Sciweavers

2327 search results - page 259 / 466
» Secure Image Filtering
Sort
View
IVC
2008
93views more  IVC 2008»
14 years 11 months ago
A blind source separation-based method for multiple images encryption
Blind source separation (BSS) has been successfully applied to many fields such as communications and biomedical engineering. Its application for image encryption, however, remain...
Qiu-Hua Lin, Fuliang Yin, Tiemin Mei, Hualou Liang
WISA
2007
Springer
15 years 5 months ago
Geometrically Invariant Image Watermarking in the DWT Domain
Watermark resistance to both geometric attacks and lossy compressions is a fundamental issue in the image watermarking community. In this paper, we propose a DWT (Discrete Wavelet ...
Shijun Xiang, Hyoung-Joong Kim
CCS
2001
ACM
15 years 3 months ago
New Iterative Geometric Methods for Robust Perceptual Image Hashing
We propose a novel and robust hashing paradigm that uses iterative geometric techniques and relies on observations that main geometric features within an image would approximately ...
Mehmet Kivanç Mihçak, Ramarathnam Ve...
CRV
2006
IEEE
99views Robotics» more  CRV 2006»
15 years 1 months ago
Using 3D Spline Differentiation to Compute Quantitative Optical Flow
We show that differentiation via fitting B-splines to the spatio-temporal intensity data comprising an image sequence provides at least the same and usually better 2D Lucas and Ka...
John L. Barron, Marc Daniel, Jean-Luc Mari
ORDER
2008
82views more  ORDER 2008»
14 years 11 months ago
Profinite Heyting Algebras
For a Heyting algebra A, we show that the following conditions are equivalent: (i) A is profinite; (ii) A is finitely approximable, complete, and completely join-prime generated; (...
Guram Bezhanishvili, Nick Bezhanishvili