The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Local Feature Extraction (LFE) algorithm is an effective feature extraction method developed in recent years. One of the shortcomings of the current LFE algorithm is that it can only process labeled data, and does not work well when the amount of the labeled data is limited. However, it is usually easy to obtain large amount of unlabeled data but only a few labeled data. In this paper, we propose...
In this paper, we propose unconstrained handwritten Kannada character recognition based on Fisher linear discriminant analysis (FLD). The proposed system extracts features from well known FLD, Two dimensional FLD (2D-FLD) and diagonal FLD. In order to classify the characters, we explore different distance measure techniques and compare their results. The proposed system is tested on unconstrained...
In this paper, a new oblivious fragile watermarking using discrete cosine transform is proposed. It is inspired by Wong's public key watermarking scheme proposed in 1998 and aims to improve its vulnerability towards possible attacks indicated by Barreto and Holliman. Instead of making use of contextual information and making it an inter-block dependent scheme, as suggested by Barreto, we adopt another...
When we generate an intermediate viewpoint image using multi-view images and their depth maps, we may have very annoying boundary noises in the background due to depth value errors around depth discontinuities. In this paper, we propose a boundary filtering method for synthesized images. After defining the boundary noise area using depth map, we replace them with corresponding texture information...
This paper proposes a retrieval system for three dimensional objects using reflective symmetry. For the retrieval method, a reflective symmetric axis with a projector is used. The symmetric plane is calculated by the reflection symmetry, and the depth buffer is calculated for the symmetric plane. Then, by applying the Fourier transform to the depth buffer, the feature vector for the object is generated...
Disparity is an important feature of multiview video applications, which can be used in coding techniques, synthesis of views, among others. The disparity estimation, however, is very complex and requires high processing capabilities to produce precise results. This paper presents an estimation method that uses segmentation and disparity information in an iterative cycle. In each cycle the frames...
In this paper, we propose an entropy coding method to further compress quantized mel-frequency cepstral coefficients (MFCCs) extracted for distributed speech recognition (DSR). In the ETSI extended DSR standard, MFCCs are compressed with additional parameters such as pitch and voicing class. It is observed that the distribution of MFCCs varies according to the voicing class, thereby enabling the design...
Inspired by the keyword-based text filter, this paper proposes an image filter which detects the spam image by matching with user-specified image content. In this way, detecting image spam e-mail is converted into image matching process. Stable local feature detection and representation is a fundamental component of image matching algorithms. SIFT has been proven to be the most robust local invariant...
In this paper, we propose a clustering method to solve computing resource problem that may arise in very large scale on-line Chinese character recognition using HMM and structure code. The basic concept of our method is to collect HMMs that have same number of parameters, then to cluster those HMMs. In our system, the number of classes is 98,639, which makes it almost impossible to load all the models...
Signature can be seen as an individual characteristic of a person which if modeled with precision can be used for his/her validation. Automatic signature verification is a technique that saves time and money. The paper is focused on skilled forgery detection. In addition, it also lays emphasis on the extraction of the critical regions which are more prone to mistakes. It follows a graph matching approach,...
A new method to compute the similarity of two blog posts is proposed in this paper. This method mainly has two parts including keywords extraction and semantic similarity measurement. During keywords extraction part, the method utilizes particular post features to extract keywords from one blog post with the aim to improve the correlation rate. In order to compute the similarity of any two blog posts...
Email classification methods based on the content general use vector space model. The model is constructed based on the frequency of every independent word appearing in Email content. Frequency based VSM does not take the context environment of the word into account, thus the feature vectors can not accurately represent Email content, which will result in the inaccurate of classification. This paper...
In this paper, we propose a new color image retrieval scheme based on color features. The goal of this scheme is to effectively retrieve images similar to a query image in a color image database. In this scheme, a color image is first divided into three planes. Then the local features of the given image can be found by calculating the color difference of each plane. Thereafter, the color difference...
In this paper we have survey on biometric payment system. Biometric payment system is used for various kinds of payment system instead of the tension of cards to put with them and to memorize their difficult passwords and pin numbers. Biometric payment system is much safe and secure and very easy to use and even without using any password or secret codes to remember as compared with previous system...
Complex visual tasks may be tackled with remarkably simple neural architectures generated by a co-evolutionary process of active vision and feature selection. This hypothesis has recently been tested in several robotic applications such as shape discrimination, car driving, indoor/outdoor navigation of a wheeled robot. Here we describe an experiment where this hypothesis is further examined in goal-oriented...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.