A virtual mouse interface with a two-layered Bayesian network
During the last decade, many natural interaction methods between human and computer have been introduced. They were developed for substitutions of keyboard and mouse devices so that they provide convenient interfaces. Recently, many studies on vision ...
HEVC-based lossless intra coding for efficient still image compression
Latest advancements in capture and display technologies demand better compression techniques for the storage and transmission of still images and video. High efficiency video coding (HEVC) is the latest video compression standard developed by the joint ...
An adaptive edge-preserving image denoising technique using patch-based weighted-SVD filtering in wavelet domain
Image denoising has always been one of the standard problems in image processing and computer vision. It is always recommendable for a denoising method to preserve important image features, such as edges, corners, etc., during its execution. Image ...
Motion trajectory of human arms based on the dual quaternion with motion tracker
In this paper, we present an algorithm for human motion capture of the real-time motion trajectory of human arms based on wireless inertial 3D motion trackers. It aims to improve the accuracy of inertial motion captures and quickly reconstruct some ...
Unconstrained face verification with a dual-layer block-based metric learning
In this paper, a dual-layer block-based metric learning technique is proposed to better discriminate the face image pairs and accelerate the overall verification process under the unconstrained environment. The input images are processed as blocks to ...
Region image sharing with various secrecy levels
In most secret image sharing schemes, the secrecy level of each pixel is the same. However, in real applications, different pixels may require different secrecy levels. For example, in a patient's medical image, the region with the patient's name must ...
A web-based tool for fast instance-level labeling of videos and the creation of spatiotemporal media fragments
This paper presents a web-based interactive tool for time-efficient instance-level spatiotemporal labeling of videos, based on the re-detection of manually selected objects of interest that appear in them. The developed tool allows the user to select a ...
A new teleconference system with a fast technique in HEVC coding
Tele-Communications play an important role nowadays. Globalization has led the requirement for traversed communication. Therefore a multimedia system takes an influential act in the comprehensive communication between the regions. Teleconferencing ...
An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography
The Session Initiation Protocol (SIP) is a signaling protocol widely applied in the world of multimedia communication. Numerous SIP authenticated key agreement schemes have been proposed with the purpose of ensuring security communication. Farash ...
Breaking a novel image encryption scheme based on an improper fractional order chaotic system
In this paper, we analyze the security of a recent image encryption algorithm based on an improper fractional-order chaotic system suggested by Zhao et al. The fatal flaw in the cryptosystem is that the keystream generated depends on neither the plain-...
Adaptive (k, F1) interpolation-based hiding scheme
In 2012, Lee et al. proposed an interpolation technique with neighboring pixels (INP) as the base to conceal secret information in predicted pixels. Their method can effectively predict the pixel between two neighboring pixels. However, the different ...
ILSBMR: improved LSBMR (ILSBMR) method
The Least Significant Bit Matching Revisited (LSBMR) is among the most commonly used methods on image steganography, aiming to make only smaller changes in an image. While security is considered as one of the basic evaluation criteria for steganography ...
Image structure rebuilding technique using fractal dimension on the best match patch searching
Since most images were built with regular textures and structures, the exemplar-based inpainting technique has become a brand-new solution for renovating degraded images by searching a match patch. This characteristic has also been named as the local ...
Secure multi-group data hiding based on gemd map
Numerous data hiding schemes have been recently proposed based on section-wise strategy. The purpose of these approaches is to enhance security by using a unique key to generate a table. But these approaches are not matched between the embedding secret ...
A new approach for texture segmentation based on NBP method
Nowadays, image processing is an interesting research area due to the growth of the communication technologies. Matching problem, which consists of localizing one texture in an image, that contains several textures is one of the fundamental problem of ...
Multiple human tracking based on distributed collaborative cameras
Due to the horizon limitation of single camera, it is difficult for single camera based multi-object tracking system to track multiple objects accurately. In addition, the possible object occlusion and ambiguous appearances often degrade the performance ...
Optimization algorithm based on texture feature and frame correlation in HEVC
Newly proposed video standard High Efficiency Video Coding (HEVC) achieves higher compression performance than previous ones. In this paper, we propose a novel algorithm for intra prediction, which scales the complexity of pictures' texture to perform ...
Full band watermarking in DCT domain with Weibull model
In the framework of maximum-likelihood detection for image watermarking schemes, the conventional Generalized Gaussian Distribution (GGD), Cauchy and Student's t distributions often fail to model the pulse-like distributions, such as Discrete Cosine ...
Fast CU size decision and mode decision algorithm for intra prediction in HEVC
In the intra prediction process, High Efficiency Video Coding (HEVC) provides a quadtree-based coding unit (CU) block partitioning structure and up to 35 kinds of prediction modes to improve the coding performance. These technologies improve the coding ...
Rain streak removal by multi-frame-based anisotropic filtering
Dynamic weather conditions, such as rain and snow, often produce strong intensity discontinuity among frames, thus seriously degrade their visual or compression performance. How to remove these artifacts is a challenging task and has been intensively ...
Robust object tracking based on sparse representation and incremental weighted PCA
Object tracking plays a crucial role in many applications of computer vision, but it is still a challenging problem due to the variations of illumination, shape deformation and occlusion. A new robust tracking method based on incremental weighted PCA ...
On the retrieval of 3D mesh sequences of human actions
In this paper, the problem of unsupervised human action retrieval in 3D mesh sequences is addressed. An action is composed of a mesh sequence, wherein each frame is represented by a static shape descriptor. Six state-of-the-art static descriptors are ...
3D video subjective quality: a new database and grade comparison study
This paper presents a research study on the subjective assessment of 3D video quality using a newly constructed 3D video database (3DVCL@FER). This database consists of 8 original 3D video sequences, each degraded with 22 different degradation types, ...
Saliency detection based on seed propagation in a multilayer graph
This paper presents a saliency detection algorithm based on the seed propagation in graph representation of image. First, the image is divided into over-segmented regions and a graph of the connected regions (nodes) with color similarity (edge weight) ...
An efficient multi-predictor reversible data hiding algorithm based on performance evaluation of different prediction schemes
With the broad development and evolution of digital data exchange, security has become an important issue in data storage and transmission since digital data can be easily manipulated and modified. Reversible data hiding algorithms are special class of ...
Affect representation and recognition in 3D continuous valence---arousal---dominance space
Currently, the focus of research on human affect recognition has shifted from six basic emotions to complex affect recognition in continuous two or three dimensional space due to the following challenges: (i) the difficulty in representing and analyzing ...
Morphological region-based initial contour algorithm for level set methods in image segmentation
Initial Contour (IC) is the essential step in level set image segmentation methods due to start the efficient process. However, the main issue with IC is how to generate the automatic technique in order to reduce the human interaction and moreover, ...
Appearance-based gaze estimation under slight head motion
At present a lot of gaze estimation methods can get accurate result under ideal conditions, but some practical issues are still the biggest challenges affect the accuracy such as head motion and eye blinking. Improving the accuracy of gaze estimation ...
Multimodal speaker clustering in full length movies
Multimodal clustering/diarization tries to answer the question "who spoke when" by using audio and visual information. Diarizationconsists of two steps, at first segmentation of the audio information and detection of the speech segments and then ...
Mean Laplacian mappings-based difference LDA for face recognition
This paper proposes a difference LDA based on mean Laplacian mappings. For each pixel, we firstly estimate multiple mean Laplacian mappings which include an odd and even and full mean Laplacian mappings, and generate three different images respectively. ...