Sciweavers

5076 search results - page 11 / 1016
» Image manipulation detection
Sort
View
AINA
2010
IEEE
15 years 2 months ago
Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching
—Stepping-stone is the most popular way used to attack other computers. The reason is that intruders can be protected through a long connection chain involving some compromised c...
Yongzhong Zhang, Jianhua Yang, Santhoshkumar Bedig...

Book
34534views
17 years 2 months ago
OpenCV - Open Source Computer Vision Reference Manual
OpenCV is a C/C++ computer vision library originally developed by Intel. It is free for commercial and research use under a BSD license. The library is cross-platform. It is highl...
Intel
VMV
2001
116views Visualization» more  VMV 2001»
15 years 5 months ago
Computational Steering by Direct Image Manipulation
Computational steering requires the coupling of simulation and visualization elements, but if the latter is targetted at general requirements, little or no information about the c...
Fotios Chatzinikos, Helen Wright
SIGGRAPH
2010
ACM
15 years 8 months ago
Image warps for artistic perspective manipulation
Painters and illustrators commonly sketch vanishing points and lines to guide the construction of perspective images. We present a tool that gives users the ability to manipulate ...
Robert Carroll, Aseem Agarwala, Maneesh Agrawala
ICRA
2009
IEEE
190views Robotics» more  ICRA 2009»
15 years 10 months ago
Object recognition and full pose registration from a single image for robotic manipulation
— Robust perception is a vital capability for robotic manipulation in unstructured scenes. In this context, full pose estimation of relevant objects in a scene is a critical step...
Alvaro Collet, Dmitry Berenson, Siddhartha S. Srin...