Abstract. Invertibility attack is a hostile measure to breach watermarking systems. In this paper, a novel watermarking protocol using a one-way hash function and a check of random...
A complete processing chain for visual object recognition is described in this paper. The system automatically detects individual objects on an assembly line, identifies their typ...
Many computer vision and pattern recognition algorithms are very sensitive to the choice of an appropriate distance metric. Some recent research sought to address a variant of the...
In this paper, we introduce a new system for profilebased face recognition. The specific scenario involves a driver entering a gated area and using his/her sideview image (the dri...
Ioannis A. Kakadiaris, H. Abdelmunim, W. Yang, The...
The automatic detection of lung nodules attached to other pulmonary structures is a useful yet challenging task in lung CAD systems. In this paper, we propose a stratified statist...
Dijia Wu, Le Lu, Jinbo Bi, Yoshihisa Shinagawa, Ki...