The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the extensive use of sophisticated image editing software, it has become easy to manipulate digital images without any visually visible clue. Copy-move is a special type of image forgery performed by copying a part of the image and pasting anywhere else in the same image. We proposed a passive image authentication technique to determine the copy-move forgery. First, the method divides the image...
In commercial banks, data centers often integrates different data sources, which represent complex and independent business systems. Due to the inherent data variability and measurement or execution errors, there may exist some abnormal customer records (data). Existing automatic abnormal customer detection methods are outlier detection which focuses on the differences between customers, and it ignores...
Detection of ship targets in the sea area is an important field in remote sensing image target detection. As the ships and the surrounding areas are very different in texture, that makes it a possible solution to detect the ships using the texture feature. Aiming at the detection of ship targets, a novel ship target detection algorithm in a large scene of the optical remote sensing image is proposed...
This paper proposes an image-to-image face recognition algorithm that uses Dual Linear Regression based Classification (DLRC) and an Electoral College voting approach. Each face image involved is first converted into a cluster of images; each image in the cluster is obtained by shifting the original image a few pixels. The similarity of a pair of face images can be measured by comparing the distance...
Malicious software poses a major threat to network security. The sheer volume of it is growing at an exponential pace. Researches have shown that the majority of new malicious samples are just variations of encountered malicious software. Therefore, similarity analysis has been put forward as an effective way to counteract the enormous new instances. Through measuring the similarity degree among instances,...
Craters are one of the most significant features of the lunar surface and have been researched widely because they offer us the relative age of the surface unit as well as crucial geological information. Generally, early studies of craters are based on the result of manual extraction from lunar images which requires a great deal of man power and specific knowledge and skills. With the development...
We propose a morphological quantitative evaluation method for the aging analysis of the handback skin. First of all, the non-invasive method of digital imaging technology is adopted to get the handback skin morphological data. Then, based on the algorithms of gray-level co-occurrence matrix and displacement co-occurrence matrix, morphological features of the individual handback skins are measured...
Parameters of the fetal nuchal translucency (NT) are very important for the diagnosis and evaluation of fetuses. Currently these parameters are manually measured from the fetal ultrasound image, which may introduce problems of the variability and reproducibility. Here an automatic scheme is proposed to estimate fetal NT parameters. With a morphologic filtering, this scheme firstly establishes the...
In this paper, the existing approaches to and open problems of extracting moving objects from a video sequence were reviewed briefly, and a novel method was proposed and verified. The method extracts contours of moving objects mainly by combining gradient information extracting with three-frame-differencing and connectivity-testing-based noise reduction. The results of theoretical analyses and computer...
In this paper, we propose a new PCA based subspace approach for pattern recognition. The conventional PCA feature space is first converted to a WPCA feature space with unit variance by weighting the features and then face recognition is performed in the new space. Detailed theoretical derivation and analysis are presented and simulation results on AR and ORL face databases are given. The simulation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.