Sciweavers

20833 search results - page 242 / 4167
» Hidden process models
Sort
View
IBPRIA
2007
Springer
15 years 10 months ago
HMM-Based Action Recognition Using Contour Histograms
This paper describes an experimental study about a robust contour feature (shape-context) for using in action recognition based on continuous hidden Markov models (HMM). We ran dif...
Maria Ángeles Mendoza, Nicolas Pérez...
ICMCS
2006
IEEE
226views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Detection of LSB Steganography based on Image Smoothness
The detection of LSB steganography is a question of common interest in the research of steganalysis techniques. In this paper, the distribution of the difference between the curre...
Tao Zhang, Yan Zhang, Xijian Ping, Mingwu Song
ICAPR
2005
Springer
15 years 10 months ago
Millimetre-Wave Personnel Scanners for Automated Weapon Detection
The ATRIUM project aims to the automatic detection of threats hidden under clothes using millimetre-wave imaging. We describe a simulator of realistic millimetre-wave images and a...
Beatriz Grafulla-González, Christopher D. H...
IJNSEC
2007
96views more  IJNSEC 2007»
15 years 4 months ago
Research on Data Hiding Capacity
To hide data in credentials is a key problem in information security. In this paper, a summary of the work on data hiding-capacity is made and several communication channel models...
Zhensong Liao, Yan Huang, Chisong Li
IJON
2011
169views more  IJON 2011»
14 years 11 months ago
Exploiting local structure in Boltzmann machines
Restricted Boltzmann Machines (RBM) are well-studied generative models. For image data, however, standard RBMs are suboptimal, since they do not exploit the local nature of image ...
Hannes Schulz, Andreas Müller 0004, Sven Behn...