The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
we present an improved algorithm for the multiple closed contour detection in the multi-object scene, especially for the contours partly occluded by some others. Our method formulates the boundary fragments detected by edge detector from nature image as a graph represented by a reversal symmetry matrix, which incorporates the Gestalt principles of proximity and good continuity as the transition probability...
Recently, a number of chaos-based image encryption algorithms have been proposed. However, the initial parameters used in masking operation are usually fixed in the whole encryption process. In this paper, we introduce an efficient image encryption scheme of pixel bit based on combination of chaotic systems with variable initial parameters. The algorithm takes advantage of the best features of chaotic...
Recently, biometric template protection has received ever increasing research interests. However, most of the proposed schemes are not yet sufficiently mature for large scale deployment, they do not meet the requirements of security, and high-recognition performance. For example, matching methods based on Euclidean measurement ignore the difference of different component easily. Mean quantization...
Playfield detection is one of important tasks in sports video analysis. Although some encouraging results have been achieved, the robustness of playfield detection still needs to be enhanced. To the best of our knowledge, traditional methods for playfield detection usually using various color features. Detection results are unstable when there are shadows on the playfield. In this paper, an effective...
Visual saliency plays an important role in biological vision. This paper proposes a novel feature-based approach of visual saliency detection for natural color images. The saliency for each pixel is determined by two features: the structure information and the color information, which represent local information of pixels. The structure information is represented by local steering kernel and the color...
In digital forensics, data stored in a hard disk usually contains valuable evidence. Preserving the integrity of the data in the hard disk is a critical issue. A single hash value for the whole hard disk is not appropriate as the investigation may take a long time and latent sector errors (LSEs) (bad sectors due to media imperfection, for example) which cause a sector suddenly unreadable will make...
This paper proposes a video streaming mechanism with packet recovery which extends the Enhanced Adaptive Forward Error Correction (EAFEC) scheme by involving Multiple Description Coding (MDC) with path diversity. The proposed mechanism transmits multiple video sub-streams along multiple disjoint paths, then recovers the sub-streams using EAFEC separately, and at last merges and reconstructs the whole...
Visual degradation and distortion may be introduced during the 3D mesh simplification. The critical issue in all mesh simplification methods is how to evaluate it. Some geometric metrics without the consideration of human visual perception and perceptual metrics based on subjective test have been proposed. It is urgent to develop an objective evaluation metric with the consideration of human visual...
The advent of digital forensic techniques imposes great challenges to the security of image disguise where tampering is involved to conceal the existence of sensitive objects in the source image. As a consequence, image interpolation that is a prerequisite step in image disguise should be adapted to be forensic resistant. This paper proposes a novel and secure interpolation method to facilitate image...
With the rapid development of computer graphics, the Partial Differential Equations (PDE) based geometry reconstruction technique has recently been considered as a powerful tool for 3D face modeling. However, the challenge on the accuracy of the reconstructed 3D face still exists due to the diversity of facial expressions. In this paper, an error driven 3D face modeling scheme based on PDE is proposed...
Image searching and authentication have become important issues for the digital world. Image hashing technique has been proposed to meet them. In this paper, a self-synchronized image hashing algorithm resistant to rotation is presented. In the algorithm, the features of the image are extracted by Scale Invariant Feature Transform(SIFT) algorithm. Then a cyclic matrix are generated from the features...
JPEG 2000 is a wavelet-based image compression standard and coding system. It will supersede the original JPEG standard in the future. Compared with Counterlet transform or Gabor filter, wavelet transform used in JPEG 2000 is less effective to extract robust edge features. In this paper, a novel discrete wavelet transform (DWT) based image hashing algorithm is proposed. Robust bits of HL, LH and HH...
Covert channels are widely used for secret information transmission on networks. Although existing packet length based covert channels have great tamper resistance, they fail to deliver normal network traffic especially when the amounts of covert messages increase. As such, they are vulnerable to detections due to abnormal network traffic. Hence, in this paper, we are motivated to design a protocol-independent...
With the rapid development of multimedia technology, how to establish the integrity of images has become an unavoidable problem. The transform between a digital image and its hard-copy makes the problem more complex. To simplify the content based authentication, we propose a print–scan resistant image hashing algorithm based on the Radon and wavelet transform. The Radon transforms an image to its...
Directional content-preserving features are extracted instead of the global ones. It first detects the initial curvature feature points based on the scale interaction model using Gabor filters with various scales in different directions. Then, the iterative geometric method is proposed to exact the content-preserving feature points. Next, by the radon transform, the two-dimensional distributing is...
A novel image perceptual hashing method is proposed on the intermediate hashing stage. It first uses the iterative geometric techniques to get main geometric features. Then, by the observation that the distances of feature points are invariant in the polar coordinate under arbitrary rotation, a novel processing method is proposed to arrange the two-dimensional distribution to a one-dimensional feature...
Image searching and authentication have become strong requirements in the digital world. Image perceptual hashing has been proposed to meet them. In this paper, a rotation resilient image hashing algorithm is presented. In the algorithm, the position information of original image is extracted to adjust the rotation. Then the features of the image are extracted by contourlet transform. The key-dependence...
In order to meet the application requirements regarding universality, permanence and performance, many multimodal biometric approaches have been proposed in recent decades. In these approaches, fused templates are stored unprotected as biometric reference in a token or database. Once the database is compromised, the attacker can potentially learn details that are sensitive to the data subject and...
Immersive sound spaces which are synthesized using virtual reality techniques have recently been developed to realize highly realistic telecommunication interactions. In real world soundscapes the sounds we usually listen to include background or ??ambient?? sounds such as the sounds of the ventilation system in a room. However, current virtual auditory display systems generate point sound sources...
A novel multimodal biometric recognition algorithm based on complex kernel fisher discriminant analysis (complex KFDA) is proposed. Complex KFDA exploits two phases to generalize KFDA and perform classification for the fusion feature set: complex KPCA plus complex LDA. As two distinct biometric modals, the features of iris and face are fused in parallel to test our algorithm. Experimental results...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.