Sciweavers

5076 search results - page 89 / 1016
» Image manipulation detection
Sort
View
SERSCISA
2009
Springer
15 years 11 months ago
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach
Many visual similarity-based phishing page detectors have been developed to detect phishing webpages, however, scammers now create polymorphic phishing pages to breach the defense ...
Ieng-Fat Lam, Wei-Cheng Xiao, Szu-Chi Wang, Kuan-T...
ICIP
2002
IEEE
16 years 6 months ago
Unsupervised detection of contours using a statistical model
In this paper, we describe an unsupervised segmentation method for contours which proves quite adapted for the images obtained by electronic acquisition. We present two statistica...
François Destrempes, Max Mignotte
ISBI
2009
IEEE
15 years 11 months ago
Probabilistic Branching Node Detection Using Hybrid Local Features
Probabilistic branching node inference is an important step for analyzing branching patterns involved in many anatomic structures. We propose combining machine learning techniques...
Haibin Ling, Michael Barnathan, Vasileios Megalooi...
DSN
2005
IEEE
15 years 10 months ago
Fatih: Detecting and Isolating Malicious Routers
Network routers occupy a key role in modern data transport and consequently are attractive targets for attackers. By manipulating, diverting or dropping packets arriving at a comp...
Alper Tugay Mizrak, Yu-Chung Cheng, Keith Marzullo...
ICIP
2008
IEEE
16 years 6 months ago
Dark line detection with line width extraction
Automated line detection is a classical image processing topic with many applications such as road detection in remote images and vessel detection in medical images. Many traditio...
Qin Li, Lei Zhang, Jane You, David Zhang, Prabir B...