Sciweavers

2386 search results - page 366 / 478
» Database Security 2000
Sort
View
ICIP
2000
IEEE
15 years 11 months ago
Normalized Training for HMM-Based Visual Speech Recognition
This paper presents an approach to estimating the parameters of continuous density HMMs for visual speech recognition. One of the key issues of image-based visual speech recogniti...
Yoshihiko Nankaku, Keiichi Tokuda, Tadashi Kitamur...
ICIP
2000
IEEE
15 years 11 months ago
Robust Image Hashing
Media hashing is an alternative to achieve many applications previously accomplished with watermarking. The major disadvantage of the existing media hashing technologies is their ...
Ramarathnam Venkatesan, S.-M. Koon, Mariusz H. Jak...
ICPR
2000
IEEE
15 years 11 months ago
Improved Degraded Document Recognition with Hybrid Modeling Techniques and Character N-Grams
In this paper a robust multifont character recognition system for degraded documents such as photocopy or fax is described. The system is based on Hidden Markov Models (HMMs) usin...
Anja Brakensiek, Daniel Willett, Gerhard Rigoll
ICPR
2000
IEEE
15 years 11 months ago
Optimal Range Segmentation Parameters through Genetic Algorithms
A wide number of algorithmsfor surjtiacesegmentationin range images have been recentlyproposed characterizedby different approaches (edgefilling, regiongrowing, ...), different su...
Luigi Cinque, Stefano Levialdi, Gianluca Pignalber...
ICPR
2000
IEEE
15 years 11 months ago
Detecting Rotational Symmetries Using Normalized Convolution
Perceptual experiments indicate that corners and curvature are very important features in the process of recognition. This paper presents a new method to detect rotational symmetr...
Björn Johansson, Gösta H. Granlund, Hans...