This paper presents a composite blind digital watermarking technique, CompMark, to hide a visually meaningful grayscale logo in a host image. The multi-resolution fusion principle...
The fingerprint verification methods include minutiae-based and image-based methods. The minutiae-based method has been frequently used, but it has limitations in performance. Thes...
Jong Ku Kim, Seung-Hoon Chae, Sung Jin Lim, Sung B...
High contrast scenes are difficult to depict on low contrast displays without loss of important fine details and textures. Skilled artists preserve these details by drawing scen...
—The Burrows-Wheeler Transform (BWT) is the basis for many of the most effective compression and selfindexing methods used today. A key to the versatility of the BWT is the abili...
Matthias Petri, Gonzalo Navarro, J. Shane Culpeppe...
With increased concern for physical security, video surveillance is becoming an important business area. Similar camera-based system can also be used in such diverse applications ...
Lurng-Kuo Liu, Sreeni Kesavarapu, Jonathan Connell...