Sciweavers

2032 search results - page 160 / 407
» Computing Robustness and Persistence for Images
Sort
View
IWDW
2005
Springer
15 years 10 months ago
ViWiD : Visible Watermarking Based Defense Against Phishing
In this paper, we present a watermarking based approach, and its implementation, for mitigating phishing attacks - a form of web based identity theft. ViWiD is an integrity check m...
Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, ...
TITB
2010
148views Education» more  TITB 2010»
14 years 11 months ago
Coclustering for cross-subject fiber tract analysis through diffusion tensor imaging
Abstract--One of the fundamental goals of computational neuroscience is the study of anatomical features that reflect the functional organization of the brain. The study of physica...
Cui Lin, Darshan Pai, Shiyong Lu, Otto Muzik, Jing...
ICIP
2006
IEEE
16 years 6 months ago
Lucas-Kanade without Iterative Warping
Many methods for motion computation and object tracking are based on the Lucas-Kanade (LK) framework [1]. We present a method which substantially speeds up the LK approach while p...
Alex Rav-Acha, Shmuel Peleg
WIAMIS
2009
IEEE
15 years 12 months ago
Graph-based approach for 3D object duplicate detection
In this paper, we consider the challenging problem of object duplicate detection and localization. Several applications require efficient object duplicate detection methods, such ...
Peter Vajda, Frédéric Dufaux, Thien ...
ICIP
2007
IEEE
15 years 6 months ago
Motion Estimation using Tangent Distance
In this paper, we present a method based on tangent distance to estimate motion in image sequences. Tangent distance combines an intuitive understanding and effective modeling of ...
Jonathan Fabrizio, Séverine Dubuisson