Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 76, Issue 2January 2017
Publisher:
  • Kluwer Academic Publishers
  • 101 Philip Drive Assinippi Park Norwell, MA
  • United States
ISSN:1380-7501
Reflects downloads up to 20 Jan 2025Bibliometrics
article
A virtual mouse interface with a two-layered Bayesian network
Pages 1615–1638

During the last decade, many natural interaction methods between human and computer have been introduced. They were developed for substitutions of keyboard and mouse devices so that they provide convenient interfaces. Recently, many studies on vision ...

article
HEVC-based lossless intra coding for efficient still image compression

Latest advancements in capture and display technologies demand better compression techniques for the storage and transmission of still images and video. High efficiency video coding (HEVC) is the latest video compression standard developed by the joint ...

article
An adaptive edge-preserving image denoising technique using patch-based weighted-SVD filtering in wavelet domain

Image denoising has always been one of the standard problems in image processing and computer vision. It is always recommendable for a denoising method to preserve important image features, such as edges, corners, etc., during its execution. Image ...

article
Motion trajectory of human arms based on the dual quaternion with motion tracker

In this paper, we present an algorithm for human motion capture of the real-time motion trajectory of human arms based on wireless inertial 3D motion trackers. It aims to improve the accuracy of inertial motion captures and quickly reconstruct some ...

article
Unconstrained face verification with a dual-layer block-based metric learning

In this paper, a dual-layer block-based metric learning technique is proposed to better discriminate the face image pairs and accelerate the overall verification process under the unconstrained environment. The input images are processed as blocks to ...

article
Region image sharing with various secrecy levels

In most secret image sharing schemes, the secrecy level of each pixel is the same. However, in real applications, different pixels may require different secrecy levels. For example, in a patient's medical image, the region with the patient's name must ...

article
A web-based tool for fast instance-level labeling of videos and the creation of spatiotemporal media fragments

This paper presents a web-based interactive tool for time-efficient instance-level spatiotemporal labeling of videos, based on the re-detection of manually selected objects of interest that appear in them. The developed tool allows the user to select a ...

article
A new teleconference system with a fast technique in HEVC coding

Tele-Communications play an important role nowadays. Globalization has led the requirement for traversed communication. Therefore a multimedia system takes an influential act in the comprehensive communication between the regions. Teleconferencing ...

article
An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography
Pages 1801–1815

The Session Initiation Protocol (SIP) is a signaling protocol widely applied in the world of multimedia communication. Numerous SIP authenticated key agreement schemes have been proposed with the purpose of ensuring security communication. Farash ...

article
Breaking a novel image encryption scheme based on an improper fractional order chaotic system

In this paper, we analyze the security of a recent image encryption algorithm based on an improper fractional-order chaotic system suggested by Zhao et al. The fatal flaw in the cryptosystem is that the keystream generated depends on neither the plain-...

article
Adaptive (k, F1) interpolation-based hiding scheme

In 2012, Lee et al. proposed an interpolation technique with neighboring pixels (INP) as the base to conceal secret information in predicted pixels. Their method can effectively predict the pixel between two neighboring pixels. However, the different ...

article
ILSBMR: improved LSBMR (ILSBMR) method

The Least Significant Bit Matching Revisited (LSBMR) is among the most commonly used methods on image steganography, aiming to make only smaller changes in an image. While security is considered as one of the basic evaluation criteria for steganography ...

article
Image structure rebuilding technique using fractal dimension on the best match patch searching

Since most images were built with regular textures and structures, the exemplar-based inpainting technique has become a brand-new solution for renovating degraded images by searching a match patch. This characteristic has also been named as the local ...

article
Secure multi-group data hiding based on gemd map

Numerous data hiding schemes have been recently proposed based on section-wise strategy. The purpose of these approaches is to enhance security by using a unique key to generate a table. But these approaches are not matched between the embedding secret ...

article
A new approach for texture segmentation based on NBP method

Nowadays, image processing is an interesting research area due to the growth of the communication technologies. Matching problem, which consists of localizing one texture in an image, that contains several textures is one of the fundamental problem of ...

article
Multiple human tracking based on distributed collaborative cameras

Due to the horizon limitation of single camera, it is difficult for single camera based multi-object tracking system to track multiple objects accurately. In addition, the possible object occlusion and ambiguous appearances often degrade the performance ...

article
Optimization algorithm based on texture feature and frame correlation in HEVC

Newly proposed video standard High Efficiency Video Coding (HEVC) achieves higher compression performance than previous ones. In this paper, we propose a novel algorithm for intra prediction, which scales the complexity of pictures' texture to perform ...

article
Full band watermarking in DCT domain with Weibull model

In the framework of maximum-likelihood detection for image watermarking schemes, the conventional Generalized Gaussian Distribution (GGD), Cauchy and Student's t distributions often fail to model the pulse-like distributions, such as Discrete Cosine ...

article
Fast CU size decision and mode decision algorithm for intra prediction in HEVC
Pages 2001–2017

In the intra prediction process, High Efficiency Video Coding (HEVC) provides a quadtree-based coding unit (CU) block partitioning structure and up to 35 kinds of prediction modes to improve the coding performance. These technologies improve the coding ...

article
Rain streak removal by multi-frame-based anisotropic filtering
Pages 2019–2038

Dynamic weather conditions, such as rain and snow, often produce strong intensity discontinuity among frames, thus seriously degrade their visual or compression performance. How to remove these artifacts is a challenging task and has been intensively ...

article
Robust object tracking based on sparse representation and incremental weighted PCA

Object tracking plays a crucial role in many applications of computer vision, but it is still a challenging problem due to the variations of illumination, shape deformation and occlusion. A new robust tracking method based on incremental weighted PCA ...

article
On the retrieval of 3D mesh sequences of human actions

In this paper, the problem of unsupervised human action retrieval in 3D mesh sequences is addressed. An action is composed of a mesh sequence, wherein each frame is represented by a static shape descriptor. Six state-of-the-art static descriptors are ...

article
3D video subjective quality: a new database and grade comparison study

This paper presents a research study on the subjective assessment of 3D video quality using a newly constructed 3D video database (3DVCL@FER). This database consists of 8 original 3D video sequences, each degraded with 22 different degradation types, ...

article
Saliency detection based on seed propagation in a multilayer graph

This paper presents a saliency detection algorithm based on the seed propagation in graph representation of image. First, the image is divided into over-segmented regions and a graph of the connected regions (nodes) with color similarity (edge weight) ...

article
An efficient multi-predictor reversible data hiding algorithm based on performance evaluation of different prediction schemes
Pages 2131–2157

With the broad development and evolution of digital data exchange, security has become an important issue in data storage and transmission since digital data can be easily manipulated and modified. Reversible data hiding algorithms are special class of ...

article
Affect representation and recognition in 3D continuous valence---arousal---dominance space
Pages 2159–2183

Currently, the focus of research on human affect recognition has shifted from six basic emotions to complex affect recognition in continuous two or three dimensional space due to the following challenges: (i) the difficulty in representing and analyzing ...

article
Morphological region-based initial contour algorithm for level set methods in image segmentation

Initial Contour (IC) is the essential step in level set image segmentation methods due to start the efficient process. However, the main issue with IC is how to generate the automatic technique in order to reduce the human interaction and moreover, ...

article
Appearance-based gaze estimation under slight head motion

At present a lot of gaze estimation methods can get accurate result under ideal conditions, but some practical issues are still the biggest challenges affect the accuracy such as head motion and eye blinking. Improving the accuracy of gaze estimation ...

article
Multimodal speaker clustering in full length movies

Multimodal clustering/diarization tries to answer the question "who spoke when" by using audio and visual information. Diarizationconsists of two steps, at first segmentation of the audio information and detection of the speech segments and then ...

article
Mean Laplacian mappings-based difference LDA for face recognition

This paper proposes a difference LDA based on mean Laplacian mappings. For each pixel, we firstly estimate multiple mean Laplacian mappings which include an odd and even and full mean Laplacian mappings, and generate three different images respectively. ...

Comments