Sciweavers

5984 search results - page 186 / 1197
» Image Analysis
Sort
View
119
Voted
ICDAR
2005
IEEE
15 years 9 months ago
A Binarization Algorithm specialized on Document Images and Photos
In this paper, a new method for document images or photos binarization is presented. The method is simple, fast and robust and appropriate for normal as well as for special cases ...
Ergina Kavallieratou
136
Voted
ICIP
2008
IEEE
16 years 5 months ago
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding sche
Our recently introduced JPEG steganographic method called Yet Another Steganographic Scheme (YASS) can resist blind steganalysis by embedding data in the discrete cosine transform...
Anindya Sarkar, Lakshmanan Nataraj, B. S. Manjunat...
132
Voted
ICIP
2001
IEEE
16 years 5 months ago
Morphological scale-space analysis and feature extraction
This paper presents a morphological scale-space approach to the problem of feature extraction. The method relies on two steps: a hierarchical simplification step based on pyramids...
Corinne Vachier
117
Voted
IPMI
2003
Springer
16 years 4 months ago
Quantitative Analysis of Intrathoracic Airway Trees: Methods and Validation
Abstract. A method for quantitative assessment of tree structures is reported allowing evaluation of airway or vascular tree morphology and its associated function. Our skeletoniza...
Kálmán Palágyi, Juerg Tschirr...
112
Voted
IWDW
2005
Springer
15 years 9 months ago
Practical Data-Hiding: Additive Attacks Performance Analysis
José-Emilio Vila-Forcén, Sviatoslav ...