The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Social scientists who collect large amounts of medical data value the privacy of their survey participants. As they follow participants through longitudinal studies, they develop unique profiles of these individuals. A growing challenge for these researchers is to maintain the privacy of their study participants, while sharing their data to facilitate research. Differential privacy is a new mechanism...
This paper addresses the challenging problem of recognition and classification of textured surfaces under illumination variation, geometric transformations and noisy sensor measurements. We propose a new texture operator, Adaptive Median Binary Patterns (AMBP) that extends our previous Median Binary Patterns (MBP) texture feature. The principal idea of AMBP is to hash small local image patches into...
The local feature descriptor called SIFT, is one of the most widely used descriptors. The keypoints found with RSIFT and describe them in a standard way, which makes them invariant to the size changes, rotation, position, scale, and so on. These are quite powerful features and are used in a variety of tasks. This local feature SIFT descriptor gives potential key points, which are extracted from the...
Feature descriptor based methods (e.g. Local Binary Patterns, Local Ternary Patterns) have gained encouraging results in face recognition. However one needs to manually set the threshold in Local Ternary Patterns (LTP). The threshold in LTP is not data adaptive and not robust to noise. In some cases, we may not give a suitable threshold for LTP. Inspired by Weber's Law, here a data adaptive threshold...
Face recognition is a popular technique in identifying human features. In certain application such as recognizing criminals from video surveillance, where no other physical trait is available, face recognition is the most practical and assessable human recognition method. For this reason, face recognition continue to attract large research interest among image processing community. In this paper,...
Patient death ratio because of lung cancer is much higher than other types of cancer. Early detection is a must to take effective steps towards curing this disease. Medical researchers have proven that in most of the cases nodules or mass tissues in lung is an indication of lung cancer. Detection of these abnormalities at an early stage can help doctors to take proper steps towards curing this disease...
In the paper a novel approach to the problem of eye blink detection in video sequences is proposed. The introduced method is utilizing the technique of Local Binary Patterns (LBP), which enables to build a descriptor capturing the features of the current eye state. In the initial step, the histogram of LBP describing the open eye is constructed and afterwards it serves as a template, which is compared...
Local Binary Pattern (LBP) and its variants are effective and popular descriptors for texture classification. Most LBP like descriptors have disadvantages including sensitiveness to noise and inability to capture long distance texture information. In this paper we propose a simple, efficient, yet robust multi-resolution descriptor to texture classification — Binary Rotation Invariant and Noise Tolerant...
We perform an empirical analysis of the statistic properties of the probability density functions (PDFs) of the ECGs. We show that the statistical analysis of the ECGs can reveal useful information on the noise in the recordings, and on the true ECG. The paper complements another paper by the second author, with theoretical character.
This paper presents an effective appearance-based facial feature descriptor constructed with a new local texture pattern, namely the median ternary pattern (MTP) for face representation and recognition. The proposed MTP operator encodes the texture information of a local neighborhood by quantizing the intensity values of the neighbors around each pixel in three different levels based on the local...
A new robust to noise algorithm for mammographic image segmentation is presented in this paper. Its main objective is the separation of breast and background, establishing correctly the boundaries of the breast. The algorithm is a combination of several image processing operations such as histogram specification, re-sampling, histogram adjustment, arithmetic and morphological operations. It was tested...
Differential privacy (DP) is a promising scheme for releasing the results of statistical queries on sensitive data, with strong privacy guarantees against adversaries with arbitrary background knowledge. Existing studies on DP mostly focus on simple aggregations such as counts. This paper investigates the publication of DP-compliant histograms, which is an important analytical tool for showing the...
Logo spotting is of a great interest because it enables to categorize the document images of a digital library of scanned documents according to their sources, without any costly semantic analysis of their textual transcript. In this paper, we present an approach for logo spotting, based on the matching of keypoints extracted both from the query document images and a given set of logos (gallery) using...
A vast number of historical and badly degraded document images can be found in libraries, public, and national archives. Due to the complex nature of different artifacts, such poor quality documents are hard to read and to process. In this paper, a novel adaptive binarization algorithm using ternary entropy-based approach is proposed. Given an input image, the contrast of intensity is first estimated...
In this paper we propose a novel kernel sparse representation classification (SRC) framework and utilize the local binary pattern (LBP) descriptor in this framework for robust face recognition. First we develop a kernel coordinate descent (KCD) algorithm for 11 minimization in the kernel space, which is based on the covariance update technique. Then we extract LBP descriptors from each image and apply...
Ground surface deformation can be monitored from time series of SAR interferograms. Conventional approaches to that problem usually require unwrapping of the interferograms that can be limiting due to decorrelation. We present a method producing denoised wrapped phase time series from a set of differential interferograms. The different paths linking two dates are combined to derive the most likely...
In this paper we propose a fast and robust descriptor for multiple view object recognition using a small number of training examples. In order to design a descriptor to be discriminative between many different object appearances, we base it on a combination of invariant color, edge and texture descriptors. We use a color descriptor based on a HSV histogram - as it is robust to size and position of...
We consider statistical data analysis in the interactive setting. In this setting a trusted curator maintains a database of sensitive information about individual participants, and releases privacy-preserving answers to queries as they arrive. Our primary contribution is a new differentially private multiplicative weights mechanism for answering a large number of interactive counting (or linear) queries...
The notion of universally utility-maximizing privacy mechanism was recently introduced by Ghosh, Rough garden, and Sundararajan [STOC 2009]. These are mechanisms that guarantee optimal utility to a large class of information consumers, simultaneously, while preserving Differential Privacy [Dwork, McSherry, Nissim, and Smith, TCC 2006]. Ghosh, Rough garden and Sundararajan have demonstrated, quite...
Content-based copy detection (CBCD) recently has appeared a promising technique for video monitoring and copyright protection. In this paper, a novel framework for CBCD is proposed. Robust global features and local Speeded Up Robust Features (SURF) are first combined to describe video contents, and the density sampling method is proposed to improve the generation of visual codebook. Secondly, Smith-Waterman...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.