Sciweavers

2327 search results - page 310 / 466
» Secure Image Filtering
Sort
View
CCS
2008
ACM
15 years 3 months ago
Reconsidering physical key secrecy: teleduplication via optical decoding
The access control provided by a physical lock is based on the assumption that the information content of the corresponding key is private -- that duplication should require eithe...
Benjamin Laxton, Kai Wang, Stefan Savage
MICCAI
2007
Springer
16 years 2 months ago
Outlier Rejection for Diffusion Weighted Imaging
Abstract. This paper introduces an outlier rejection and signal reconstruction method for high angular resolution diffusion weighted imaging. The approach is based on the threshold...
Carl-Fredrik Westin, Marc Niethammer, Martha Eliza...
CVDB
2005
ACM
15 years 3 months ago
Optimizing progressive query-by-example over pre-clustered large image databases
The typical mode for querying in an image content-based information system is query-by-example, which allows the user to provide an image as a query and to search for similar imag...
Anicet Kouomou Choupo, Laure Berti-Equille, Annie ...
ICIAP
2001
Springer
16 years 1 months ago
Eigenspace-Based Recognition of Faces: Comparisons and a New Approach
Different eigenspace-based approaches have been proposed for the recognition of faces. They differ mostly in the kind of projection method been used and in the similarity matching ...
Pablo Navarrete, Javier Ruiz-del-Solar
WWW
2005
ACM
16 years 2 months ago
Detection of phishing webpages based on visual similarity
An approach to detection of phishing webpages based on visual similarity is proposed, which can be utilized as a part of an enterprise solution for anti-phishing. A legitimate web...
Liu Wenyin, Guanglin Huang, Liu Xiaoyue, Zhang Min...