Sciweavers

5076 search results - page 45 / 1016
» Image manipulation detection
Sort
View
ICIP
2001
IEEE
16 years 6 months ago
On the security of the SARI image authentication system
In this paper we investigate the image authentication system SARI, proposed by C.Y. Lin and S.F. Chang [1], that distinguishes JPEG compression from malicious manipulations. In pa...
Regunathan Radhakrishnan, Nasir D. Memon
ICIP
2005
IEEE
16 years 6 months ago
New corner detection algorithm by tangent and vertical axes and case table
In this paper, we introduce a new algorithm for corner detection. Instead of calculating the gradients along x and y-axes, which is the common step of many existed algorithms, we ...
Soo-Chang Pei, Jian-Jiun Ding
ICPR
2004
IEEE
16 years 5 months ago
Edge Detection in Range Images of Piled Box-like Objects
We present a framework for edge detection in range images acquired by a time of flight laser sensor. Our edge detection approach is inspired by [7], in the context of which edge d...
Andreas Werber, Dimitrios Katsoulas
DAIS
2007
15 years 6 months ago
Situation Specification and Realization in Rule-Based Context-Aware Applications
Context-aware applications use and manipulate context information to detect high-level situations, which are used to adapt application behavior. This paper discusses the specificat...
Patricia Dockhorn Costa, João Paulo A. Alme...
ICMCS
2007
IEEE
149views Multimedia» more  ICMCS 2007»
15 years 10 months ago
SICO: A System for Detection of Near-Duplicate Images During Search
Duplicate and near-duplicate digital image matching is beneficial for image search in terms of collection management, digital content protection, and search efficiency. In this ...
Jun Jie Foo, Ranjan Sinha, Justin Zobel