Sciweavers

427 search results - page 70 / 86
» icip 2005
Sort
View
101
Voted
ICIP
2005
IEEE
16 years 2 months ago
Watermarking JBIG2 text region for image authentication
An authentication watermarking technique (AWT) inserts hidden data into an image in order to detect any accidental or malicious alteration to the image. AWT usually computes, usin...
Sergio Vicente Denser Pamboukian, Hae Yong Kim, Ri...
79
Voted
ICIP
2005
IEEE
16 years 2 months ago
Aircraft detection and tracking using intelligent cameras
Systems that provide ground movement management at airports, maintaining ground safety and increasing air traffic capacity, are called A-SMGCS (Advanced Surface Movement Guidance a...
Kosmas Dimitropoulos, Nikos Grammalidis, Dimitrios...
ICIP
2005
IEEE
16 years 2 months ago
Using visual features for anti-spam filtering
Unsolicited Commercial Email (UCE), also known as spam, has been a major problem on the Internet. In the past, researchers have addressed this problem as a text classification or ...
Ching-Tung Wu, Kwang-Ting Cheng, Qiang Zhu, Yi-Leh...
107
Voted
ICIP
2005
IEEE
16 years 2 months ago
Combined error protection and compression using turbo codes for error resilient image transmission
A joint source channel coding scheme for error resilient image transmission is proposed. A practical image coder was introduced in [1] using modified Differential Pulse Coded Modu...
Anna N. Kim, Stefania Sesia, Tor A. Ramstad, Giuse...
ICIP
2005
IEEE
15 years 6 months ago
Fingerprint indexing based on singular point correlation
—Fingerprint indexing is an efficient technique that greatly improves the performance of Automated Fingerprint Identification Systems. We propose a continuous fingerprint indexin...
Tong Liu, Guocai Zhu, Chao Zhang, Pengwei Hao