In the last few years, obfuscation has been used more and more by spammers to make spam emails bypass filters. The standard method is to use images that look like text, since typi...
Abstract: This paper deals with the problem of multivariate copula density estimation. Using wavelet methods we provide two shrinkage procedures based on thresholding rules for whi...
A concept of virtual subspace is introduced for realizing a robust face recognition independent of the lighting conditions. The virtual subspace is a paradoxical concept because i...
Abstract. This work presents a clustering method which can be applied to relational knowledge bases. Namely, it can be used to discover interesting groupings of semantically annota...
In this paper a novel offline signature verification scheme has been proposed. The scheme is based on selecting 60 feature points from the geometric centre of the signature and co...