Sciweavers

1050 search results - page 90 / 210
» Two methods of authenticated positioning
Sort
View
104
Voted
TIP
2002
94views more  TIP 2002»
15 years 1 months ago
Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector
Watermarkingwith both obliviousdetection and high robustness capabilities is still a challenging problem. The existing methods are either robust or oblivious, but it is di cult to...
Chun-Shien Lu, Hong-Yuan Mark Liao, Martin Kutter
CVPR
2007
IEEE
16 years 4 months ago
Displaying a Moving Image By Multiple Steerable Projectors
This paper proposes a method for precise overlapping of projected images from multiple steerable projectors. When they are controlled simultaneously, two problems are revealed: (1...
Ikuhisa Mitsugami, Norimichi Ukita, Masatsugu Kido...
ICIP
2008
IEEE
16 years 3 months ago
Appearance-based object detection in colour retinal images
Extraction of anatomical structures (landmarks), such as optic disk (OD), fovea and blood vessels, from fundus images is useful in automatic diagnosis. Current approaches largely ...
Jeetinder Singh, Gopal Datt Joshi, Jayanthi Sivasw...
ICPR
2006
IEEE
16 years 3 months ago
Camera-Based Document Image Mosaicing
In this paper we present an image mosaicing method for camera-captured document images. Our method is unique in not restricting the camera position, thus allowing greater flexibil...
Daniel DeMenthon, David S. Doermann, Jian Liang
MICCAI
2004
Springer
16 years 2 months ago
Adaptive Segmentation of Multi-modal 3D Data Using Robust Level Set Techniques
Abstract. A new 3D segmentation method based on the level set technique is proposed. The main contribution is a robust evolutionary model which requires no fine tuning of parameter...
Aly A. Farag, Hossam S. Hassan