Most digital data hiding schemes are sensitive to simple geometric attacks namely rotation, cropping, and scaling. Of these, rotational attacks possess the capability to not only ...
—Effective image retrieval by content from database requires that visual image properties are used instead of textual labels to properly index and recover pictorial data. Retriev...
Digital repositories raise the need for an effective and efficient retrieval of the stored material. In this paper we propose the intensive application of intelligent techniques t...
Floriana Esposito, Stefano Ferilli, Teresa Maria A...
The conventional method of generating a basis that is optimally adapted (in MSE) for representation of an ensemble of signals is Principal Component Analysis (PCA). A more ambitio...
Rosa M. Figueras i Ventura, Umesh Rajashekar, Zhou...
The variation of facial texture and surface due to the change of expression is an important cue for analyzing and modeling facial expressions. In this paper, we propose a new appr...