Sciweavers

1560 search results - page 191 / 312
» Example-based image compression
Sort
View
ICIP
2007
IEEE
16 years 6 months ago
Image Authentication Based on Distributed Source Coding
Image authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of the original imag...
Yao-Chung Lin, David P. Varodayan, Bernd Girod
ICIP
2005
IEEE
16 years 6 months ago
Presegmentation of high-resolution satellite images with a multifractal reconstruction scheme based on an entropy criterium
The last generation of satellites leads to the very high-resolution images which offer a high quality of detailed information about the Earth's surface. However, the exploita...
Antonio Turiel, Hussein M. Yahia, Jacopo Grazzini
ICIP
2005
IEEE
16 years 6 months ago
Watermarking JBIG2 text region for image authentication
An authentication watermarking technique (AWT) inserts hidden data into an image in order to detect any accidental or malicious alteration to the image. AWT usually computes, usin...
Sergio Vicente Denser Pamboukian, Hae Yong Kim, Ri...
ICCV
1998
IEEE
16 years 7 months ago
Multidimensional Morphable Models
We describe a exible model for representing images of objects of a certain class, known a priori, such as faces, and introduce a new algorithm for matching it to a novel image and...
Michael J. Jones, Tomaso Poggio
149
Voted
MEDIAFORENSICS
2010
15 years 6 months ago
Improving re-sampling detection by adding noise
Current image re-sampling detectors can reliably detect re-sampling in JPEG images only up to a Quality Factor (QF) of 95 or higher. At lower QFs, periodic JPEG blocking artifacts...
Lakshmanan Nataraj, Anindya Sarkar, B. S. Manjunat...