Sciweavers

368 search results - page 53 / 74
» Computationally efficient interference detection in videoker...
Sort
View
ICIP
2008
IEEE
15 years 11 months ago
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding sche
Our recently introduced JPEG steganographic method called Yet Another Steganographic Scheme (YASS) can resist blind steganalysis by embedding data in the discrete cosine transform...
Anindya Sarkar, Lakshmanan Nataraj, B. S. Manjunat...
84
Voted
ICCV
2005
IEEE
15 years 11 months ago
Identifying Individuals in Video by Combining "Generative" and Discriminative Head Models
The objective of this work is automatic detection and identification of individuals in unconstrained consumer video, given a minimal number of labelled faces as training data. Whi...
Mark Everingham, Andrew Zisserman
MOBIHOC
2010
ACM
14 years 7 months ago
Breaking bidder collusion in large-scale spectrum auctions
Dynamic spectrum auction is an effective solution to provide spectrum on-demand to many small wireless networks. As the number of participants grows, bidder collusion becomes a se...
Xia Zhou, Haitao Zheng
145
Voted
CVPR
2009
IEEE
16 years 4 months ago
A Robust Approach for Automatic Registration of Aerial Images with Untextured Aerial LiDAR Data
Airborne LiDAR technology draws increasing interest in large-scale 3D urban modeling in recent years. 3D Li- DAR data typically has no texture information. To generate photo-rea...
Lu Wang, Ulrich Neumann
ICPR
2008
IEEE
15 years 10 months ago
Boosted cannabis image recognition
With the large number of Websites promoting the use of illicit drugs, it has become important to screen these sites for the protection of children on the Internet. Conventional ke...
J. Z. Wang, Nianhua Xie, Weiming Hu, Xi Li, Xiaoqi...