Sciweavers

2327 search results - page 408 / 466
» Secure Image Filtering
Sort
View
ICIAR
2004
Springer
15 years 6 months ago
Three-Dimensional Face Recognition: A Fishersurface Approach
Previous work has shown that principal component analysis (PCA) of three-dimensional face models can be used to perform recognition to a high degree of accuracy. However, experimen...
Thomas Heseltine, Nick Pears, Jim Austin
IMCSIT
2010
14 years 10 months ago
The development features of the face recognition system
Nowadays personal identification is a very important issue. There is a wide range of applications in different spheres, such as video surveillance security systems, control of docu...
Rauf Sadykhov, Igor Frolov
DGCI
2003
Springer
15 years 6 months ago
Stability in Discrete Tomography: Linear Programming, Additivity and Convexity
The problem of reconstructing finite subsets of the integer lattice from X-rays has been studied in discrete mathematics and applied in several fields like image processing, data...
Sara Brunetti, Alain Daurat
PCM
2001
Springer
130views Multimedia» more  PCM 2001»
15 years 5 months ago
Data Encryption Using MRF with an RSA Key
In a digital multimedia era, the security of multimedia over network transmission becomes a challenging issue. A strategy, combining cryptography with steganography, is investigat...
Chaur-Chin Chen
JPDC
2006
134views more  JPDC 2006»
15 years 1 months ago
Fast shared-memory algorithms for computing the minimum spanning forest of sparse graphs
Minimum Spanning Tree (MST) is one of the most studied combinatorial problems with practical applications in VLSI layout, wireless communication, and distributed networks, recent ...
David A. Bader, Guojing Cong