In contrast to the equivalence of linear blind source separation and linear independent component analysis it is not possible to recover the original source signal from some unkno...
This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works to a more general scenario. The se...
This paper presents a new keypoint-based approach to nearduplicate images detection. It consists of three steps. Firstly, the keypoints of images are extracted and then matched. S...
In this paper, we propose a novel multi-resolution background subtraction method. We adopt coarse to fine strategy, which is the essence the multi-resolution scheme, to obtain th...
In this paper, a new method for extracting the system phase from the bispectrum of the system output has been proposed. This is based on the complete bispectral data computed in t...
S. V. Narasimhan, Nandini Basumallick, Ratana Chai...