نتایج جستجو برای: key image

تعداد نتایج: 909039  

1999
Xudong Jiang Wei Yun Yau

The performance of an automatic fingerprint verification approach relies heavily on the quality of the fingerprint image. Enhancement of the fingerprint image is then a crucial step in automatic fingerprint verification. This paper discusses the fingerprint image processing methods for automatic verification and proposes an adaptive oriented low pass filter to enhance the fingerprint image qual...

Journal: :CoRR 2013
Adity Sharma Anoo Agarwal Vinay Kumar

A new technique for data hiding in digital image is proposed in this paper. Steganography is a well known technique for hiding data in an image, but generally the format of image plays a pivotal role in it, and the scheme is format dependent. In this paper we will discuss a new technique where irrespective of the format of image, we can easily hide a large amount of data without deteriorating t...

2001
David W. McDonald Mark S. Ackerman

INTRODUCTION People are faced with difficult problems that they cannot solve alone on a day-to-day basis. In these situations the right people are those who have the expertise to answer a specific question or in some other way move the problem toward resolution. In organizational settings, people fill key roles that assist in solving problems or initiating important collaborations. Managers, se...

Journal: :CVGIP: Graphical Model and Image Processing 1996
Roberto Brunelli Ornella Mich

| In this paper we present a system for browsing large mug-shot databases and the creation identikits of photographic quality. The two functions are interrelated: the available database provides direct feedback to the user building the identikit and the identikit itself can be used as an access key to the image database. SpotIt! provides a virtually unlimited set of alternative features that ca...

2012
Tomohiko Fujita Takuya Funatomi Yoshitaka Morimura Michihiko Minoh

To achieve privacy protection on facial image retrieval systems, we propose a method of encrypting facial images with a key produced from facial features. Because facial features vary even for the same person, it is not recommended to use facial features as the cryptographic key. Therefore, we propose a method for generating a key by quantizing the facial features based on entropy. In our exper...

Journal: :Journal of Visualization and Computer Animation 2013
Hongyu Wu Xiaowu Chen Mengxia Yang Zhihong Fang

This paper proposes a novel video-based method to transfer the illumination from a single reference facial performance video to a target one taken under nearly uniform illumination. We first filter the key frames of the reference and the target face videos with an edge-preserving filter. Then, the illumination component of reference key frame is extracted through dividing the filtered reference...

Journal: :Computer and Information Science 2008
Yulian Shang Wuyuan Jia Peng Li Pengfei Zhu

Based on the RSA public key cryptosystem, in this article, we put forward one sort of iterative encryption scheme based on RSA. The multiple keys can make attackers’ attacks to the system more difficult and further enhance the security of the key. Through the simulation of software, we realize the encryption transmission of binary image and validate the improvement of the RSA iterative encrypti...

2013
Patrick J de Koning Rob J van der Geest Jos J Westenberg

Background Three-dimensional (3D) velocity-encoded MRI (4DFLOW) of the heart may be used for the assessment of systolic and diastolic function. Particle tracing is frequently used as a technique for visualization of 3D intra-cardiac flow patterns. As the obtained velocity data may suffer from imperfections in the acquisition technique, it is important to have a means for image quality control. ...

Journal: :CoRR 2017
Haodong Li Weiqi Luo Quanquan Rao Jiwu Huang

The fingerprint-copy attack aims to confuse camera identification based on sensor pattern noise. However, the triangle test shows that the forged images undergone fingerprint-copy attack would share a non-PRNU (Photo-response nonuniformity) component with every stolen image, and thus can detect fingerprint-copy attack. In this paper, we propose an improved fingerprint-copy attack scheme. Our ma...

Journal: :Comput. Graph. Forum 2005
Marco Tarini Paolo Cignoni

We introduce a new texture representation that combines standard sampling, to be bilinearly interpolated in smoothly varying regions, with customizable discontinuities, to model sharp boundaries between these regions. The structure consists of a standard signal texture, plus a second texture we call pinchmap, which encodes discontinuities along generally curved lines; at rendering time the frag...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید