Sciweavers

533 search results - page 53 / 107
» Uncontrolled Modulation Imaging
Sort
View
ICIP
2004
IEEE
15 years 12 months ago
Action segmentation and recognition in meeting room scenarios
In this proposal a novel implementation to find and recognize person actions in image sequences of meeting scenarios is introduced. Such extracted information can be used as the b...
Frank Wallhoff, Martin Zobl, Gerhard Rigoll
76
Voted
SADFE
2009
IEEE
15 years 5 months ago
Automating Disk Forensic Processing with SleuthKit, XML and Python
We have developed a program called fiwalk which produces detailed XML describing all of the partitions and files on a hard drive or disk image, as well as any extractable metadat...
Simson L. Garfinkel
89
Voted
ICASSP
2008
IEEE
15 years 4 months ago
A new implementation of trellis coded quantization based data hiding
This paper discusses the construction and implementation problem of trellis coded quantization (TCQ) based data hiding. We explore the robustness and distortion of data hiding by ...
Xiaofeng Wang, Xiao-Ping Zhang
87
Voted
ICPR
2008
IEEE
15 years 4 months ago
Remote multimodal biometric authentication using bit priority-based fragile watermarking
We propose a new remote multimodal biometric authentication framework based on fragile watermarking for transferring multi-biometrics over networks to server for authentication. A...
Tuan Hoang, Dat Tran, Dharmendra Sharma
96
Voted
VISUAL
2007
Springer
15 years 4 months ago
A Knowledge Synthesizing Approach for Classification of Visual Information
Abstract. An approach for visual information analysis and classification is presented. It is based on a knowledge synthesizing technique to automatically create a relevance map fro...
Le Dong, Ebroul Izquierdo