نتایج جستجو برای: key image

تعداد نتایج: 909039  

2003
Xuejun Tan Bir Bhanu Yingqiang Lin

In this paper, we present a comparison of two key approaches for fingerprint identification. These approaches are based on (a) classification followed by verification, and (b) indexing followed by verification. The fingerprint classification approach is based on a novel feature-learning algorithm. It learns to discover composite operators and features that are evolved from combinations of primi...

Journal: :IACR Cryptology ePrint Archive 2012
Rajeswari Mukesh

Image compression and image encryption are pivotal to proper storage and transmission of images over MANET. Simultaneous image compression and encryption aims at achieving enhanced bandwidth utilization and security at the same time. The Number Theory based Image Compression and Quasigroup Encryption (NTICQE) algorithm employs number theoretic paradigm Chinese Remainder Theorem and Quasigroup E...

2006
Ung-Keun Cho Jin-Hyuk Hong Sung-Bae Cho

Singularity is the special feature of fingerprints for identification and classification. Since the performance of singularity extraction depends on the quality of fingerprint images, image enhancement is required to improve the performance. Image enhancement with various image filters might be more useful than a filter, but it is very difficult to find a set of appropriate filters. In this pap...

2010
Babak Mahdian Stanislav Saic Radim Nedbal

Many digital image forensics techniques extracting various fingerprints are dependent on data on digital images from an unknown environment. As often software modifications leave no appropriate traces in images metadata, critical inconveniences and miscalculations of fingerprints arise. This is the problem addressed in this paper. Modeling information noise in image metadata, we introduce a sta...

2016
Danyang Wang Xiaoshi Wang Chenjie Yang

In this paper we purposed an approach to remove ghosting artifact generated by moving objects and reconstruct the movement of these objects in panorama images. Our approach contains three steps. First is to detect moving objects in the image flow with moving background. Second is to replace the moving objects with corresponding background scenes. Third is to reconstruct the movement of moving o...

2002
Oscar C. Au Peter Hon-Wah Wong

We proposed a blind watermarking technique to embed the watermark in JPEG compressed domain. Low frequency DCT coeffi cients are extracted to form an M-dimensional vector. Watermarking is achieved by modifying this vector in order to point to the centroid of a particular cell. This cell is determined according to the extract ed vector, private keys and the watermark. A dual-key system is used t...

2015
Chien-Chang Chen Yao-Hong Tsai

This study presents an expandable essential secret image sharing structure showing that some important shared images, named essential ones, are necessary when recovering the secret image and the proposed structure must incorporate other secret image sharing scheme to expand to a new secret image sharing scheme with multiple functions. An (s, t, n) essential secret image sharing structure shares...

2000
Dee H. Wu Wayne Dannels

Introduction: Echo planar images (EPI) are applied in a variety of diagnostic techniques that rely on fast acquisition of imaged data. EPI applications in common practice range from dynamic-contrast studies used to monitor the passage of injected contrast over time for stroke, tumor evaluation, and cardiac assessment to fMRI applications where a large series of images (typically thousands) are ...

Journal: :Comput. Graph. Forum 2007
Remo Ziegler Simon Bucheli Lukas Ahrenberg Marcus A. Magnor Markus H. Gross

In this paper, we propose a novel framework to represent visual information. Extending the notion of conventional image-based rendering, our framework makes joint use of both light fields and holograms as complementary representations. We demonstrate how light fields can be transformed into holograms, and vice versa. By exploiting the advantages of either representation, our proposed dual repre...

2013
Amanpreet Kaur Neetu Sardana

With the growth in the communication, there is an increase in the transmission of data across the various medium; security is the key issue that needs to be addressed. Various steganography techniques are used to hide actual message secretly to provide control over the medium where data is sent. This paper is intended to propose an image steganography technique that will hide four bits of data ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید