Sciweavers

2327 search results - page 227 / 466
» Secure Image Filtering
Sort
View
MEMICS
2010
14 years 5 months ago
Efficient Computation of Morphological Greyscale Reconstruction
Morphological reconstruction is an important image operator from mathematical morphology. It is very often used for filtering, segmentation, and feature extraction. However, its c...
Pavel Karas
IVC
2006
156views more  IVC 2006»
14 years 11 months ago
Image encryption using chaotic logistic map
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques.Inthis communication,weproposea ...
Narendra K. Pareek, Vinod Patidar, Krishan K. Sud
84
Voted
ICIP
2007
IEEE
15 years 2 months ago
Sensitivity Analysis Attacks Against Randomized Detectors
Sensitivity analysis attacks present a serious threat to the security of popular spread spectrum watermarking schemes. Randomization of the detector is thought to increase the imm...
Maha El Choubassi, Pierre Moulin
88
Voted
TIP
2008
108views more  TIP 2008»
14 years 11 months ago
Design of Linear Equalizers Optimized for the Structural Similarity Index
Abstract--We propose an algorithm for designing linear equalizers that maximize the structural similarity (SSIM) index between the reference and restored signals. The SSIM index ha...
Sumohana S. Channappayya, Alan C. Bovik, Constanti...
PAMI
2008
235views more  PAMI 2008»
14 years 10 months ago
Dependent Multiple Cue Integration for Robust Tracking
We propose a new technique for fusing multiple cues to robustly segment an object from its background in video sequences that suffer from abrupt changes of both illumination and po...
Francesc Moreno-Noguer, Alberto Sanfeliu, Dimitris...