Sciweavers

853 search results - page 105 / 171
» Flexible authentication of images
Sort
View
CORR
2011
Springer
167views Education» more  CORR 2011»
14 years 3 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
CVPR
2004
IEEE
16 years 1 months ago
The World in an Eye
This paper provides a comprehensive analysis of exactly what visual information about the world is embedded within a single image of an eye. It turns out that the cornea of an eye...
Ko Nishino, Shree K. Nayar
ICIP
2006
IEEE
16 years 1 months ago
Generalized Histogram Equalization Based on Local Characteristics
From time to time, state-of-the-art contrast enhancement algorithms face undesired drawbacks, like loss of tiny details, enhancement of image noise, occasional overenhancement, an...
Tzu-Cheng Jen, Sheng-Jyh Wang
MICCAI
2009
Springer
16 years 1 months ago
Endoscopic Orientation Correction
Abstract. An open problem in endoscopic surgery (especially with flexible endoscopes) is the absence of a stable horizon in endoscopic images. With our "Endorientation" a...
Kurt Höller, Jochen Penne, Armin Schneider, J...
IJCNN
2007
IEEE
15 years 6 months ago
Analysis of mammogram using self-organizing neural networks based on spatial isomorphism
— The correct segmentation and measurement of mammography images is of fundamental importance for the development of automatic or computer-aided cancer detection systems. In this...
Aida A. Ferreira, Francisco Nascimento Jr., Ing Re...