In this paper, we present a watermarking based approach, and its implementation, for mitigating phishing attacks - a form of web based identity theft. ViWiD is an integrity check m...
Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, ...
Abstract--One of the fundamental goals of computational neuroscience is the study of anatomical features that reflect the functional organization of the brain. The study of physica...
Cui Lin, Darshan Pai, Shiyong Lu, Otto Muzik, Jing...
Many methods for motion computation and object tracking are based on the Lucas-Kanade (LK) framework [1]. We present a method which substantially speeds up the LK approach while p...
In this paper, we consider the challenging problem of object duplicate detection and localization. Several applications require efficient object duplicate detection methods, such ...
In this paper, we present a method based on tangent distance to estimate motion in image sequences. Tangent distance combines an intuitive understanding and effective modeling of ...