The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a categorization of Synthetic Aperture Radar (SAR) data patches. The categories of the SAR data were designed manually by cutting several spotlight SAR products into different categories. The supervised approach to the categorization was proposed, where an oriented dual tree wavelet transform was used to decompose energy of the original image. Subbands of wavelet transforms with...
Recent studies have indicated that well-designed convolutional neural network (CNN) has achieved comparable performance to the spatial rich models with ensemble classifier (SRM-EC) in digital image steganalysis. In this paper, we discuss the difference and correlation between a CNN model and a SRM-EC model, and explore the classification error rate varying with texture complexity of an image for both...
Since the Viola-Jones seminal work, the boosted cascade with simple features has become the most popular and effective approach for practical face detection. More improved face detectors that can handle uncontrolled face detection scenarios have achieved by applying more advanced features such as Histogram of oriented Gradients (HoG). The great improvement in accuracy delivered by these methods has...
In this paper, we propose a composite manipulation detection method based on convolutional neural networks (CNNs). To our best knowledge, this is the first work applying deep learning for composite forgery detection. The proposed technique defines three types of attacks that occurred frequently during image forging and detects when they are concurrently applied to images. To do this, we learn the...
Keypoint detection is a basic step in many computer vision algorithms aimed at recognition of objects, automatic navigation, medicine and other application fields. Successful implementation of higher level image analysis tasks, however, is conditioned by reliable detection of characteristic image local regions termed keypoints. A large number of keypoint detection algorithms has been proposed and...
In the field of aerial surveillance, tracking targets in images is complicated by the possible motion of the camera, especially if frame differencing is used to detect moving objects. We propose in this paper to exploit the high similarity in sequences acquired from a nearly static camera. In this case distance maps grown from image edge points share many similarities and T-junctions of distance map...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.