The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The combination of biometrics and cryptography is a promising information security technique which offers an efficient way to protect the biometric template, as well as to facilitate user authentication and key management. We propose a key-binding scheme based on iris data, in which reliable region is selected to reduce the intra-class variation, and error control technique that combines RS and convolutional...
How to resist geometry transformation attacks effectively has become a focus of digital watermarking. In this paper a video blind watermarking algorithm resistant to geometry transformation attacks is proposed. In the scheme of watermark embedding, video shot segmentation is used first. Then, background of a video segment in the video shot is extracted by independent component analysis(ICA). Finally,...
This paper proposed a blind digital image watermark analysis algorithm, which is to analyze watermarks in host images without any prior-watermarking embedding and detection information. In the proposed algorithm, DWT is firstly used to decompose images into detail subbands, and noise visibility function is used to enhance the detail subbands, then non-negative matrix factorization (NMF) is used to...
In recent years, iris recognition is becoming a very active topic in both research and practical applications. However, fake iris is a potential threat there are potential threats for iris-based systems. This paper presents a novel fake iris detection method based on the analysis of 2-D Fourier spectra together with iris image quality assessment. First, image quality assessment method is used to exclude...
A main problem in face retrieval is the semantic gap between low-level features and high-level semantic concepts. Relevance feedback (RF) may be used to incorporate to reduce the semantic gap. However, in the search for a specific target in a facial image database, a user's assignment of RF instances may be mistaken. This would make the system prediction of the user's target in a wrong way. Addressing...
This paper considers the problem of orthogonal neighborhood preserving projections (ONPP) in two-dimensional sense. Recently, ONPP was proposed as a projection based dimensionality reduction technique, attempting to preserve both the intrinsic neighborhood geometry of the data samples and the global geometry. Concerned with two dimensional data, such as face images, often vectorized for ONPP algorithm...
Shadow mapping is an efficient algorithm for real-time shadow rendering. This algorithm is image based. When a shadow map with limited resolution maps in to a large virtual scene, it will suffer from the aliasing errors due to it's insufficient sample. In this paper we present a real-time shadow mapping algorithm. We render some sub shadow maps respectively instead of render only one shadow map and...
Face recognition is a very active field for research in the field of pattern recognition. To improve the performance of feature extraction in face recognition, a novel feature extraction method named as minimal linear discriminant analysis based on independent component analysis (ICA) is proposed. Therefore, the singular problem of the within-class scatter matrix will be avoided, and linear discriminant...
With the increasing amount of multimedia data, content-based image retrieval attracts many researchers of various fields in an effort to automate data analysis and indexing. In this paper, we propose a content-based semantic indexing method which annotates images automatically using concepts and textual description. In order to bridge the "semantic gap" between the low-level descriptors...
Background subtraction is a popular moving object detection technique, but its performance is dependent of the accuracy of background model. In this paper, the theory of sequential kernel density approximation is first introduced to background modeling. To this end, a novel background subtraction method for moving object detection is proposed. Various real video sequences have been used to test this...
The processing effect and recognition accuracy of RMB is an important part in the paper currency classification system. According to the characteristics of RMB images, the paper uses the theory of digital image processing and pattern recognition to put forward the method of RMB image processing based on the processing and recognition of the part of the RMB serial numbers, the arithmetic of linear...
The following topics are dealt with: pattern recognition; computer vision; image processing; video analysis; motion analysis; face recognition; biometrics recognition; digital watermarking; document analysis; biomedical imaging; bioinformatics; speech; language; and multimedia.
Aiming at the shortages of the diagnosing efficiency, applicability and knowledge acquisition ability in traditional transformer fault diagnosing methods, an immune model for diagnosing transformer fault is established in this paper by combining the strong ability of recognition and learning in the artificial immune system (AIS) with the attributes' objectively reduction of the rough set theory (RST)...
In the large vocabulary continuous speech recognition system based on stochastic segment model (SSM), the multistage decoding and pruning algorithm could decrease decoding time obviously. Generally, we only decode and prune for one segment each time. In this paper, a decoding algorithm based on neighboring segments is proposed. This algorithm decodes for multi-segments at the same time, so that the...
Audio classification is based on audio features. The choice of audio features can reflect important audio classification features in time and frequency time. The extraction and analysis of audio features are the base and important of audio classification. The most important problem is to extract audio features effectively and make them mutual independence to reduce information redundancy. In this...
Road identification and detection is the essential problem to be solved in intelligent vehicle systems. As the complexity dimension of the surrounding environment increases, road recognition becomes much harder under different interferences. To increment the robustness and interference immunity, a diffused region of Hough based road detection algorithm is proposed in this paper. This algorithm incorporates...
Context-dependent acoustic model based on decision tree has been deeply investigated and applied in English, Chinese speech recognition. But in Mongolian speech recognition, little attention was paid in the past. In this paper Mongolian context-dependent acoustic model based on decision tree was proposed.and decision tree based state tying was applied to the acoustic model designning in Mongolian...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.