In this paper we present a robust and novel strategic invisible approach for insertion-extraction of a digital watermark, a color image, into color images. The novelty of our sche...
Saraju P. Mohanty, Parthasarathy Guturu, Elias Kou...
Trust negotiation supports authentication and access control across multiple security domains by allowing parties to use non-forgeable digital credentials to establish trust. By t...
Anna Cinzia Squicciarini, Alberto Trombetta, Elisa...
Abstract--This paper focuses on the way to achieve accurate visual servoing tasks when the shape of the object being observed as well as the desired image are unknown. More precise...
We describe a higher-orderspectralanalysis-basedapproach for detecting people by recognizing human motion such as walking or running. The periodic attribute of human motion lends ...
Cyclic motion underlies several human activities including exercising,running, and walking. Accurate tracking of such motion in video data helps in developing computer-aided appli...