Sciweavers

4546 search results - page 785 / 910
» Detection of image stretching
Sort
View
EMMCVPR
2005
Springer
15 years 3 months ago
Extraction of Layers of Similar Motion Through Combinatorial Techniques
In this paper we present a new technique to extract layers in a video sequence. To this end, we assume that the observed scene is composed of several transparent layers, that their...
Romain Dupont, Nikos Paragios, Renaud Keriven, Phi...
IBPRIA
2005
Springer
15 years 3 months ago
From Moving Edges to Moving Regions
In this paper, we propose a new method to extract moving objects from a video stream without any motion estimation. The objective is to obtain a method robust to noise, large motio...
Loic Biancardini, Eva Dokladalova, Serge Beucher, ...
78
Voted
IWDW
2005
Springer
15 years 3 months ago
The Return of the Sensitivity Attack
The sensitivity attack is considered as a serious threat to the security of spread-spectrum-based schemes, since it provides a practical method of removing watermarks with minimum ...
Pedro Comesaña, Luis Pérez-Freire, F...
MM
2004
ACM
107views Multimedia» more  MM 2004»
15 years 3 months ago
15 seconds of fame: an interactive, computer-vision based art installation
“15 seconds of fame1 ” is an interactive art installation which elevates the face of a randomly selected gallery visitor for 15 seconds into a “work of art”. The installat...
Borut Batagelj, Franc Solina, Peter Peer
74
Voted
ESORICS
2004
Springer
15 years 3 months ago
Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics
Abstract. The recent approach of a model-based framework for steganography fruitfully contributes to the discussion on the security of steganography. In addition, the first propos...
Rainer Böhme, Andreas Westfeld