Sciweavers

5076 search results - page 7 / 1016
» Image manipulation detection
Sort
View
79
Voted
ICASSP
2010
IEEE
14 years 9 months ago
A nonnegative sparsity induced similarity measure with application to cluster analysis of spam images
Image spam is an email spam that embeds text content into graphical images to bypass traditional spam filters. The majority of previous approaches focus on filtering image spam ...
Yan Gao, Alok N. Choudhary, Gang Hua
ICPR
2002
IEEE
15 years 10 months ago
Tracking Hands and Objects for an Intelligent Video Production System
We propose a novel method for detecting hands and hand-held objects in desktop manipulation situations. In order to achieve robust tracking under few constraints, we use multiple ...
Motoyuki Ozeki, Masatsugu Itoh, Yuichi Nakamura, Y...
ICIP
2004
IEEE
15 years 11 months ago
Robust perceptual image hashing using feature points
Perceptual image hashing maps an image to a fixed length binary string based on the image's appearance to the human eye, and has applications in image indexing, authenticatio...
Vishal Monga, Brian L. Evans
ICPR
2008
IEEE
15 years 4 months ago
A device enhancing and denoising algorithm for X-ray cardiac fluoroscopy
In X-ray interventional imaging, improved denoising enables lower X-ray dose and better visualization, resulting in increased confidence in the therapeutic act. This article focu...
Vincent Bismuth, Régis Vaillant
ICIP
2007
IEEE
15 years 11 months ago
Image Authentication Based on Distributed Source Coding
Image authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of the original imag...
Yao-Chung Lin, David P. Varodayan, Bernd Girod