Sciweavers

3899 search results - page 11 / 780
» Robust Image Hashing
Sort
View
LATINCRYPT
2010
14 years 8 months ago
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves
Let E be a non-supersingular elliptic curve over a finite field Fq. At CRYPTO 2009, Icart introduced a deterministic function Fq → E(Fq) which can be computed efficiently, and ...
Pierre-Alain Fouque, Mehdi Tibouchi
ICIP
2008
IEEE
15 years 4 months ago
Rate-efficient visual correspondences using random projections
We consider the problem of establishing visual correspondences in a distributed and rate-efficient fashion by broadcasting compact descriptors. Establishing visual correspondence...
Chuohao Yeo, Parvez Ahammad, Kannan Ramchandran
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
15 years 3 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
ISMAR
2009
IEEE
15 years 4 months ago
Augmenting text document by on-line learning of local arrangement of keypoints
We propose a technique for text document tracking over a large range of viewpoints. Since the popular SIFT or SURF descriptors typically fail on such documents, our method conside...
Hideaki Uchiyama, Hideo Saito
ICCV
2011
IEEE
13 years 9 months ago
Coherency Sensitive Hashing
Coherency Sensitive Hashing (CSH) extends Locality Sensitivity Hashing (LSH) and PatchMatch to quickly find matching patches between two images. LSH relies on hashing, which maps...
Simon Korman, Shai Avidan