Sciweavers

1086 search results - page 19 / 218
» Points surrounding the origin
Sort
View
EUROCRYPT
2006
Springer
15 years 4 months ago
Hiding Secret Points Amidst Chaff
Motivated by the representation of biometric and multimedia objects, we consider the problem of hiding noisy point-sets using a secure sketch. A point-set X consists of s points fr...
Ee-Chien Chang, Qiming Li
IJNSEC
2006
94views more  IJNSEC 2006»
15 years 1 months ago
A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems
The main back-bone operation in elliptic curve cryptosystems is scalar point multiplication. The most frequently used method implementing the scalar point multiplication which is ...
Sangook Moon
CVPR
2000
IEEE
16 years 3 months ago
Reconstruction from Six-Point Sequences
An algorithm is given for computing projective structure from a set of six points seen in a sequence of many images. The method is based on the notion of duality between cameras a...
Richard I. Hartley, Nicolas Y. Dano
MIR
2006
ACM
354views Multimedia» more  MIR 2006»
15 years 7 months ago
Constant tangential angle elected interest points
This paper presents a new interest points detector whose goal is to better catch visual attention than standard detectors. It is based on the generalization of Loy and Zelinsky tr...
Ahmed Rebai, Alexis Joly, Nozha Boujemaa
APVIS
2010
14 years 8 months ago
Visual analysis of high dimensional point clouds using topological landscapes
In this paper, we present a novel three-stage process to visualize the structure of point clouds in arbitrary dimensions. To get insight into the structure and complexity of a dat...
Patrick Oesterling, Christian Heine, Heike Jä...