanding technologies to build efficient interfaces into large digital oral history a...
Michael G. Christel, Julieanna Richardson, Howard ...
In this paper, we will review several different 3D scanning devices. We will present a method for empirical accuracy analysis, and apply it to several scanners providing an overvi...