The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present a novel scalable logo recognition system which can recognize a large number of logo categories locally on mobile devices. The system is unsupervised without any supervised training procedure, and very time efficient at low memory cost. It is also robust against challenging conditions such as noise addition, different image scale, rotation, etc. To achieve this goal, we propose...
It is quite common and easy to modify graphics with special effects using multimedia software applications. Graphical effects might able to direct visual attention of the audience to the foci of the graphic presentation. This paper intends to demonstrate two different approaches on preparing the instructional graphics with special effects and to use eye tracking for analyzing the performances in terms...
Visual cryptography is a way to encrypt the secret image into several meaningless share images. Noted that no information can be obtained if not all of the shares are collected. Stacking the share images, the secret image can be retrieved. The share images are meaningless to owner which results in difficult to manage. Tagged visual cryptography is a skill to print a pattern onto meaningless share...
Markerless technology is a game changer for motion-capture applications, such as the monitoring of patients outside the hospital, realistic face-to-face communication across continents, and observation across large spaces.
Image interpolation is important for computer vision. Most of the existing image interpolation methods are based on the optimization in the mean square error (MSE) sense. In this paper, we incorporate the structural similarity (SSIM) based metric into the framework of the nonlocal edge-directed image interpolation (NLEDI) method. In the proposed algorithm, a missing pixel is interpolated using the...
Most web-based e-learning platforms for teaching and learning can record individual action history of the access to course materials and activities. In general, the click through rate (CTR) is recorded as the action to represent the history of people who review the course online. By analyzing CTR only would exclude the important information from the visual behaviors. This study proposed a different...
Secret sharing is widely used in secret image protection since 1979. Image secret sharing schemes are used to encrypt the secret image into several meaningless share images. Later on, the secret image can be reconstructed while collecting the share images. The authentication mechanism is a way to verify whether the reconstructed secret image is authentic. The general authentication might increase...
Visual cryptography (VC) is widely used in secret communications without any computations. The past schemes rarely focused on the authentication issue before reconstructing the decrypted image. This paper provided an authentication mechanism for VC and the experiments confirmed its feasibility.
The camera-projector systems are widely used in 3D measurement. In the visual measurement systems, the calibration for the camera and projector is an important issue. In this paper, an active projection method based on homography is presented for the camera-projector system calibration. With the camera visual feedback, the features of the target and the projected image are extracted by color channels...
Wet paper coding is a technique that can be used to embed secrets into some specific pixels, called dry pixels, of a digital image. The fully exploiting modifications method (FEM) is a method applied to convey secrets securely from senders to receivers using a stego-image that is slightly modified from the original digital image. Based on FEM, before embedding, we randomly choose pixels in the image...
This paper proposes a novel data embedding method for embedding secrets into VQ indices by using the Chinese Remainder Theorem (CRT). In the experimental results, the hiding capacity is flexible which corresponds to the pre-defined prime parameters. In addition, a reversible mechanism is imported into the scheme so the original VQ indices can be restored after extracting secrets retrieval.
Data embedding is one of the important issues for securely conveying secrets from senders to receivers without arousing any notices to attackers. Wet paper coding (WPC) is one of the data embedding schemes which embeds secrets into a subset of pixels of an image. The pixels in the subset are also called dry pixels. Inspired by wet paper coding, a novel data embedding scheme with a magic matrix is...
This paper presents a reversible data embedding scheme with prediction and dissimilar techniques for palette-based images. Two embedding rules are imported in the proposed method, and no extra bit map is required to indicate which rules are applied in which pixels to embed secrets. As the experimental results show, when the hiding capacity is 255 Kb, the visual quality of the decoded image for our...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.