The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To realize Electrocardiography (ECG) signals monitoring systems, compressive sensing (CS) is a new technique to reduce power of biosensors and data transmission. Instead of spending high complexity on reconstructing back to data domain to do signal analysis, compressed analysis (CA) exploits the data structure preserved by CS to directly analyze in the compressed domain. However, compressively-sensed...
Skew detection is a crucial step for document analysis systems. Indeed, it represents one of the basic challenges, especially in case of historical documents analysis. In this paper, we propose a novel robust skew angle detection and correction technique. Morphological Skeleton is introduced to significantly reduce the amount of data to treat by removing the redundant pixels and keeping only the central...
Traversable region estimation is the fundamental enabler in autonomous navigation. In this paper, we propose a traversable region segmentation algorithm using stereo vision. We address this problem mainly in road scenes for the goal of autonomous driving. Using only geometry information, our approach has the advantages of effectiveness and robustness. The proposed approach is based on a cascaded framework...
Convolutional Neural Network (CNN) has led to significant progress in face recognition. Currently most CNNbased face recognition methods follow a two-step pipeline, i.e. a detected face is first aligned to a canonical one predefined by a mean face shape, and then it is fed into a CNN to extract features for recognition. The alignment step transforms all faces to the same shape, which can cause loss...
Picking and transporting objects in an outdoor environment with multiple lightweight MAVs is a demanding task. The main challenges are sudden changes of flight dynamics due to altered center of mass and weight, varying lighting conditions for visual perception, and coordination of the MAVs over unreliable wireless connections. At the Mohamed Bin Zayed International Robotics Challenge (MBZIRC) teams...
As the usage areas of the images increase, the functions of various image editing software are increasing. Easy-to-use software has caused the images to be tampered with easily. Many Copy-Move Forgery Detection (CMFD) algorithms have been developed against these attacks. In literature CMFD methods are divided into block based and keypoint based methods. In this paper, recent works in keypoint based...
Radio frequency fingerprints (RF fingerprints) extraction is a technology that can identify the unique radio transmitter at the physical level by measuring external feature to match with feature library. RF fingerprints is the reflection of differences between hardwares of transmitters, and it contains rich detail characteristics of internal components within transmitter. RF fingerprints has been...
Handwritten document images are a special class of document images having a lot of variations in font-style, font size, thickness and interspacing of words and lines. Designing an effective fragile watermarking scheme to protect such images needs capturing both structure and information content which is an open research challenge. A novel contourlet based fragile watermarking technique for optimal...
Identification and apprehension of criminals by matching facial sketches with photographic faces is one of the major law enforcement applications of the modern world. Majority of the crime occur where there will not be any information available regarding the suspect. In such situation, forensic sketch artist who usually deal with the eyewitness of the crime or victim in order to draw the sketch that...
This paper introduced a watermarking method using the CRT and Canny Algorithm that able to improve the imperceptibility of watermarked image and preserving the robustness of watermark image as well. The classical CRT algorithm is spread the watermark bits evenly on the image area. It causes significant degradation when the embedding location lies on the least significant region or in the homogeny...
Palmprint recognition has received in the last 20 years a great deal of the research community's attention. In this paper a new palmprint matching approach based on corner feature point extraction is proposed. A 72-element fixed-length descriptor is used to capture distinctive information of each feature point neighborhood and to build a measure of similarity whilst their coordinates provide a measure...
In this paper, we develop a robust generalization of the Gaussian quasi score test (GQST) for composite binary hypothesis testing. The proposed test, called measure-transformed GQST (MT-GQST), is based on a transformation applied to the probability distribution of the data. The considered transform is structured by a non-negative function, called MT-function, that weights the data points. By appropriate...
Numerous methods have been proposed for person re-identification, most of which however neglect the matching efficiency. Recently, several hashing based approaches have been developed to make re-identification more scalable for large-scale gallery sets. Despite their efficiency, these works ignore cross-camera variations, which severely deteriorate the final matching accuracy. To address the above...
We address the problem of instance-level semantic segmentation, which aims at jointly detecting, segmenting and classifying every individual object in an image. In this context, existing methods typically propose candidate objects, usually as bounding boxes, and directly predict a binary mask within each such proposal. As a consequence, they cannot recover from errors in the object candidate generation...
This paper proposes an algorithm to perform robust digital watermarking through image scrambling and singular value decomposition (SVD). Both the watermark and the carrier are images, and the proposed algorithm aim to ensure the robustness and perceptual invisibility of the embedded watermark. The proposed algorithm first performs a scrambling encryption on the watermark and carrier images. The scrambled...
we present a method based on a locally affineinvariant constraint for volumetric registration of 3D solid shapes. The core idea of this method is that an affine combination of the given point in 3D solid shapes that are directly connected to the given point, and the corresponding weight of each neighboring point can be obtained by the method of generalized least square. The input of our method is...
Establishing reliable correspondences is often challenging for retinal image registration with poor quality and low overlap. The conventional local search methods usually find many incorrect correspondences by feature descriptor, which would degrade the accuracy of image registration. In this paper, we propose a robust correspondence detection framework for low overlap and poor quality retinal image...
Ensemble clustering is to fuse several basic partitions to find a single best cluster structure of data. With the prevalence of heterogeneous data rising from various application domains, ensemble clustering has become a state-of-the-art solution for cluster analysis due to its robustness and generalizability. However in the area of fuzzy systems, systematic research along this line is still in its...
This paper studies the following question: where should an adversary place an outlier of a given magnitude in order to maximize the error of the subspace estimated by PCA? We give the exact location of this worst possible outlier, and the exact expression of the maximum possible error. Equivalently, we determine the information-theoretic bounds on how much an outlier can tilt a subspace in its direction...
Stereo cameras are among the most promising sensors for automated driving. For their deployment, however, calibration should be automated and possible in-situ. We propose a restructuring of bundle adjustment into an incremental online calibration system. It allows us to estimate all observable camera parameters on the fly. Both simulations and experiments with real world cameras show its capability...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.