Sciweavers

974 search results - page 130 / 195
» Image based rendering of iterated function systems
Sort
View
KES
2005
Springer
15 years 8 months ago
Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack
Abstract. Invertibility attack is a hostile measure to breach watermarking systems. In this paper, a novel watermarking protocol using a one-way hash function and a check of random...
Xinpeng Zhang, Shuozhong Wang
DAGM
2001
Springer
15 years 7 months ago
A New Contour-Based Approach to Object Recognition for Assembly Line Robots
A complete processing chain for visual object recognition is described in this paper. The system automatically detects individual objects on an assembly line, identifies their typ...
Markus Suing, Lothar Hermes, Joachim M. Buhmann
PR
2006
164views more  PR 2006»
15 years 3 months ago
Locally linear metric adaptation with application to semi-supervised clustering and image retrieval
Many computer vision and pattern recognition algorithms are very sensitive to the choice of an appropriate distance metric. Some recent research sought to address a variant of the...
Hong Chang, Dit-Yan Yeung
FGR
2008
IEEE
201views Biometrics» more  FGR 2008»
15 years 5 months ago
Profile-based face recognition
In this paper, we introduce a new system for profilebased face recognition. The specific scenario involves a driver entering a gated area and using his/her sideview image (the dri...
Ioannis A. Kakadiaris, H. Abdelmunim, W. Yang, The...
CVPR
2010
IEEE
15 years 7 months ago
Stratified Learning of Local Anatomical Context for Lung Nodules in CT Images
The automatic detection of lung nodules attached to other pulmonary structures is a useful yet challenging task in lung CAD systems. In this paper, we propose a stratified statist...
Dijia Wu, Le Lu, Jinbo Bi, Yoshihisa Shinagawa, Ki...