Publication Year: 2004
DOI: DOI not available
Abstract: Introduction Todd Q. R. Molina, and A.K. Katsaggelos Aguiar, Radu S. Jasinschi, Jose M. F. Moura, and R. Charnchai Pluempitiwiriyawej THE COMPUTATION OF MOTION Christoph Stiller, Soeren Kammel, Reed Jan Horn, and Thao Dang MOTION ANALYSIS AND DISPLACEMENT ESTIMATION CONTENT-BASED IN THE FREQUENCY DOMAIN Luca Lucchese and Guido Maria Cortelazzo Show more
Authors:
Publication Year: 2006
DOI: https://doi.org/10.1201/9781420013450
Abstract: Protection of and Shih-Fu Chang Digital Rights Management for Consumer Devices, Jeffrey Lotspiech Edward Adult Image Filtering for Internet Safety, Huicheng Zheng, Mohamed Daoudi,Christophe J. Tombelle, and Chabane Djeraba Digital Rights Management Issues for Video, Delp Sabu Emmanuel and Mohan S. Kankanhalli Vulnerabilities of Multimedia Protection Schemes, Mohamed Multimedia F. Show more
Authors:
Publication Year: 2007
DOI: https://doi.org/10.1117/12.696774
Abstract: Blind steganalysis is then used to construct a Support Vector Machine multi-classifier capable becoming of assigning stego images to six popular steganographic algorithms-F5,22 OutGuess,18 increasingly Model Based Steganography without ,19 and with20 deblocking, JP Hide&Seek,1 more and Steghide.14 Comparing to our previous work on multi-classification,11, 12 powerful. the new feature Show more
Authors:
Publication Year: 2007
DOI: https://doi.org/10.1117/12.704723
Abstract: In this law for the probability distributions of the first digits of paper, the block-DCT and quantized JPEG coefficients is presented. A parametric a logarithmic law, i.e., the generalized Benford's law, is formulated. Furthermore, novel some potential applications of this model in image forensics are statistical discussed in this paper, Show more
Authors:
Publication Year: 2007
DOI: https://doi.org/10.1117/12.696519
Abstract: Photo-response non-uniformity as joint estimation and detection procedure consisting of two steps: (1) a estimation of PRNUs from video clips using the Maximum Likelihood unique Estimator and (2) detecting the presence of PRNU using normalized identification cross-correlation. We anticipate this technology to be an essential tool fingerprint for fighting piracy Show more
Authors:
Publication Year: 2007
DOI: https://doi.org/10.1117/12.704321
Abstract: A new proposed difference between the authentic images and spliced images. Consequently, the in proposed scheme extracts image features from moments of wavelet characteristic this functions and 2-D phase congruency for image splicing detection. The paper. experiments have demonstrated that the proposed approach can achieve a Image higher detection rate Show more
Authors:
Publication Year: 2006
DOI: https://doi.org/10.1117/12.643254
Abstract: The contribution an reliability of steganalysis given certain a priori side-information about the improved image source?" Moreover, we experimentally compare the security of three version steganographic schemes for images stored in a raster format - of (1) pseudo-random ±1 embedding using ternary matrix embedding, (2) spatially a adaptive ternary ±1 Show more
Authors:
Publication Year: 2006
DOI: https://doi.org/10.1007/11848035
Abstract: Not available
Authors:
Publication Year: 2005
DOI: https://doi.org/10.1117/12.593796
Abstract: In today's very process. In this paper we describe the use of image important texture analysis to identify the printer used to print a in document. In particular we will describe a set of features terms that can be used to provide forensic information about a of document. We will Show more
Authors:
Publication Year: 2009
DOI: https://doi.org/10.1109/msp.2008.931089
Abstract: This special and open problems in digital forensics that are amenable to issue signal processing techniques. provides a comprehensive overview of recent developments
Authors:
Publication Year: 2011
DOI: https://doi.org/10.1109/icip.2011.6115809
Abstract: Many chronic can be related to diet. Hence, the need to accurately diseases, measure diet becomes imperative. We are developing methods to use such image analysis tools for the identification and quantification of food as consumed at a meal. In this paper we describe a heart new approach to food Show more
Authors:
Publication Year: 2014
DOI: https://doi.org/10.1109/icip.2014.7025555
Abstract: In this food 10% for the Top 4 classification accuracy. image analysis and a classification approach based on k-nearest paper neighbors and vocabulary trees. The system is evaluated on a we food image dataset consisting of 1453 images of eating occasions investigate in 42 food categories which were acquired by Show more
Authors:
Publication Year: 2013
DOI: https://doi.org/10.1109/icme.2013.6607548
Abstract: We are food content from a single image using a shape template for intake foods with regular shapes and area-based weight estimation for foods through with irregular shapes. the use of food images taken at developing a meal. The food images are then analyzed to extract a the nutrient content Show more
Authors:
Publication Year: 2006
DOI: https://doi.org/10.1117/12.643176
Abstract: In recent proposed. classifiers. The binary feature vectors are integrated in the HDS Among leading to a privacy protected facial recognition algorithm with acceptable these FAR and FRR, provided that the intra-class variation is sufficiently is small. This suggests that a controlled enrollment procedure with a the sufficient number of Show more
Authors:
Publication Year: 2007
DOI: https://doi.org/10.1117/12.705837
Abstract: Digital images of unique fingerprint of the scanner. An anisotropic local polynomial estimator sources is used for obtaining the reference patterns. To further improve including the classification accuracy a feature vector based approach using an digital SVM classifier is used to classify the pattern noise. This cameras feature vector based Show more
Authors:
Found 305 results in 0.167 seconds
Including any of the words AND
, OR
, or NOT
in any of your searches will enable
boolean search. Those words must be UPPERCASE. You can use this in all searches, including using
the search parameter, and using search filters.
This allows you to craft complex queries using those boolean operators along with parentheses and quotation marks.
Surrounding a phrase with quotation marks will search for an exact match of that phrase, after stemming and
stop-word removal (be sure to use double quotation marks — "
). Using parentheses will specify order of
operations for the boolean operators. Words that are not separated by one of the boolean operators will be
interpreted as AND
.
Behind the scenes, the boolean search is using Elasticsearch's query string query on the searchable fields (such as
title, abstract, and fulltext for works; see each individual entity page for specifics about that entity). Wildcard
and fuzzy searches using *
, ?
or ~
are not allowed; these characters will be
removed from any searches. These searches, even when using quotation marks, will go through the same cleaning as
described above, including stemming and removal of stop words.
Search for works that mention "elmo"
and "sesame street"
, but not the words
"cookie"
or "monster"
:
"elmo" AND "sesame street" NOT "cookie" NOT "monster"