Authentication watermarking is the process that inserts hidden data into an object (image) in order to detect any fraudulent alteration perpetrated by a malicious hacker. In the l...
This paper addresses the problem of deriving measures that express the degree of the reliability of motion vectors estimated by a Block Matching motion estimation method. We expre...
Ioannis Patras, Emile A. Hendriks, Reginald L. Lag...
This paper outlines a technique for the automated alignment of digital images of the retina under the assumption that they differ spatially by a geometric global transform. This a...
When dealing with ill-posed inverse problems in data analysis, the Bayesian approach allows one to use prior information to guide the result toward reasonable solutions. In this w...
K. M. Hanson, G. S. Cunningham, G. R. Jennings Jr....
Edge computing pushes application logic and the underlying data to the edge of the network, with the aim of improving availability and scalability. As the edge servers are not nec...