Sciweavers

1717 search results - page 196 / 344
» Error concealment using a diffusion based method
Sort
View
107
Voted
DICTA
2007
14 years 11 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
CORR
2010
Springer
166views Education» more  CORR 2010»
14 years 10 months ago
Software Metrics Evaluation Based on Entropy
Abstract. Software engineering activities in the Industry has come a long way with various improvements brought in various stages of the software development life cycle. The comple...
R. Selvarani, T. R. Gopalakrishnan Nair, Muthu Ram...
ICIP
2002
IEEE
15 years 11 months ago
Quantized projection data hiding
In this paper we propose a novel data hiding procedure called Quantized Projection (QP), that combines elements from quantization (i.e. Quantization Index Modulation, QIM) and spr...
Fernando Pérez-González, Féli...
68
Voted
ICDAR
1999
IEEE
15 years 2 months ago
Robust Skew Estimation on Low-Resolution Document Images
In this paper, we present a new technique for estimating an arbitrary skew angle using a simple and efficient text row accumulation based on the statistics of the 1st and 2nd orde...
Oleg Okun, Matti Pietikäinen, Jaakko J. Sauvo...
IPMI
1997
Springer
15 years 2 months ago
Reconstruction of the Intracerebral Vasculature from MRA and a Pair of Projection Views
Clinicians cannot easily visualize 3D intracerebral vascular anatomy in adequate detail. We present methods of creating a detailed, 3D vascular map from an MRA and a pair of x-ray ...
Elizabeth Bullitt, Alan Liu, Stephen R. Aylward, S...